Sciweavers

1298 search results - page 141 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
154
Voted
BMCBI
2006
213views more  BMCBI 2006»
15 years 3 months ago
CoXpress: differential co-expression in gene expression data
Background: Traditional methods of analysing gene expression data often include a statistical test to find differentially expressed genes, or use of a clustering algorithm to find...
Michael Watson
205
Voted
KDD
2000
ACM
222views Data Mining» more  KDD 2000»
15 years 7 months ago
Interactive exploration of very large relational datasets through 3D dynamic projections
The grand tour, one of the most popular methods for multidimensional data exploration, is based on orthogonally projecting multidimensional data to a sequence of lower dimensional...
Li Yang
126
Voted
ICDM
2010
IEEE
148views Data Mining» more  ICDM 2010»
15 years 1 months ago
Comparing Vessel Trajectories Using Geographical Domain Knowledge and Alignments
Abstract--This paper presents a similarity measure that combines low-level trajectory information with geographical domain knowledge to compare vessel trajectories. The similarity ...
Gerben de Vries, Willem Robert van Hage, Maarten v...
137
Voted
WISEC
2010
ACM
15 years 3 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
138
Voted
SAC
2005
ACM
15 years 9 months ago
The role of visualization in effective data cleaning
Using visualization techniques to assist conventional data mining tasks has attracted considerable interest in recent years. This paper addresses a challenging issue in the use of...
Yu Qian, Kang Zhang