Sciweavers

688 search results - page 85 / 138
» Reverse Tree Clustering
Sort
View
ESA
2005
Springer
128views Algorithms» more  ESA 2005»
14 years 1 months ago
Greedy Routing in Tree-Decomposed Graphs
Milgram’s experiment (1967) demonstrated that there are short chains of acquaintances between individuals, and that these chains can be discovered in a greedy manner. Kleinberg ...
Pierre Fraigniaud
IPPS
2009
IEEE
14 years 2 months ago
On the tradeoff between playback delay and buffer space in streaming
We consider the following basic question: a source node wishes to stream an ordered sequence of packets to a collection of receivers, which are distributed among a number of clust...
Alix L. H. Chow, Leana Golubchik, Samir Khuller, Y...
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Two-Level Approach to Making Class Predictions
In this paper we propose a new two-level methodology for assessing countries’/companies’ economic/financial performance. The methodology is based on two major techniques of gr...
Adrian Costea, Tomas Eklund
IJCAI
2003
13 years 9 months ago
Web Page Cleaning for Web Mining through Feature Weighting
Unlike conventional data or text, Web pages typically contain a large amount of information that is not part of the main contents of the pages, e.g., banner ads, navigation bars, ...
Lan Yi, Bing Liu
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...