Sciweavers

5757 search results - page 109 / 1152
» Dynamic Policy Programming
Sort
View
FASE
2003
Springer
15 years 10 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
WIOPT
2010
IEEE
15 years 3 months ago
Reservation policies for revenue maximization from secondary spectrum access in cellular networks
We consider the problem of providing opportunistic spectrum access to secondary users in wireless cellular networks. From the standpoint of spectrum license holders, achieving ben...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
IPPS
2009
IEEE
15 years 11 months ago
Efficient microarchitecture policies for accurately adapting to power constraints
In the past years Dynamic Voltage and Frequency Scaling (DVFS) has been an effective technique that allowed microprocessors to match a predefined power budget. However, as process...
Juan M. Cebrian, Juan L. Aragón, José...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
15 years 2 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
FLAIRS
2003
15 years 6 months ago
Cost-Based Policy Mapping for Imitation
Imitation represents a powerful approach for programming and autonomous learning in robot and computer systems. An important aspect of imitation is the mapping of observations to ...
Srichandan V. Gudla, Manfred Huber