Sciweavers

1486 search results - page 230 / 298
» Firewall Rules Analysis
Sort
View
ENTCS
2006
172views more  ENTCS 2006»
14 years 12 months ago
Efficient Detection of Conflicts in Graph-based Model Transformation
Using graph transformation as a formalism to specify model transformation, termination and confluence of the graph transformation system are often required properties. Only under ...
Leen Lambers, Hartmut Ehrig, Fernando Orejas
NLE
2008
77views more  NLE 2008»
14 years 11 months ago
Generating basic skills reports for low-skilled readers
We describe SkillSum, a Natural Language Generation (NLG) system that generates a personalised feedback report for someone who has just completed a screening assessment of their b...
Sandra Williams, Ehud Reiter
BMCBI
2005
102views more  BMCBI 2005»
14 years 11 months ago
BioCreAtIvE Task1A: entity identification with a stochastic tagger
Background: Our approach to Task 1A was inspired by Tanabe and Wilbur's ABGene system [1,2]. Like Tanabe and Wilbur, we approached the problem as one of part-of-speech taggin...
Shuhei Kinoshita, K. Bretonnel Cohen, Philip V. Og...
DATAMINE
1999
152views more  DATAMINE 1999»
14 years 11 months ago
Discovery of Frequent DATALOG Patterns
Discovery of frequent patterns has been studied in a variety of data mining settings. In its simplest form, known from association rule mining, the task is to discover all frequent...
Luc Dehaspe, Hannu Toivonen
MTA
2007
141views more  MTA 2007»
14 years 11 months ago
Flexible integration of multimedia sub-queries with qualitative preferences
Complex multimedia queries, aiming to retrieve from large databases those objects that best match the query specification, are usually processed by splitting them into a set of m ...
Ilaria Bartolini, Paolo Ciaccia, Vincent Oria, M. ...