Sciweavers

1298 search results - page 82 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ISVC
2010
Springer
15 years 1 months ago
Automatic Learning of Gesture Recognition Model Using SOM and SVM
In this paper, we propose an automatic learning method for gesture recognition. We combine two different pattern recognition techniques: the SelfOrganizing Map (SOM) and Support Ve...
Masaki Oshita, Takefumi Matsunaga
99
Voted
CCS
2003
ACM
15 years 8 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
BMCBI
2005
122views more  BMCBI 2005»
15 years 3 months ago
GenClust: A genetic algorithm for clustering gene expression data
Background: Clustering is a key step in the analysis of gene expression data, and in fact, many classical clustering algorithms are used, or more innovative ones have been designe...
Vito Di Gesù, Raffaele Giancarlo, Giosu&egr...
119
Voted
SODA
2010
ACM
189views Algorithms» more  SODA 2010»
16 years 21 days ago
Correlation Clustering with Noisy Input
Correlation clustering is a type of clustering that uses a basic form of input data: For every pair of data items, the input specifies whether they are similar (belonging to the s...
Claire Mathieu, Warren Schudy
292
Voted
ICDE
2005
IEEE
260views Database» more  ICDE 2005»
16 years 4 months ago
A Comparative Evaluation of Transparent Scaling Techniques for Dynamic Content Servers
We study several transparent techniques for scaling dynamic content web sites, and we evaluate their relative impact when used in combination. Full transparency implies strong dat...
Cristiana Amza, Alan L. Cox, Willy Zwaenepoel