Sciweavers

1565 search results - page 121 / 313
» cluster 2006
Sort
View
131
Voted
DAWAK
2006
Springer
15 years 4 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
101
Voted
JUCS
2007
118views more  JUCS 2007»
15 years 19 days ago
Satisfying Assignments of Random Boolean Constraint Satisfaction Problems: Clusters and Overlaps
: The distribution of overlaps of solutions of a random constraint satisfaction problem (CSP) is an indicator of the overall geometry of its solution space. For random k-SAT, nonri...
Gabriel Istrate
PRL
2008
161views more  PRL 2008»
15 years 6 days ago
Automatic kernel clustering with a Multi-Elitist Particle Swarm Optimization Algorithm
This article introduces a scheme for clustering complex and linearly non-separable datasets, without any prior knowledge of the number of naturally occurring groups in the data. T...
Swagatam Das, Ajith Abraham, Amit Konar
DKE
2007
107views more  DKE 2007»
15 years 21 days ago
A clustering method based on path similarities of XML data
Current studies on the storage of XML data are focused on either the efficient mapping of XML data onto an existing RDBMS or the development of a native XML storage. Some native X...
Il-Hwan Choi, Bongki Moon, Hyoung-Joo Kim
ICPADS
2006
IEEE
15 years 6 months ago
The Node Monitoring Component of a Scalable Systems Software Environment
We describe Fountain, an implementation of the Scalable Systems Software node monitor specification targeted at aggregate node monitoring for clusters. Fountain is designed from ...
Sam Miller, Brett Bode