Sciweavers

1486 search results - page 36 / 298
» Firewall Rules Analysis
Sort
View
CL
2000
Springer
15 years 4 months ago
A Logic Programming Application for the Analysis of Spanish Verse
Logic programming rules are provided to capture the rules governing formal poetry in Spanish. The resulting logic program scans verses in Spanish to provide their metric analysis. ...
Pablo Gervás
ISCAS
2002
IEEE
96views Hardware» more  ISCAS 2002»
15 years 4 months ago
Analysis of interleaved converters with WTA-based switching
This paper presents interleaved buck converters using a switching rule based on winner-take-all nonlinearity. The switching rule can realize flexible phase control and the system...
Toshimichi Saito, M. Yoshizawa, Hiroyuki Torikai, ...
MSR
2005
ACM
15 years 5 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
SIGECOM
2005
ACM
105views ECommerce» more  SIGECOM 2005»
15 years 5 months ago
Communication complexity of common voting rules
We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, ...
Vincent Conitzer, Tuomas Sandholm
ISI
2005
Springer
15 years 5 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic