Sciweavers

3047 search results - page 369 / 610
» On the Meaning of Logical Completeness
Sort
View
SYNASC
2008
IEEE
274views Algorithms» more  SYNASC 2008»
15 years 5 months ago
Verbalising R2ML Rules into SBVR
Nowadays, business rules receive a lot of attention from both industry and academia, as they are considered the ideal vehicle for capturing business logic. The purpose of our pape...
Oana Nicolae, Gerd Wagner
84
Voted
FUZZIEEE
2007
IEEE
15 years 5 months ago
An On-Line Fuzzy Predictor from Real-Time Data
The algorithm of on-line predictor from input-output data pairs will be proposed. In this paper, it proposed an approach to generate fuzzy rules of predictor from real-time input-o...
Chih-Ching Hsiao, Shun-Feng Su
81
Voted
IFSA
2007
Springer
133views Fuzzy Logic» more  IFSA 2007»
15 years 5 months ago
Fuzzy Tree Mining: Go Soft on Your Nodes
Tree mining consists in discovering the frequent subtrees from a forest of trees. This problem has many application areas. For instance, a huge volume of data available from the In...
Federico Del Razo López, Anne Laurent, Pasc...
70
Voted
SAC
2006
ACM
15 years 4 months ago
Union types for object-oriented programming
We propose union types for statically typed class-based objectoriented languages as a means to enhance the flexibility of subtyping. As its name suggests, a union type can be con...
Atsushi Igarashi, Hideshi Nagira
CSFW
2005
IEEE
15 years 4 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...