29,352 resources related to Clustering algorithms
- Topics related to Clustering algorithms
- IEEE Organizations related to Clustering algorithms
- Conferences related to Clustering algorithms
- Periodicals related to Clustering algorithms
- Most published Xplore authors for Clustering algorithms
2014 IEEE International Conference On Cluster Computing (CLUSTER)
IEEE Cluster is the main conference on all aspects of cluster computing for computational science
2013 8th International Conference on Computer Engineering & Systems (ICCES)
This conference is the 9th of its series, it aims at gathering academia and industry to present the latest research in computer engineering and systems.
2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)
2013 IEEE Symposium on Computational Intelligence and Data Mining (IEEE CIDM 2013) will bring together scientists, engineers and students from around the world to discuss the latest advances in the field of computational intelligence applied to issues in data and process mining. This conference will provide a forum for the presentation of recent results in data mining algorithms, applications, software and data and process mining systems.
ISPA-12 follows the traditions of previous successful ISPA conferences, ISPA-03 (Aizu, Japan), ISPA-04 (Hong Kong), ISPA-05 (Nanjing, China), ISPA-06 (Sorrento, Italy), ISPA-07 (Niagara Falls, Canada) and ISPA-08 (Sydney, Australia), ISPA-09 (Chengdu, China), ISPA-10 (Taipei, Taiwan), ISPA-11 (Busan, Korea). The objective of ISPA 2012 is to provide a forum for scientists and engineers in academia and industry to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of parallel and distributed computing and networking. It will feature session presentations, workshops, tutorials, and keynote speeches. ISPA-12 is sponsored by IEEE Technical Committee on Scalable Computing (TCSC) and IEEE Computer Society.
2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE)
The annual IEEE International Conference on Bioinformatics and Bioengineering covers complementary disciplines that hold great promise for the advancement of research and development in complex medical and biological systems, agriculture, environment, public health, drug design, and so on.
Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...
Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...
Statistical and structural pattern recognition; image analysis; computational models of vision; computer vision systems; enhancement, restoration, segmentation, feature extraction, shape and texture analysis; applications of pattern analysis in medicine, industry, government, and the arts and sciences; artificial intelligence, knowledge representation, logical and probabilistic inference, learning, speech recognition, character and text recognition, syntactic and semantic processing, understanding natural language, expert systems, ...
Specification, development, management, test, maintenance, and documentation of computer software.
The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...
Xiaohua Hu; Jianchoa Han; Cercone, N. Computer Software and Applications Conference, 2003. COMPSAC 2003. Proceedings. 27th Annual International, 2003
In this paper we present a novel method to discover cyber communities from the WWW. A cyber community is a set of highly connected web pages in the WWW, which share the similar topics or interests. The WWW can be modeled as a huge scale-free network graph. Discovering cyber communities is converted to trawling the corresponding web graph to search ...
RuLong Zhu; SongJie Gong Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on, 2009
Collaborative filtering recommender systems which automatically predict preferred products of a customer using known preferences of other customers have become extremely popular in recent years. Recommending products based on similarity of interest is also attractive for many domains such as books, CDs, movies, etc., and reducing the information over load in the electronic commerce environments. The growth of customers and ...
Xu Jing Intelligent Information Technology Application, 2009. IITA 2009. Third International Symposium on, 2009
This paper proposes an effective reconfiguration algorithm to increase the network lifetime by fairly distributing clusterheads (CHs) in wireless sensor networks. For a fair distribution of the CHs, the current CH chooses the next CH according to the two metrics - the number of general nodes (GNs) in a cluster and the number of CHs within the GN's transmission range. ...
Rivero-Angeles, M.E.; Bouabdallah, N. Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 2009
Wireless Sensor Networks (WSNs) can be typically used to achieve Continuous Monitoring (CM) or Event-Detection inside the supervised area. In CM applications each sensor node transmits periodically its sensed data to the sink node while in Event-Detection Driven (EDD) applications, once an event occurs, it is reported to the sink node by the sensors within the event area. Applications using ...
Yi-Jing Chu; Chu-Ping Tseng; Kuo-Chi Liao; Yung-Cheng Wu; Fu-Ming Lu; Joe-Air Jiang; Yung-Chung Wang; Chwan-Lu Tseng; En-Cheng Yang; Kun-Yaw Ho Sensors, 2009 IEEE, 2009
The power of nodes in the first layer of a wireless sensor network (WSN) cannot last due to their frequent relay tasks. One possible solution to this disadvantage is to adopt the first order load-balanced algorithm (LBA) to redistribute the loading of the first layer node uniformly. The balanced low- latency convergecast tree (BLLCT) algorithm, a LBA, is generally utilized ...
Bezdek, James C. A Primer on Cluster Analysis, 2008
This course- the first in a series of three - provides a foundation for understanding the field of cluster analysis in unlabeled data. The target audience for this course comprises undergraduate and graduate students majoring in engineering and science, as well as practicing engineers and scientists interested in either research about or applications of clustering to real world problems such ...
Bezdek, James C. Fuzzy Cluster Analysis in Very Large Data Sets, 2009
This last module in the series discusses just one approach to the interesting and important problem of clustering in very large (VL) data. The target audience is graduate students majoring in engineering and science, and practicing engineers and scientists interested in either research about or applications of clustering applied to very large real world problems that occur in data mining, ...
Netflix's Chris Pouliot: How to Build a Data Science Team from Scratch
Rollin' Justin -- Mobile Platform with Variable Base
Optimal Design of NPC and Active-NPC Transformerless PV Inverters
Wireless Power Charging of Plug-In Electric Vehicles
IEEE Medal of Honor Recipient (2007): Thomas Kailath
The Fundamentals of Battery Charger Design
Regenerative Energy Storage Systems for Hybrid Electric and Battery Electric Vehicles
Power Electronics in PV-Systems: Status and Perspectives
High Frequency Magnetic Circuit Design for Power Electronics
Developing Point-of-Care Technologies
ICRA Robot Challenge
No standards are currently tagged "Clustering algorithms"