Sciweavers

581 search results - page 34 / 117
» policy 2009
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 6 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
INFOCOM
2009
IEEE
14 years 3 months ago
Delay Analysis for Multi-Hop Wireless Networks
Abstract—We analyze the delay performance of a multihop wireless network with a fixed route between each sourcedestination pair. There are arbitrary interference constraints on ...
Gagan Rajesh Gupta, Ness B. Shroff
ICRA
2009
IEEE
132views Robotics» more  ICRA 2009»
14 years 3 months ago
Smoothed Sarsa: Reinforcement learning for robot delivery tasks
— Our goal in this work is to make high level decisions for mobile robots. In particular, given a queue of prioritized object delivery tasks, we wish to find a sequence of actio...
Deepak Ramachandran, Rakesh Gupta
MICRO
2009
IEEE
121views Hardware» more  MICRO 2009»
14 years 3 months ago
Application-aware prioritization mechanisms for on-chip networks
Network-on-Chips (NoCs) are likely to become a critical shared resource in future many-core processors. The challenge is to develop policies and mechanisms that enable multiple ap...
Reetuparna Das, Onur Mutlu, Thomas Moscibroda, Chi...
MICAI
2009
Springer
14 years 3 months ago
A Two-Stage Relational Reinforcement Learning with Continuous Actions for Real Service Robots
Reinforcement Learning is a commonly used technique in robotics, however, traditional algorithms are unable to handle large amounts of data coming from the robot’s sensors, requi...
Julio H. Zaragoza, Eduardo F. Morales