Sciweavers

555 search results - page 22 / 111
» Performance Evaluation of Two Data Mining Techniques of Netw...
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
PKDD
2004
Springer
102views Data Mining» more  PKDD 2004»
14 years 1 months ago
Improving the Performance of the RISE Algorithm
Ideally, a multi-strategy learning algorithm performs better than its component approaches. RISE is a multi-strategy algorithm that combines rule induction and instance-based learn...
Aloísio Carlos de Pina, Gerson Zaverucha
DIS
2010
Springer
13 years 6 months ago
Sentiment Knowledge Discovery in Twitter Streaming Data
Micro-blogs are a challenging new source of information for data mining techniques. Twitter is a micro-blogging service built to discover what is happening at any moment in time, a...
Albert Bifet, Eibe Frank
ICPR
2010
IEEE
13 years 5 months ago
On the Performance of Handoff and Tracking in a Camera Network
Camera handoff is an important problem when using multiple cameras to follow a number of objects in a video network. However, almost all the handoff techniques rely on a robust tr...
Yiming Li, Bir Bhanu, Vincent Nguyen
BMCBI
2010
243views more  BMCBI 2010»
13 years 7 months ago
Comparative study of unsupervised dimension reduction techniques for the visualization of microarray gene expression data
Background: Visualization of DNA microarray data in two or three dimensional spaces is an important exploratory analysis step in order to detect quality issues or to generate new ...
Christoph Bartenhagen, Hans-Ulrich Klein, Christia...