Filters








29,094 Hits in 2.8 sec

Synthesizing entity matching rules by examples

Rohit Singh, Venkata Vamsikrishna Meduri, Ahmed Elmagarmid, Samuel Madden, Paolo Papotti, Jorge-Arnulfo Quiané-Ruiz, Armando Solar-Lezama, Nan Tang
2017 Proceedings of the VLDB Endowment  
Entity matching (EM) is a critical part of data integration. We study how to synthesize entity matching rules from positive-negative matching examples.  ...  The rules in the form of GBF are more concise than traditional EM rules represented in Disjunctive Normal Form (DNF).  ...  Rule-Based Entity Matching. Declarative EM rules are normally desirable to end users.  ... 
doi:10.14778/3149193.3149199 fatcat:2sekwu3kzbakndo2otlaymeqem

Extracting Meaningful Entities from Human-generated Tactical Reports

Jinhong K. Guo, David Van Brackle, Nicolas LoFaso, Martin O. Hofmann
2015 Procedia Computer Science  
Traditionally, tools did not exploit human generated, textual reports, leaving analysts to manually map dots on the map into meaningful entities using background knowledge about adversary equipment, organization  ...  Tactical reports typically feature short sentences with simple grammar, but also tend to include jargon and abbreviations, do not follow grammatical rules, and are likely to have spelling errors.  ...  Tactical reports are generally short and concise. However, the conciseness is a product of mutual understanding, shared knowledge and shared context, among the parties involved.  ... 
doi:10.1016/j.procs.2015.09.153 fatcat:wqyxb6tda5hnxpuer6u32z6wjq

Automatic Inference of Structural Changes for Matching across Program Versions

Miryung Kim, David Notkin, Dan Grossman
2007 29th International Conference on Software Engineering (ICSE'07)  
rules.  ...  To overcome these limitations, our approach represents structural changes as a set of high-level change rules, automatically infers likely change rules and determines method-level matches based on the  ...  Conciseness: the measure of how concisely a set of rules explains matches, represented as a M/R ratio = |M| |Rules| .  ... 
doi:10.1109/icse.2007.20 dblp:conf/icse/KimNG07 fatcat:ovti5xuttnct7p5c3jsjixcbuq

Mining Source Code for Structural Regularities

Angela Lozano, Andy Kellens, Kim Mens, Gabriela Arevalo
2010 2010 17th Working Conference on Reverse Engineering  
In general, tool support for mining regularities tends to discover a huge amount of rules, making interpretation of the results hard and time-consuming.  ...  We propose an automated approach, based on association rule mining, to discover the structural regularities that govern the source code of a software system.  ...  entity is involved (either as a match to a rule, or as a deviation).  ... 
doi:10.1109/wcre.2010.12 dblp:conf/wcre/LozanoKMA10 fatcat:bupgicfzqneppd2xw3pjbm56lu

Class Diagram Restructuring with GROOVE

Wietse Smid, Arend Rensink
2013 Electronic Proceedings in Theoretical Computer Science  
We show that the visual rule formalism enables the required restructuring to be formulated in a very concise manner.  ...  First we apply the rule SELECTSUBCLASS (Fig. 3) . Similar to PULLUPDIRECT, it matches Entitys that have a superclass and a Property.  ...  The generalizations that link the Entitys to the superclass are removed, as well as the properties themselves.  ... 
doi:10.4204/eptcs.135.10 fatcat:xzqpmiywwvga7b2o5x5p2x6bj4

Declarative Access Control for WebDSL: Combining Language Integration and Separation of Concerns

Danny Groenewegen, Eelco Visser
2008 2008 Eighth International Conference on Web Engineering  
Acknowledgments We would like to thank William Cook for the discussions on domain-specific language design for web applications in general and access control in particular.  ...  A generic rule can use a wildcard for the name of the element and/or the parameters of the element. Such a rule applies to elements to which it matches.  ...  The generic rule is placed inside a rule set named admin.  ... 
doi:10.1109/icwe.2008.15 dblp:conf/icwe/GroenewegenV08 fatcat:vtyxpea2zjg23fkxkxf6e3b2h4

Adaptable Support for Queries and Transformations for the DRAGOS Graph-Database [chapter]

Erhard Weinell
2008 Lecture Notes in Computer Science  
Users can therefore access the database by applying structured rules instead of using atomic operations provided before.  ...  result, the development of graph transformation tools is eased by providing a mapping of specific graph languages to the Query and Transformation Language, instead of developing interpreters or code generators  ...  Hexagons represent operators which denote modifications of the matched graph entities. Here, the entity assigned to the third NodeVariable is deleted and removed from the match.  ... 
doi:10.1007/978-3-540-89020-1_27 fatcat:6fagheilivfabjdqmbyqpcu5hu

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [article]

Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song
2021 arXiv   pre-print
Built upon system auditing frameworks, ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise  ...  The return rule specifies the attributes of the matched events for return.  ...  EFFHUNTER further filters out edges whose associated IOC relations do not match any rules.  ... 
arXiv:2010.13637v2 fatcat:2dt52vj7a5fhbbwkb33jwwx7mu

Schema polynomials and applications

Kenneth A. Ross, Julia Stoyanovich
2008 Proceedings of the 11th international conference on Extending database technology Advances in database technology - EDBT '08  
The simplicity and conciseness of a schema depends critically on the idioms available to express the schema.  ...  We demonstrate how the schema factorization framework can be used to generate relational, object-oriented, and faceted physical schemas, allowing a wider exploration of physical schema alternatives than  ...  The general theme of simplicity, though, suggests that more concise representations of the same schema are better.  ... 
doi:10.1145/1352431.1352482 fatcat:7eu4efs7mremnnkuswdzmze3qe

Schema polynomials and applications

Kenneth A. Ross, Julia Stoyanovich
2008 Proceedings of the 11th international conference on Extending database technology Advances in database technology - EDBT '08  
The simplicity and conciseness of a schema depends critically on the idioms available to express the schema.  ...  We demonstrate how the schema factorization framework can be used to generate relational, object-oriented, and faceted physical schemas, allowing a wider exploration of physical schema alternatives than  ...  The general theme of simplicity, though, suggests that more concise representations of the same schema are better.  ... 
doi:10.1145/1353343.1353394 dblp:conf/edbt/RossS08 fatcat:gearj7atb5etvltggzsqcgvtii

Towards 2D Traceability in a Platform for Contract Aware Visual Transformations with Tolerated Inconsistencies

Pieter Gorp, Frank Altheide, Dirk Janssens
2006 International Enterprise Distributed Object Computing Conference, Proceedings  
Such transformations can be generated automatically from the contracts but tend to be optimized subtly by a transformation expert.  ...  The rule matches all cm nodes connected to an rm node by means of an m2m link of type CM2RM.  ...  Once a match against this structure has been found, the rule asserts that the name of the class in the conceptual model should always be the same as the name of the entity in the robustness model.  ... 
doi:10.1109/edoc.2006.61 dblp:conf/edoc/GorpAJ06 fatcat:dqk7q7idc5dqjdfheutxgmldyu

An Administrative Model for Relationship-Based Access Control [chapter]

Scott D. Stoller
2015 Lecture Notes in Computer Science  
Relationship-based access control (ReBAC) originated in the context of social network systems and recently is being generalized to be suitable for general computing systems.  ...  To the best of our knowledge, it is the first comprehensive administrative model for a ReBAC model suitable for general computing systems.  ...  A principal-matching policy is a list of principal-matching rules. It may contain at most one rule containing , and that rule, if present, must appear last.  ... 
doi:10.1007/978-3-319-20810-7_4 fatcat:fkzd32xqjbh5hhvcdy3twxo3me

Identifying and Summarizing Systematic Code Changes via Rule Inference

Miryung Kim, David Notkin, Dan Grossman, Gary Wilson
2013 IEEE Transactions on Software Engineering  
as logic rules.  ...  To enable programmers to reason about program differences at a high-level, this article proposes a rule-based program differencing approach that automatically discovers and represents systematic changes  ...  ACKNOWLEDGMENTS The authors thank Wei Wu and Hoan Nguyen for their help with the evaluation of the API-matching tool.  ... 
doi:10.1109/tse.2012.16 fatcat:nmf3zzrvgbg5zm72aqule2losy

GovWILD

Christoph Böhm, Michael Schmidt, Markus Freitag, Arvid Heise, Claudia Lehmann, Andrina Mascher, Felix Naumann, Vuk Ercegovac, Mauricio Hernandez, Peter Haase
2012 Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion  
Data fusion: The last integration step fuses previously matched and grouped representations of entities to concise tuples in order to lower the complexity of queries spanning multiple entities.  ...  Further, we have incorporated some general information sites to augment person and legal entity data.  ... 
doi:10.1145/2187980.2188039 dblp:conf/www/BohmFHLMNEHHS12 fatcat:ecdrgymhdzbzvknlltu3uhecqa

Conditional Bigraphs [chapter]

Blair Archibald, Muffy Calder, Michele Sevegnani
2020 Lecture Notes in Computer Science  
In standard bigraphs, the applicability of a rewrite rule is determined completely by a local match and does not allow any non-local reasoning, i.e. contextual conditions.  ...  We introduce conditional bigraphs that add conditions to rules and show how these fit into the matching framework for standard bigraphs. An implementation is provided, along with a set of examples.  ...  In bigraphs there is no general method to declare an entity as unique.  ... 
doi:10.1007/978-3-030-51372-6_1 fatcat:i7rp3mlmdnaohdo7ez5uggkoau
« Previous Showing results 1 — 15 out of 29,094 results