Sciweavers

1486 search results - page 65 / 298
» Firewall Rules Analysis
Sort
View
BIBM
2008
IEEE
170views Bioinformatics» more  BIBM 2008»
15 years 6 months ago
Protein Sequence Motif Super-Rule-Tree (SRT) Structure Constructed by Hybrid Hierarchical K-Means Clustering Algorithm
— Protein sequence motifs information is crucial to the analysis of biologically significant regions. The conserved regions have the potential to determine the role of the protei...
Bernard Chen, Jieyue He, Stephen Pellicer, Yi Pan
ICWL
2005
Springer
15 years 5 months ago
The Research of Mining Association Rules Between Personality and Behavior of Learner Under Web-Based Learning Environment
: Discovering the relationship between behavior and personality of learner in the web-based learning environment is a key to guide learners in the learning process. This paper prop...
Jin Du, Qinghua Zheng, Haifei Li, Wenbin Yuan
RE
2008
Springer
14 years 11 months ago
Rule-Based Maintenance of Post-Requirements Traceability Relations
An accurate set of traceability relations between software development artifacts is desirable to support evolutionary development. However, even where an initial set of traceabili...
Patrick Mäder, Orlena Gotel, Ilka Philippow
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
15 years 5 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
CHARME
2003
Springer
196views Hardware» more  CHARME 2003»
15 years 5 months ago
Analyzing the Intel Itanium Memory Ordering Rules Using Logic Programming and SAT
We present a non-operational approach to specifying and analyzing shared memory consistency models. The method uses higher order logic to capture a complete set of ordering constra...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom, K...