Sciweavers

235 search results - page 11 / 47
» On Challenges in Evaluating Malware Clustering
Sort
View
SAC
2009
ACM
15 years 4 months ago
Combining statistics and semantics via ensemble model for document clustering
Incorporating background knowledge into data mining algorithms is an important but challenging problem. Current approaches in semi-supervised learning require explicit knowledge p...
Samah Jamal Fodeh, William F. Punch, Pang-Ning Tan
DATESO
2010
148views Database» more  DATESO 2010»
14 years 7 months ago
Using Spectral Clustering for Finding Students' Patterns of Behavior in Social Networks
Abstract. The high dimensionality of the data generated by social networks has been a big challenge for researchers. In order to solve the problems associated with this phenomenon,...
Gamila Obadi, Pavla Drázdilová, Jan ...
SBACPAD
2004
IEEE
112views Hardware» more  SBACPAD 2004»
14 years 11 months ago
Performance Characterisation of Intra-Cluster Collective Communications
Although recent works try to improve collective communication in grid systems by separating intra and intercluster communication, the optimisation of communications focus only on ...
Luiz Angelo Barchet-Estefanel, Grégory Moun...
105
Voted
BILDMED
2011
245views Algorithms» more  BILDMED 2011»
14 years 1 months ago
Clustering-Based Detection of Anatomical Features on Organic Shapes
Abstract. Robust and accurate automatic detection of anatomical features on organic shapes is a challenging task. Despite a rough similarity, each shape is unique. To cope with thi...
Konrad Sickel, Vojtech Bubnik
90
Voted
NDSS
2008
IEEE
15 years 3 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...