Sciweavers

1298 search results - page 162 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
134
Voted
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 9 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
136
Voted
CLUSTER
2008
IEEE
15 years 10 months ago
An OSD-based approach to managing directory operations in parallel file systems
—Distributed file systems that use multiple servers to store data in parallel are becoming commonplace. Much work has already gone into such systems to maximize data throughput....
Nawab Ali, Ananth Devulapalli, Dennis Dalessandro,...
122
Voted
CLUSTER
2003
IEEE
15 years 8 months ago
Improving the Performance of MPI Derived Datatypes by Optimizing Memory-Access Cost
The MPI Standard supports derived datatypes, which allow users to describe noncontiguous memory layout and communicate noncontiguous data with a single communication function. Thi...
Surendra Byna, William D. Gropp, Xian-He Sun, Raje...
159
Voted
ADMA
2010
Springer
264views Data Mining» more  ADMA 2010»
15 years 1 months ago
Frequent Pattern Trend Analysis in Social Networks
Abstract. This paper describes an approach to identifying and comparing frequent pattern trends in social networks. A frequent pattern trend is defined as a sequence of time-stampe...
Puteri N. E. Nohuddin, Rob Christley, Frans Coenen...
114
Voted
NN
2006
Springer
153views Neural Networks» more  NN 2006»
15 years 3 months ago
An incremental network for on-line unsupervised classification and topology learning
This paper presents an on-line unsupervised learning mechanism for unlabeled data that are polluted by noise. Using a similarity thresholdbased and a local error-based insertion c...
Shen Furao, Osamu Hasegawa