Sciweavers

2422 search results - page 69 / 485
» Security Policy Consistency
Sort
View
BIRTHDAY
2008
Springer
15 years 6 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
ICML
2000
IEEE
16 years 5 months ago
Eligibility Traces for Off-Policy Policy Evaluation
Eligibility traces have been shown to speed reinforcement learning, to make it more robust to hidden states, and to provide a link between Monte Carlo and temporal-difference meth...
Doina Precup, Richard S. Sutton, Satinder P. Singh
WPES
2004
ACM
15 years 9 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
POLICY
2007
Springer
15 years 10 months ago
Specifying and Enforcing High-Level Semantic Obligation Policies
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems...
Zhen Liu, Anand Ranganathan, Anton Riabov
IOR
2010
112views more  IOR 2010»
15 years 2 months ago
New Policies for the Stochastic Inventory Control Problem with Two Supply Sources
We study an inventory system under periodic review in the presence of two suppliers (or delivery modes). The emergency supplier has a shorter lead-time than the regular supplier, ...
Anshul Sheopuri, Ganesh Janakiraman, Sridhar Sesha...