Sciweavers

1650 search results - page 245 / 330
» How to Turn the Page
Sort
View
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
15 years 1 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
EDBT
2010
ACM
170views Database» more  EDBT 2010»
15 years 1 months ago
Augmenting OLAP exploration with dynamic advanced analytics
Online Analytical Processing (OLAP) is a popular technique for explorative data analysis. Usually, a fixed set of dimensions (such as time, place, etc.) is used to explore and ana...
Benjamin Leonhardi, Bernhard Mitschang, Rubé...
CCS
2008
ACM
14 years 12 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
LREC
2010
197views Education» more  LREC 2010»
14 years 11 months ago
Question Answering Biographic Information and Social Network Powered by the Semantic Web
After several years of development, the vision of the Semantic Web is gradually becoming reality. Large data repositories have been created and offer semantic information in a mac...
Peter Adolphs, Xiwen Cheng, Tina Klüwer, Hans...
IMECS
2007
14 years 11 months ago
Web Service Integration Based on Abstract Forms in XML for End-user Initiative Development
ice Integration Based on Abstract Forms in XML for End-user Initiative Development Takeshi Chusho, Ryousuke Yuasa, Shinpei Nishida and Katsuya Fujiwara ∗ Abstract— The number o...
Takeshi Chusho, Ryousuke Yuasa, Shinpei Nishida, K...