Sciweavers

480 search results - page 64 / 96
» policy 2004
Sort
View
ECML
2004
Springer
14 years 28 days ago
Filtered Reinforcement Learning
Reinforcement learning (RL) algorithms attempt to assign the credit for rewards to the actions that contributed to the reward. Thus far, credit assignment has been done in one of t...
Douglas Aberdeen
IWDC
2004
Springer
510views Communications» more  IWDC 2004»
14 years 27 days ago
On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP Networks
Abstract. The extension of Internet services to public transport passengers is slowly becoming inevitable. To this end, it is envisaged that high-speed local area networks will be ...
Muhammad Ali Malik, Salil S. Kanhere, Mahbub Hassa...
ESORICS
2004
Springer
14 years 28 days ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
OOPSLA
2004
Springer
14 years 27 days ago
Finding and preventing run-time error handling mistakes
It is difficult to write programs that behave correctly in the presence of run-time errors. Existing programming language features often provide poor support for executing clean-u...
Westley Weimer, George C. Necula
DBSEC
2004
83views Database» more  DBSEC 2004»
13 years 9 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu