Sciweavers

1678 search results - page 253 / 336
» An ASM Specification of C
Sort
View
SACMAT
2005
ACM
14 years 4 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
WMASH
2005
ACM
14 years 4 months ago
Measurements of SIP signaling over 802.11b links
The Session Initiation Protocol (SIP) is a popular application-level signaling protocol that is used for a wide variety of applications such as session control and mobility handli...
Cristian Hesselman, Henk Eertink, Ing Widya, Erik ...
CCS
2005
ACM
14 years 4 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
ECAL
2005
Springer
14 years 4 months ago
The Quantitative Law of Effect is a Robust Emergent Property of an Evolutionary Algorithm for Reinforcement Learning
An evolutionary reinforcement-learning algorithm, the operation of which was not associated with an optimality condition, was instantiated in an artificial organism. The algorithm ...
J. J. McDowell, Zahra Ansari
EMSOFT
2005
Springer
14 years 4 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander