Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
Abstract--Workflow design, mashup configuration, and composite service formation are examples where the capabilities of multiple simple services combined achieve a complex function...
We review two versions of a topology preserving algorithm one of which we had previously [1] found to be more successful in defining smooth manifolds and tight clusters. In the con...
We recently proposed a method to find cluster structure in home videos based on statistical models of visual and temporal features of video segments and sequential binary Bayesian...
Daniel Gatica-Perez, Alexander C. Loui, Ming-Ting ...
The TNO speaker speaker diarization system is based on a standard BIC segmentation and clustering algorithm. Since for the NIST Rich Transcription speaker dizarization evaluation m...