As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...
Abstract. We investigate the problem of using function approximation in reinforcement learning where the agent’s policy is represented as a classifier mapping states to actions....
Bandwidth efficiency of wireless multicast can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. T...
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Challenging usage policy issues can arise within virtual organizations (VOs) that integrate participants and resources spanning multiple physical institutions. Participants may wi...
Large-Scale network such as the Internet consist of a large number of sub-networks. Since each subnetwork has management privileges and policies individually, it is difficult to r...
Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Ki...
Abstract. Learning to act in an unknown partially observable domain is a difficult variant of the reinforcement learning paradigm. Research in the area has focused on model-free m...
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
This paper introduces notions of resource policy for mobile code to be run on smart devices, to integrate with the proof-carrying code architecture of the Mobile Resource Guarantee...
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...