Sciweavers

486 search results - page 17 / 98
» policy 2005
Sort
View
UM
2005
Springer
15 years 3 months ago
Bayesphone: Precomputation of Context-Sensitive Policies for Inquiry and Action in Mobile Devices
Inference and decision making with probabilistic user models may be infeasible on portable devices such as cell phones. We highlight the opportunity for storing and using precomput...
Eric Horvitz, Paul Koch, Raman Sarin, Johnson Apac...
NDSS
2007
IEEE
15 years 3 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ETFA
2005
IEEE
15 years 3 months ago
LEF closed-loop scheduling policy for real-time control systems
Today there is a significant body of results of resource management in real-time systems. However, most of them are based on "open-loop" strategies and techniques that do...
J. Yepez, Pau Martí, J. Ayza, Josep M. Fuer...
SEFM
2005
IEEE
15 years 3 months ago
Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification
The three main assertion-based verification approaches are: Design by Contract (DBC), Extended Static Checking (ESC) and Verified Design by Contract (VDBC). Each approach offers a...
Thomas Wilson, Savi Maharaj, Robert G. Clark
ICCBR
2005
Springer
15 years 3 months ago
Retrieval and Configuration of Life Insurance Policies
When searching for the right life insurance product, one can either confide in her/his insurance broker or fill out lengthy questionnaires at Internet Portal sites before gathering...
Alexander Tartakovski, Martin Schaaf, Ralph Bergma...