Sciweavers

470 search results - page 28 / 94
» From evidence-based policy making to policy analytics
Sort
View
92
Voted
VR
2002
IEEE
124views Virtual Reality» more  VR 2002»
15 years 5 months ago
Handling Heterogeneity in Networked Virtual Environments
The availability of inexpensive and powerful graphics cards as well as fast Internet connections make Networked Virtual Environments viable for millions of users and many new appl...
Helmuth Trefftz, Ivan Marsic, Michael Zyda
CADE
2002
Springer
16 years 26 days ago
A Gradual Approach to a More Trustworthy, Yet Scalable, Proof-Carrying Code
Abstract. Proof-carrying code (PCC) allows a code producer to associate to a program a machine-checkable proof of its safety. In the original approach to PCC, the safety policy inc...
Robert R. Schneck, George C. Necula
80
Voted
KI
2007
Springer
15 years 6 months ago
Options in Readylog Reloaded - Generating Decision-Theoretic Plan Libraries in Golog
Readylog is a logic-based agent programming language and combines many important features from other Golog dialects. One of the features of Readylog is to make use of decision-theo...
Lutz Böhnstedt, Alexander Ferrein, Gerhard La...
149
Voted
CSFW
2010
IEEE
15 years 4 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
91
Voted
IWMMDBMS
1998
123views more  IWMMDBMS 1998»
15 years 1 months ago
An Adaptive Block Management Scheme Using On-Line Detection of Block Reference Patterns
Recent research has shown that near optimal performance can be achieved by adaptive block replacement policies that use user-level hints regarding the block reference pattern. How...
Jongmoo Choi, Sam H. Noh, Sang Lyul Min, Yookun Ch...