{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:26:02Z","timestamp":1729617962142,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cisim.2010.5643667","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:34:10Z","timestamp":1291152850000},"page":"176-181","source":"Crossref","is-referenced-by-count":2,"title":["Large data real-time classification with Non-negative Matrix Factorization and Self-Organizing Maps on GPU"],"prefix":"10.1109","author":[{"given":"Jan","family":"Platos","sequence":"first","affiliation":[]},{"given":"Petr","family":"Gajdos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604048"},{"journal-title":"The UCI KDD Archive","article-title":"Kdd cup data","year":"2010","key":"ref38"},{"journal-title":"Proceedings of the International Joint Conference on Neural Networks","article-title":"A study of parallel self-organizing map","year":"1999","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2004.11.025"},{"journal-title":"Designing parallel computers for self organizing maps","year":"1992","author":"nordstrm","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(05)80069-9"},{"journal-title":"DARPA Intrusion Detection Evaluation","year":"2010","key":"ref37"},{"journal-title":"CUDA Programming Guide","year":"2010","key":"ref36"},{"key":"ref35","article-title":"Openmp to gpgpu: a compiler framework for automatic translation and optimization","author":"amd","year":"0","journal-title":"Proceedings of the 14th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming"},{"journal-title":"OpenMP API Specification for Parallel Programming","year":"2010","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1198398"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161058"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICBAKE.2009.22"},{"key":"ref13","article-title":"A survey of dimension reduction techniques","author":"fodor","year":"2002","journal-title":"Tech Rep"},{"key":"ref14","article-title":"Large-scale principal component analysis on livejournal friends network","author":"kurucz","year":"2008","journal-title":"Proceedings of SNAKDD 2008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718867"},{"key":"ref16","first-page":"1020","article-title":"Hybrid feature selection for modeling intrusion detection systems","volume":"3316","author":"chebrolu","year":"2004","journal-title":"ICONIP"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.53"},{"key":"ref18","first-page":"216","article-title":"Socioeconomic and Legal Implications of Electronic Intrusion","author":"plate\u0161","year":"2009","journal-title":"Information Science Reference ch Designing Light Weight Intrusion Detection Systems Non-negative Matrix Factorization Approach"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536341"},{"key":"ref28","first-page":"268","article-title":"Wavefront implementation of self organizing maps on renns","author":"myklebust","year":"1995","journal-title":"International Conference on Digital Signal Processing"},{"journal-title":"Clustering Algorithms","year":"1975","author":"hartigan","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","author":"kohonen","year":"1995","journal-title":"Self-Organizing Maps"},{"journal-title":"Classification and Regression Trees","year":"1984","author":"breiman","key":"ref3"},{"journal-title":"Neural Network and Fuzzy Logic Applications in C\/C++","year":"1994","author":"welstead","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-3004(96)00040-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511812651"},{"key":"ref8","first-page":"566","article-title":"Evolutionary approaches to linear ordering problem","author":"snasel","year":"2008","journal-title":"Proc of DEXA 2008"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1145\/224170.285569","article-title":"Computational Methods for Intelligent Information Access","author":"berry","year":"1995","journal-title":"Proceedings of the 1995 ACM\/IEEE Supercomputing Conference"},{"journal-title":"Neural Networks A Comprehensive Foundation","year":"1994","author":"haykin","key":"ref2"},{"key":"ref9","first-page":"554","article-title":"On the implementation of boolean matrix factorization","author":"snasel","year":"2008","journal-title":"Proc of DEXA 2008"},{"journal-title":"Fundamentals of Neural Networks","year":"1994","author":"fausett","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2008.0221"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2009.26"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/9\/093024"},{"key":"ref24","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2001","journal-title":"Advances in Neural Information Processing Systems 13 Papers from Neural Information Processing Systems (NIPS) 2000"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"788791","DOI":"10.1038\/44565","article-title":"Learning the parts of objects by non-negative matrix factorization","volume":"401","author":"lee","year":"1999","journal-title":"Nature"},{"key":"ref26","first-page":"693","article-title":"Detecting insider attacks using non-negative matrix factorization","author":"plate\u00e5","year":"2009","journal-title":"IAS"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1201\/9781584888338","author":"skillicorn","year":"2007","journal-title":"Understanding Complex Datasets Data Mining using Matrix Decompositions"}],"event":{"name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","start":{"date-parts":[[2010,10,8]]},"location":"Krackow, Poland","end":{"date-parts":[[2010,10,10]]}},"container-title":["2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637902\/5643452\/05643667.pdf?arnumber=5643667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:57:30Z","timestamp":1559843850000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/cisim.2010.5643667","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}