Keyphrases
- allocation scheme
- clustering algorithm
- constrained clustering
- resource constraints
- constraint satisfaction
- bandwidth allocation
- intrusion detection
- security issues
- information security
- parallel processing
- evaluation method
- constrained optimization
- document clustering
- access control
- response time
- information systems
- security policies
- parallel implementation
- parallel computing
- cluster analysis
- security mechanisms
- unsupervised clustering
- semi supervised clustering
- clustering method
- peak load