Sciweavers

1298 search results - page 154 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BPM
2008
Springer
192views Business» more  BPM 2008»
15 years 5 months ago
Trace Clustering in Process Mining
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Minseok Song, Christian W. Günther, Wil M. P....
167
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 10 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
166
Voted
CIKM
2011
Springer
14 years 3 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
EVOW
2005
Springer
15 years 9 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
ICML
2004
IEEE
16 years 4 months ago
Boosting margin based distance functions for clustering
The performance of graph based clustering methods critically depends on the quality of the distance function, used to compute similarities between pairs of neighboring nodes. In t...
Tomer Hertz, Aharon Bar-Hillel, Daphna Weinshall