Sciweavers

979 search results - page 163 / 196
» Developing Dynamic Security Policies
Sort
View
ICDCS
1996
IEEE
14 years 2 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
UAI
2008
13 years 11 months ago
Hierarchical POMDP Controller Optimization by Likelihood Maximization
Planning can often be simplified by decomposing the task into smaller tasks arranged hierarchically. Charlin et al. [4] recently showed that the hierarchy discovery problem can be...
Marc Toussaint, Laurent Charlin, Pascal Poupart
NSDI
2004
13 years 11 months ago
SWAP: A Scheduler with Automatic Process Dependency Detection
We have developed SWAP, a system that automatically detects process dependencies and accounts for such dependencies in scheduling. SWAP uses system call history to determine possi...
Haoqiang Zheng, Jason Nieh
CEC
2010
IEEE
13 years 11 months ago
Learning to overtake in TORCS using simple reinforcement learning
In modern racing games programming non-player characters with believable and sophisticated behaviors is getting increasingly challenging. Recently, several works in the literature ...
Daniele Loiacono, Alessandro Prete, Pier Luca Lanz...
CCE
2004
13 years 9 months ago
An algorithmic framework for improving heuristic solutions: Part II. A new version of the stochastic traveling salesman problem
The algorithmic framework developed for improving heuristic solutions of the new version of deterministic TSP [Choi et al., 2002] is extended to the stochastic case. To verify the...
Jaein Choi, Jay H. Lee, Matthew J. Realff