Sciweavers

1627 search results - page 131 / 326
» On context in authorization policy
Sort
View
CORR
2008
Springer
132views Education» more  CORR 2008»
13 years 10 months ago
Dynamic Rate Allocation in Fading Multiple-access Channels
We consider the problem of rate allocation in a fading Gaussian multiple-access channel (MAC) with fixed transmission powers. Our goal is to maximize a general concave utility func...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
COMCOM
2006
78views more  COMCOM 2006»
13 years 10 months ago
Personalization of internet telephony services for presence with SIP and extended CPL
This paper discusses issues of personalization of presence services in the context of Internet Telephony. Such services take into consideration the willingness and ability of a use...
Dongmei Jiang, Ramiro Liscano, Luigi Logrippo
CSCW
2006
ACM
14 years 4 months ago
Context-aware telephony: privacy preferences and sharing patterns
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with cont...
Ashraf Khalil, Kay Connelly
JMLR
2012
12 years 26 days ago
Contextual Bandit Learning with Predictable Rewards
Contextual bandit learning is a reinforcement learning problem where the learner repeatedly receives a set of features (context), takes an action and receives a reward based on th...
Alekh Agarwal, Miroslav Dudík, Satyen Kale,...
CONTEXT
2007
Springer
14 years 4 months ago
Between Symbol and Language-in-use
Indexing is often designed with the intent of dimensional reduction, that is, of generating standardised and uniform descriptive metadata. This could be characterised as a process ...
Emma Tonkin