Sciweavers

2907 search results - page 77 / 582
» Trust analysis with clustering
Sort
View
AUSFORENSICS
2004
13 years 11 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
ISBI
2004
IEEE
14 years 11 months ago
Clustering-Based Framework for Comparing fMRI Analysis Methods
In this paper, a cluster-based framework is introduced for comparing analysis methods of functional magnetic resonance images (fMRI). In the proposed framework, fMRI data is repla...
Hamid Soltanian-Zadeh, Gholam-Ali Hossein-Zadeh, A...
TSD
2005
Springer
14 years 3 months ago
Cluster Analysis of Railway Directory Inquire Dialogs
Cluster analysis of dialogs with transport directory service allows revealing the typical scenarios of dialogs, which is useful for designing automatic dialog systems. We show how ...
Mikhail Alexandrov, Emilio Sanchis Arnal, Paolo Ro...
WEBI
2005
Springer
14 years 3 months ago
WICER: A Weighted Inter-Cluster Edge Ranking for Clustered Graphs
Several algorithms based on link analysis have been developed to measure the importance of nodes on a graph such as pages on the World Wide Web. PageRank and HITS are the most pop...
Divya Padmanabhan, Prasanna Kumar Desikan, Jaideep...
IDA
2011
Springer
13 years 4 months ago
PSO driven collaborative clustering: A clustering algorithm for ubiquitous environments
Abstract. The goal of this article is to introduce a collaborative clustering approach to the domain of ubiquitous knowledge discovery. This clustering approach is suitable in peer...
Benoît Depaire, Rafael Falcón, Koen V...