Sciweavers

470 search results - page 63 / 94
» From evidence-based policy making to policy analytics
Sort
View
WDAG
2005
Springer
104views Algorithms» more  WDAG 2005»
15 years 6 months ago
Polymorphic Contention Management
Abstract. In software transactional memory (STM) systems, a contention manager resolves conflicts among transactions accessing the same memory locations. Whereas atomicity and ser...
Rachid Guerraoui, Maurice Herlihy, Bastian Pochon
WORDS
2002
IEEE
15 years 5 months ago
Meta-Programming Techniques for Distributed Real-time and Embedded Systems
Commercial off-the-shelf (COTS) middleware increasingly offers not only functional support for standard interfaces, but also the ability to optimize their resource consumption pat...
Joseph K. Cross, Douglas C. Schmidt
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 5 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
CCS
2001
ACM
15 years 5 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
130
Voted
UAI
2008
15 years 1 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...