Sciweavers

486 search results - page 61 / 98
» policy 2005
Sort
View
EURONGI
2005
Springer
15 years 3 months ago
An Afterstates Reinforcement Learning Approach to Optimize Admission Control in Mobile Cellular Networks
We deploy a novel Reinforcement Learning optimization technique based on afterstates learning to determine the gain that can be achieved by incorporating movement prediction inform...
José Manuel Giménez-Guzmán, J...
72
Voted
FOSSACS
2005
Springer
15 years 3 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
61
Voted
GECCO
2005
Springer
145views Optimization» more  GECCO 2005»
15 years 3 months ago
Evolving an ecology of two-tiered organizations
Evolutionary models typically rely on a single level of evolution for training a team of cooperating agents. I present a model that evolves at two levels—an “organizational”...
Travis Kriplean
ICTAC
2005
Springer
15 years 3 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...
IPTPS
2005
Springer
15 years 3 months ago
A Taxonomy of Rational Attacks
Abstract— For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neith...
Seth James Nielson, Scott A. Crosby, Dan S. Wallac...