Sciweavers

1486 search results - page 194 / 298
» Firewall Rules Analysis
Sort
View
121
Voted
CONCUR
2006
Springer
15 years 7 months ago
Concurrent Rewriting for Graphs with Equivalences
Several applications of graph rewriting systems (notably, some encodings of calculi with name passing) require rules which, besides deleting and generating graph items, are able to...
Paolo Baldan, Fabio Gadducci, Ugo Montanari
EUROPAR
2006
Springer
15 years 7 months ago
Model-Based Performance Diagnosis of Master-Worker Parallel Computations
Parallel performance tuning naturally involves a diagnosis process to locate and explain sources of program inefficiency. Proposed is an approach that exploits parallel computation...
Li Li, Allen D. Malony
EVOW
2006
Springer
15 years 7 months ago
Artificial Life Models in Lung CTs
A new method for the analysis of 3D medical images is introduced. The algorithm is based on Biological Models of ants known as Artificial Life models. Test images (lung Computed To...
Sorin Cristian Cheran, Gianfranco Gargano
KDD
1995
ACM
104views Data Mining» more  KDD 1995»
15 years 7 months ago
Using Rough Sets as Tools for Knowledge Discovery
An attribute-oriented rough set method for knowledgediscovery in databases is described. Themethodis based on information generalization, whichexaminesthe data at various levels o...
Ning Shan, Wojciech Ziarko, Howard J. Hamilton, Ni...
EXACT
2008
15 years 6 months ago
Deriving Explanations From Partial Temporal Information
The representation and manipulation of natural human understanding of temporal phenomena is a fundamental field of study in Computer Science, which aims both to emulate human think...
Jixin Ma, Brian Knight, Miltos Petridis