Sciweavers

1298 search results - page 76 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ICDM
2010
IEEE
125views Data Mining» more  ICDM 2010»
15 years 1 months ago
Evolving Ensemble-Clustering to a Feedback-Driven Process
Abstract--Data clustering is a highly used knowledge extraction technique and is applied in more and more application domains. Over the last years, a lot of algorithms have been pr...
Martin Hahmann, Dirk Habich, Wolfgang Lehner
122
Voted
IAJIT
2006
109views more  IAJIT 2006»
15 years 3 months ago
Image Segmentation Based on Watershed and Edge Detection Techniques
: A combination of K-means, watershed segmentation method, and Difference In Strength (DIS) map was used to perform image segmentation and edge detection tasks. We obtained an init...
Nassir Salman
ICML
2005
IEEE
16 years 4 months ago
Clustering through ranking on manifolds
Clustering aims to find useful hidden structures in data. In this paper we present a new clustering algorithm that builds upon the consistency method (Zhou, et.al., 2003), a semi-...
Markus Breitenbach, Gregory Z. Grudic
SIGIR
2006
ACM
15 years 9 months ago
Latent semantic analysis for multiple-type interrelated data objects
Co-occurrence data is quite common in many real applications. Latent Semantic Analysis (LSA) has been successfully used to identify semantic relations in such data. However, LSA c...
Xuanhui Wang, Jian-Tao Sun, Zheng Chen, ChengXiang...
ANLP
2000
137views more  ANLP 2000»
15 years 4 months ago
Using Corpus-derived Name Lists for Named Entity Recognition
This paper describes experiments to establish the performance of a named entity recognition system which builds categorized lists of names from manually annotated training data. N...
Mark Stevenson, Robert J. Gaizauskas