Sciweavers

1486 search results - page 18 / 298
» Firewall Rules Analysis
Sort
View
LOPSTR
1994
Springer
15 years 1 months ago
A Transformation System for Definite Programs Based on Termination Analysis
We present a goal replacement rule whose main applicability condition is based on termination properties of the resulting transformed program. The goal replacement rule together wi...
J. Cook, John P. Gallagher
64
Voted
DEXA
2003
Springer
113views Database» more  DEXA 2003»
15 years 2 months ago
Termination Analysis of Active Rules with Priorities
This paper presents an algorithm for termination static analysis of active rules with priorities. Active rules termination is an undecidable problem. Several recent works have sugg...
Alain Couchot
ADCM
2011
14 years 4 months ago
Convergence and smoothness analysis of subdivision rules in Riemannian and symmetric spaces
After a discussion on definability of invariant subdivision rules we discuss rules for sequential data living in Riemannian manifolds and in symmetric spaces, having in mind the s...
Johannes Wallner, Esfandiar Nava Yazdani, Andreas ...
AI
2006
Springer
15 years 1 months ago
Classification Based on Logical Concept Analysis
This paper studies the problem of classification by using a concept lattice as a search space of classification rules. The left hand side of a classification rule is composed by a ...
Yan Zhao, Yiyu Yao
92
Voted
POLICY
2001
Springer
15 years 1 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...