Sciweavers

1486 search results - page 52 / 298
» Firewall Rules Analysis
Sort
View
TPLP
2010
102views more  TPLP 2010»
14 years 10 months ago
As time goes by: Constraint Handling Rules
Constraint Handling Rules (CHR) is a high-level programming language based on multiheaded multiset rewrite rules. Originally designed for writing user-defined constraint solvers,...
Jon Sneyers, Peter Van Weert, Tom Schrijvers, Lesl...
ICDM
2003
IEEE
127views Data Mining» more  ICDM 2003»
15 years 5 months ago
A High-Performance Distributed Algorithm for Mining Association Rules
Abstract. We present a new distributed association rule mining (D-ARM) algorithm that demonstrates superlinear speed-up with the number of computing nodes. The algorithm is the fi...
Assaf Schuster, Ran Wolff, Dan Trock
VLDB
1998
ACM
138views Database» more  VLDB 1998»
15 years 4 months ago
TOPAZ: a Cost-Based, Rule-Driven, Multi-Phase Parallelizer
Currently the key problems of query optimization are extensibility imposed by object-relational technology, as well as query complexity caused by forthcoming applications, such as...
Clara Nippl, Bernhard Mitschang
ACL
1996
15 years 1 months ago
From Submit to Submitted via Submission: On Lexical Rules in Large-Scale Lexicon Acquisition
This paper deals with the discovery, representation, and use of lexical rules (LRs) during large-scale semi-automatic computational lexicon acquisition. The analysis is based on a...
Evelyne Viegas, Boyan A. Onyshkevych, Victor Raski...
ENTCS
2007
101views more  ENTCS 2007»
14 years 11 months ago
Solving Sudoku Puzzles with Rewriting Rules
The aim of the sudoku puzzle (also known as number place in the United States) is to enter a numeral from 1 through 9 in each cell of a grid, most frequently a 9 × 9 grid made up...
Gustavo Santos-García, Miguel Palomino