Sciweavers

927 search results - page 138 / 186
» Stability of k -Means Clustering
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 5 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
ICPR
2008
IEEE
14 years 2 months ago
Stop word detection in compressed textual images: An experiment on indic script documents
Stop word detection is attempted in this work in the context of retrieval of document images in the compressed domain. Algorithms are presented to identify text lines and words an...
Utpal Garain, Amit Kumar Das
IPPS
2008
IEEE
14 years 2 months ago
Self-optimizing distributed trees
We present a novel protocol for restructuring a treebased overlay network in response to the workload of the application running over it. Through low-cost restructuring operations...
Michael K. Reiter, Asad Samar, Chenxi Wang
CISS
2007
IEEE
14 years 2 months ago
An EM Technique for Multiple Transmitter Localization
— We propose an expectation-maximization (EM) technique for locating multiple transmitters based on power levels observed by a set of arbitrarily-placed receivers. Multiple trans...
Jill K. Nelson, Maya R. Gupta
CCGRID
2006
IEEE
14 years 2 months ago
Scalable Approaches for Supporting MPI-IO Atomicity
Scalable atomic and parallel access to noncontiguous regions of a file is essential to exploit high performance I/O as required by large-scale applications. Parallel I/O framewor...
Peter M. Aarestad, Avery Ching, George K. Thiruvat...