Sciweavers

1298 search results - page 122 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
137
Voted
MLDM
1999
Springer
15 years 7 months ago
Non-hierarchical Clustering with Rival Penalized Competitive Learning for Information Retrieval
In large content-based image database applications, e cient information retrieval depends heavily on good indexing structures of the extracted features. While indexing techniques f...
Irwin King, Tak-Kan Lau
ICASSP
2009
IEEE
15 years 1 months ago
Phoneme cluster based state mapping for text-independent voice conversion
This paper takes phonetic information into account for data alignment in text-independent voice conversion. Hidden Markov Models are used for representing the phonetic structure o...
Meng Zhang, Jiaohua Tao, Jani Nurminen, Jilei Tian...
131
Voted
COMSWARE
2006
IEEE
15 years 9 months ago
Exploiting multi-channel clustering for power efficiency in sensor networks
Sensor networks typically comprise of a number of inexpensive small devices with processing, communication and sensing abilities that collaborate to perform a common task. Sensor d...
Ashima Gupta, Chao Gui, Prasant Mohapatra
139
Voted
SDM
2004
SIAM
224views Data Mining» more  SDM 2004»
15 years 4 months ago
Hierarchical Clustering for Thematic Browsing and Summarization of Large Sets of Association Rules
In this paper we propose a method for grouping and summarizing large sets of association rules according to the items contained in each rule. We use hierarchical clustering to par...
Alípio Jorge
127
Voted
DEXA
2005
Springer
77views Database» more  DEXA 2005»
15 years 9 months ago
An Optimal Skew-insensitive Join and Multi-join Algorithm for Distributed Architectures
Abstract. The development of scalable parallel database systems requires the design of efficient algorithms for the join operation which is the most frequent and expensive operatio...
Mostafa Bamha