Sciweavers

1298 search results - page 203 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
OSDI
2008
ACM
16 years 3 months ago
Error Log Processing for Accurate Failure Prediction
Error logs are a fruitful source of information both for diagnosis as well as for proactive fault handling ? however elaborate data preparation is necessary to filter out valuable...
Felix Salfner, Steffen Tschirpke
ICANN
2007
Springer
15 years 9 months ago
Visualising Class Distribution on Self-organising Maps
The Self-Organising Map is a popular unsupervised neural network model which has been used successfully in various contexts for clustering data. Even though labelled data is not re...
Rudolf Mayer, Taha Abdel Aziz, Andreas Rauber
EMSOFT
2005
Springer
15 years 9 months ago
Compiler-guided register reliability improvement against soft errors
With the scaling of technology, transient errors caused by external particle strikes have become a critical challenge for microprocessor design. As embedded processors are widely ...
Jun Yan, Wei Zhang
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
ICCV
2001
IEEE
16 years 5 months ago
Feature Selection from Huge Feature Sets
The number of features that can be computed over an image is, for practical purposes, limitless. Unfortunately, the number of features that can be computed and exploited by most c...
José Bins, Bruce A. Draper