Sciweavers

10 search results - page 2 / 2
» Policy and product-directed process instantiation
Sort
View
98
Voted
ICML
2006
IEEE
15 years 10 months ago
Learning the structure of Factored Markov Decision Processes in reinforcement learning problems
Recent decision-theoric planning algorithms are able to find optimal solutions in large problems, using Factored Markov Decision Processes (fmdps). However, these algorithms need ...
Thomas Degris, Olivier Sigaud, Pierre-Henri Wuille...
114
Voted
FORTE
2011
14 years 28 days ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
CRISIS
2008
14 years 11 months ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
91
Voted
FOAL
2007
ACM
15 years 1 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
ISPW
1991
IEEE
15 years 29 days ago
Policy-directed coordination and cooperation
product and the project as well as to define synchronization (or interaction) abstractions; activity definitions are used to model the process activities that transform the produ...
Dewayne E. Perry