Sciweavers

136 search results - page 26 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
ACSAC
2007
IEEE
13 years 11 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
JMLR
2006
113views more  JMLR 2006»
13 years 7 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
INFOCOM
2005
IEEE
14 years 1 months ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
IJCAI
2001
13 years 9 months ago
R-MAX - A General Polynomial Time Algorithm for Near-Optimal Reinforcement Learning
R-max is a very simple model-based reinforcement learning algorithm which can attain near-optimal average reward in polynomial time. In R-max, the agent always maintains a complet...
Ronen I. Brafman, Moshe Tennenholtz
GCC
2010
Springer
13 years 5 months ago
DFC: Towards Effective Feedback Flow Management for Datacenters
Quality of Service (QoS) is essential to datacenters, which requires effective schemes to manage the flows among numerous servers. However, existing management techniques mainly fo...
Baohua Yang, Guodong Li, Yaxuan Qi, Yibo Xue, Jun ...