Sciweavers

1486 search results - page 35 / 298
» Firewall Rules Analysis
Sort
View
AMW
2010
15 years 1 months ago
Minimising RDF Graphs under Rules and Constraints Revisited
Based on practical observations on rule-based inference on RDF data, we study the problem of redundancy elimination in RDF in the presence of rules (in the form of Datalog rules) a...
Reinhard Pichler, Axel Polleres, Sebastian Skritek...
NAACL
2001
15 years 1 months ago
Re-Engineering Letter-to-Sound Rules
Using finite-state automata for the text analysis component in a text-to-speech system is problematic in several respects: the rewrite rules from which the automata are compiled a...
Martin Jansche
SIGMOD
2006
ACM
148views Database» more  SIGMOD 2006»
15 years 12 months ago
Research issues in data stream association rule mining
There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring and web click streams analysis. Different from data in t...
Nan Jiang, Le Gruenwald
ICML
2009
IEEE
15 years 6 months ago
Rule learning with monotonicity constraints
In classification with monotonicity constraints, it is assumed that the class label should increase with increasing values on the attributes. In this paper we aim at formalizing ...
Wojciech Kotlowski, Roman Slowinski
FUIN
2006
128views more  FUIN 2006»
14 years 11 months ago
A Rewriting Framework for Rule-Based Programming Dynamic Applications
In recent years light-weighted formal methods are of growing interest in construction and analysis of complex concurrent software system. A new rule-action based term rewriting fr...
Anatoly E. Doroshenko, Ruslan Shevchenko