Sciweavers

1627 search results - page 109 / 326
» On context in authorization policy
Sort
View
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 10 months ago
A Unified View of TD Algorithms; Introducing Full-Gradient TD and Equi-Gradient Descent TD
This paper addresses the issue of policy evaluation in Markov Decision Processes, using linear function approximation. It provides a unified view of algorithms such as TD(), LSTD()...
Manuel Loth, Philippe Preux
EMNLP
2008
13 years 12 months ago
HotSpots: Visualizing Edits to a Text
Compared to the telephone, email based customer care is increasingly becoming the preferred channel of communication for corporations and customers. Most email-based customer care...
Srinivas Bangalore, David Smith
SACMAT
2009
ACM
14 years 5 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
JFP
2008
61views more  JFP 2008»
13 years 10 months ago
Control reduction theories: the benefit of structural substitution
The historical design of the call-by-value theory of control relies on the reification of evaluation contexts as regular functions and on the use of ordinary term application for ...
Zena M. Ariola, Hugo Herbelin
POLICY
2007
Springer
14 years 4 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat