Sciweavers

1486 search results - page 33 / 298
» Firewall Rules Analysis
Sort
View
ECRIME
2007
15 years 3 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
EMNLP
2006
15 years 1 months ago
Partially Supervised Coreference Resolution for Opinion Summarization through Structured Rule Learning
Combining fine-grained opinion information to produce opinion summaries is important for sentiment analysis applications. Toward that end, we tackle the problem of source corefere...
Veselin Stoyanov, Claire Cardie
IEPOL
2010
102views more  IEPOL 2010»
14 years 10 months ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
ECOOPW
1998
Springer
15 years 4 months ago
Workshop Report - ECOOP'98 Workshop 7: Tools and Environments for Business Rules
This workshop focussed on the requirements for tools and environments that support business rules in an object-oriented setting and attempted to provide an overview of possible tec...
Kim Mens, Roel Wuyts, Dirk Bontridder, Alain Grijs...
ICSEA
2006
IEEE
15 years 5 months ago
Assessing Impacts of Changes to Business Rules through Data Exploration
The benefits of impact analysis in the maintenance and evolution of software systems are well known, and many forms of impact analysis, over different software life cycle objects...
Suzanne M. Embury, David Willmor, Lei Dang