Sciweavers

1298 search results - page 225 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ICCS
2004
Springer
15 years 7 months ago
An Atmospheric Sciences Workflow and Its Implementation with Web Services
: Computational and data Grids couple geographically distributed resources such as high performance computers, workstations, clusters, and scientific instruments. Grid Workflows co...
David Abramson, Jagan Kommineni, John L. McGregor,...
WWW
2010
ACM
15 years 2 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery
TNN
1998
76views more  TNN 1998»
15 years 1 months ago
Multiobjective genetic algorithm partitioning for hierarchical learning of high-dimensional pattern spaces: a learning-follows-d
— In this paper, we present a novel approach to partitioning pattern spaces using a multiobjective genetic algorithm for identifying (near-)optimal subspaces for hierarchical lea...
Rajeev Kumar, Peter Rockett
DASFAA
2009
IEEE
136views Database» more  DASFAA 2009»
15 years 8 months ago
A Two-Tire Index Structure for Approximate String Matching with Block Moves
Many applications need to solve the problem of approximate string matching with block moves. It is an NP-Complete problem to compute block edit distance between two strings. Our go...
Bin Wang, Long Xie, Guoren Wang
WWW
2009
ACM
13 years 10 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other user...
J. Kunegis, A. Lomatzsch, and C. Bauckhage