Sciweavers

1298 search results - page 49 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
TON
2008
86views more  TON 2008»
15 years 1 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
KDD
2002
ACM
138views Data Mining» more  KDD 2002»
16 years 2 months ago
Learning to match and cluster large high-dimensional data sets for data integration
Part of the process of data integration is determining which sets of identifiers refer to the same real-world entities. In integrating databases found on the Web or obtained by us...
William W. Cohen, Jacob Richman
DMIN
2006
138views Data Mining» more  DMIN 2006»
15 years 3 months ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel
VDA
2010
169views Visualization» more  VDA 2010»
15 years 4 months ago
Techniques for precision-based visual analysis of projected data
The analysis of high-dimensional data is an important, yet inherently difficult problem. Projection techniques such as PCA, MDS, and SOM can be used to map high-dimensional data t...
Tobias Schreck, Tatiana von Landesberger, Sebastia...
CORR
2007
Springer
170views Education» more  CORR 2007»
15 years 1 months ago
The structure of verbal sequences analyzed with unsupervised learning techniques
Data mining allows the exploration of sequences of phenomena, whereas one usually tends to focus on isolated phenomena or on the relation between two phenomena. It offers invaluab...
Catherine Recanati, Nicoleta Rogovschi, Youn&egrav...