Sciweavers

1020 search results - page 19 / 204
» Learning to Use Operational Advice
Sort
View
SACMAT
2003
ACM
14 years 3 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
PERVASIVE
2004
Springer
14 years 3 months ago
Microbiology Tray and Pipette Tracking as a Proactive Tangible User Interface
Abstract. Many work environments can benefit from integrated computing devices to provide information to users, record users’ actions, and prompt users about the next steps to t...
Harlan Hile, Jiwon Kim, Gaetano Borriello
ISPASS
2007
IEEE
14 years 4 months ago
Accelerating Full-System Simulation through Characterizing and Predicting Operating System Performance
The ongoing trend of increasing computer hardware and software complexity has resulted in the increase in complexity and overheads of cycle-accurate processor system simulation, e...
Seongbeom Kim, Fang Liu, Yan Solihin, Ravi R. Iyer...
DISCEX
2003
IEEE
14 years 3 months ago
Lessons Learned in Using Live Red Teams in IA Experiments
The DARPA Information Assurance (IA) and Operational Partners in Experimentation (OPX) Programs have conducted over a dozen laboratory-based experiments involving live red teams s...
David Levin
LION
2010
Springer
190views Optimization» more  LION 2010»
14 years 1 months ago
Algorithm Selection as a Bandit Problem with Unbounded Losses
Abstract. Algorithm selection is typically based on models of algorithm performance learned during a separate offline training sequence, which can be prohibitively expensive. In r...
Matteo Gagliolo, Jürgen Schmidhuber