Sciweavers

437 search results - page 27 / 88
» Policy Gradient Critics
Sort
View
ECRTS
2004
IEEE
14 years 16 days ago
Energy-Efficient Policies for Request-Driven Soft Real-Time Systems
Computing systems, ranging from small battery-operated embedded systems to more complex general purpose systems, are designed to satisfy various computation demands in some accept...
Cosmin Rusu, Ruibin Xu, Rami G. Melhem, Daniel Mos...
IM
2007
13 years 10 months ago
Automated Availability Management Driven by Business Policies
—Policy-driven service management helps reduce IT management cost and it keeps the service management aligned with business objectives. While most of the previous research focuse...
Zhongtang Cai, Yuan Chen, Vibhore Kumar, Dejan S. ...
EUROMICRO
2003
IEEE
14 years 2 months ago
Enforcing a lips Usage Policy for CORBA Components
Software components promise easy reuse, dependability, and simplified development. Problems arise when implicit assumptions about the use of the component are encoded in the imple...
Wayne DePrince Jr., Christine Hofmeister
ISI
2006
Springer
13 years 8 months ago
An Info-Gap Approach to Policy Selection for Bio-terror Response
Bio-terror events are accompanied by severe uncertainty: great disparity between the best available data and models, and the actual course of events. We model this uncertainty with...
Anna Yoffe, Yakov Ben-Haim
ACSAC
2000
IEEE
14 years 1 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger