Sciweavers

1298 search results - page 120 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
83
Voted
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 9 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
JMLR
2011
133views more  JMLR 2011»
14 years 10 months ago
Operator Norm Convergence of Spectral Clustering on Level Sets
Following Hartigan (1975), a cluster is defined as a connected component of the t-level set of the underlying density, that is, the set of points for which the density is greater...
Bruno Pelletier, Pierre Pudlo
124
Voted
AAAI
2012
13 years 5 months ago
Discriminative Clustering via Generative Feature Mapping
Existing clustering methods can be roughly classified into two categories: generative and discriminative approaches. Generative clustering aims to explain the data and thus is ad...
Liwei Wang, Xiong Li, Zhuowen Tu, Jiaya Jia
FUIN
2011
358views Cryptology» more  FUIN 2011»
14 years 7 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
BMCBI
2005
112views more  BMCBI 2005»
15 years 3 months ago
Visualization methods for statistical analysis of microarray clusters
Background: The most common method of identifying groups of functionally related genes in microarray data is to apply a clustering algorithm. However, it is impossible to determin...
Matthew A. Hibbs, Nathaniel C. Dirksen, Kai Li, Ol...