Sciweavers

183 search results - page 21 / 37
» Safety analysis of usage control authorization models
Sort
View
VTC
2008
IEEE
113views Communications» more  VTC 2008»
14 years 3 months ago
On Design of TDD for Joint Uplink and Downlink Resource Allocation in OFDMA-Based WiMax
— In this paper, we study the joint design of uplink and downlink resources in OFDMA-based systems. We first analyze the interactions between uplink and downlink, due essentiall...
Tijani Chahed, Salah-Eddine Elayoubi, Eitan Altman
CHI
2010
ACM
14 years 3 months ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz
NIPS
1993
13 years 10 months ago
Robust Reinforcement Learning in Motion Planning
While exploring to nd better solutions, an agent performing online reinforcement learning (RL) can perform worse than is acceptable. In some cases, exploration might have unsafe, ...
Satinder P. Singh, Andrew G. Barto, Roderic A. Gru...
ACSC
2009
IEEE
14 years 3 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
WSC
2004
13 years 10 months ago
Automation of Human Decision Processes for Route Completion for Airspace Design Analysis
This paper describes an algorithm for approximating missing data in air traffic routes thereby allowing the lengths of different routes to be compared for our simulation analyses....
Lisa A. Schaefer