Sciweavers

852 search results - page 155 / 171
» Model-Checking Access Control Policies
Sort
View
RTSS
2008
IEEE
14 years 2 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West
ICML
2008
IEEE
14 years 8 months ago
Reinforcement learning in the presence of rare events
We consider the task of reinforcement learning in an environment in which rare significant events occur independently of the actions selected by the controlling agent. If these ev...
Jordan Frank, Shie Mannor, Doina Precup
ICFP
2009
ACM
14 years 8 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
CHI
2006
ACM
14 years 8 months ago
Tensions in designing capture technologies for an evidence-based care community
Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collecte...
Gillian R. Hayes, Gregory D. Abowd
PODS
2008
ACM
204views Database» more  PODS 2008»
14 years 7 months ago
Annotated XML: queries and provenance
We present a formal framework for capturing the provenance of data appearing in XQuery views of XML. Building on previous work on relations and their (positive) query languages, w...
J. Nathan Foster, Todd J. Green, Val Tannen