Sciweavers

1298 search results - page 96 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
CVPR
2008
IEEE
15 years 10 months ago
Partitioning of image datasets using discriminative context information
We propose a new method to partition an unlabeled dataset, called Discriminative Context Partitioning (DCP). It is motivated by the idea of splitting the dataset based only on how...
Christoph H. Lampert
IPPS
2009
IEEE
15 years 10 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
COLT
2010
Springer
15 years 1 months ago
Robust Hierarchical Clustering
One of the most widely used techniques for data clustering is agglomerative clustering. Such algorithms have been long used across many different fields ranging from computational...
Maria-Florina Balcan, Pramod Gupta
118
Voted
HPCA
1998
IEEE
15 years 7 months ago
Efficiently Adapting to Sharing Patterns in Software DSMs
In this paper we introduce a page-based Lazy Release Consistency protocol called ADSM that constantly and efficiently adapts to the applications' sharing patterns. Adaptation...
Luiz Rodolpho Monnerat, Ricardo Bianchini
ICDM
2006
IEEE
130views Data Mining» more  ICDM 2006»
15 years 9 months ago
Efficient Clustering for Orders
Lists of ordered objects are widely used as representational forms. Such ordered objects include Web search results or best-seller lists. Clustering is a useful data analysis tech...
Toshihiro Kamishima, Shotaro Akaho