Sciweavers

1486 search results - page 44 / 298
» Firewall Rules Analysis
Sort
View
EUROCRYPT
1999
Springer
15 years 4 months ago
An Analysis of Exponentiation Based on Formal Languages
A recoding rule for exponentiation is a method for reducing the cost of the exponentiation ae by reducing the number of required multiplications. If w(e) is the (hamming) weight of...
Luke O'Connor
EPEW
2008
Springer
15 years 1 months ago
Performance Evaluation of Embedded ECA Rule Engines: A Case Study
Embedded systems operating on high data workloads are becoming pervasive. ECA rule engines provide a flexible environment to support the management, reconfiguration and execution o...
Pablo Ezequiel Guerrero, Kai Sachs, Stephan Butter...
KDD
2001
ACM
216views Data Mining» more  KDD 2001»
16 years 6 days ago
Real world performance of association rule algorithms
This study compares five well-known association rule algorithms using three real-world datasets and an artificial dataset. The experimental results confirm the performance improve...
Zijian Zheng, Ron Kohavi, Llew Mason
RIDE
1997
IEEE
15 years 4 months ago
Evaluation of Sampling for Data Mining of Association Rules
Discovery of association rules is a prototypical problem in data mining. The current algorithms proposed for data mining of association rules make repeated passes over the databas...
Mohammed Javeed Zaki, Srinivasan Parthasarathy, We...
SMI
2010
IEEE
165views Image Analysis» more  SMI 2010»
14 years 9 months ago
Designing a Topological Modeler Kernel: A Rule-Based Approach
In this article, we present a rule-based language dedicated to topological operations, based on graph transformations. Generalized maps are described as a particular class of graph...
Thomas Bellet, Mathieu Poudret, Agnès Arnou...