Sciweavers

1998 search results - page 343 / 400
» Situated Control Rules
Sort
View
NDSS
2009
IEEE
15 years 10 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
INFOCOM
2009
IEEE
15 years 10 months ago
Minimizing Rulesets for TCAM Implementation
—Packet classification is a function increasingly used in a number of networking appliances and applications. Typically, sists of a set of abstract classifications, and a set o...
Rick McGeer, Praveen Yalagandula
ATAL
2009
Springer
15 years 10 months ago
Online exploration in least-squares policy iteration
One of the key problems in reinforcement learning is balancing exploration and exploitation. Another is learning and acting in large or even continuous Markov decision processes (...
Lihong Li, Michael L. Littman, Christopher R. Mans...
ATAL
2009
Springer
15 years 10 months ago
MABLE: a framework for learning from natural instruction
The Modular Architecture for Bootstrapped Learning Experiments (MABLE) is a system that is being developed to allow humans to teach computers in the most natural manner possible: ...
Roger Mailler, Daniel Bryce, Jiaying Shen, Ciaran ...
123
Voted
ESAW
2009
Springer
15 years 10 months ago
PreSage-MS: Metric Spaces in PreSage
Abstract. We consider adaptation in open systems, i.e. systems without global objects or common objectives. There are three related issues: how to make the degrees of freedom (DoFs...
Hugo Carr, Alexander Artikis, Jeremy Pitt