Sciweavers

948 search results - page 17 / 190
» Analysis of SITA policies
Sort
View
ICMI
2003
Springer
99views Biometrics» more  ICMI 2003»
15 years 2 months ago
Selective perception policies for guiding sensing and computation in multimodal systems: a comparative analysis
Intensive computations required for sensing and processing perceptual information can impose significant burdens on personal computer systems. We explore several policies for sel...
Nuria Oliver, Eric Horvitz
ICSE
2005
IEEE-ACM
15 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
SACMAT
2009
ACM
15 years 4 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
GLOBECOM
2007
IEEE
15 years 4 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
NIPS
2008
14 years 11 months ago
Signal-to-Noise Ratio Analysis of Policy Gradient Algorithms
Policy gradient (PG) reinforcement learning algorithms have strong (local) convergence guarantees, but their learning performance is typically limited by a large variance in the e...
John W. Roberts, Russ Tedrake