Sciweavers

1167 search results - page 103 / 234
» policy 2007
Sort
View
NSDI
2007
15 years 6 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
INFOCOM
2007
IEEE
15 years 10 months ago
Throughput-Optimal Scheduling in Multichannel Access Point Networks Under Infrequent Channel Measurements
—We consider the problem of uplink/downlink scheduling in a multichannel wireless access point network where channel states differ across channels as well as users, vary with tim...
Koushik Kar, Xiang Luo, Saswati Sarkar
COLT
2007
Springer
15 years 10 months ago
Bounded Parameter Markov Decision Processes with Average Reward Criterion
Bounded parameter Markov Decision Processes (BMDPs) address the issue of dealing with uncertainty in the parameters of a Markov Decision Process (MDP). Unlike the case of an MDP, t...
Ambuj Tewari, Peter L. Bartlett
MODELS
2007
Springer
15 years 10 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
PDCAT
2007
Springer
15 years 10 months ago
Monitoring Employees' Emails without Violating Their Privacy Right
The capability of an employee to violate the policy of an organization is a concern for an employer. Monitoring is a measure taken by an employer to discourage an employee from ac...
Giannakis Antoniou, Parampalli Udaya, Lynn Margare...