Sciweavers

581 search results - page 99 / 117
» policy 2009
Sort
View
SAC
2009
ACM
14 years 1 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
GECCO
2009
Springer
124views Optimization» more  GECCO 2009»
14 years 1 months ago
Reinforcement learning for games: failures and successes
We apply CMA-ES, an evolution strategy with covariance matrix adaptation, and TDL (Temporal Difference Learning) to reinforcement learning tasks. In both cases these algorithms se...
Wolfgang Konen, Thomas Bartz-Beielstein
GECON
2009
Springer
125views Business» more  GECON 2009»
14 years 1 months ago
Message Protocols for Provisioning and Usage of Computing Services
Abstract. The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers o...
Nikolay Borissov, Simon Caton, Omer F. Rana, Aharo...
SSS
2009
Springer
110views Control Systems» more  SSS 2009»
14 years 1 months ago
From Local Impact Functions to Global Adaptation of Service Compositions
Abstract. The problem of self-optimization and adaptation in the context of customizable systems is becoming increasingly important with the emergence of complex software systems a...
Liliana Rosa, Luís Rodrigues, Antóni...
ATC
2009
Springer
14 years 18 days ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen