Buscar
Mostrando ítems 1-10 de 1362
QK-Means: A clustering technique based on community detection and K-Means for deployment of cluster head nodes
(2012-08-22)
Wireless Sensor Networks (WSN) are a special kind of ad-hoc networks that is usually deployed in a monitoring field in order to detect some physical phenomenon. Due to the low dependability of individual nodes, small radio ...
QK-Means: A clustering technique based on community detection and K-Means for deployment of cluster head nodes
(2012-08-22)
Wireless Sensor Networks (WSN) are a special kind of ad-hoc networks that is usually deployed in a monitoring field in order to detect some physical phenomenon. Due to the low dependability of individual nodes, small radio ...
Paradigmatic Clustering for NLP
(Institute of Electrical and Electronics Engineers Inc., 2016)
How can we retrieve meaningful information from a large and sparse graph?. Traditional approaches focus on generic clustering techniques and discovering dense cumulus in a network graph, however, they tend to omit interesting ...
Barriers to environmental management in clusters of small businesses in Brazil and Japan: from a lack of knowledge to a decline in traditional knowledge
(Taylor & Francis Inc, 2012-06-01)
This study aimed to examine the main barriers to environmental management (EM) in two clusters of small businesses (SBs). A study of two clusters was performed: one cluster in Brazil (the leather/shoe sector) and one cluster ...
Barriers to environmental management in clusters of small businesses in Brazil and Japan: from a lack of knowledge to a decline in traditional knowledge
(Taylor & Francis Inc, 2012-06-01)
This study aimed to examine the main barriers to environmental management (EM) in two clusters of small businesses (SBs). A study of two clusters was performed: one cluster in Brazil (the leather/shoe sector) and one cluster ...
Intrusion detection in computer networks using optimum-path forest clustering
(2012-12-01)
Nowadays, organizations face the problem of keeping their information protected, available and trustworthy. In this context, machine learning techniques have also been extensively applied to this task. Since manual labeling ...
Intrusion detection in computer networks using optimum-path forest clustering
(2012-12-01)
Nowadays, organizations face the problem of keeping their information protected, available and trustworthy. In this context, machine learning techniques have also been extensively applied to this task. Since manual labeling ...