Sciweavers

1344 search results - page 105 / 269
» Cluster Analysis of High-Dimensional Data: A Case Study
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
PKDD
2000
Springer
107views Data Mining» more  PKDD 2000»
13 years 11 months ago
Expert Constrained Clustering: A Symbolic Approach
Abstract. A new constrained model is discussed as a way of incorporating efficiently a priori expert knowledge into a clustering problem of a given individual set. The first innova...
Fabrice Rossi, Frédérick Vautrain
TASE
2008
IEEE
13 years 7 months ago
Steady-State Throughput and Scheduling Analysis of Multicluster Tools: A Decomposition Approach
Abstract--Cluster tools are widely used as semiconductor manufacturing equipment. While throughput analysis and scheduling of single-cluster tools have been well-studied, research ...
Jingang Yi, Shengwei Ding, Dezhen Song, Mike Tao Z...
IPPS
1999
IEEE
14 years 3 days ago
The Impact of Memory Hierarchies on Cluster Computing
Using off-the-shelf commodity workstations and PCs to build a cluster for parallel computing has become a common practice. A choice of a cost-effective cluster computing platform ...
Xing Du, Xiaodong Zhang
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
14 years 1 months ago
Strategies for the Successful Implementation of Workflow Systems within Healthcare: A Cross Case Comparison
The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This...
Meg Murray