One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
We determine the communication complexity of the common voting rules. The rules (sorted by their communication complexity from low to high) are plurality, plurality with runoff, ...
The effort of data mining, especially in relation to association rules in real world business applications, is significantly important. Recently, association rules algorithms have ...
This article, which lies within the data mining framework, proposes a method to build classifiers based on the evolution of rules. The method, named REC (Rule Evolution for Classif...
Constraint management plays an important role in design applications where constraints re ect design restrictions and design decisions. ECA rules are a widely used mechanism to enf...