Sciweavers

1298 search results - page 36 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
VTC
2008
IEEE
147views Communications» more  VTC 2008»
15 years 8 months ago
Media Access Technique for Cluster-Based Vehicular Ad Hoc Networks
— We propose a hybrid media access technique for cluster-based vehicular networks. This technique integrates the centralization approach of cluster management and the universal w...
Zaydoun Y. Rawashdeh, Syed Masud Mahmud
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 8 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
NLDB
2005
Springer
15 years 7 months ago
The Role of Word Sense Disambiguation in Automated Text Categorization
Abstract. Automated Text Categorization has reached the levels of accuracy of human experts. Provided that enough training data is available, it is possible to learn accurate autom...
José María Gómez Hidalgo, Man...
CSB
2005
IEEE
205views Bioinformatics» more  CSB 2005»
15 years 7 months ago
Fractal Clustering for Microarray Data Analysis
DNA microarray experiments generate a substantial amount of information about global gene expression. Gene expression profiles can be represented as points in multi-dimensional sp...
Lu-Yong Wang, Ammaiappan Balasubramanian, Amit Cha...
CIKM
2009
Springer
15 years 8 months ago
Commentary-based video categorization and concept discovery
Social network contents are not limited to text but also multimedia. Dailymotion, YouTube, and MySpace are examples of successful sites which allow users to share videos among the...
Janice Kwan-Wai Leung, Chun Hung Li, Ting Keung Ip