Sciweavers

2907 search results - page 35 / 582
» Trust analysis with clustering
Sort
View
VMCAI
2012
Springer
12 years 5 months ago
Sound Non-statistical Clustering of Static Analysis Alarms
We present a sound method for clustering alarms from static analyzers. Our method clusters alarms by discovering sound dependencies between them such that if the dominant alarm of ...
Woosuk Lee, Wonchan Lee, Kwangkeun Yi
PRL
2010
158views more  PRL 2010»
13 years 8 months ago
Data clustering: 50 years beyond K-means
: Organizing data into sensible groupings is one of the most fundamental modes of understanding and learning. As an example, a common scheme of scientific classification puts organ...
Anil K. Jain
CSE
2009
IEEE
14 years 4 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
ICTAI
2008
IEEE
14 years 4 months ago
Knee Point Detection on Bayesian Information Criterion
The main challenge of cluster analysis is that the number of clusters or the number of model parameters is seldom known, and it must therefore be determined before clustering. Bay...
Qinpei Zhao, Mantao Xu, Pasi Fränti
SCAM
2005
IEEE
14 years 3 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich