Sciweavers

1298 search results - page 223 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ISVC
2010
Springer
15 years 12 days ago
A Human Inspired Local Ratio-Based Algorithm for Edge Detection in Fluorescent Cell Images
Abstract. We have developed a new semi-automated method for segmenting images of biological cells seeded at low density on tissue culture substrates, which we use to improve the ge...
Joe Chalfoun, Alden Dima, Adele P. Peskin, John T....
EDBT
2010
ACM
170views Database» more  EDBT 2010»
15 years 5 months ago
Augmenting OLAP exploration with dynamic advanced analytics
Online Analytical Processing (OLAP) is a popular technique for explorative data analysis. Usually, a fixed set of dimensions (such as time, place, etc.) is used to explore and ana...
Benjamin Leonhardi, Bernhard Mitschang, Rubé...
ISMIR
2005
Springer
179views Music» more  ISMIR 2005»
15 years 7 months ago
Databionic Visualization of Music Collections According to Perceptual Distance
We describe the MusicMiner system for organizing large collections of music with databionic mining techniques. Low level audio features are extracted from the raw audio data on sh...
Fabian Mörchen, Alfred Ultsch, Mario Nöc...
EUC
2007
Springer
15 years 3 months ago
GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger
Abstract. Location is the most essential presence information for mobile users. In this paper, we present an improved time-based clustering technique for extracting significant lo...
Dexter H. Hu, Cho-Li Wang
167
Voted
AINA
2010
IEEE
14 years 5 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...