Sciweavers

151 search results - page 8 / 31
» policy 2001
Sort
View
USENIX
2001
14 years 7 days ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
ISASSCI
2001
14 years 7 days ago
Towards Optimal Database Maintenance in Wireless Communication Systems
To ensure the consistency of database subsystems involved in wireless communication systems, appropriate scheduled maintenance policies are necessary. However, the short-persisten...
Amine Chohra, Felicita Di Giandomenico, Stefano Po...
IJCAI
2001
14 years 7 days ago
Exploiting Multiple Secondary Reinforcers in Policy Gradient Reinforcement Learning
Most formulations of Reinforcement Learning depend on a single reinforcement reward value to guide the search for the optimal policy solution. If observation of this reward is rar...
Gregory Z. Grudic, Lyle H. Ungar
RE
2001
Springer
14 years 3 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
NIPS
2001
14 years 7 days ago
Model-Free Least-Squares Policy Iteration
We propose a new approach to reinforcement learning which combines least squares function approximation with policy iteration. Our method is model-free and completely off policy. ...
Michail G. Lagoudakis, Ronald Parr