Sciweavers

1298 search results - page 182 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
131
Voted
DL
2000
Springer
210views Digital Library» more  DL 2000»
15 years 7 months ago
Extracting and visualizing semantic structures in retrieval results for browsing
The paper introduces an approach that organizes retrieval results semantically and displays them spatially for browsing. Latent Semantic Analysis as well as cluster techniques are...
Katy Börner
156
Voted
ICNP
2003
IEEE
15 years 8 months ago
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissem...
Wensheng Zhang, Guohong Cao, Thomas F. La Porta
126
Voted
LREC
2008
138views Education» more  LREC 2008»
15 years 4 months ago
Bridging the Gap between Linguists and Technology Developers: Large-Scale, Sociolinguistic Annotation for Dialect and Speaker Re
Recent years have seen increased interest within the speaker recognition community in high-level features including, for example, lexical choice, idiomatic expressions or syntacti...
Christopher Cieri, Stephanie Strassel, Meghan Lamm...
COMSUR
2006
87views more  COMSUR 2006»
15 years 3 months ago
Handover schemes in satellite networks: State-of-the-art and future research directions
Low Earth Orbit (LEO) satellites will work as an important component in future data communication networks. LEO satellites provide low end-to-end delays and efficient frequency spe...
Pulak K. Chowdhury, Mohammed Atiquzzaman, William ...
143
Voted
CVPR
2008
IEEE
15 years 3 months ago
Joint learning and dictionary construction for pattern recognition
We propose a joint representation and classification framework that achieves the dual goal of finding the most discriminative sparse overcomplete encoding and optimal classifier p...
Duc-Son Pham, Svetha Venkatesh