Sciweavers

1765 search results - page 283 / 353
» Combinations of Weak Classifiers
Sort
View
DSN
2009
IEEE
14 years 4 months ago
System log pre-processing to improve failure prediction
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering ...
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Gei...
IEEEIAS
2009
IEEE
14 years 4 months ago
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression
: Threats to information security for healthcare information system increased tremendously. There are various factors that contribute to information security threats, many research...
Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilw...
ICB
2009
Springer
134views Biometrics» more  ICB 2009»
14 years 4 months ago
A Model Based Approach for Expressions Invariant Face Recognition
This paper describes an idea of recognizing the human face in the presence of strong facial expressions using model based approach. The features extracted for the face image sequen...
Zahid Riaz, Christoph Mayer, Matthias Wimmer, Mich...
ICICS
2009
Springer
14 years 4 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...