Sciweavers

1486 search results - page 169 / 298
» Firewall Rules Analysis
Sort
View
DSN
2009
IEEE
15 years 11 months ago
System log pre-processing to improve failure prediction
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering ...
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Gei...
ICDAR
2009
IEEE
15 years 11 months ago
A Collaborative Interface for Multimodal Ink and Audio Documents
With the increased availability of pen-based devices, it becomes interesting to conduct and to archive multi-party communication sessions that involve audio and digital ink on a s...
Amit Regmi, Stephen M. Watt
ICDAR
2005
IEEE
15 years 10 months ago
Warped Image restoration with Applications to Digital Libraries
Recently, high resolution digital cameras have made the digitization process more flexible and convenient than traditional scanning technology. Therefore, document image analysis ...
Li Zhang, Chew Lim Tan
ICCSA
2005
Springer
15 years 10 months ago
A Penalized Likelihood Estimation on Transcriptional Module-Based Clustering
In this paper, we propose a new clustering procedure for high dimensional microarray data. Major difficulty in cluster analysis of microarray data is that the number of samples to ...
Ryo Yoshida, Seiya Imoto, Tomoyuki Higuchi
INFOCOM
1997
IEEE
15 years 8 months ago
Analyzing Non-Determinism in Telecommunication Services Using P-Invariant of Petri-Net Model
The non-deterministic behaviors in telecommunication services are well-known as one of the most typical Feature Interactions, and they should be detected and eliminated from the t...
Masahide Nakamura, Yoshiaki Kakuda, Tohru Kikuno