Sciweavers

233 search results - page 2 / 47
» Composing and combining policies under the policy machine
Sort
View
ICCS
2001
Springer
13 years 9 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
ICML
2003
IEEE
14 years 5 months ago
Relativized Options: Choosing the Right Transformation
Relativized options combine model minimization methods and a hierarchical reinforcement learning framework to derive compact reduced representations of a related family of tasks. ...
Balaraman Ravindran, Andrew G. Barto
TASE
2007
IEEE
13 years 11 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
ML
2008
ACM
152views Machine Learning» more  ML 2008»
13 years 4 months ago
Learning near-optimal policies with Bellman-residual minimization based fitted policy iteration and a single sample path
Abstract. We consider batch reinforcement learning problems in continuous space, expected total discounted-reward Markovian Decision Problems. As opposed to previous theoretical wo...
András Antos, Csaba Szepesvári, R&ea...
IJCAI
2003
13 years 6 months ago
Approximate Policy Iteration using Large-Margin Classifiers
We present an approximate policy iteration algorithm that uses rollouts to estimate the value of each action under a given policy in a subset of states and a classifier to general...
Michail G. Lagoudakis, Ronald Parr