Sciweavers

1082 search results - page 29 / 217
» Policy support for call control
Sort
View
ACSAC
1997
IEEE
14 years 27 days ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
ESORICS
2007
Springer
14 years 2 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
SELMAS
2004
Springer
14 years 2 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
LCN
2003
IEEE
14 years 1 months ago
Multi-Class Bandwidth Allocation Policy for 3G Wireless Networks
In this paper we develop an analytical threshold-based bandwidth allocation policy for 3G multi-class cellular networks. We consider the effects of user mobility when the cellular...
Nidal Nasser, Hossam S. Hassanein
COLT
2010
Springer
13 years 6 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura