Sciweavers

1150 search results - page 136 / 230
» Specifying Information-Flow Controls
Sort
View
AGENTS
2001
Springer
14 years 22 days ago
Using background knowledge to speed reinforcement learning in physical agents
This paper describes Icarus, an agent architecture that embeds a hierarchical reinforcement learning algorithm within a language for specifying agent behavior. An Icarus program e...
Daniel G. Shapiro, Pat Langley, Ross D. Shachter
CSMR
2000
IEEE
14 years 19 days ago
Architectural Design Recovery using Data Mining Techniques
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented...
Kamran Sartipi, Kostas Kontogiannis, Farhad Mavadd...
POPL
2000
ACM
14 years 17 days ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
APSEC
1999
IEEE
14 years 16 days ago
Capturing Periodic Concurrent Interactions of Mission Computer Tasks
Safety critical systems, such as aviation systems controlled by software, often have hard real-time requirements. Producing the correct resultat the right time is thefundamental g...
Jin Song Dong, Brendan P. Mahony, Neale Fulton
CONCUR
1999
Springer
14 years 15 days ago
Validating Firewalls in Mobile Ambients
Abstract. The ambient calculus is a calculus of computation that allows active processes (mobile ambients) to move between sites. A firewall is said to be protective whenever it d...
Flemming Nielson, Hanne Riis Nielson, René ...