Sciweavers

1486 search results - page 60 / 298
» Firewall Rules Analysis
Sort
View
DALT
2010
Springer
14 years 6 months ago
Commitment-Based Protocols with Behavioral Rules and Correctness Properties of MAS
Commitment-based interaction protocols are a flexible way of representing the interaction of a set of agents, that are well-known and widely accepted by the research community. Nor...
Matteo Baldoni, Cristina Baroglio, Elisa Marengo
DASFAA
2006
IEEE
133views Database» more  DASFAA 2006»
15 years 6 months ago
Mining Spatio-temporal Association Rules, Sources, Sinks, Stationary Regions and Thoroughfares in Object Mobility Databases
Abstract. As mobile devices proliferate and networks become more locationaware, the corresponding growth in spatio-temporal data will demand analysis techniques to mine patterns th...
Florian Verhein, Sanjay Chawla
BIBE
2005
IEEE
15 years 5 months ago
Diagnostic Rules Induced by an Ensemble Method for Childhood Leukemia
We introduce a new ensemble method based on decision tree to discover significant and diversified rules for subtype classification of childhood acute lymphoblastic leukemia, a ...
Jinyan Li, Huiqing Liu, Ling Li
AIIA
2005
Springer
15 years 5 months ago
Mining Relational Association Rules for Propositional Classification
In traditional classification setting, training data are represented as a single table, where each row corresponds to an example and each column to a predictor variable or the targ...
Annalisa Appice, Michelangelo Ceci, Donato Malerba
DOCENG
2003
ACM
15 years 5 months ago
XPath on left and right sides of rules: toward compact XML tree rewriting through node patterns
XPath [3, 5] is a powerful and quite successful language able to perform complex node selection in trees through compact specifications. As such, it plays a growing role in many ...
Jean-Yves Vion-Dury