Sciweavers

480 search results - page 39 / 96
» policy 2004
Sort
View
FLAIRS
2004
13 years 9 months ago
State Space Reduction For Hierarchical Reinforcement Learning
er provides new techniques for abstracting the state space of a Markov Decision Process (MDP). These techniques extend one of the recent minimization models, known as -reduction, ...
Mehran Asadi, Manfred Huber
ASPLOS
2004
ACM
14 years 1 months ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
POLICY
2004
Springer
14 years 1 months ago
Towards a Multi-dimensional Characterization of Dissemination Control
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
Roshan K. Thomas, Ravi S. Sandhu
PERCOM
2004
ACM
14 years 7 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
ECIS
2004
13 years 9 months ago
Calculative-based trust and social welfare
Trust building has been acknowledged as one of the critical factor for the success of e-commerce. However, few sources of trust were identified in online transaction. This paper t...
Sang-Yong Tom Lee, Zhaoli Meng