Sciweavers

1298 search results - page 131 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
122
Voted
IDA
2005
Springer
15 years 9 months ago
From Local Pattern Mining to Relevant Bi-cluster Characterization
Clustering or bi-clustering techniques have been proved quite useful in many application domains. A weakness of these techniques remains the poor support for grouping characterizat...
Ruggero G. Pensa, Jean-François Boulicaut
115
Voted
ICMCS
2005
IEEE
183views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Sports Event Recognition Using Layered HMMS
The recognition of events in video data is a subject of much current interest. In this paper, we address several issues related to this topic. The first one is overfitting when ...
Mark Barnard, Jean-Marc Odobez
DIS
2001
Springer
15 years 8 months ago
Dynamic Aggregation to Support Pattern Discovery: A Case Study with Web Logs
Rapid growth of digital data collections is overwhelming the capabilities of humans to comprehend them without aid. The extraction of useful data from large raw data sets is someth...
Lida Tang, Ben Shneiderman
145
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Swift: Scalable weighted iterative sampling for flow cytometry clustering
Flow cytometry (FC) is a powerful technology for rapid multivariate analysis and functional discrimination of cells. Current FC platforms generate large, high-dimensional datasets...
Iftekhar Naim, Suprakash Datta, Gaurav Sharma, Jam...
PPOPP
2006
ACM
15 years 9 months ago
Exploiting distributed version concurrency in a transactional memory cluster
We investigate a transactional memory runtime system providing scaling and strong consistency for generic C++ and SQL applications on commodity clusters. We introduce a novel page...
Kaloian Manassiev, Madalin Mihailescu, Cristiana A...