Sciweavers

1298 search results - page 143 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
113
Voted
ISI
2007
Springer
15 years 9 months ago
Detecting Anomalies in Graphs
Graph data represents relationships, connections, or affinities. Innocent relationships produce repeated, and so common, substructures in graph data. We present techniques for dis...
David B. Skillicorn
144
Voted
ICDCS
2002
IEEE
15 years 8 months ago
Clustering Algorithms for Content-Based Publication-Subscription Systems
We consider efficient communication schemes based on both network-supported and application-level multicast techniques for content-based publication-subscription systems. We show...
Anton Riabov, Zhen Liu, Joel L. Wolf, Philip S. Yu...
144
Voted
ISVC
2010
Springer
15 years 2 months ago
Combining Automated and Interactive Visual Analysis of Biomechanical Motion Data
Abstract. We present a framework for combining automated and interactive visual analysis techniques for use on high-resolution biomechanical data. Analyzing the complex 3D motion o...
Scott Spurlock, Remco Chang, Xiaoyu Wang, George A...
116
Voted
ISAAC
2007
Springer
109views Algorithms» more  ISAAC 2007»
15 years 9 months ago
Separating Populations with Wide Data: A Spectral Analysis
In this paper, we consider the problem of partitioning a small data sample drawn from a mixture of k product distributions. We are interested in the case that individual features a...
Avrim Blum, Amin Coja-Oghlan, Alan M. Frieze, Shuh...
123
Voted
EDM
2010
152views Data Mining» more  EDM 2010»
15 years 5 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim