Sciweavers

3523 search results - page 55 / 705
» Feature interaction in policies
Sort
View
ECAI
2006
Springer
14 years 1 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
ISCA
1995
IEEE
110views Hardware» more  ISCA 1995»
14 years 1 months ago
Instruction Cache Fetch Policies for Speculative Execution
Current trends in processor design are pointing to deeper and wider pipelines and superscalar architectures. The efficient use of these resources requires speculative execution, ...
Dennis Lee, Jean-Loup Baer, Brad Calder, Dirk Grun...
ATAL
2009
Springer
14 years 4 months ago
Planning with continuous resources for agent teams
Many problems of multiagent planning under uncertainty require distributed reasoning with continuous resources and resource limits. Decentralized Markov Decision Problems (Dec-MDP...
Janusz Marecki, Milind Tambe
RIDE
1999
IEEE
14 years 2 months ago
Use of Roles and Policies for Specifying and Managing a Virtual Enterprise
One of the problems faced by an organisation participating in a virtual enterprise is how to specify internal and external aspects of the organisation in terms of the organisation...
Emil Lupu, Zoran Milosevic, Morris Sloman
ACSAC
2006
IEEE
14 years 1 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini