Sciweavers

1993 search results - page 253 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
KDD
2012
ACM
168views Data Mining» more  KDD 2012»
13 years 6 months ago
Mining contentions from discussions and debates
Social media has become a major source of information for many applications. Numerous techniques have been proposed to analyze network structures and text contents. In this paper,...
Arjun Mukherjee, Bing Liu 0001
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 2 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
CEC
2007
IEEE
15 years 8 months ago
Development and validation of different hybridization strategies between GA and PSO
In this paper a new class of hybridization strategies between GA and PSO is presented and validated. The Genetical Swarm Optimization (GSO) approach is presented here with respect ...
A. Gandelli, F. Grimaccia, Marco Mussetta, Paola P...
SDM
2008
SIAM
138views Data Mining» more  SDM 2008»
15 years 5 months ago
Clustering from Constraint Graphs
In constrained clustering it is common to model the pairwise constraints as edges on the graph of observations. Using results from graph theory, we analyze such constraint graphs ...
Ari Freund, Dan Pelleg, Yossi Richter
ATAL
2010
Springer
15 years 5 months ago
Parameterizing the winner determination problem for combinatorial auctions
Combinatorial auctions have been studied by the multiagent systems community for some time, since these auctions are an effective mechanism for resource allocation when agents are...
David Loker, Kate Larson