Sciweavers

1486 search results - page 60 / 298
» Firewall Rules Analysis
Sort
View
DALT
2010
Springer
14 years 11 months ago
Commitment-Based Protocols with Behavioral Rules and Correctness Properties of MAS
Commitment-based interaction protocols are a flexible way of representing the interaction of a set of agents, that are well-known and widely accepted by the research community. Nor...
Matteo Baldoni, Cristina Baroglio, Elisa Marengo
144
Voted
DASFAA
2006
IEEE
133views Database» more  DASFAA 2006»
15 years 10 months ago
Mining Spatio-temporal Association Rules, Sources, Sinks, Stationary Regions and Thoroughfares in Object Mobility Databases
Abstract. As mobile devices proliferate and networks become more locationaware, the corresponding growth in spatio-temporal data will demand analysis techniques to mine patterns th...
Florian Verhein, Sanjay Chawla
126
Voted
BIBE
2005
IEEE
15 years 9 months ago
Diagnostic Rules Induced by an Ensemble Method for Childhood Leukemia
We introduce a new ensemble method based on decision tree to discover significant and diversified rules for subtype classification of childhood acute lymphoblastic leukemia, a ...
Jinyan Li, Huiqing Liu, Ling Li
AIIA
2005
Springer
15 years 9 months ago
Mining Relational Association Rules for Propositional Classification
In traditional classification setting, training data are represented as a single table, where each row corresponds to an example and each column to a predictor variable or the targ...
Annalisa Appice, Michelangelo Ceci, Donato Malerba
DOCENG
2003
ACM
15 years 9 months ago
XPath on left and right sides of rules: toward compact XML tree rewriting through node patterns
XPath [3, 5] is a powerful and quite successful language able to perform complex node selection in trees through compact specifications. As such, it plays a growing role in many ...
Jean-Yves Vion-Dury