Sciweavers

459 search results - page 53 / 92
» Automated Learning of Rules Using Genetic Operators
Sort
View
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
14 years 3 months ago
Design Pattern Evolution and Verification Using Graph Transformation
This paper presents a graph transformation based approach to design pattern evolution. An evolution of a design pattern includes modifications of pattern elements, such as classes...
Chunying Zhao, Jun Kong, Kang Zhang
CONEXT
2006
ACM
14 years 2 months ago
Autonomic policy-based management using web services
Network management requires a lot of manual work. Due to ongoing growth of the Internet, more self-management is needed in order to deal with the growing complexity. Policybased m...
Torsten Klie, Lars Wolf
JCS
2006
91views more  JCS 2006»
13 years 9 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...
KDD
2004
ACM
139views Data Mining» more  KDD 2004»
14 years 9 months ago
Machine learning for online query relaxation
In this paper we provide a fast, data-driven solution to the failing query problem: given a query that returns an empty answer, how can one relax the query's constraints so t...
Ion Muslea
ISDA
2008
IEEE
14 years 3 months ago
Rough Set Granularity in Mobile Web Pre-caching
Mobile Web pre-caching (Web prefetching and caching) is an explication of performance enhancement and storage limitation of mobile devices. In this paper, we present the granulari...
Sarina Sulaiman, Siti Mariyam Hj. Shamsuddin, Ajit...