Sciweavers

1298 search results - page 194 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
121
Voted
ISPDC
2008
IEEE
15 years 9 months ago
Load Balancing in Mesh-like Computations using Prediction Binary Trees
We present a load-balancing technique that exploits the temporal coherence, among successive computation phases, in mesh-like computations to be mapped on a cluster of processors....
Biagio Cosenza, Gennaro Cordasco, Rosario De Chiar...
SOCIALCOM
2010
15 years 1 months ago
Using Text Analysis to Understand the Structure and Dynamics of the World Wide Web as a Multi-Relational Graph
A representation of the World Wide Web as a directed graph, with vertices representing web pages and edges representing hypertext links, underpins the algorithms used by web search...
Harish Sethu, Alexander Yates
CEE
2008
119views more  CEE 2008»
15 years 3 months ago
A clustering-based prefetching scheme on a Web cache environment
Web prefetching is an attractive solution to reduce the network resources consumed by Web services as well as the access latencies perceived by Web users. Unlike Web caching, whic...
George Pallis, Athena Vakali, Jaroslav Pokorn&yacu...
DKE
2002
218views more  DKE 2002»
15 years 3 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
ICANN
2003
Springer
15 years 8 months ago
An Adaptable Gaussian Neuro-Fuzzy Classifier
The concept of semantic and context aware intelligent systems provides a vision for the Information Society where the emphasis lays on computing applications that can sense context...
Minas Pertselakis, Dimitrios S. Frossyniotis, Andr...