Sciweavers

2556 search results - page 178 / 512
» Clustering processes
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 4 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
IWCC
1999
IEEE
15 years 8 months ago
Nomad: A Scalable Operating System for Clusters of Uni and Multiprocessors
The recent improvements in workstation and interconnection network performance have popularized the clusters of off-the-shelf workstations. However, the usefulness of these cluste...
Eduardo Pinheiro, Ricardo Bianchini
IADIS
2008
15 years 5 months ago
Information Retrieval with Cluster Genetic
This article presents an online cluster using genetic algorithms to increase information retrieval efficiency. The Information Retrieval (IR) is based on the grouping of documents...
José Luis Castillo Sequera, José Ra&...
ESWA
2008
119views more  ESWA 2008»
15 years 4 months ago
Incremental clustering of mixed data based on distance hierarchy
Clustering is an important function in data mining. Its typical application includes the analysis of consumer's materials. Adaptive resonance theory network (ART) is very pop...
Chung-Chian Hsu, Yan-Ping Huang
IWPC
2000
IEEE
15 years 8 months ago
The Effect of Call Graph Construction Algorithms for Object-Oriented Programs on Automatic Clustering
Call graphs are commonly used as input for automatic clustering algorithms, the goal of which is to extract the high level structure of the program under study. Determining the ca...
Derek Rayside, Steve Reuss, Erik Hedges, Kostas Ko...