Sciweavers

581 search results - page 12 / 117
» policy 2009
Sort
View
FM
2009
Springer
104views Formal Methods» more  FM 2009»
14 years 3 months ago
Verifying Information Flow Control over Unbounded Processes
Abstract. Decentralized Information Flow Control (DIFC) systems enable programmers to express a desired DIFC policy, and to have the policy enforced via a reference monitor that re...
William R. Harris, Nicholas Kidd, Sagar Chaki, Som...
SIGCOMM
2009
ACM
14 years 3 months ago
Practical declarative network management
We present Flow-based Management Language (FML), a declarative policy language for managing the configuration of enterprise networks. FML was designed to replace the many dispara...
Timothy L. Hinrichs, Natasha Gude, Martin Casado, ...
ALT
2011
Springer
12 years 8 months ago
Deviations of Stochastic Bandit Regret
This paper studies the deviations of the regret in a stochastic multi-armed bandit problem. When the total number of plays n is known beforehand by the agent, Audibert et al. (2009...
Antoine Salomon, Jean-Yves Audibert
CDC
2009
IEEE
123views Control Systems» more  CDC 2009»
14 years 1 months ago
On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access
We consider a class of restless multi-armed bandit problems that arises in multi-channel opportunistic communications, where channels are modeled as independent and stochastically...
Keqin Liu, Qing Zhao
ICCBR
2010
Springer
14 years 14 days ago
Similarity-Based Retrieval and Solution Re-use Policies in the Game of Texas Hold'em
In previous papers we have presented our autonomous poker playing agent (SARTRE) that uses a memory-based approach to create a betting strategy for two-player, limit Texas Hold’e...
Jonathan Rubin, Ian Watson