Sciweavers

1298 search results - page 34 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
IDEAL
2007
Springer
15 years 8 months ago
Partitioning-Clustering Techniques Applied to the Electricity Price Time Series
Clustering is used to generate groupings of data from a large dataset, with the intention of representing the behavior of a system as accurately as possible. In this sense, cluster...
Francisco Martínez-Álvarez, Alicia T...
ADVIS
2004
Springer
15 years 7 months ago
Multiple Sets of Rules for Text Categorization
An important issue in text mining is how to make use of multiple pieces knowledge discovered to improve future decisions. In this paper, we propose a new approach to combining mult...
Yaxin Bi, Terry J. Anderson, Sally I. McClean
EUROSYS
2010
ACM
15 years 11 months ago
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling
As organizations start to use data-intensive cluster computing systems like Hadoop and Dryad for more applications, there is a growing need to share clusters between users. Howeve...
Matei Zaharia, Dhruba Borthakur, Joydeep Sen Sarma...
CVPR
2008
IEEE
16 years 4 months ago
Geo-located image analysis using latent representations
Image categorization is undoubtedly one of the most challenging open problems faced in Computer Vision, far from being solved by employing pure visual cues. Recently, additional t...
Marco Cristani, Alessandro Perina, Umberto Castell...
IPCCC
2005
IEEE
15 years 7 months ago
SECK: survivable and efficient clustered keying for wireless sensor networks
A wireless sensor network (WSN) typically consists of a large number of small sensor nodes and one or more highend control and data aggregation nodes. Sensor nodes have limited co...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...