Hierarchical clustering

Results: 694



#Item
41CONTIGUITY-CONSTRAINED PARTITIONING OF HETEROGENEOUS URBAN NETWORKS Mohammadreza Saeedmanesh Nikolas Geroliminis  May 2016

CONTIGUITY-CONSTRAINED PARTITIONING OF HETEROGENEOUS URBAN NETWORKS Mohammadreza Saeedmanesh Nikolas Geroliminis May 2016

Add to Reading List

Source URL: www.strc.ch

Language: English - Date: 2016-06-15 12:09:15
42BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
43Unraveling tobacco BY-2 protein complexes with BN PAGE/LC–MS/MS and clustering methods

Unraveling tobacco BY-2 protein complexes with BN PAGE/LC–MS/MS and clustering methods

Add to Reading List

Source URL: eda.mmci.uni-saarland.de

Language: English - Date: 2011-06-09 10:13:43
44Cluster analysis for cognitive diagnosis: An application to the 2001 PIRLS reading assessment Chia-Yi Chiu Department of Educational Psychology, Rutgers University, New Brunswick, New Jersey, United States of America

Cluster analysis for cognitive diagnosis: An application to the 2001 PIRLS reading assessment Chia-Yi Chiu Department of Educational Psychology, Rutgers University, New Brunswick, New Jersey, United States of America

Add to Reading List

Source URL: ierinstitute.org

Language: English - Date: 2012-01-04 07:01:18
456th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates The process of summarization in the pre-processing stage in order to improve measurement

6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United Arab Emirates The process of summarization in the pre-processing stage in order to improve measurement

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2016-05-03 09:12:00
46CLUSTERING MUSIC RECORDINGS BY THEIR KEYSArun Shenoy Ye Wang

CLUSTERING MUSIC RECORDINGS BY THEIR KEYSArun Shenoy Ye Wang

Add to Reading List

Source URL: www.smcnus.org

Language: English - Date: 2013-09-27 01:18:27
47Exploiting Visual Appearance to Cluster and Detect Rogue Software Christian J. Dietrich1,3 , Christian Rossow1,2 , Norbert Pohlmann1 {dietrich|rossow|pohlmann}@internet-sicherheit.de 1

Exploiting Visual Appearance to Cluster and Detect Rogue Software Christian J. Dietrich1,3 , Christian Rossow1,2 , Norbert Pohlmann1 {dietrich|rossow|pohlmann}@internet-sicherheit.de 1

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:15:57
48Informatics 1 Cognitive Science (2013–2014) School of Informatics, University of Edinburgh Mirella Lapata Quiz 3: Language Acquisition 1. What is word learning?

Informatics 1 Cognitive Science (2013–2014) School of Informatics, University of Edinburgh Mirella Lapata Quiz 3: Language Acquisition 1. What is word learning?

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2016-03-06 11:35:15
49Genome Informatics 12: 270–ASIAN: Automatic System for Inferring a Network from Gene Expression Profiles

Genome Informatics 12: 270–ASIAN: Automatic System for Inferring a Network from Gene Expression Profiles

Add to Reading List

Source URL: www.jsbi.org

Language: English - Date: 2002-01-17 03:51:05
50Regional Research Institute West Virginia University Resource Document Series Economic Clusters Research an Annotated Bibliography

Regional Research Institute West Virginia University Resource Document Series Economic Clusters Research an Annotated Bibliography

Add to Reading List

Source URL: rri.wvu.edu

Language: English - Date: 2016-02-15 12:11:02