Sciweavers

1486 search results - page 186 / 298
» Firewall Rules Analysis
Sort
View
RR
2009
Springer
15 years 10 months ago
On the Ostensibly Silent 'W' in OWL 2 RL
In this paper, we discuss the draft OWL 2 RL profile from the perspective of applying the constituent rules over Web data. In particular, borrowing from previous work, we discuss ...
Aidan Hogan, Stefan Decker
ACSD
2008
IEEE
130views Hardware» more  ACSD 2008»
15 years 10 months ago
BAM: BioAmbient machine
In recent years it has become clear that techniques developed for concurrent programming are in fact very useful for the analysis of complex systems in biology. To some level of i...
Vinod A. Muganthan, Andrew Phillips, Maria Grazia ...
CDC
2008
IEEE
15 years 10 months ago
On the inverse scattering of star-shape LC-networks
— The study of the scattering data for a star-shape network of LC-transmission lines is transformed into the scattering analysis of a Schr¨odinger operator on the same graph. Th...
Filippo Visco-Comandini, Mazyar Mirrahimi, Michel ...
SEMCO
2008
IEEE
15 years 10 months ago
A Comparative Study of Feature Extraction Algorithms in Customer Reviews
The paper systematically compares two feature extraction algorithms to mine product features commented on in customer reviews. The first approach [17] identifies candidate featu...
Liliana Ferreira, Niklas Jakob, Iryna Gurevych
FUZZIEEE
2007
IEEE
15 years 10 months ago
Fuzzy Logic Control System for Autonomous Sailboats
—Sailing experts can explain basic sailing skills by rules about how to steer sails and rudder according to direction of target and wind. This paper describes how to transform th...
Roland Stelzer, Tobias Pröll, Robert Ivor Joh...