Sciweavers

1699 search results - page 284 / 340
» A Rule Format for Associativity
Sort
View
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 3 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
GFKL
2006
Springer
75views Data Mining» more  GFKL 2006»
15 years 3 months ago
Classification of Contradiction Patterns
Abstract. Solving conflicts between overlapping databases requires an understanding of the reasons that lead to the inconsistencies. Provided that conflicts do not occur randomly b...
Heiko Müller, Ulf Leser, Johann Christoph Fre...
AI
2001
Springer
15 years 3 months ago
Stratified Partial-Order Logic Programming
The stable semantics has become a prime candidate for knowledge representation and reasoning. The rules associated with propositional logic programs and the stable semantics are no...
Mauricio Osorio, Juan Carlos Nieves
APWEB
2003
Springer
15 years 3 months ago
Mining "Hidden Phrase" Definitions from the Web
Keyword searching is the most common form of document search on the Web. Many Web publishers manually annotate the META tags and titles of their pages with frequently queried phras...
Hung V. Nguyen, P. Velamuru, Deepak Kolippakkam, H...
COMPSAC
2001
IEEE
15 years 3 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff