Sciweavers

1236 search results - page 35 / 248
» Efficient Interpretation Policies
Sort
View
ESORICS
2007
Springer
14 years 19 days ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
TIT
2008
65views more  TIT 2008»
13 years 8 months ago
Power-Efficient Resource Allocation for Time-Division Multiple Access Over Fading Channels
We investigate resource allocation policies for time-division multiple access (TDMA) over fading channels in the power-limited regime. For frequency-flat block-fading channels and ...
Xin Wang, Georgios B. Giannakis
TISSEC
2002
82views more  TISSEC 2002»
13 years 8 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
HPCC
2007
Springer
14 years 19 days ago
Business Model and the Policy of Mapping Light Communication Grid-Based Workflow Within the SLA Context
In the business Grid environment, the business relationship between a customer and a service provider should be clearly defined. The responsibility of each partner can be stated in...
Dang Minh Quan, Jörn Altmann
NIPS
2008
13 years 10 months ago
Regularized Policy Iteration
In this paper we consider approximate policy-iteration-based reinforcement learning algorithms. In order to implement a flexible function approximation scheme we propose the use o...
Amir Massoud Farahmand, Mohammad Ghavamzadeh, Csab...