Sciweavers

1298 search results - page 19 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
USS
2010
14 years 11 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
AIME
2005
Springer
15 years 7 months ago
Towards Information Visualization and Clustering Techniques for MRI Data Sets
Abstract. The paper deals with the integrated use of Information Visualization techniques and clustering algorithms to analyze Magnetic Resonance Imaging (MRI) data sets. The paper...
Umberto Castellani, Carlo Combi, Pasquina Marzola,...
114
Voted
WSOM
2009
Springer
15 years 8 months ago
Career-Path Analysis Using Optimal Matching and Self-Organizing Maps
Abstract. This paper is devoted to the analysis of career paths and employability. The state-of-the-art on this topic is rather poor in methodologies. Some authors propose distance...
Sébastien Massoni, Madalina Olteanu, Patric...
ISPD
2005
ACM
188views Hardware» more  ISPD 2005»
15 years 7 months ago
A semi-persistent clustering technique for VLSI circuit placement
Placement is a critical component of today's physical synthesis flow with tremendous impact on the final performance of VLSI designs. However, it accounts for a significant p...
Charles J. Alpert, Andrew B. Kahng, Gi-Joon Nam, S...
100
Voted
CMMR
2009
Springer
164views Music» more  CMMR 2009»
15 years 6 months ago
AllThatSounds: Associative Semantic Categorization of Audio Data
Finding appropriate and high-quality audio files for the creation of a sound track nowadays presents a serious hurdle to many media producers. As most digital sound archives rest...
Julian Rubisch, Matthias Husinsky, Hannes Raffased...