Sciweavers

189 search results - page 20 / 38
» Learning Automation Policies for Pervasive Computing Environ...
Sort
View
WPES
2004
ACM
15 years 5 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
SACMAT
2010
ACM
14 years 10 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
ICCBR
2007
Springer
15 years 5 months ago
An Analysis of Case-Based Value Function Approximation by Approximating State Transition Graphs
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
Thomas Gabel, Martin Riedmiller
FLAIRS
2003
15 years 1 months ago
Cost-Based Policy Mapping for Imitation
Imitation represents a powerful approach for programming and autonomous learning in robot and computer systems. An important aspect of imitation is the mapping of observations to ...
Srichandan V. Gudla, Manfred Huber
CASCON
2006
127views Education» more  CASCON 2006»
15 years 1 months ago
A model and architecture for situation determination
Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current appro...
Graham Thomson, Sotirios Terzis, Paddy Nixon