Sciweavers

183 search results - page 21 / 37
» Safety analysis of usage control authorization models
Sort
View
125
Voted
VTC
2008
IEEE
113views Communications» more  VTC 2008»
15 years 8 months ago
On Design of TDD for Joint Uplink and Downlink Resource Allocation in OFDMA-Based WiMax
— In this paper, we study the joint design of uplink and downlink resources in OFDMA-based systems. We first analyze the interactions between uplink and downlink, due essentiall...
Tijani Chahed, Salah-Eddine Elayoubi, Eitan Altman
121
Voted
CHI
2010
ACM
15 years 8 months ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz
NIPS
1993
15 years 3 months ago
Robust Reinforcement Learning in Motion Planning
While exploring to nd better solutions, an agent performing online reinforcement learning (RL) can perform worse than is acceptable. In some cases, exploration might have unsafe, ...
Satinder P. Singh, Andrew G. Barto, Roderic A. Gru...
ACSC
2009
IEEE
15 years 8 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
110
Voted
WSC
2004
15 years 3 months ago
Automation of Human Decision Processes for Route Completion for Airspace Design Analysis
This paper describes an algorithm for approximating missing data in air traffic routes thereby allowing the lengths of different routes to be compared for our simulation analyses....
Lisa A. Schaefer