Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








8 Hits in 6.4 sec

A Survey on Automated Log Analysis for Reliability Engineering [article]

Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, Michael R. Lyu
2021 arXiv   pre-print
To enable effective and efficient usage of modern software logs in reliability engineering, a number of studies have been conducted on automated log analysis.  ...  event templates, and how to employ logs to detect anomalies, predict failures, and facilitate diagnosis.  ...  [89] proposed log2vec, a graph embedding based method for cyber threat detection.  ... 
arXiv:2009.07237v2 fatcat:thbtfboglnglld5rr6s2gqhizi

Proceedings of the First International Conference and School on Radiation Imaging (ICSRI-2021), Ferhat Abbas-Setif1 University, Setif, September 26-30, 2021, Algeria

KHARFI Faycal
2022 Zenodo  
Image processing in radiation imaging is, indeed, a science field presenting up-to-date detailed treatment techniques and algorithms for the registration, segmentation, reconstruction, and evaluation of  ...  Image processing has always played a major role in the development and use of radiation imaging techniques.  ...  In another paper 36 , a DL model has been used to detect errors of MLC transmission and effective source size for static beam IMRT QA dosimetry.  ... 
doi:10.5281/zenodo.7071305 fatcat:qmhbpemvrjewha3xuwi7y62yne

Green Software [chapter]

Bob Steigerwald, Abhishek Agrawal
2012 Harnessing Green It  
We profusely thank Simon Liu, Editor-in-Chief of the IEEE Computer Society's IT Professional magazine, for writing a foreword to this book.  ...  Acknowledgements The experiments and data summarized in this chapter are based on years of experimentation and research conducted by engineers of Intel Corp.  ...  For example, a four-level MLC stores 2 bits in a single memory cell. Typically, MLCs are cheaper and have greater storage density, but are slower than SLCs.  ... 
doi:10.1002/9781118305393.ch3 fatcat:epohredblvhg5ei2chbw2fmhpy

1986-1999 combined index IEEE aerospace and electronic systems magazine vols. 1-14 [Subject Index]

2000 IEEE Transactions on Aerospace and Electronic Systems  
., + , AES-MApr 98 31-42 checker for validating safe schedules and selecting error recovery schedules for satellite control systems.  ...  /soft computing for space appls.  ...  Ringer, MarkJ., + , AES-M Jan 93 40-47 built-in test and embedded diagnostics for two US Army M 1 A 2 main battle tank subsystems. Sallade.  ... 
doi:10.1109/taes.2000.869530 fatcat:dqlflsnslveyri76fpijskbzqi

Harnessing Green IT: Principles and Practices

San Murugesan
2008 IT Professional Magazine  
applications, Web engineering, e-business and IT for emerging markets.  ...  In a career spanning over three decades in academia and industry, Dr Murugesan has led several innovative IT projects, provided leadership in teaching and research, and consulted to business, industry  ...  We profusely thank Simon Liu, Editor-in-Chief of the IEEE Computer Society's IT Professional magazine, for writing a foreword to this book.  ... 
doi:10.1109/mitp.2008.10 fatcat:g5np2vq245drvflci2bc7bj4me

Machine Learning Approaches and Web-Based System to the Application of Disease Modifying Therapy for Sickle Cell

MI Khalaf
2018
MLC and SVM are combined to facilitate soft decision making and achieve probabilistic outcomes for SVM in association with classification and learning techniques.  ...  Rohan Varma [57] Machine learning models based on heuristic techniques unsupervised machine Learning via the K-means algorithm Applied machine learning and automated detection via blood image analysis  ... 
doi:10.24377/researchonline.ljmu.ac.uk.00009470 fatcat:iewgazcjinbgznimvifj7lqf6u

Formal Verification of Object-Oriented Software. Papers presented at the 2nd International Conference, October 5-7, 2011, Turin, Italy

Bernhard [Hrsg.] Beckert, Ferruccio [Hrsg.] Damiani, Dilian [Hrsg.] Gurov
2011
In particular, he suggested to use a simplified version of the problem described in [4] as a running example. The authors also thank the anonymous referees for their valuable input. A.  ...  Also we thank the Celtique team in INRIA-Rennes for the cooperation and constant clarifications over the BIR language.  ...  These include a memory leak checker (MLC), a pointer validity checker (PVC) and an array buffer overflow checker (ABC).  ... 
doi:10.5445/ir/1000024780 fatcat:qnqnk6c46jcrxjgydp6migtxpm

Novel Approaches Toward Area- and Energy-Efficient Embedded Memories

Pascal Andreas Meinerzhagen
2014
for various great collaborations on the design, manufacturing, and measurement of many sub-V T memories based on custom-designed standard-cells.  ...  to this thesis; Adi taught me many circuit techniques for use in CMOS memory arrays, how to prioritize tasks and get work done efficiently, as well as a positive and healthy attitude toward research,  ...  Moreover, to cope with soft errors (for example caused by alpha-particle impacts), redundant memory cells in conjunction with error detection and correction codes are often employed, a prominent example  ... 
doi:10.5075/epfl-thesis-6074 fatcat:4q3q7qy6p5f7nakakhkwyqmi2y