Sciweavers

1486 search results - page 52 / 298
» Firewall Rules Analysis
Sort
View
113
Voted
TPLP
2010
102views more  TPLP 2010»
15 years 2 months ago
As time goes by: Constraint Handling Rules
Constraint Handling Rules (CHR) is a high-level programming language based on multiheaded multiset rewrite rules. Originally designed for writing user-defined constraint solvers,...
Jon Sneyers, Peter Van Weert, Tom Schrijvers, Lesl...
129
Voted
ICDM
2003
IEEE
127views Data Mining» more  ICDM 2003»
15 years 9 months ago
A High-Performance Distributed Algorithm for Mining Association Rules
Abstract. We present a new distributed association rule mining (D-ARM) algorithm that demonstrates superlinear speed-up with the number of computing nodes. The algorithm is the fi...
Assaf Schuster, Ran Wolff, Dan Trock
126
Voted
VLDB
1998
ACM
138views Database» more  VLDB 1998»
15 years 8 months ago
TOPAZ: a Cost-Based, Rule-Driven, Multi-Phase Parallelizer
Currently the key problems of query optimization are extensibility imposed by object-relational technology, as well as query complexity caused by forthcoming applications, such as...
Clara Nippl, Bernhard Mitschang
115
Voted
ACL
1996
15 years 5 months ago
From Submit to Submitted via Submission: On Lexical Rules in Large-Scale Lexicon Acquisition
This paper deals with the discovery, representation, and use of lexical rules (LRs) during large-scale semi-automatic computational lexicon acquisition. The analysis is based on a...
Evelyne Viegas, Boyan A. Onyshkevych, Victor Raski...
111
Voted
ENTCS
2007
101views more  ENTCS 2007»
15 years 3 months ago
Solving Sudoku Puzzles with Rewriting Rules
The aim of the sudoku puzzle (also known as number place in the United States) is to enter a numeral from 1 through 9 in each cell of a grid, most frequently a 9 × 9 grid made up...
Gustavo Santos-García, Miguel Palomino