Sciweavers

1486 search results - page 17 / 298
» Firewall Rules Analysis
Sort
View
AAAI
1996
14 years 11 months ago
Post-Analysis of Learned Rules
Rule induction research implicitly assumes that after producing the rules from a dataset, these rules will be used directly by an expert system or a human user. In real-life appli...
Bing Liu, Wynne Hsu
SOSYM
2010
107views more  SOSYM 2010»
14 years 8 months ago
A UML/OCL framework for the analysis of graph transformation rules
In this paper we present an approach for the analysis of graph transformation rules based on an intermediate OCL representation. We translate different rule semantics into OCL, to...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
86
Voted
SDM
2004
SIAM
163views Data Mining» more  SDM 2004»
14 years 11 months ago
Basic Association Rules
Previous approaches for mining association rules generate large sets of association rules. Such sets are difficult for users to understand and manage. Here, the concept of a restri...
Guichong Li, Howard J. Hamilton
DAS
2004
Springer
15 years 2 months ago
Rule-Based Structural Analysis of Web Pages
Structural analysis of web pages has been proposed several times and for a number of reasons and purposes, such as the re-flowing of standard web pages to fit a smaller PDA screen....
Fabio Vitali, Angelo Di Iorio, Elisa Ventura Campo...
82
Voted
NBIS
2010
Springer
14 years 7 months ago
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada