Sciweavers

2539 search results - page 362 / 508
» Debugging Method Names
Sort
View
93
Voted
ICDM
2007
IEEE
137views Data Mining» more  ICDM 2007»
15 years 4 months ago
Locally Constrained Support Vector Clustering
Support vector clustering transforms the data into a high dimensional feature space, where a decision function is computed. In the original space, the function outlines the bounda...
Dragomir Yankov, Eamonn J. Keogh, Kin Fai Kan
ICNS
2007
IEEE
15 years 4 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
IJCNN
2007
IEEE
15 years 4 months ago
Text Representations for Text Categorization: A Case Study in Biomedical Domain
— In vector space model (VSM), textual documents are represented as vectors in the term space. Therefore, there are two issues in this representation, i.e. (1) what should a term...
Man Lan, Chew Lim Tan, Jian Su, Hwee-Boon Low
80
Voted
IJCNN
2007
IEEE
15 years 4 months ago
Philosophical Aspects of Neural, Probabilistic and Fuzzy Modeling of Language Use and Translation
— Serious efforts to develop computerized systems for natural language understanding and machine translation have taken place for more than half a century. Some successful system...
Timo Honkela
INFOCOM
2007
IEEE
15 years 4 months ago
Guaranteed-Delivery Geographic Routing Under Uncertain Node Locations
—Geographic routing protocols like GOAFR or GPSR rely on exact location information at the nodes, because when the greedy routing phase gets stuck at a local minimum, they requir...
Stefan Funke, Nikola Milosavljevic