Sciweavers

1486 search results - page 226 / 298
» Firewall Rules Analysis
Sort
View
ASM
2010
ASM
15 years 6 months ago
Using Event-B to Verify the Kmelia Components and Their Assemblies
and formal model, named Kmelia [1,2], with an associated language to specify components, their provided and required services and their assemblies; we also developed a framework na...
Pascal André, Gilles Ardourel, Christian At...
ICDE
2007
IEEE
107views Database» more  ICDE 2007»
15 years 6 months ago
An Integrated Platform for Spatial Data Mining within a GIS Environment
The strength of GIS is in providing a rich data infrastructure for combining disparate data in meaningful ways by using a spatial arrangement (e.g., proximity). As a toolbox, a GI...
Annalisa Appice, Antonietta Lanza, Donato Malerba
MSR
2006
ACM
15 years 5 months ago
Predicting defect densities in source code files with decision tree learners
With the advent of open source software repositories the data available for defect prediction in source files increased tremendously. Although traditional statistics turned out t...
Patrick Knab, Martin Pinzger, Abraham Bernstein
BIBE
2005
IEEE
121views Bioinformatics» more  BIBE 2005»
15 years 5 months ago
RNA Pseudoknot Prediction Using Term Rewriting
RNA plays a critical role in mediating every step of cellular information transfer from genes to functional proteins. Pseudoknots are widely occurring structural motifs found in a...
Xuezheng Fu, Hao Wang, William L. Harrison, Robert...
UPP
2004
Springer
15 years 5 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes