Sciweavers

62 search results - page 5 / 13
» Evaluating fragment construction policies for SDT systems
Sort
View
JAIR
2002
99views more  JAIR 2002»
13 years 7 months ago
Optimizing Dialogue Management with Reinforcement Learning: Experiments with the NJFun System
Designing the dialogue policy of a spoken dialogue system involves many nontrivial choices. This paper presents a reinforcement learning approach for automatically optimizing a di...
Satinder P. Singh, Diane J. Litman, Michael J. Kea...
SELMAS
2004
Springer
14 years 27 days ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
CSFW
2004
IEEE
13 years 11 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
JCB
2007
94views more  JCB 2007»
13 years 7 months ago
A Quantile Method for Sizing Optical Maps
Optical mapping is an integrated system for the analysis of single DNA molecules. It constructs restriction maps (noted as “optical map”) from individual DNA molecules present...
Haifeng Li, Anton Valouev, David C. Schwartz, Mich...
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov