Filters








696,493 Hits in 5.1 sec

Efficient analysis of pattern-based constraint specifications

Michael Wahler, David Basin, Achim D. Brucker, Jana Koehler
2009 Journal of Software and Systems Modeling  
In this paper, we present a heuristic approach for efficiently analyzing constraint specifications built from constraint patterns.  ...  This analysis is based on precise notions of consistency for constrained class models and exploits the semantic properties of constraint patterns, thereby enabling syntax-based consistency checking in  ...  In Section 3, we introduce an efficient approach to checking the consistency of pattern-based constraint specifications.  ... 
doi:10.1007/s10270-009-0123-6 fatcat:gqxqglmkabavvbounolhssdmiu

BiC2PAM: constraint-guided biclustering for biological data analysis with domain knowledge

Rui Henriques, Sara C. Madeira
2016 Algorithms for Molecular Biology  
Methods: This work extends (pattern-based) biclustering algorithms to guarantee the satisfiability of constraints derived from background knowledge and to effectively explore efficiency gains from their  ...  We further show how pattern-based biclustering algorithms can be adapted to effectively prune of the search space in the presence of such constraints, as well as be guided in the presence of biological  ...  Third, we describe a set of principles for the specification, processing and incorporation of constraints within pattern-based biclustering.  ... 
doi:10.1186/s13015-016-0085-5 pmid:27651825 fatcat:jdsydtcyone2fprzrwzojgyiti

Moving Objects Gathering Patterns Retrieving based on Spatio-Temporal Graph

Junming Zhang, Jinglin Li, Zhihan Liu, Quan Yuan, Fangchun Yang
2016 International Journal of Web Services Research  
However, effectively and efficiently discovering the specific gathering pattern turns to be a remaining challenging issue since the large number of moving objects will generate high volume of trajectory  ...  Moving objects gathering pattern represents a group events or incidents that involve congregation of moving objects, enabling the analysis of traffic system.  ...  The time constraint can help discover more International Journal of Web Services Research Volume 13 • Issue 3 • July-September 2016 89 specific patterns in many cases of mining trajectory data.  ... 
doi:10.4018/ijwsr.2016070105 fatcat:b7tsk5ytunginhep24xuvfosdi

Scanning and Parsing Languages with Ambiguities and Constraints: The Lamb and Fence Algorithms [article]

Luis Quesada, Fernando Berzal, Francisco J. Cortijo
2015 arXiv   pre-print
Lamb is a scanning algorithm that supports ambiguous token definitions and the specification of custom pattern matchers and constraints.  ...  These tools allow the occurrence of lexical and syntactic ambiguities in language specifications and the declarative specification of constraints for resolving them.  ...  English or Spanish) of the General Natural Language Parser.  ... 
arXiv:1501.02795v1 fatcat:2ixpxbr26vgvbdaxnpesuyzory

Mining constraint-based patterns using automatic relaxation

Arnaud Soulet, Bruno Crémilleux
2009 Intelligent Data Analysis  
We show that the primitive-based constraints can be efficiently mined thanks to a relaxation method based on virtual patterns which summarize the specificities of the search space.  ...  The limitations of the task lies in languages being limited to describe the mined patterns and the ability to express varied constraints.  ...  Acknowledgments This work has been partially supported by the ANR (French Research National Agency) project Bingo2 ANR-07-MDCO-014 which is a follow-up of the first Bingo project (2004)(2005)(2006)(2007  ... 
doi:10.3233/ida-2009-0358 fatcat:7lkdv5fxmfhuvjt4wswfj2qr6q

The MiningZinc Framework for Constraint-Based Itemset Mining

Tias Guns, Anton Dries, Guido Tack, Siegfried Nijssen, Luc De Raedt
2013 2013 IEEE 13th International Conference on Data Mining Workshops  
We present MiningZinc, a novel system for constraint-based pattern mining.  ...  It provides a declarative approach to data mining, where a user specifies a problem in terms of constraints and the system employs advanced techniques to efficiently find solutions.  ...  This work was supported by two Postdoc and one project grant "Principles of Patternset Mining" from the Research Foundation-Flanders, and by the EU FET IST project "Inductive Constraint Programming", contract  ... 
doi:10.1109/icdmw.2013.38 dblp:conf/icdm/GunsDTNR13 fatcat:6lbwpmkfyfdnvo4i6ydm2zkxmm

PATTERN ANALYSIS AND KNOWLEDGE DISCOVERY ALGORITHMS – DIFFERENT PERSPECTIVES

B. Lavanya, P. Devipriya
2020 International journal of electronics engineering and application  
Sequential Pattern Mining (SPM) is widely used data mining technique for discovering sequential patterns with a host of application domains including medicine, shopping sequences, sales record analysis  ...  This paper studies and analysis and presents a comparison of different algorithms various types, methods, and data mining techniques for Frequent pattern mining.  ...  The basic idea of this algorithm is constraint specification use of the regular expression at Knowledge the flexible tool [2] .  ... 
doi:10.30696/ijeea.viii.i.2020.42-47 fatcat:7rmpz4fw4rhftncbtuetmaadqq

OCL constraints automatic generation for UML class diagram

Li Tan, Zongyuan Yang, Jinkui Xie
2010 2010 IEEE International Conference on Software Engineering and Service Sciences  
First of all, the significance of automatic generation of OCL constraints was emphasized, and then the application domain of OCL was shown, followed by a lexical analysis of how to extract the target objects  ...  In our way, the overall quality and efficiency of software design is enhanced and thus contributions are made for the automation of Software Engineering.  ...  LEXICAL ANALYSIS BASED OCL CONSTRAINTS AUTOMATIC GENERATION After showing evidence of significance and feasibility of OCL constraints automatic generation, this section is to make it real.  ... 
doi:10.1109/icsess.2010.5552361 fatcat:qagh67jagzeqbgwcmnsfori5um

Study on Efficient Way to Identify User Aware Rare Sequential Pattern Matching in Document Stream

Swati V. Mengje
2017 International Journal for Research in Applied Science and Engineering Technology  
This approach gives the effective and efficient way to find out rare pattern in document string.  ...  STP candidates with (expected) support values for each user by pattern-growth, and selecting URSTPs by making user-aware rarity analysis on derived STPs.  ...  will be possible for efficient mining of patterns  ... 
doi:10.22214/ijraset.2017.2019 fatcat:s543g4e5gbaavcylwlqh73glyy

Constraint-Based System for Genomic Analysis

Nittaya Kerdprasop, Kittisak Kerdprasop
2015 International Journal of Information and Education Technology  
However, to make the system efficiently work, we need a new set of constraint solver algorithms specifically designed for the sequence analysis problem.  ...  In this paper, we propose a different setting of sequence analysis formulation based on the nucleotide patterns using a constraint logic programming paradigm, in which the sequence alignment can be performed  ...  ACKNOWLEDGMENT This work has been supported by grants from the National Research Council of Thailand (NRCT) and the authors are supported by research funding from Suranaree University of Technology.  ... 
doi:10.7763/ijiet.2015.v5.487 fatcat:jxutnxbhvjedlfn22ksfntkz2m

Special issue on "context-aware data mining (CADM)"

Chiara Renso, Vania Bogorny, Hui Xiong
2011 Knowledge and Information Systems  
Also, during the mining task, context may be used as constraints, thus allowing search space reduction, pattern pruning, and the development of more efficient algorithms.  ...  Also, data mining has been successfully applied in a number of different fields, such as bioinformatics, business intelligence, finance data analysis, location based services, network data analysis, and  ...  The first paper, entitled "COAT: COnstraint-based anonymization of transactions," faces the problem of producing anonymizations of transactional data proposing COAT (COnstraint-based Anonymization of Transactions  ... 
doi:10.1007/s10115-011-0436-y fatcat:ixt5zerxpva3jnmbhanf22laji

Computer-Aided Formalization of Requirements Based on Patterns

Xi WANG, Shaoying LIU
2014 IEICE transactions on information and systems  
To handle this challenge, this paper describes a pattern-based approach to facilitate the formalization of requirements.  ...  In this approach, a pattern system is predefined to guide requirements formalization where each pattern provides a specific solution for formalizing one kind of function into a formal expression.  ...  Acknowledgement This work has been conducted as a part of "Research Initiative on Advanced Software Engineering in 2012" supported by Software Reliability Enhancement Center (SEC), Information Technology  ... 
doi:10.1587/transinf.e97.d.198 fatcat:5htu4ij62ng5zenckeubwzye6q

Reverse engineering with the reclipse tool suite

Markus von Detten, Matthias Meyer, Dietrich Travkin
2010 Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - ICSE '10  
Design pattern detection is a reverse engineering methodology that helps software engineers to analyze and understand legacy software by recovering its design and thereby aiding in the preparation of re-engineering  ...  We present Reclipse, a reverse engineering tool suite for static and dynamic design pattern detection in combination with a pattern candidate rating used to assess the detection results' reliability.  ...  Dynamic Analysis The dynamic analysis is based on traces of the pattern candidates.  ... 
doi:10.1145/1810295.1810360 dblp:conf/icse/DettenMT10 fatcat:iltesfbarbhllad2v4p3yujhyu

Survey on Sequential Pattern Mining Algorithms

V. ChandraShekharRao, P. Sammulal
2013 International Journal of Computer Applications  
The information achieved from sequential pattern mining can be used in marketing, medical records, sales analysis, and so on.  ...  Several efficient algorithms for maintaining sequential patterns have been developed. , old datasets are deleted while some other datasets are updated.  ...  So, from the previous studies and comparative analysis of various mining algorithms, it is clear that pattern growth based algorithms are more efficient with respect to running time, space utilization  ... 
doi:10.5120/13301-0782 fatcat:eee6r7dtbffmfphbb4y4shh3be

Modeling constraints to redundancy in bimanual force coordination

Xiaogang Hu, Karl M. Newell
2011 Journal of Neurophysiology  
We examined three models of task constraints based on the criteria of task variance (minimum variance model) and efficiency of muscle force output (coefficient-independent and coefficient-dependent efficiency  ...  categories of constraints is weighted based on their relative influence on coordination patterns and the realization of the task goal.  ...  DISCLOSURES No conflicts of interest, financial or otherwise, are declared by the author(s).  ... 
doi:10.1152/jn.01086.2010 pmid:21346203 fatcat:gi3mnjtaf5d2he5j36asyjd2fa
« Previous Showing results 1 — 15 out of 696,493 results