Sciweavers

1298 search results - page 28 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
DSN
2011
IEEE
14 years 1 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
LREC
2008
120views Education» more  LREC 2008»
15 years 3 months ago
Division of Example Sentences Based on the Meaning of a Target Word Using Semi-Supervised Clustering
In this paper, we describe a system that divides example sentences (data set) into clusters, based on the meaning of the target word, using a semi-supervised clustering technique....
Hiroyuki Shinnou, Minoru Sasaki
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 7 months ago
Adaptive Clustering: Obtaining Better Clusters Using Feedback and Past Experience
Adaptive clustering uses external feedback to improve cluster quality; past experience serves to speed up execution time. An adaptive clustering environment is proposed that uses ...
Abraham Bagherjeiran, Christoph F. Eick, Chun-Shen...
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 2 months ago
Density-based clustering for real-time stream data
Existing data-stream clustering algorithms such as CluStream are based on k-means. These clustering algorithms are incompetent to find clusters of arbitrary shapes and cannot hand...
Yixin Chen, Li Tu
SDM
2003
SIAM
110views Data Mining» more  SDM 2003»
15 years 3 months ago
Mixture Models and Frequent Sets: Combining Global and Local Methods for 0-1 Data
We study the interaction between global and local techniques in data mining. Specifically, we study the collections of frequent sets in clusters produced by a probabilistic clust...
Jaakko Hollmén, Jouni K. Seppänen, Hei...