Sciweavers

1486 search results - page 157 / 298
» Firewall Rules Analysis
Sort
View
SIGBDP
1990
15 years 8 months ago
Knowledge Acquisition: Issues, Techniques, and Methodology
Technique for Inducing Abstractions", Communications of the ACM, 21(5), 401411, May 1978. [7] Hayes-Roth, Frederick, "Rule-Based Systems", Communications of the ACM,...
Yihwa Irene Liou
PKDD
2000
Springer
159views Data Mining» more  PKDD 2000»
15 years 8 months ago
An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data
Abstract. This paper proposes a novel approach named AGM to eciently mine the association rules among the frequently appearing substructures in a given graph data set. A graph tran...
Akihiro Inokuchi, Takashi Washio, Hiroshi Motoda
AAAI
2008
15 years 6 months ago
A Neuro-Fuzzy Strategy for Web Personalization
In this paper, we propose the use of a neuro-fuzzy strategy to develop a Web personalization framework for the dynamic suggestion of URLs retained interesting for the currently co...
Giovanna Castellano, Anna Maria Fanelli, Paola Pla...
EDBTW
2006
Springer
15 years 6 months ago
Change Management in Large-Scale Enterprise Information Systems
The information infrastructure in today's businesses consists of many interoperating autonomous systems. Changes to a single system can therefore have an unexpected impact on ...
Boris Stumm
ACL
2007
15 years 6 months ago
HPSG Parsing with Shallow Dependency Constraints
We present a novel framework that combines strengths from surface syntactic parsing and deep syntactic parsing to increase deep parsing accuracy, specifically by combining depend...
Kenji Sagae, Yusuke Miyao, Jun-ichi Tsujii