Sciweavers

1486 search results - page 23 / 298
» Firewall Rules Analysis
Sort
View
HICSS
1999
IEEE
114views Biometrics» more  HICSS 1999»
15 years 4 months ago
On the Analysis of Regulations using Defeasible Rules
Regulations are a wide-spread and important part of governmentand business. Theycodify howproducts must be madeand processes should be performed. Suchregulations can be difficult ...
Grigoris Antoniou, David Billington, Michael J. Ma...
ESORICS
1992
Springer
15 years 3 months ago
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
After a brief survey of the problems related to audit trail analysis and of some approaches to deal with them, the paper outlines the project ASAX which aims at providing an advanc...
Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji...
AUSAI
2007
Springer
15 years 3 months ago
Branching Rules for Satisfiability Analysed with Factor Analysis
Factor analysis is a statistical technique for reducing the number of factors responsible for a matrix of correlations to a smaller number of factors that may reflect underlying va...
Richard J. Wallace, Stuart Bain
ICML
2003
IEEE
16 years 17 days ago
An Analysis of Rule Evaluation Metrics
In this paper we analyze the most popular evaluation metrics for separate-and-conquer rule learning algorithms. Our results show that all commonly used heuristics, including accur...
Johannes Fürnkranz, Peter A. Flach
COGSCI
2008
75views more  COGSCI 2008»
14 years 10 months ago
Exemplars, Prototypes, Similarities, and Rules in Category Representation: An Example of Hierarchical Bayesian Analysis
This article demonstrates the potential of using hierarchical Bayesian methods to relate models and data in the cognitive sciences. This is done using a worked example that consid...
Michael D. Lee, Wolf Vanpaemel