Sciweavers

1486 search results - page 94 / 298
» Firewall Rules Analysis
Sort
View
IJAR
2002
98views more  IJAR 2002»
14 years 11 months ago
Contradiction sensitive fuzzy model-based adaptive control
Fuzzy model-based adaptive control, unlike traditional fuzzy control, extracts expert knowledge from data by using model identification techniques. In this paper, we propose an an...
Pablo Carmona, Juan Luis Castro, Jose Manuel Zurit...
ICIP
2010
IEEE
14 years 10 months ago
Video anomaly detection in spatiotemporal context
Compared to other approaches that analyze object trajectories, we propose to detect anomalous video events at three levels considering spatiotemporal context of video objects, i.e...
Fan Jiang, Junsong Yuan, Sotirios A. Tsaftaris, Ag...
LOPSTR
2009
Springer
15 years 6 months ago
A Transformational Approach for Proving Properties of the CHR Constraint Store
Proving termination of, or generating efficient control for Constraint Handling Rules (CHR) programs requires information about the kinds of constraints that can show up in the CHR...
Paolo Pilozzi, Tom Schrijvers, Maurice Bruynooghe
ICDM
2005
IEEE
130views Data Mining» more  ICDM 2005»
15 years 5 months ago
Obtaining Best Parameter Values for Accurate Classification
In this paper we examine the effect that the choice of support and confidence thresholds has on the accuracy of classifiers obtained by Classification Association Rule Mining. ...
Frans Coenen, Paul H. Leng
TIME
2005
IEEE
15 years 5 months ago
Search Strategies for Resolution in CTL-Type Logics: Extension and Complexity
A clausal resolution approach originally developed for the branching logic CTL has recently been extended to the logics ECTL and ECTL+ . In the application of the resolution rules...
Artie Basukoski, Alexander Bolotov