Sciweavers

148 search results - page 10 / 30
» Strong and Weak Policy Relations
Sort
View
MJ
2008
74views more  MJ 2008»
13 years 7 months ago
Wigner function and decoherence in a microcavity-Qdot system
The relation between the master equation and the Wigner function to characterize the dissipative system dynamics (evolution, mixedness and decoherence) between a three-level quant...
Juan P. Restrepo, Herbert Vinck-Posada, Boris A. R...
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
TARK
2009
Springer
14 years 2 months ago
A logical characterization of iterated admissibility
Brandenburger, Friedenberg, and Keisler provide an epistemic characterization of iterated admissibility (i.e., iterated deletion of weakly dominated strategies) where uncertainty ...
Joseph Y. Halpern, Rafael Pass
SAINT
2003
IEEE
14 years 28 days ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
KR
2004
Springer
14 years 1 months ago
Distance Semantics for Relevance-Sensitive Belief Revision
Possible-world semantics are provided for Parikh’s relevance-sensitive model for belief revision. Having Grove’s system-of-spheres construction as a base, we consider addition...
Pavlos Peppas, Samir Chopra, Norman Y. Foo