Sciweavers

1298 search results - page 93 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BMCBI
2008
166views more  BMCBI 2008»
15 years 3 months ago
Biclustering via optimal re-ordering of data matrices in systems biology: rigorous methods and comparative studies
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem...
Peter A. DiMaggio Jr., Scott R. McAllister, Christ...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 3 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
120
Voted
TKDE
2002
127views more  TKDE 2002»
15 years 3 months ago
Efficient Join-Index-Based Spatial-Join Processing: A Clustering Approach
A join-index is a data structure used for processing join queries in databases. Join-indices use precomputation techniques to speed up online query processing and are useful for da...
Shashi Shekhar, Chang-Tien Lu, Sanjay Chawla, Siva...
CIBCB
2008
IEEE
15 years 10 months ago
An information theoretic approach for the discovery of irregular and repetitive patterns in genomic data
sequence content at an abstract level and offers novel ways to examine the information contained in them. Our approach is an information theoretic search process which uses patter...
Willard Davis, Ananth Kalyanaraman, Diane J. Cook
121
Voted
JNW
2007
132views more  JNW 2007»
15 years 3 months ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam