Sciweavers

470 search results - page 28 / 94
» From evidence-based policy making to policy analytics
Sort
View
VR
2002
IEEE
124views Virtual Reality» more  VR 2002»
14 years 3 months ago
Handling Heterogeneity in Networked Virtual Environments
The availability of inexpensive and powerful graphics cards as well as fast Internet connections make Networked Virtual Environments viable for millions of users and many new appl...
Helmuth Trefftz, Ivan Marsic, Michael Zyda
CADE
2002
Springer
14 years 11 months ago
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code
Abstract. Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy inc...
Robert R. Schneck, George C. Necula
KI
2007
Springer
14 years 5 months ago
Options in Readylog Reloaded - Generating Decision-Theoretic Plan Libraries in Golog
Readylog is a logic-based agent programming language and combines many important features from other Golog dialects. One of the features of Readylog is to make use of decision-theo...
Lutz Böhnstedt, Alexander Ferrein, Gerhard La...
CSFW
2010
IEEE
14 years 2 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
IWMMDBMS
1998
123views more  IWMMDBMS 1998»
14 years 9 days ago
An Adaptive Block Management Scheme Using On-Line Detection of Block Reference Patterns
Recent research has shown that near optimal performance can be achieved by adaptive block replacement policies that use user-level hints regarding the block reference pattern. How...
Jongmoo Choi, Sam H. Noh, Sang Lyul Min, Yookun Ch...