Sciweavers

948 search results - page 20 / 190
» Analysis of SITA policies
Sort
View
ORL
2007
112views more  ORL 2007»
14 years 9 months ago
Competitive analysis of a dispatch policy for a dynamic multi-period routing problem
We analyze a simple and natural on-line algorithm (dispatch policy) for a dynamic multiperiod uncapacitated routing problem, in which at the beginning of each time period a set of...
Enrico Angelelli, Martin W. P. Savelsbergh, Maria ...
DSOM
2006
Springer
15 years 1 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
DGO
2003
140views Education» more  DGO 2003»
14 years 11 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
DOCENG
2010
ACM
14 years 10 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
ACSAC
2006
IEEE
15 years 1 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini