Sciweavers

4695 search results - page 29 / 939
» Software Clustering Techniques and the Use of Combined Algor...
Sort
View
TRUST
2010
Springer
15 years 2 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
GLOBECOM
2009
IEEE
15 years 1 months ago
Mobility-Based Clustering in VANETs Using Affinity Propagation
Abstract--The recent research in cluster-based MAC and routing schemes for Vehicle Ad Hoc Networks (VANETs) motivates the necessity for a stable VANET clustering algorithm. Due to ...
Christine Shea, Behnam Hassanabadi, Shahrokh Valae...
72
Voted
EMNLP
2007
14 years 11 months ago
V-Measure: A Conditional Entropy-Based External Cluster Evaluation Measure
We present V-measure, an external entropybased cluster evaluation measure. Vmeasure provides an elegant solution to many problems that affect previously defined cluster evaluatio...
Andrew Rosenberg, Julia Hirschberg
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 9 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
93
Voted
FLAIRS
2007
14 years 11 months ago
Improving Cluster Method Quality by Validity Indices
Clustering attempts to discover significant groups present in a data set. It is an unsupervised process. It is difficult to define when a clustering result is acceptable. Thus,...
Narjes Hachani, Habib Ounelli