Sciweavers

470 search results - page 20 / 94
» From evidence-based policy making to policy analytics
Sort
View
EUROSYS
2008
ACM
14 years 8 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
SIGCOMM
2009
ACM
14 years 5 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber
ICSE
2005
IEEE-ACM
14 years 11 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
JMLR
2006
124views more  JMLR 2006»
13 years 11 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
ECOWS
2009
Springer
14 years 5 months ago
Indirect Reciprocity in Policy-Based Helping Experiments
—In service-oriented architectures, participants keep interacting by exchanging tasks, in order to increase their benefit. Since carrying out a task incurs costs, and participan...
Christian von der Weth, Klemens Böhm, Thorben...