Sciweavers

3072 search results - page 289 / 615
» Shape analysis algorithm based on information theory
Sort
View
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ASUNAM
2011
IEEE
14 years 3 months ago
Evolutionary Clustering and Analysis of Bibliographic Networks
—In this paper, we study the problem of evolutionary clustering of multi-typed objects in a heterogeneous bibliographic network. The traditional methods of homogeneous clustering...
Manish Gupta, Charu C. Aggarwal, Jiawei Han, Yizho...
IADIS
2004
15 years 5 months ago
'surfing for knowledge' finding semantically similar Web clusters
In this paper we present our technique for finding semantically similar clusters within web documents obtained from a set of queries retrieved from the Google search engine. This ...
David Cleary, Diarmuid O'Donoghue
GECCO
2008
Springer
147views Optimization» more  GECCO 2008»
15 years 4 months ago
On selecting the best individual in noisy environments
In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Wojciech Jaskowski, Wojciech Kotlowski
GIS
2010
ACM
15 years 1 months ago
Cleaning massive sonar point clouds
We consider the problem of automatically cleaning massive sonar data point clouds, that is, the problem of automatically removing noisy points that for example appear as a result ...
Lars Arge, Kasper Green Larsen, Thomas Mølh...