Sciweavers

437 search results - page 20 / 88
» Policy Gradient Critics
Sort
View
PDC
2004
ACM
14 years 2 months ago
Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design
As computer technologies start to permeate the everyday activities of a continuously growing population, social and technical as well as political and legal issues will surface. P...
Rogério De Paula
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 3 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
ISCC
2005
IEEE
14 years 2 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
NIPS
2008
13 years 10 months ago
Policy Search for Motor Primitives in Robotics
Many motor skills in humanoid robotics can be learned using parametrized motor primitives as done in imitation learning. However, most interesting motor learning problems are high...
Jens Kober, Jan Peters
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie