Sciweavers

3523 search results - page 93 / 705
» Feature interaction in policies
Sort
View
CG
2005
Springer
14 years 10 months ago
A simple normal enhancement technique for interactive non-photorealistic renderings
We present a simple technique to improve the perception of an object's shape. Bump mapping is well known in the computer graphics community for providing the impression of sm...
Paolo Cignoni, Roberto Scopigno, Marco Tarini
ISW
2009
Springer
15 years 4 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
CORR
2006
Springer
113views Education» more  CORR 2006»
14 years 10 months ago
A Unified View of TD Algorithms; Introducing Full-Gradient TD and Equi-Gradient Descent TD
This paper addresses the issue of policy evaluation in Markov Decision Processes, using linear function approximation. It provides a unified view of algorithms such as TD(), LSTD()...
Manuel Loth, Philippe Preux
IAT
2009
IEEE
15 years 4 months ago
Introducing Communication in Dis-POMDPs with Finite State Machines
Distributed Partially Observable Markov Decision Problems (DisPOMDPs) are emerging as a popular approach for modeling sequential decision making in teams operating under uncertain...
Yuki Iwanari, Makoto Tasaki, Makoto Yokoo, Atsushi...
CCS
2005
ACM
15 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu