Sciweavers

979 search results - page 120 / 196
» Developing Dynamic Security Policies
Sort
View
114
Voted
DRM
2009
Springer
15 years 10 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
AAAI
2006
15 years 5 months ago
Improving Approximate Value Iteration Using Memories and Predictive State Representations
Planning in partially-observable dynamical systems is a challenging problem, and recent developments in point-based techniques such as Perseus significantly improve performance as...
Michael R. James, Ton Wessling, Nikos A. Vlassis
131
Voted
IPPS
2005
IEEE
15 years 9 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
NIPS
1993
15 years 5 months ago
Using Local Trajectory Optimizers to Speed Up Global Optimization in Dynamic Programming
Dynamic programming provides a methodology to develop planners and controllers for nonlinear systems. However, general dynamic programming is computationally intractable. We have ...
Christopher G. Atkeson
140
Voted
GRID
2007
Springer
15 years 10 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson