Sciweavers

1298 search results - page 57 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
TIME
1997
IEEE
15 years 7 months ago
On Effective Data Clustering in Bitemporal Databases
Temporal databases provide built-in supports for efficient recording and querying of time-evolving data. In this paper, data clustering issues in temporal database environment are...
Jong Soo Kim, Myoung-Ho Kim
100
Voted
ICML
2009
IEEE
16 years 4 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
150
Voted
OSDI
2006
ACM
16 years 3 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
SDM
2007
SIAM
184views Data Mining» more  SDM 2007»
15 years 4 months ago
Mining Naturally Smooth Evolution of Clusters from Dynamic Data
Many clustering algorithms have been proposed to partition a set of static data points into groups. In this paper, we consider an evolutionary clustering problem where the input d...
Yi Wang, Shi-Xia Liu, Jianhua Feng, Lizhu Zhou
BIBM
2008
IEEE
101views Bioinformatics» more  BIBM 2008»
15 years 9 months ago
Comparing and Clustering Flow Cytometry Data
Flow cytometry technique produces large, multidimensional datasets of properties of individual cells that are helpful for biomedical science and clinical research. This paper expl...
Lin Liu, Li Xiong, James J. Lu, Kim M. Gernert, Vi...