Sciweavers

1082 search results - page 113 / 217
» Policy support for call control
Sort
View
COLCOM
2007
IEEE
14 years 3 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CSFW
2006
IEEE
14 years 3 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic
ICML
1996
IEEE
14 years 1 months ago
A Convergent Reinforcement Learning Algorithm in the Continuous Case: The Finite-Element Reinforcement Learning
This paper presents a direct reinforcement learning algorithm, called Finite-Element Reinforcement Learning, in the continuous case, i.e. continuous state-space and time. The eval...
Rémi Munos
MICRO
2000
IEEE
74views Hardware» more  MICRO 2000»
14 years 14 days ago
A framework for dynamic energy efficiency and temperature management
While technology is delivering increasingly sophisticated and powerful chip designs, it is also imposing alarmingly high energy requirements on the chips. One way to address this ...
Michael C. Huang, Jose Renau, Seung-Moon Yoo, Jose...
RTAS
1997
IEEE
14 years 1 months ago
QoS Negotiation in Real-Time Systems and Its Application to Automated Flight Control
ÐReal-time middleware services must guarantee predictable performance under specified load and failure conditions, and ensure graceful degradation when these conditions are violat...
Tarek F. Abdelzaher, Ella M. Atkins, Kang G. Shin