Sciweavers

700 search results - page 76 / 140
» Combinations of Stit and Actions
Sort
View
PERSUASIVE
2010
Springer
14 years 1 months ago
Activity-Based Micro-pricing: Realizing Sustainable Behavior Changes through Economic Incentives
Abstract. In this paper, we further develop the idea of combining pervasive computing techniques with electronic payment systems to create activity-based micro-incentives. Economic...
Tetsuo Yamabe, Vili Lehdonvirta, Hitoshi Ito, Hayu...
CSFW
2007
IEEE
14 years 1 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ECML
2007
Springer
14 years 1 months ago
Efficient Continuous-Time Reinforcement Learning with Adaptive State Graphs
Abstract. We present a new reinforcement learning approach for deterministic continuous control problems in environments with unknown, arbitrary reward functions. The difficulty of...
Gerhard Neumann, Michael Pfeiffer, Wolfgang Maass
ASIAN
2006
Springer
76views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Responsiveness in Process Calculi
Abstract. In a process calculus, an agent guarantees responsive usage of a channel name r if a communication along r is guaranteed to eventually take place. Responsiveness is impor...
Lucia Acciai, Michele Boreale
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...