Sciweavers

1298 search results - page 176 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
126
Voted
IVC
2007
94views more  IVC 2007»
15 years 3 months ago
Vector quantization and fuzzy ranks for image reconstruction
The problem of clustering is often addressed with techniques based on a Voronoi partition of the data space. Vector quantization is based on a similar principle, but it is a diffe...
Stefano Rovetta, Francesco Masulli
WWW
2010
ACM
15 years 10 months ago
CETR: content extraction via tag ratios
We present Content Extraction via Tag Ratios (CETR) – a method to extract content text from diverse webpages by using the HTML document’s tag ratios. We describe how to comput...
Tim Weninger, William H. Hsu, Jiawei Han
131
Voted
AIME
2007
Springer
15 years 9 months ago
Hierarchical Latent Class Models and Statistical Foundation for Traditional Chinese Medicine
Traditional Chinese medicine (TCM) is an important avenue for disease prevention and treatment for the Chinese people and is gaining popularity among others. However, many remain s...
Nevin Lianwen Zhang, Shihong Yuan, Tao Chen, Yi Wa...
145
Voted
JWSR
2007
172views more  JWSR 2007»
15 years 3 months ago
Service Class Driven Dynamic Data Source Discovery with DynaBot
: Dynamic Web data sources – sometimes known collectively as the Deep Web – increase the utility of the Web by providing intuitive access to data repositories anywhere that Web...
Daniel Rocco, James Caverlee, Ling Liu, Terence Cr...
IISWC
2006
IEEE
15 years 9 months ago
MineBench: A Benchmark Suite for Data Mining Workloads
Abstract— Data mining constitutes an important class of scientific and commercial applications. Recent advances in data extraction techniques have created vast data sets, which ...
Ramanathan Narayanan, Berkin Özisikyilmaz, Jo...