Sciweavers

1298 search results - page 39 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
CVPR
2007
IEEE
16 years 4 months ago
Discriminative Cluster Refinement: Improving Object Category Recognition Given Limited Training Data
A popular approach to problems in image classification is to represent the image as a bag of visual words and then employ a classifier to categorize the image. Unfortunately, a si...
Liu Yang, Rong Jin, Caroline Pantofaru, Rahul Sukt...
FPL
2006
Springer
125views Hardware» more  FPL 2006»
15 years 5 months ago
Application-Specific Memory Interleaving for FPGA-Based Grid Computations: A General Design Technique
Many compute-intensive applications generate single result values by accessing clusters of nearby points in grids of one, two, or more dimensions. Often, the performance of FGPA i...
Tom Van Court, Martin C. Herbordt
SECON
2010
IEEE
14 years 11 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
CG
2007
Springer
15 years 1 months ago
Visualizing time-oriented data - A systematic view
The analysis of time-oriented data is an important task in many application scenarios. In recent years, a variety of techniques for visualizing such data have been published. This...
Wolfgang Aigner, Silvia Miksch, Wolfgang Müll...
BIBE
2004
IEEE
107views Bioinformatics» more  BIBE 2004»
15 years 5 months ago
Enhanced pClustering and Its Applications to Gene Expression Data
Clustering has been one of the most popular methods to discover useful biological insights from DNA microarray. An interesting paradigm is simultaneous clustering of both genes an...
Sungroh Yoon, Christine Nardini, Luca Benini, Giov...