Sciweavers

914 search results - page 27 / 183
» Effective vaccination policies
Sort
View
205
Voted
SACMAT
2011
ACM
14 years 3 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
ICML
2003
IEEE
16 years 1 months ago
The Cross Entropy Method for Fast Policy Search
We present a learning framework for Markovian decision processes that is based on optimization in the policy space. Instead of using relatively slow gradient-based optimization al...
Shie Mannor, Reuven Y. Rubinstein, Yohai Gat
110
Voted
IJCAI
2001
15 years 1 months ago
Robot Weightlifting By Direct Policy Search
This paper describes a method for structuring a robot motor learning task. By designing a suitably parameterized policy, we show that a simple search algorithm, along with biologi...
Michael T. Rosenstein, Andrew G. Barto
99
Voted
CCS
2009
ACM
16 years 1 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
94
Voted
CLUSTER
2008
IEEE
15 years 7 months ago
Magnet: A novel scheduling policy for power reduction in cluster with virtual machines
—The concept of green computing has attracted much attention recently in cluster computing. However, previous local approaches focused on saving the energy cost of the components...
Liting Hu, Hai Jin, Xiaofei Liao, Xianjie Xiong, H...