Sciweavers

1298 search results - page 243 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
159
Voted
SDM
2012
SIAM
208views Data Mining» more  SDM 2012»
13 years 4 months ago
Mining Massive Archives of Mice Sounds with Symbolized Representations
Many animals produce long sequences of vocalizations best described as “songs.” In some animals, such as crickets and frogs, these songs are relatively simple and repetitive c...
Jesin Zakaria, Sarah Rotschafer, Abdullah Mueen, K...
ICDE
2005
IEEE
185views Database» more  ICDE 2005»
16 years 3 months ago
A Multiresolution Symbolic Representation of Time Series
Efficiently and accurately searching for similarities among time series and discovering interesting patterns is an important and non-trivial problem. In this paper, we introduce a...
Vasileios Megalooikonomou, Qiang Wang, Guo Li, Chr...
MICCAI
2005
Springer
16 years 2 months ago
A Prediction Framework for Cardiac Resynchronization Therapy Via 4D Cardiac Motion Analysis
Abstract. We propose a novel framework to predict pacing sites in the left ventricle (LV) of a heart and its result can be used to assist pacemaker implantation and programming in ...
Heng Huang, Li Shen, Rong Zhang, Fillia Makedon, B...
WWW
2010
ACM
15 years 8 months ago
Sampling community structure
We propose a novel method, based on concepts from expander graphs, to sample communities in networks. We show that our sampling method, unlike previous techniques, produces subgra...
Arun S. Maiya, Tanya Y. Berger-Wolf
127
Voted
AUTONOMICS
2009
ACM
15 years 8 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...