Sciweavers

1298 search results - page 15 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
DAC
2008
ACM
15 years 10 months ago
On reliable modular testing with vulnerable test access mechanisms
In modular testing of system-on-a-chip (SoC), test access mechanisms (TAMs) are used to transport test data between the input/output pins of the SoC and the cores under test. Prio...
Lin Huang, Feng Yuan, Qiang Xu
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li
EUROPAR
2007
Springer
15 years 3 months ago
Parallel Nearest Neighbour Algorithms for Text Categorization
In this paper we describe the parallelization of two nearest neighbour classification algorithms. Nearest neighbour methods are well-known machine learning techniques. They have be...
Reynaldo Gil-García, José Manuel Bad...
114
Voted
SIGIR
2005
ACM
15 years 3 months ago
Automatic web query classification using labeled and unlabeled training data
Accurate topical categorization of user queries allows for increased effectiveness, efficiency, and revenue potential in general-purpose web search systems. Such categorization be...
Steven M. Beitzel, Eric C. Jensen, Ophir Frieder, ...
WCE
2007
14 years 10 months ago
A Comparison of Classification Techniques for Technical Text Passages
— Our work explores the use of several text categorization techniques for classification of manufacturing quality defect and service shop data sets into fixed categories. Althoug...
Mark M. Kornfein, Helena Goldfarb