Sciweavers

470 search results - page 7 / 94
» From evidence-based policy making to policy analytics
Sort
View
CCS
2011
ACM
12 years 11 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
CCS
2007
ACM
14 years 5 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
TCOM
2010
115views more  TCOM 2010»
13 years 9 months ago
QoS Analysis of a Scheduling Policy for Heterogeneous Users Employing AMC Jointly with ARQ
—This paper analyzes the quality of service (QoS) of scheduling algorithms for heterogeneous users in multiuser (MU) wireless systems that take advantage from a crosslayer design...
Mario Poggioni, Luca Rugini, Paolo Banelli
ATAL
2007
Springer
14 years 2 months ago
Confidence-based policy learning from demonstration using Gaussian mixture models
We contribute an approach for interactive policy learning through expert demonstration that allows an agent to actively request and effectively represent demonstration examples. I...
Sonia Chernova, Manuela M. Veloso
NETWORKING
2008
14 years 9 days ago
Modeling Priority-Based Incentive Policies for Peer-Assisted Content Delivery Systems
Content delivery providers can improve their service scalability and offload their servers by making use of content transfers among their clients. To provide peers with incentive t...
Niklas Carlsson, Derek L. Eager