Sciweavers

1298 search results - page 65 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
16 years 4 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
ALT
2010
Springer
15 years 4 months ago
Contrast Pattern Mining and Its Application for Building Robust Classifiers
: The ability to distinguish, differentiate and contrast between different data sets is a key objective in data mining. Such ability can assist domain experts to understand their d...
Kotagiri Ramamohanarao
ISCA
2003
IEEE
93views Hardware» more  ISCA 2003»
15 years 8 months ago
Improving Dynamic Cluster Assignment for Clustered Trace Cache Processors
This work examines dynamic cluster assignment for a clustered trace cache processor (CTCP). Previously proposed cluster assignment techniques run into unique problems as issue wid...
Ravi Bhargava, Lizy Kurian John
DEXA
2009
Springer
172views Database» more  DEXA 2009»
15 years 6 months ago
Utilizing XML Clustering for Efficient XML Data Management on P2P Networks
Peer-to-Peer (P2P) data integration combines the P2P infrastructure with traditional scheme-based data integration techniques. Some of the primary problems in this research area ar...
Panagiotis Antonellis, Christos Makris, Nikos Tsir...
ICPR
2002
IEEE
16 years 4 months ago
Fast Hierarchical Clustering Based on Compressed Data
: One way to scale up clustering algorithms is to squash the data by some intelligent compression technique and cluster only the compressed data records. Such compressed data recor...
Erendira Rendon, Ricardo Barandela