Sciweavers

1298 search results - page 250 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
JVCA
2007
132views more  JVCA 2007»
14 years 9 months ago
Interactive and flexible motion transition
In this paper, we present an example-based motion synthesis technique. Users can interactively control the virtual character to perform desired actions in any order. The desired a...
Jen-Yu Peng, I-Chen Lin, Jui-Hsiang Chao, Yan-Ju C...
CLOUDCOM
2010
Springer
14 years 7 months ago
Voronoi-Based Geospatial Query Processing with MapReduce
Geospatial queries (GQ) have been used in a wide variety of applications such as decision support systems, profile-based marketing, bioinformatics and GIS. Most of the existing qu...
Afsin Akdogan, Ugur Demiryurek, Farnoush Banaei Ka...
ICSE
2012
IEEE-ACM
12 years 12 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
15 years 10 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
IDA
1998
Springer
14 years 9 months ago
Self-Organized-Expert Modular Network for Classification of Spatiotemporal Sequences
We investigate a form of modular neural network for classification with (a) pre-separated input vectors entering its specialist (expert) networks, (b) specialist networks which ar...
Sylvian R. Ray, William H. Hsu