Sciweavers

956 search results - page 63 / 192
» Source Constrained Clustering
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
ICMLA
2003
13 years 11 months ago
Reinforcement Learning Task Clustering
This work represents the first step towards a task library system in the reinforcement learning domain. Task libraries could be useful in speeding up the learning of new tasks th...
James L. Carroll, Todd S. Peterson, Kevin D. Seppi
CCR
2002
98views more  CCR 2002»
13 years 9 months ago
Efficient flooding with Passive Clustering (PC) in ad hoc networks
An ad hoc network is a fast deployable selfconfiguring wireless network characterized by node mobility, dynamic topology structure, unreliable media and limited power supply. Node...
Taek Jin Kwon, Mario Gerla
ICAI
2004
13 years 11 months ago
A Comparison of Resampling Methods for Clustering Ensembles
-- Combination of multiple clusterings is an important task in the area of unsupervised learning. Inspired by the success of supervised bagging algorithms, we propose a resampling ...
Behrouz Minaei-Bidgoli, Alexander P. Topchy, Willi...
SAC
2008
ACM
13 years 9 months ago
Efficient concept clustering for ontology learning using an event life cycle on the web
Ontology learning integrates many complementary techniques, including machine learning, natural language processing, and data mining. Specifically, clustering techniques facilitat...
Sangsoo Sung, Seokkyung Chung, Dennis McLeod