Sciweavers

1298 search results - page 127 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
96
Voted
INFORMATICALT
2008
92views more  INFORMATICALT 2008»
15 years 3 months ago
On Structural Analysis of Parliamentarian Voting Data
We investigate applicability of quantitative methods to discover the most fundamental structural properties of the most reliable political data in Lithuania. Namely, we analyze vot...
Tomas Krilavicius, Antanas Zilinskas
158
Voted
WLP
2004
Springer
15 years 8 months ago
Deductive and Inductive Reasoning on Spatio-Temporal Data
Abstract. We present a framework for a declarative approach to spatiotemporal reasoning on geographical data, based on the constraint logical language STACLP, which offers deducti...
Mirco Nanni, Alessandra Raffaetà, Chiara Re...
220
Voted
GIS
2004
ACM
16 years 4 months ago
Discovering personal gazetteers: an interactive clustering approach
Personal gazetteers record individuals' most important places, such as home, work, grocery store, etc. Using personal gazetteers in location-aware applications offers additio...
Changqing Zhou, Dan Frankowski, Pamela J. Ludford,...
130
Voted
ICML
2010
IEEE
15 years 4 months ago
Power Iteration Clustering
We present a simple and scalable graph clustering method called power iteration clustering (PIC). PIC finds a very low-dimensional embedding of a dataset using truncated power ite...
Frank Lin, William W. Cohen
151
Voted
KDD
2008
ACM
156views Data Mining» more  KDD 2008»
16 years 3 months ago
Unsupervised deduplication using cross-field dependencies
Recent work in deduplication has shown that collective deduplication of different attribute types can improve performance. But although these techniques cluster the attributes col...
Robert Hall, Charles A. Sutton, Andrew McCallum