Sciweavers

1627 search results - page 175 / 326
» On context in authorization policy
Sort
View
ICML
2010
IEEE
13 years 11 months ago
Convergence of Least Squares Temporal Difference Methods Under General Conditions
We consider approximate policy evaluation for finite state and action Markov decision processes (MDP) in the off-policy learning context and with the simulation-based least square...
Huizhen Yu
ENTCS
2006
137views more  ENTCS 2006»
13 years 10 months ago
An Efficient Method for Computing Exact State Space of Petri Nets With Stopwatches
In this paper, we address the issue of the formal verification of real-time systems in the context of a preemptive scheduling policy. We propose an algorithm which computes the st...
Morgan Magnin, Didier Lime, Olivier H. Roux
CSSE
2004
IEEE
13 years 10 months ago
Trustable B2C markets on the semantic web
Abstract. Semantic Web technologies will deeply influence the further development of the Internet Economy. A major challenge is, however, to find a practical solution for trust pro...
Robert Tolksdorf, Christian Bizer, Rainer Eckstein...
CCR
2000
93views more  CCR 2000»
13 years 10 months ago
On the validity of digital signatures
An important feature of digital signatures is to serve as nonrepudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should...
Jianying Zhou, Robert H. Deng
IPAW
2010
13 years 8 months ago
Provenance of Decisions in Emergency Response Environments
Mitigating the devastating ramifications of major disasters requires emergency workers to respond in a maximally efficient way. Information systems can improve their efficiency by ...
Iman Naja, Luc Moreau, Alex Rogers