Sciweavers

1486 search results - page 70 / 298
» Firewall Rules Analysis
Sort
View
CCECE
2006
IEEE
15 years 6 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
SPAA
2003
ACM
15 years 5 months ago
A proportionate fair scheduling rule with good worst-case performance
In this paper we consider the following scenario. A set of n jobs with different threads is being run concurrently. Each job has an associated weight, which gives the proportion ...
Micah Adler, Petra Berenbrink, Tom Friedetzky, Les...
BMCBI
2007
147views more  BMCBI 2007»
14 years 12 months ago
Predicting combinatorial binding of transcription factors to regulatory elements in the human genome by association rule mining
Background: Cis-acting transcriptional regulatory elements in mammalian genomes typically contain specific combinations of binding sites for various transcription factors. Althoug...
Xochitl C. Morgan, Shulin Ni, Daniel P. Miranker, ...
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
14 years 2 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...
AAI
2007
132views more  AAI 2007»
15 years 13 hour ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...