Sciweavers

1082 search results - page 18 / 217
» Policy support for call control
Sort
View
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 8 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
NN
2010
Springer
187views Neural Networks» more  NN 2010»
13 years 3 months ago
Efficient exploration through active learning for value function approximation in reinforcement learning
Appropriately designing sampling policies is highly important for obtaining better control policies in reinforcement learning. In this paper, we first show that the least-squares ...
Takayuki Akiyama, Hirotaka Hachiya, Masashi Sugiya...
ICCS
2009
Springer
14 years 3 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
ICT
2004
Springer
139views Communications» more  ICT 2004»
14 years 2 months ago
A XML Policy-Based Approach for RSVP
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Emir Toktar, Edgard Jamhour, Carlos Maziero
DANCE
2002
IEEE
14 years 1 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...