Sciweavers

470 search results - page 10 / 94
» From evidence-based policy making to policy analytics
Sort
View
INFOCOM
1999
IEEE
14 years 3 months ago
Bandwidth Allocation Policies for Unicast and Multicast Flows
Abstract--Using multicast delivery to multiple receivers reduces the aggregate bandwidth required from the network compared to using unicast delivery to each receiver. However mult...
Arnaud Legout, Jörg Nonnenmacher, Ernst Biers...
CCS
2008
ACM
14 years 27 days ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
SACMAT
2009
ACM
14 years 5 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
VLDB
2002
ACM
95views Database» more  VLDB 2002»
13 years 10 months ago
Effective Change Detection Using Sampling
For a large-scale data-intensive environment, such as the World-Wide Web or data warehousing, we often make local copies of remote data sources. Due to limited network and computa...
Junghoo Cho, Alexandros Ntoulas
CORR
2002
Springer
94views Education» more  CORR 2002»
13 years 10 months ago
Self-Optimizing and Pareto-Optimal Policies in General Environments based on Bayes-Mixtures
The problem of making sequential decisions in unknown probabilistic environments is studied. In cycle t action yt results in perception xt and reward rt, where all quantities in g...
Marcus Hutter