Sciweavers

1298 search results - page 152 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
CIKM
2001
Springer
15 years 8 months ago
PowerDB-IR - Information Retrieval on Top of a Database Cluster
Our current concern is a scalable infrastructure for information retrieval (IR) with up-to-date retrieval results in the presence of frequent, continuous updates. Timely processin...
Torsten Grabs, Klemens Böhm, Hans-Jörg S...
141
Voted
JCP
2008
119views more  JCP 2008»
15 years 3 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
142
Voted
SIGIR
2006
ACM
15 years 9 months ago
Near-duplicate detection by instance-level constrained clustering
For the task of near-duplicated document detection, both traditional fingerprinting techniques used in database community and bag-of-word comparison approaches used in information...
Hui Yang, James P. Callan
130
Voted
BMCBI
2006
216views more  BMCBI 2006»
15 years 3 months ago
Machine learning approaches to supporting the identification of photoreceptor-enriched genes based on expression data
Background: Retinal photoreceptors are highly specialised cells, which detect light and are central to mammalian vision. Many retinal diseases occur as a result of inherited dysfu...
Haiying Wang, Huiru Zheng, David Simpson, Francisc...
131
Voted
JCM
2007
105views more  JCM 2007»
15 years 3 months ago
Generalization Capabilities Enhancement of a Learning System by Fuzzy Space Clustering
Abstract— We have used measurements taken on real network to enhance the performance of our radio network planning tool. A distribution learning technique is adopted to realize t...
Zakaria Nouir, Berna Sayraç, Benoît F...