Sciweavers

591 search results - page 103 / 119
» Embracing policy engineering
Sort
View
JMLR
2002
125views more  JMLR 2002»
14 years 9 months ago
Lyapunov Design for Safe Reinforcement Learning
Lyapunov design methods are used widely in control engineering to design controllers that achieve qualitative objectives, such as stabilizing a system or maintaining a system'...
Theodore J. Perkins, Andrew G. Barto
SAC
2008
ACM
14 years 9 months ago
A lifecycle approach to SOA governance
Due to the distributed nature of Service-Oriented Architectures (SOA), maintaining control in a SOA environment becomes more difficult as services spread over different lines-of-b...
T. G. J. Schepers, Maria-Eugenia Iacob, Pascal van...
CCS
2010
ACM
14 years 8 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
CCS
2010
ACM
14 years 4 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
SIGMETRICS
2010
ACM
129views Hardware» more  SIGMETRICS 2010»
14 years 4 months ago
From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP
Traffic matrices play a pivotal role in the management of an ISP's network such as various levels of traffic engineering and capacity planning. However, it is unclear how the...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang