Sciweavers

1486 search results - page 214 / 298
» Firewall Rules Analysis
Sort
View
ICDM
2005
IEEE
177views Data Mining» more  ICDM 2005»
15 years 5 months ago
Average Number of Frequent (Closed) Patterns in Bernouilli and Markovian Databases
In data mining, enumerate the frequent or the closed patterns is often the first difficult task leading to the association rules discovery. The number of these patterns represen...
Loïck Lhote, François Rioult, Arnaud S...
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
15 years 5 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
BIRTHDAY
2005
Springer
15 years 5 months ago
Expander2
Expander2 is a flexible multi-purpose workbench for interactive rewriting, verification, constraint solving, flow graph analysis and other procedures that build up proofs or co...
Peter Padawitz
FPL
2005
Springer
119views Hardware» more  FPL 2005»
15 years 5 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
MATES
2005
Springer
15 years 5 months ago
Reconciling Agent Ontologies for Web Service Applications
Because there is still no agreed-upon global ontology, Web services supplied by different providers typically have individual and unique semantics, described by independently devel...
Jingshan Huang, Rosa Laura Zavala Gutierrez, Benit...