Sciweavers

2006 search results - page 309 / 402
» Heuristic Security-Testing Methods
Sort
View
ICDM
2009
IEEE
132views Data Mining» more  ICDM 2009»
14 years 4 months ago
Bayesian Overlapping Subspace Clustering
Given a data matrix, the problem of finding dense/uniform sub-blocks in the matrix is becoming important in several applications. The problem is inherently combinatorial since th...
Qiang Fu, Arindam Banerjee
ICTAI
2009
IEEE
14 years 4 months ago
FlockStream: A Bio-Inspired Algorithm for Clustering Evolving Data Streams
Existing density-based data stream clustering algorithms use a two-phase scheme approach consisting of an online phase, in which raw data is processed to gather summary statistics...
Agostino Forestiero, Clara Pizzuti, Giandomenico S...
IPPS
2009
IEEE
14 years 4 months ago
Multi-users scheduling in parallel systems
We are interested in this paper to study scheduling problems in systems where many users compete to perform their respective jobs on shared parallel resources. Each user has speci...
Erik Saule, Denis Trystram
ARGMAS
2009
Springer
14 years 3 months ago
Dominant Decisions by Argumentation Agents
Abstract. We introduce a special family of (assumption-based argumentation) frameworks for reasoning about the bene ts of decisions. These frameworks can be used for representing t...
Paul-Amaury Matt, Francesca Toni, Juan R. Vaccari
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
14 years 3 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl