Sciweavers

1298 search results - page 135 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
139
Voted
BMCBI
2007
147views more  BMCBI 2007»
15 years 3 months ago
Statistical analysis and significance testing of serial analysis of gene expression data using a Poisson mixture model
Background: Serial analysis of gene expression (SAGE) is used to obtain quantitative snapshots of the transcriptome. These profiles are count-based and are assumed to follow a Bin...
Scott D. Zuyderduyn
157
Voted
DIS
2003
Springer
15 years 8 months ago
Clustering Orders
We propose a method of using clustering techniques to partition a set of orders. We define the term order as a sequence of objects that are sorted according to some property, such...
Toshihiro Kamishima, Jun Fujiki
IV
2005
IEEE
130views Visualization» more  IV 2005»
15 years 9 months ago
A Comparison of Visual and Haptic Object Representations Based on Similarity
Do we judge similarity between two objects to be the same using touch and vision? We investigated this using psychophysical experiments in which subjects rated the similarity betw...
Theresa Cooke, Christian Wallraven, Heinrich H. B&...
112
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
16 years 4 months ago
Enhanced word clustering for hierarchical text classification
In this paper we propose a new information-theoretic divisive algorithm for word clustering applied to text classification. In previous work, such "distributional clustering&...
Inderjit S. Dhillon, Subramanyam Mallela, Rahul Ku...