Sciweavers

1167 search results - page 78 / 234
» policy 2007
Sort
View
CCS
2007
ACM
15 years 6 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ESANN
2007
15 years 1 months ago
Applying the Episodic Natural Actor-Critic Architecture to Motor Primitive Learning
In this paper, we investigate motor primitive learning with the Natural Actor-Critic approach. The Natural Actor-Critic consists out of actor updates which are achieved using natur...
Jan Peters, Stefan Schaal
IJCAI
2007
15 years 1 months ago
Relational Knowledge with Predictive State Representations
Most work on Predictive Representations of State (PSRs) has focused on learning and planning in unstructured domains (for example, those represented by flat POMDPs). This paper e...
David Wingate, Vishal Soni, Britton Wolfe, Satinde...
SEC
2004
15 years 1 months ago
Recursive Sandboxes: Extending Systrace To Empower Applications
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We desc...
Aleksey Kurchuk, Angelos D. Keromytis
SOSP
2007
ACM
15 years 8 months ago
Improving file system reliability with I/O shepherding
We introduce a new reliability infrastructure for file systems called I/O shepherding. I/O shepherding allows a file system developer to craft nuanced reliability policies to de...
Haryadi S. Gunawi, Vijayan Prabhakaran, Swetha Kri...