Sciweavers

1298 search results - page 67 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
VLDB
1999
ACM
224views Database» more  VLDB 1999»
15 years 7 months ago
Optimal Grid-Clustering: Towards Breaking the Curse of Dimensionality in High-Dimensional Clustering
Many applications require the clustering of large amounts of high-dimensional data. Most clustering algorithms, however, do not work e ectively and e ciently in highdimensional sp...
Alexander Hinneburg, Daniel A. Keim
JMLR
2006
96views more  JMLR 2006»
15 years 3 months ago
Rearrangement Clustering: Pitfalls, Remedies, and Applications
Given a matrix of values in which the rows correspond to objects and the columns correspond to features of the objects, rearrangement clustering is the problem of rearranging the ...
Sharlee Climer, Weixiong Zhang
136
Voted
CLUSTER
2009
IEEE
15 years 10 months ago
Integrating software distributed shared memory and message passing programming
Abstract—Software Distributed Shared Memory (SDSM) systems provide programmers with a shared memory programming environment across distributed memory architectures. In contrast t...
H'sien J. Wong, Alistair P. Rendell
GI
2007
Springer
15 years 9 months ago
Background Modeling Using Adaptive Cluster Density Estimation for Automatic Human Detection
: Detection is an inherent part of every advanced automatic tracking system. In this work we focus on automatic detection of humans by enhanced background subtraction. Background s...
Harish Bhaskar, Lyudmila Mihaylova, Simon Maskell
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
15 years 9 months ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...