Sciweavers

1298 search results - page 147 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
151
Voted
ML
2010
ACM
127views Machine Learning» more  ML 2010»
15 years 2 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
118
Voted
ASWEC
2000
IEEE
15 years 8 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt
CLUSTER
2005
IEEE
15 years 9 months ago
A pipelined data-parallel algorithm for ILP
The amount of data collected and stored in databases is growing considerably for almost all areas of human activity. Processing this amount of data is very expensive, both humanly...
Nuno A. Fonseca, Fernando M. A. Silva, Víto...
129
Voted
ACCV
2010
Springer
14 years 10 months ago
Optimizing Visual Vocabularies Using Soft Assignment Entropies
The state of the art for large database object retrieval in images is based on quantizing descriptors of interest points into visual words. High similarity between matching image r...
Yubin Kuang, Kalle Åström, Lars Kopp, M...
136
Voted
CIKM
2011
Springer
14 years 3 months ago
Probabilistic near-duplicate detection using simhash
This paper offers a novel look at using a dimensionalityreduction technique called simhash [8] to detect similar document pairs in large-scale collections. We show that this algo...
Sadhan Sood, Dmitri Loguinov