Sciweavers

1486 search results - page 64 / 298
» Firewall Rules Analysis
Sort
View
SIGSAND
2008
15 years 1 months ago
Advanced Reduction Rules for the Verification of EPC Business Process Models
: Conceptual business process models such as Event-driven Process Chains (EPCs) play an important role in the business process management life cycle. The problem in this context is...
Jan Mendling, Wil M. P. van der Aalst
JCP
2007
148views more  JCP 2007»
14 years 11 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy
CGF
1999
98views more  CGF 1999»
14 years 11 months ago
Multiresolution Curve and Surface Representation: Reversing Subdivision Rules by Least-Squares Data Fitting
This work explores how three techniques for defining and representing curves and surfaces can be related efficiently. The techniques are subdivision, least-squares data fitting, a...
Faramarz F. Samavati, Richard M. Bartels
133
Voted
ICWE
2010
Springer
14 years 10 months ago
Association-Rules-Based Recommender System for Personalization in Adaptive Web-Based Applications
Personalization systems based upon users' surfing behavior analysis imply three phases: data collection, pattern discovery and recommendation. Due to the dimension of log file...
Daniel Mican, Nicolae Tomai
ICMLA
2009
14 years 9 months ago
Discovering Rules from Disk Events for Predicting Hard Drive Failures
Detecting impending failure of hard disks is an important prediction task which might help computer systems to prevent loss of data and performance degradation. Currently most of t...
Vipul Agarwal, Chiranjib Bhattacharyya, Thirumale ...