Sciweavers

1298 search results - page 38 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BMCBI
2011
14 years 9 months ago
A novel approach to the clustering of microarray data via nonparametric density estimation
Background: Cluster analysis is a crucial tool in several biological and medical studies dealing with microarray data. Such studies pose challenging statistical problems due to di...
Riccardo De Bin, Davide Risso
TASLP
2008
120views more  TASLP 2008»
15 years 1 months ago
Rapid Speaker Adaptation Using Clustered Maximum-Likelihood Linear Basis With Sparse Training Data
Abstract-- Speaker space based adaptation methods for automatic speech recognition have been shown to provide significant performance improvements for tasks where only a few second...
Yun Tang, Richard Rose
PRDC
2006
IEEE
15 years 8 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...
ICDM
2009
IEEE
133views Data Mining» more  ICDM 2009»
15 years 8 months ago
On K-Means Cluster Preservation Using Quantization Schemes
This work examines under what conditions compression methodologies can retain the outcome of clustering operations. We focus on the popular k-Means clustering algorithm and we dem...
Deepak S. Turaga, Michail Vlachos, Olivier Versche...
KDD
1999
ACM
147views Data Mining» more  KDD 1999»
15 years 6 months ago
Text Mining: Finding Nuggets in Mountains of Textual Data
Text mining appliesthe sameanalytical functions of datamining to the domainof textual information, relying on sophisticatedtext analysis techniques that distill information from f...
Jochen Dörre, Peter Gerstl, Roland Seiffert