Sciweavers

363 search results - page 63 / 73
» Mining Processes using cluster approach for representing wor...
Sort
View
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 4 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
ICIP
2008
IEEE
15 years 4 months ago
Wavelet-based hybrid multilinear models for multidimensional image approximation
The wavelet transform hierarchically decomposes images with prescribed bases, while multilineal models search for optimal bases to adapt visual data. In this paper, we integrate t...
Qing Wu, Chun Chen, Yizhou Yu
CCS
2007
ACM
15 years 3 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
BMCBI
2005
161views more  BMCBI 2005»
14 years 9 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau

Publication
197views
13 years 5 months ago
Convex non-negative matrix factorization for massive datasets
Non-negative matrix factorization (NMF) has become a standard tool in data mining, information retrieval, and signal processing. It is used to factorize a non-negative data matrix ...
C. Thurau, K. Kersting, M. Wahabzada, and C. Bauck...