Sciweavers

1298 search results - page 84 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
PAMI
2008
197views more  PAMI 2008»
15 years 3 months ago
LEGClust - A Clustering Algorithm Based on Layered Entropic Subgraphs
Hierarchical clustering is a stepwise clustering method usually based on proximity measures between objects or sets of objects from a given data set. The most common proximity meas...
Jorge M. Santos, Joaquim Marques de Sá, Lu&...
116
Voted
BICOB
2009
Springer
15 years 10 months ago
Association Analysis Techniques for Bioinformatics Problems
Association analysis is one of the most popular analysis paradigms in data mining. Despite the solid foundation of association analysis and its potential applications, this group o...
Gowtham Atluri, Rohit Gupta, Gang Fang, Gaurav Pan...
EDM
2008
97views Data Mining» more  EDM 2008»
15 years 4 months ago
Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor
Using data from an existing pre-algebra computer-based tutor, we analyzed the covariance of item-types with the goal of describing a more effective way to assign skill labels to it...
Philip I. Pavlik, Hao Cen, Lili Wu, Kenneth R. Koe...
SISAP
2010
IEEE
159views Data Mining» more  SISAP 2010»
15 years 1 months ago
CP-index: using clustering and pivots for indexing non-metric spaces
Most multimedia information retrieval systems use an indexing scheme to speed up similarity search. The index aims to discard large portions of the data collection at query time. ...
Victor Sepulveda, Benjamin Bustos
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...