Sciweavers

5722 search results - page 140 / 1145
» Security Function Interactions
Sort
View
ECAI
2008
Springer
13 years 10 months ago
Exploiting locality of interactions using a policy-gradient approach in multiagent learning
In this paper, we propose a policy gradient reinforcement learning algorithm to address transition-independent Dec-POMDPs. This approach aims at implicitly exploiting the locality...
Francisco S. Melo
CRIWG
2003
13 years 10 months ago
Exploring Interaction Behaviour and Performance of Online Collaborative Learning Teams
Abstract. Studying and analysing the collaborative behaviour of online learning teams and how this behaviour is related and affects task performance is a complex process. This pap...
Thanasis Daradoumis, Fatos Xhafa, Joan Manuel Marq...
VLDB
2002
ACM
126views Database» more  VLDB 2002»
13 years 8 months ago
ALIAS: An Active Learning led Interactive Deduplication System
Deduplication, a key operation in integrating data from multiple sources, is a time-consuming, labor-intensive and domainspecific operation. We present our design of alias that us...
Sunita Sarawagi, Anuradha Bhamidipaty, Alok Kirpal...
NDSS
2000
IEEE
14 years 1 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
SACMAT
2009
ACM
14 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger