Sciweavers

5829 search results - page 218 / 1166
» The Practice of Cluster Analysis
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 4 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
CVPR
2006
IEEE
16 years 6 months ago
Graph Partitioning by Spectral Rounding: Applications in Image Segmentation and Clustering
ct We introduce a new family of spectral partitioning methods. Edge separators of a graph are produced by iteratively reweighting the edges until the graph disconnects into the pre...
David Tolliver, Gary L. Miller
138
Voted
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
15 years 10 months ago
A Scalable Collaborative Filtering Framework Based on Co-Clustering
Collaborative filtering-based recommender systems, which automatically predict preferred products of a user using known preferences of other users, have become extremely popular ...
Thomas George, Srujana Merugu
IPPS
1999
IEEE
15 years 9 months ago
The Computational Co-op: Gathering Clusters into a Metacomputer
We explore the creation of a metacomputer by the aggregation of independent sites. Joining a metacomputer is voluntary, and hence it has to be an endeavor that mutually benefits a...
Walfredo Cirne, Keith Marzullo
SC
1995
ACM
15 years 8 months ago
Multicast Virtual Topologies for Collective Communication in MPCs and ATM Clusters
This paper de nes and describes the properties of a multicast virtual topology, the M-array, and a resource-ecient variation, the REM-array. It is shown how several collective op...
Yih Huang, Chengchang Huang, Philip K. McKinley