Sciweavers

1486 search results - page 91 / 298
» Firewall Rules Analysis
Sort
View
ATAL
2005
Springer
15 years 5 months ago
The induction of communication protocols
This paper describes our preliminary analysis on the induction of communication protocols. Our work has two goals: (i) to recognize rules (i.e. protocols) from the communicative b...
Nik Nailah Binti Abdullah
FASE
2005
Springer
15 years 5 months ago
Termination Criteria for Model Transformation
Model Transformation has become central to most software engineering activities. It refers to the process of modifying a (usually graphical) model for the purpose of analysis (by i...
Hartmut Ehrig, Karsten Ehrig, Juan de Lara, Gabrie...
RIDE
1997
IEEE
15 years 4 months ago
WIDE: A Distributed Architecture for Workflow Management
This paper presents the distributed architecture of the WIDE workflow management system. We show how distribution and scalability are obtained by the use of a distributed object m...
Stefano Ceri, Paul W. P. J. Grefen, Gabriel Sanche...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 9 months ago
Measuring Discrimination in Socially-Sensitive Decision Records.
Discrimination in social sense (e.g., against minorities and disadvantaged groups) is the subject of many laws worldwide, and it has been extensively studied in the social and eco...
Dino Pedreschi, Franco Turini, Salvatore Ruggieri
CBMS
2007
IEEE
15 years 6 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...