Sciweavers

1592 search results - page 243 / 319
» The state of the email address
Sort
View
TDSC
2008
152views more  TDSC 2008»
15 years 1 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
JAIR
2007
124views more  JAIR 2007»
15 years 1 months ago
Closed-Loop Learning of Visual Control Policies
In this paper we present a general, flexible framework for learning mappings from images to actions by interacting with the environment. The basic idea is to introduce a feature-...
Sébastien Jodogne, Justus H. Piater
TNN
2008
102views more  TNN 2008»
15 years 1 months ago
Robust Synchronization of an Array of Coupled Stochastic Discrete-Time Delayed Neural Networks
Abstract--This paper is concerned with the robust synchronization problem for an array of coupled stochastic discrete-time neural networks with time-varying delay. The individual n...
J. Liang, Z. Wang, Y. Liu, X. Liu
CCE
2005
15 years 1 months ago
On-line monitoring of a sugar crystallization process
The present paper reports a comparative evaluation of four multivariate statistical process control (SPC) techniques for the on-line monitoring of an industrial sugar crystallizat...
A. Simoglou, Petia Georgieva, E. B. Martin, A. J. ...
TON
2008
75views more  TON 2008»
15 years 1 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson