Sciweavers

1486 search results - page 54 / 298
» Firewall Rules Analysis
Sort
View
ANCS
2008
ACM
15 years 1 months ago
Low power architecture for high speed packet classification
Today's routers need to perform packet classification at wire speed in order to provide critical services such as traffic billing, priority routing and blocking unwanted Inte...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
CIKM
2010
Springer
14 years 10 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
PKDD
2001
Springer
108views Data Mining» more  PKDD 2001»
15 years 4 months ago
Knowledge Discovery in Multi-label Phenotype Data
The biological sciences are undergoing an explosion in the amount of available data. New data analysis methods are needed to deal with the data. We present work using KDD to analys...
Amanda Clare, Ross D. King
FLAIRS
2008
15 years 2 months ago
UServ Case Study, Conceptual Design with ARD+ Method
The paper is dedicated to an analysis of the classic business rules study called UServ. The importance of this study comes from the fact, that it serves as a benchmark example for...
Grzegorz J. Nalepa
WFLP
2009
Springer
239views Algorithms» more  WFLP 2009»
15 years 6 months ago
Fast and Accurate Strong Termination Analysis with an Application to Partial Evaluation
A logic program strongly terminates if it terminates for any selection rule. Clearly, considering a particular selection rule—like Prolog’s leftmost selection rule—allows one...
Michael Leuschel, Salvador Tamarit, Germán ...