Sciweavers

1912 search results - page 104 / 383
» Optimizing interconnection policies
Sort
View
PKDD
2009
Springer
169views Data Mining» more  PKDD 2009»
14 years 4 months ago
Hybrid Least-Squares Algorithms for Approximate Policy Evaluation
The goal of approximate policy evaluation is to “best” represent a target value function according to a specific criterion. Temporal difference methods and Bellman residual m...
Jeffrey Johns, Marek Petrik, Sridhar Mahadevan
CCS
2007
ACM
14 years 3 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
AINA
2006
IEEE
14 years 3 months ago
Adaptive Timeout Policies for Wireless Links
— A considerable body of evidence indicates that the use of reliable link layer protocols over error prone wireless links dramatically improves the performance of Internet protoc...
George Xylomenos, Christos Tsilopoulos
DSOM
2005
Springer
14 years 3 months ago
Design and Implementation of Performance Policies for SMS Systems
We present a design for policy-based performance management of SMS Systems. The design takes as input the operator’s performance goals, which are expressed as policies that can b...
Alberto Gonzalez Prieto, Rolf Stadler
NDSS
2003
IEEE
14 years 3 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis