Sciweavers

1486 search results - page 56 / 298
» Firewall Rules Analysis
Sort
View
ICMLA
2004
15 years 1 months ago
Mining interesting contrast rules for a web-based educational system
Web-based educational technologies allow educators to study how students learn (descriptive studies) and which learning strategies are most effective (causal/predictive studies). ...
Behrouz Minaei-Bidgoli, Pang-Ning Tan, William F. ...
CSREASAM
2003
15 years 1 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
DATAMINE
2006
131views more  DATAMINE 2006»
14 years 12 months ago
A systematic approach to the assessment of fuzzy association rules
In order to allow for the analysis of data sets including numerical attributes, several generalizations of association rule mining based on fuzzy sets have been proposed in the li...
Didier Dubois, Eyke Hüllermeier, Henri Prade
COLING
1990
15 years 1 months ago
An Integrated System For Morphological Analysis Of The Slovene Language
: The paper presents an integrated environment for morphological analysis of word-forms of the Slovene language. The system consists of a lexicon input and maintenance module, a le...
Tomaz Erjavec, Peter Tancig
IBPRIA
2007
Springer
15 years 6 months ago
A Tabular Pruning Rule in Tree-Based Fast Nearest Neighbor Search Algorithms
Some fast nearest neighbor search (NNS) algorithms using metric properties have appeared in the last years for reducing computational cost. Depending on the structure used to store...
José Oncina, Franck Thollard, Eva Gó...