Sciweavers

1298 search results - page 59 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
SIGMOD
2007
ACM
198views Database» more  SIGMOD 2007»
16 years 3 months ago
Addressing diverse user preferences in SQL-query-result navigation
Database queries are often exploratory and users often find their queries return too many answers, many of them irrelevant. Existing work either categorizes or ranks the results t...
Zhiyuan Chen, Tao Li
ICDS
2009
IEEE
15 years 10 months ago
A Hybrid Approach for Clustering-Based Data Aggregation in Wireless Sensor Networks
—In a wireless sensor network application for tracking multiple mobile targets, large amounts of sensing data can be generated by a number of sensors. These data must be controll...
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, Sang-Jo...
DMIN
2006
146views Data Mining» more  DMIN 2006»
15 years 4 months ago
A Comparison of Two Document Clustering Approaches for Clustering Medical Documents
Medical data is often presented as free text in the form of medical reports. Such documents contain important information about patients, disease progression and management, but ar...
Fathi H. Saad, Beatriz de la Iglesia, Duncan G. Be...
SDM
2003
SIAM
184views Data Mining» more  SDM 2003»
15 years 4 months ago
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data
The problem of finding clusters in data is challenging when clusters are of widely differing sizes, densities and shapes, and when the data contains large amounts of noise and out...
Levent Ertöz, Michael Steinbach, Vipin Kumar
FSS
2002
99views more  FSS 2002»
15 years 3 months ago
Extreme physical information and objective function in fuzzy clustering
Fuzzy clustering algorithms have been widely studied and applied in a variety of areas. They become the major techniques7 in cluster analysis. In this paper, we focus on objective...
Michel Ménard, Michel Eboueya