Sciweavers

3651 search results - page 158 / 731
» Data Mining for Security Applications
Sort
View
ICDM
2003
IEEE
135views Data Mining» more  ICDM 2003»
15 years 10 months ago
An Algorithm for the Exact Computation of the Centroid of Higher Dimensional Polyhedra and its Application to Kernel Machines
The Support Vector Machine (SVM) solution corresponds to the centre of the largest sphere inscribed in version space. Alternative approaches like Bayesian Point Machines (BPM) and...
Frédéric Maire
IPPS
2008
IEEE
15 years 11 months ago
Parallel mining of closed quasi-cliques
Graph structure can model the relationships among a set of objects. Mining quasi-clique patterns from large dense graph data makes sense with respect to both statistic and applica...
Yuzhou Zhang, Jianyong Wang, Zhiping Zeng, Lizhu Z...
ADHOC
2007
104views more  ADHOC 2007»
15 years 5 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 5 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
FGCS
2010
186views more  FGCS 2010»
15 years 3 months ago
A grid portal for solving geoscience problems using distributed knowledge discovery services
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining r...
Gianluigi Folino, Agostino Forestiero, Giuseppe Pa...