Sciweavers

427 search results - page 13 / 86
» Policies: Giving Users Control over Calls
Sort
View
ICML
2009
IEEE
14 years 10 months ago
Binary action search for learning continuous-action control policies
Reinforcement Learning methods for controlling stochastic processes typically assume a small and discrete action space. While continuous action spaces are quite common in real-wor...
Jason Pazis, Michail G. Lagoudakis
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
13 years 4 months ago
Optimal cross-layer wireless control policies using TD learning
We present an on-line crosslayer control technique to characterize and approximate optimal policies for wireless networks. Our approach combines network utility maximization and ad...
Sean P. Meyn, Wei Chen, Daniel O'Neill
MOR
2006
90views more  MOR 2006»
13 years 9 months ago
Optimal Control and Hedging of Operations in the Presence of Financial Markets
We consider the problem of dynamically hedging the profits of a corporation when these profits are correlated with returns in the financial markets. In particular, we consider the...
René Caldentey, Martin B. Haugh
JCS
2008
119views more  JCS 2008»
13 years 9 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
ENTCS
2007
113views more  ENTCS 2007»
13 years 9 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb