A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient analysis of pattern-based constraint specifications
2009
Journal of Software and Systems Modeling
In this paper, we present a heuristic approach for efficiently analyzing constraint specifications built from constraint patterns. ...
This analysis is based on precise notions of consistency for constrained class models and exploits the semantic properties of constraint patterns, thereby enabling syntax-based consistency checking in ...
In Section 3, we introduce an efficient approach to checking the consistency of pattern-based constraint specifications. ...
doi:10.1007/s10270-009-0123-6
fatcat:gqxqglmkabavvbounolhssdmiu
BiC2PAM: constraint-guided biclustering for biological data analysis with domain knowledge
2016
Algorithms for Molecular Biology
Methods: This work extends (pattern-based) biclustering algorithms to guarantee the satisfiability of constraints derived from background knowledge and to effectively explore efficiency gains from their ...
We further show how pattern-based biclustering algorithms can be adapted to effectively prune of the search space in the presence of such constraints, as well as be guided in the presence of biological ...
Third, we describe a set of principles for the specification, processing and incorporation of constraints within pattern-based biclustering. ...
doi:10.1186/s13015-016-0085-5
pmid:27651825
fatcat:jdsydtcyone2fprzrwzojgyiti
Moving Objects Gathering Patterns Retrieving based on Spatio-Temporal Graph
2016
International Journal of Web Services Research
However, effectively and efficiently discovering the specific gathering pattern turns to be a remaining challenging issue since the large number of moving objects will generate high volume of trajectory ...
Moving objects gathering pattern represents a group events or incidents that involve congregation of moving objects, enabling the analysis of traffic system. ...
The time constraint can help discover more
International Journal of Web Services Research Volume 13 • Issue 3 • July-September 2016 89 specific patterns in many cases of mining trajectory data. ...
doi:10.4018/ijwsr.2016070105
fatcat:b7tsk5ytunginhep24xuvfosdi
Scanning and Parsing Languages with Ambiguities and Constraints: The Lamb and Fence Algorithms
[article]
2015
arXiv
pre-print
Lamb is a scanning algorithm that supports ambiguous token definitions and the specification of custom pattern matchers and constraints. ...
These tools allow the occurrence of lexical and syntactic ambiguities in language specifications and the declarative specification of constraints for resolving them. ...
English or Spanish) of the General Natural Language Parser. ...
arXiv:1501.02795v1
fatcat:2ixpxbr26vgvbdaxnpesuyzory
Mining constraint-based patterns using automatic relaxation
2009
Intelligent Data Analysis
We show that the primitive-based constraints can be efficiently mined thanks to a relaxation method based on virtual patterns which summarize the specificities of the search space. ...
The limitations of the task lies in languages being limited to describe the mined patterns and the ability to express varied constraints. ...
Acknowledgments This work has been partially supported by the ANR (French Research National Agency) project Bingo2 ANR-07-MDCO-014 which is a follow-up of the first Bingo project (2004)(2005)(2006)(2007 ...
doi:10.3233/ida-2009-0358
fatcat:7lkdv5fxmfhuvjt4wswfj2qr6q
The MiningZinc Framework for Constraint-Based Itemset Mining
2013
2013 IEEE 13th International Conference on Data Mining Workshops
We present MiningZinc, a novel system for constraint-based pattern mining. ...
It provides a declarative approach to data mining, where a user specifies a problem in terms of constraints and the system employs advanced techniques to efficiently find solutions. ...
This work was supported by two Postdoc and one project grant "Principles of Patternset Mining" from the Research Foundation-Flanders, and by the EU FET IST project "Inductive Constraint Programming", contract ...
doi:10.1109/icdmw.2013.38
dblp:conf/icdm/GunsDTNR13
fatcat:6lbwpmkfyfdnvo4i6ydm2zkxmm
PATTERN ANALYSIS AND KNOWLEDGE DISCOVERY ALGORITHMS – DIFFERENT PERSPECTIVES
2020
International journal of electronics engineering and application
Sequential Pattern Mining (SPM) is widely used data mining technique for discovering sequential patterns with a host of application domains including medicine, shopping sequences, sales record analysis ...
This paper studies and analysis and presents a comparison of different algorithms various types, methods, and data mining techniques for Frequent pattern mining. ...
The basic idea of this algorithm is constraint specification use of the regular expression at Knowledge the flexible tool [2] . ...
doi:10.30696/ijeea.viii.i.2020.42-47
fatcat:7rmpz4fw4rhftncbtuetmaadqq
OCL constraints automatic generation for UML class diagram
2010
2010 IEEE International Conference on Software Engineering and Service Sciences
First of all, the significance of automatic generation of OCL constraints was emphasized, and then the application domain of OCL was shown, followed by a lexical analysis of how to extract the target objects ...
In our way, the overall quality and efficiency of software design is enhanced and thus contributions are made for the automation of Software Engineering. ...
LEXICAL ANALYSIS BASED OCL CONSTRAINTS AUTOMATIC GENERATION After showing evidence of significance and feasibility of OCL constraints automatic generation, this section is to make it real. ...
doi:10.1109/icsess.2010.5552361
fatcat:qagh67jagzeqbgwcmnsfori5um
Study on Efficient Way to Identify User Aware Rare Sequential Pattern Matching in Document Stream
2017
International Journal for Research in Applied Science and Engineering Technology
This approach gives the effective and efficient way to find out rare pattern in document string. ...
STP candidates with (expected) support values for each user by pattern-growth, and selecting URSTPs by making user-aware rarity analysis on derived STPs. ...
will be possible for efficient mining of patterns ...
doi:10.22214/ijraset.2017.2019
fatcat:s543g4e5gbaavcylwlqh73glyy
Constraint-Based System for Genomic Analysis
2015
International Journal of Information and Education Technology
However, to make the system efficiently work, we need a new set of constraint solver algorithms specifically designed for the sequence analysis problem. ...
In this paper, we propose a different setting of sequence analysis formulation based on the nucleotide patterns using a constraint logic programming paradigm, in which the sequence alignment can be performed ...
ACKNOWLEDGMENT This work has been supported by grants from the National Research Council of Thailand (NRCT) and the authors are supported by research funding from Suranaree University of Technology. ...
doi:10.7763/ijiet.2015.v5.487
fatcat:jxutnxbhvjedlfn22ksfntkz2m
Special issue on "context-aware data mining (CADM)"
2011
Knowledge and Information Systems
Also, during the mining task, context may be used as constraints, thus allowing search space reduction, pattern pruning, and the development of more efficient algorithms. ...
Also, data mining has been successfully applied in a number of different fields, such as bioinformatics, business intelligence, finance data analysis, location based services, network data analysis, and ...
The first paper, entitled "COAT: COnstraint-based anonymization of transactions," faces the problem of producing anonymizations of transactional data proposing COAT (COnstraint-based Anonymization of Transactions ...
doi:10.1007/s10115-011-0436-y
fatcat:ixt5zerxpva3jnmbhanf22laji
Computer-Aided Formalization of Requirements Based on Patterns
2014
IEICE transactions on information and systems
To handle this challenge, this paper describes a pattern-based approach to facilitate the formalization of requirements. ...
In this approach, a pattern system is predefined to guide requirements formalization where each pattern provides a specific solution for formalizing one kind of function into a formal expression. ...
Acknowledgement This work has been conducted as a part of "Research Initiative on Advanced Software Engineering in 2012" supported by Software Reliability Enhancement Center (SEC), Information Technology ...
doi:10.1587/transinf.e97.d.198
fatcat:5htu4ij62ng5zenckeubwzye6q
Reverse engineering with the reclipse tool suite
2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - ICSE '10
Design pattern detection is a reverse engineering methodology that helps software engineers to analyze and understand legacy software by recovering its design and thereby aiding in the preparation of re-engineering ...
We present Reclipse, a reverse engineering tool suite for static and dynamic design pattern detection in combination with a pattern candidate rating used to assess the detection results' reliability. ...
Dynamic Analysis The dynamic analysis is based on traces of the pattern candidates. ...
doi:10.1145/1810295.1810360
dblp:conf/icse/DettenMT10
fatcat:iltesfbarbhllad2v4p3yujhyu
Survey on Sequential Pattern Mining Algorithms
2013
International Journal of Computer Applications
The information achieved from sequential pattern mining can be used in marketing, medical records, sales analysis, and so on. ...
Several efficient algorithms for maintaining sequential patterns have been developed. , old datasets are deleted while some other datasets are updated. ...
So, from the previous studies and comparative analysis of various mining algorithms, it is clear that pattern growth based algorithms are more efficient with respect to running time, space utilization ...
doi:10.5120/13301-0782
fatcat:eee6r7dtbffmfphbb4y4shh3be
Modeling constraints to redundancy in bimanual force coordination
2011
Journal of Neurophysiology
We examined three models of task constraints based on the criteria of task variance (minimum variance model) and efficiency of muscle force output (coefficient-independent and coefficient-dependent efficiency ...
categories of constraints is weighted based on their relative influence on coordination patterns and the realization of the task goal. ...
DISCLOSURES No conflicts of interest, financial or otherwise, are declared by the author(s). ...
doi:10.1152/jn.01086.2010
pmid:21346203
fatcat:gi3mnjtaf5d2he5j36asyjd2fa
« Previous
Showing results 1 — 15 out of 696,493 results