Sciweavers

Share
IJCOMSYS
2006
99views more  IJCOMSYS 2006»
8 years 11 months ago
Distributed policy processing in active-service based infrastructures
More and more applications in the Internet are requiring an intelligent service infrastructure to provide customized services. In this paper, we present an infrastructure, which c...
Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
CORR
2006
Springer
113views Education» more  CORR 2006»
8 years 11 months ago
A Unified View of TD Algorithms; Introducing Full-Gradient TD and Equi-Gradient Descent TD
This paper addresses the issue of policy evaluation in Markov Decision Processes, using linear function approximation. It provides a unified view of algorithms such as TD(), LSTD()...
Manuel Loth, Philippe Preux
COMCOM
2006
93views more  COMCOM 2006»
8 years 11 months ago
A novel method for QoS provisioning with protection in GMPLS networks
In this paper, a new optimal policy is introduced to determine, adapt, and protect the Generalized MultiProtocol Label Switching (GMPLS) network topology based on the current traf...
Tricha Anjali, Caterina M. Scoglio
CORR
2008
Springer
64views Education» more  CORR 2008»
8 years 11 months ago
Linearly Parameterized Bandits
We consider bandit problems involving a large (possibly infinite) collection of arms, in which the expected reward of each arm is a linear function of an r-dimensional random vect...
Paat Rusmevichientong, John N. Tsitsiklis
CORR
2010
Springer
164views Education» more  CORR 2010»
8 years 11 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy
CORR
2008
Springer
81views Education» more  CORR 2008»
8 years 11 months ago
Platform-Independent Firewall Policy Representation
paper we will discuss the design of abstract firewall model along with platform-independent policy definition language. We will also discuss the main design challenges and solutio...
Vadim Zaliva
ANOR
2008
108views more  ANOR 2008»
8 years 11 months ago
A consensus model of political decision-making
In this paper, a model of political consensus is introduced. Parties try to reach consensus in forming a government. A government is defined as a pair consisting of a winning coali...
Patrik Eklund, Agnieszka Rusinowska, Harrie C. M. ...
DBSEC
2009
124views Database» more  DBSEC 2009»
9 years 6 days ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
ESORICS
2010
Springer
9 years 6 days ago
An Authorization Framework Resilient to Policy Evaluation Failures
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...
Jason Crampton, Michael Huth
DOCENG
2010
ACM
9 years 6 days ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
books