Sciweavers

1315 search results - page 81 / 263
» Discovering significant rules
Sort
View
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 1 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
JSAC
2008
133views more  JSAC 2008»
14 years 12 months ago
Distributed Rule-Regulated Spectrum Sharing
Dynamic spectrum access is a promising technique to use spectrum efficiently. Without being restricted to any prefixed spectrum bands, nodes choose operating spectrum ondemand. Suc...
Lili Cao, Haitao Zheng
ICPR
2006
IEEE
16 years 29 days ago
The Generalized Condensed Nearest Neighbor Rule as A Data Reduction Method
In this paper, we propose a new data reduction algorithm that iteratively selects some samples and ignores others that can be absorbed, or represented, by those selected. This alg...
Bo-Han Kuo, Chien-Hsing Chou, Fu Chang
POPL
2007
ACM
16 years 5 days ago
A concurrent constraint handling rules implementation in Haskell with software transactional memory
Constraint Handling Rules (CHR) is a concurrent committedchoice constraint logic programming language to describe transformations (rewritings) among multi-sets of constraints (ato...
Edmund S. L. Lam, Martin Sulzmann
WPES
2005
ACM
15 years 5 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón