Sciweavers

581 search results - page 25 / 117
» policy 2009
Sort
View
CIKM
2009
Springer
14 years 4 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
ATAL
2009
Springer
13 years 11 months ago
Implementing Collective Obligations in Human-Agent Teams Using KAoS Policies
Obligations can apply to individuals, either severally or collectively. When applied severally, each individual or member of a team is independently responsible to fulfill the obli...
Jurriaan van Diggelen, Jeffrey M. Bradshaw, Matthe...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 7 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
PAM
2009
Springer
14 years 4 months ago
Triangle Inequality and Routing Policy Violations in the Internet
Triangle inequality violations (TIVs) are the effect of packets between two nodes being routed on the longer direct path between them when a shorter detour path through an intermed...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
ICAS
2009
IEEE
109views Robotics» more  ICAS 2009»
14 years 4 months ago
Ponder2: A Policy System for Autonomous Pervasive Environments
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale ne...
Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris...