Sciweavers

948 search results - page 5 / 190
» Analysis of SITA policies
Sort
View
SOCIALCOM
2010
13 years 8 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
COMCOM
2008
71views more  COMCOM 2008»
13 years 11 months ago
The policy continuum-Policy authoring and conflict analysis
Steven Davy, Brendan Jennings, John Strassner
IFIP
2009
Springer
13 years 8 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
WCET
2010
13 years 8 months ago
Toward Precise PLRU Cache Analysis
Schedulability analysis for hard real-time systems requires bounds on the execution times of its tasks. To obtain useful bounds in the presence of caches, cache analysis is mandat...
Daniel Grund, Jan Reineke
JMLR
2010
135views more  JMLR 2010»
13 years 5 months ago
Finite-sample Analysis of Bellman Residual Minimization
We consider the Bellman residual minimization approach for solving discounted Markov decision problems, where we assume that a generative model of the dynamics and rewards is avai...
Odalric-Ambrym Maillard, Rémi Munos, Alessa...