Sciweavers

152 search results - page 19 / 31
» Discovering Identity Problems: A Case Study
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
14 years 11 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...
BMCBI
2007
128views more  BMCBI 2007»
13 years 9 months ago
Model order selection for bio-molecular data clustering
Background: Cluster analysis has been widely applied for investigating structure in bio-molecular data. A drawback of most clustering algorithms is that they cannot automatically ...
Alberto Bertoni, Giorgio Valentini
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Toward Intelligent Use of Semantic Information on Subspace Discovery for Image Retrieval
Image retrieval has been widely used in many fields of science and engineering. The semantic concept of user interest is obtained by a learning process. Traditional techniques oft...
Jie Yu, Qi Tian
VLDB
2005
ACM
118views Database» more  VLDB 2005»
14 years 3 months ago
Mining Compressed Frequent-Pattern Sets
A major challenge in frequent-pattern mining is the sheer size of its mining results. In many cases, a high min sup threshold may discover only commonsense patterns but a low one ...
Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng