Sciweavers

1298 search results - page 234 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
AINA
2007
IEEE
15 years 8 months ago
A Class-Based Search System in Unstructured P2P Networks
— Efficient searching is one of the important design issues in peer-to-peer (P2P) networks. Among various searching techniques, semantic-based searching has drawn significant a...
Juncheng Huang, Xiuqi Li, Jie Wu
CIKM
2008
Springer
15 years 3 months ago
Learning the distance metric in a personal ontology
Personal ontology construction is the task of sorting through relevant materials, identifying the main topics and concepts, and organizing them to suit personal needs. Automatic c...
Hui Yang, Jamie Callan
MINENET
2005
ACM
15 years 7 months ago
A first step toward understanding inter-domain routing dynamics
BGP updates are triggered by a variety of events such as link failures, resets, routers crashing, configuration changes, and so on. Making sense of these updates and identifying ...
Kuai Xu, Jaideep Chandrashekar, Zhi-Li Zhang
GECCO
2005
Springer
134views Optimization» more  GECCO 2005»
15 years 7 months ago
Predicting mining activity with parallel genetic algorithms
We explore several different techniques in our quest to improve the overall model performance of a genetic algorithm calibrated probabilistic cellular automata. We use the Kappa ...
Sam Talaie, Ryan E. Leigh, Sushil J. Louis, Gary L...
DAWAK
1999
Springer
15 years 6 months ago
Implementation of Multidimensional Index Structures for Knowledge Discovery in Relational Databases
Efficient query processing is one of the basic needs for data mining algorithms. Clustering algorithms, association rule mining algorithms and OLAP tools all rely on efficient quer...
Stefan Berchtold, Christian Böhm, Hans-Peter ...