|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Walt Yao |
Fidelis: A Policy-Driven Trust Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings, pp. 301-317, 2003, Springer, 3-540-40224-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Glenn S. Wasson, Marty Humphrey |
Policy and Enforcement in Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 4th International Workshop on Grid Computing (GRID 2003), 17 November 2003, Phoenix, AZ, USA, Proceedings, pp. 125-133, 2003, IEEE Computer Society, 0-7695-2026-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jun-Jang Jeng, Henry Chang, Jen-Yao Chung |
A Policy Framework for Business Activity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 24-27 June 2003, Newport Beach, CA, USA, pp. 238-245, 2003, IEEE Computer Society, 0-7695-1969-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Nidal Nasser, Hossam S. Hassanein |
Multi-Class Bandwidth Allocation Policy for 3G Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), The Conference on Leading Edge and Practical Computer Networking, 20-24 October 2003, Bonn/Königswinter, Germany, Proceedings, pp. 203-209, 2003, IEEE Computer Society, 0-7695-2037-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman, Toshio Tonouchi |
Tools for domain-based policy management of distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management Solutions for the New Communications World, 8th IEEE/IFIP Network Operations and Management Symposium, NOMS 2002, Florence, Italy, April 15-19, 2002. Proceedings, pp. 203-217, 2002, IEEE, 0-7803-7383-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Sandrine Duflos, Gladys Diaz, Valérie Gay, Eric Horlait |
A Comparative Study of Policy Specification Languages for Secure Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Management Technologies for E-Commerce and E-Business Applications, 13th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2002, Montreal, Canada, October 21-23, 2002, Proceedings, pp. 157-168, 2002, Springer, 3-540-00080-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Nazim Agoulmine, Mauro Fonseca, Alan Marshall 0001 |
Multi-domain Policy Based Management Using Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, Third International Workshop, MATA 2001, Montreal, Canada, August 14-16, 2001, Proceedings, pp. 235-244, 2001, Springer, 3-540-42460-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Larry Korba, Fuhua Lin |
Towards Policy-Driven Agent Development and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobile Agents for Telecommunication Applications, Second International Workshop, MATA 2000, Paris, France, September 18-20, 2000, Proceedings, pp. 115-128, 2000, Springer, 3-540-41069-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Yavuz Günalay, Diwakar Gupta |
Threshold start-up control policy for polling systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 29(2-4), pp. 399-421, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
threshold start-up control, dormant/patient server, descendant sets, globally gated service, queueing theory, polling models |
19 | Giuseppe A. Paleologo, Luca Benini, Alessandro Bogliolo, Giovanni De Micheli |
Policy Optimization for Dynamic Power Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 35th Conference on Design Automation, Moscone center, San Francico, California, USA, June 15-19, 1998., pp. 182-187, 1998, ACM Press, 0-89791-964-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
reconstruction, emulation, visibility, functional simulation |
19 | Sivarama P. Dandamudi, K. C. Michael Lo |
A Hierarchical Load Sharing Policy for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: MASCOTS 1997, Proceedings of the Fifth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, January 12-15, 1997 Haifa, Israel, pp. 3-10, 1997, IEEE Computer Society, 0-8186-7758-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Martin Mundhenk, Judy Goldsmith, Eric Allender |
The Complexity of Policy Evaluation for Finite-Horizon Partially-Observable Markov Decision Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 1997, 22nd International Symposium, MFCS'97, Bratislava, Slovakia, August 25-29, 1997, Proceedings, pp. 129-138, 1997, Springer, 3-540-63437-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Sharman Lichtenstein |
Developing Internet Security Policy for Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pp. 350-, 1997, IEEE Computer Society, 0-8186-7734-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Leonidas Georgiadis, Wojciech Szpankowski, Leandros Tassiulas |
A scheduling policy with maximal stability region for ring networks with spatial reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 19(1-2), pp. 131-148, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Lyapunov, function method, scheduling, stability analysis, Ring networks, spatial reuse |
19 | Ben G. Matley |
A national computer policy: forging the final synergy of computers and society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1984 National Computer Conference, 9-12 July 1984, Las Vegas, Nevada, USA, pp. 469-473, 1984, AFIPS Press, 0-88283-043-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
19 | Rob Kling |
Automated information systems as social resources in policy making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference (2) ![In: Proceedings 1978 ACM Annual Conference, Washington, DC, USA, December 4-6, 1978, Volume II, pp. 666-674, 1978, ACM, 978-0-89791-000-2. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
|
19 | Yuxi Li, Dale Schuurmans |
Policy Iteration for Learning an Exercise Policy for American Options. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWRL ![In: Recent Advances in Reinforcement Learning, 8th European Workshop, EWRL 2008, Villeneuve d'Ascq, France, June 30 - July 3, 2008, Revised and Selected Papers, pp. 165-178, 2008, Springer, 978-3-540-89721-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mpostol Jeremia Mashinini |
Challenges of ICT policy for rural communities: A case study from South Africa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008, pp. 125-137, 2008, Springer, 978-0-387-84821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Traditional leadership, grounded theory method, ICT Policies, South Africa, rural communities |
19 | Rafae Bhatti, Tyrone Grandison |
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 158-173, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Refinement, Healthcare, Compliance, HIPAA, Privacy Management |
19 | Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo |
The Policy Machine for Security Policy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2001, International Conference, San Francisco, CA, USA, May 28-30, 2001. Proceedings, Part II, pp. 494-506, 2001, Springer, 3-540-42233-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Sandra Payette, Carl Lagoze |
Policy-Carrying, Policy-Enforcing Digital Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECDL ![In: Research and Advanced Technology for Digital Libraries, 4th European Conference, ECDL 2000, Lisbon, Portugal, September 18-20, 2000, Proceedings, pp. 144-157, 2000, Springer, 3-540-41023-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Pengchao Xu, Shen Gu, Lin Gao 0001, Hui Yu 0002, Xinbing Wang, Xiaoying Gan, Shenglong Dong |
Myopic sensing for multiple SUs in multichannel opportunistic access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 256-260, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
multichannel MAC, multiple SUs, myopic policy, opportunistic access, cognitive radio, POMDP |
18 | Dean F. Sutherland, William L. Scherlis |
Composable thread coloring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPoPP ![In: Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPOPP 2010, Bangalore, India, January 9-14, 2010, pp. 233-244, 2010, ACM, 978-1-60558-877-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
keywords: state consistency, state confinement, thread policy, java, annotation, multicore, race conditions |
18 | Sasa Junuzovic, Prasun Dewan |
Lazy scheduling of processing and transmission tasks in collaborative systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GROUP ![In: Proceedings of the 2009 International ACM SIGGROUP Conference on Supporting Group Work, GROUP 2009, Sanibel Island, Florida, USA, May 10-13, 2009, pp. 159-168, 2009, ACM, 978-1-60558-500-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
local and remote response times, simulations, analytical model, scheduling policy, collaboration architecture |
18 | Jung-Woo Sohn, Sooyeon Lee, Tracy Mullen |
Impact of Misalignment of Trading Agent Strategy across Multiple Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMMA ![In: Auctions, Market Mechanisms and Their Applications, First International ICST Conference, AMMA 2009, Boston, MA, USA, May 8-9, 2009, Revised Selected Papers, pp. 40-54, 2009, Springer, 978-3-642-03820-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
market selection strategy, multiple markets, pricing policy, market design, trading strategy |
18 | Chao Huang, Jianling Sun, Xinyu Wang 0001, Yuanjie Si |
Selective Regression Test for Access Control System Employing RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 70-79, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, RBAC, regression test, test selection, policy verification |
18 | Jin Li 0002, Kui Ren 0001, Bo Zhu 0001, Zhiguo Wan |
Privacy-Aware Attribute-Based Encryption with User Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 347-362, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Attribute-based, Access control, Anonymity, Accountability, Ciphertext-policy |
18 | Trong Hieu Tran, Ngoc Thanh Nguyen 0001 |
A Consensus-Based Integration Method for Security Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based and Intelligent Information and Engineering Systems, 13th International Conference, KES 2009, Santiago, Chile, September 28-30, 2009, Proceedings, Part I, pp. 54-61, 2009, Springer, 978-3-642-04594-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Policy-based security, knowledge integration |
18 | Maxim Schnjakin, Michael Menzel 0001, Christoph Meinel |
A pattern-driven security advisor for service-oriented architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009, pp. 13-20, 2009, ACM, 978-1-60558-789-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ws-security-policy, security, web service, soa |
18 | Patrik Eklund, Agnieszka Rusinowska, Harrie C. M. de Swart |
A consensus model of political decision-making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 158(1), pp. 5-20, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Consensus reaching, Consensus degree, Policy, Government, Coalition |
18 | Jan Reineke 0001, Daniel Grund |
Relative competitive analysis of cache replacement policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCTES ![In: Proceedings of the 2008 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'08), Tucson, AZ, USA, June 12-13, 2008, pp. 51-60, 2008, ACM, 978-1-60558-104-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
wcet analysis, predictability, worst-case execution time, cache performance, replacement policy |
18 | Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park |
Problem Analyses and Recommendations in DRM Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroISI ![In: Intelligence and Security Informatics, First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, pp. 165-178, 2008, Springer, 978-3-540-89899-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security Policy, Digital Rights Management, DRM |
18 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 114-121, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
18 | Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo |
Enforcing DRM policies across applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 87-94, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, digital rights management, usage control, policy enforcement |
18 | Feng Wang, Kenneth J. Turner |
Towards personalised home care systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008, pp. 44, 2008, ACM, 978-1-60558-067-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
pervasive computing, personalisation, policy-based management, home care |
18 | Steffen Bartsch, Karsten Sohr, Carsten Bormann |
Supporting Agile Development of Authorization Rules for SME Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 461-471, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Agile Security Engineering, SME Applications, End-User Development, DSL, Authorization Policy |
18 | Sasa Junuzovic, Prasun Dewan |
Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 746-759, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
feedback time, feedthrough time, simulations, multicast, response time, unicast, scheduling policy, collaboration architecture |
18 | Mohammed Shahid Abdulla, Shalabh Bhatnagar |
Reinforcement Learning Based Algorithms for Average Cost Markov Decision Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Event Dyn. Syst. ![In: Discret. Event Dyn. Syst. 17(1), pp. 23-52, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Actor-critic algorithms, Two timescale stochastic approximation, Simultaneous perturbation stochastic approximation, Normalized Hadamard matrices, TD-learning, Reinforcement learning, Markov decision processes, Policy iteration |
18 | J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini |
Audit-based compliance control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(2-3), pp. 133-151, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Access control, Policy, Audit |
18 | Katrina Peddle |
Telehealth in Context: Socio-technical Barriers to Telehealth use in Labrador, Canada. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Support. Cooperative Work. ![In: Comput. Support. Cooperative Work. 16(6), pp. 595-614, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
health services, political economy, Smart Community, policy, work practice, telehealth, rural communications |
18 | Joaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés |
Building and implementing policies in autonomous and autonomic systems using MaCMAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innov. Syst. Softw. Eng. ![In: Innov. Syst. Softw. Eng. 3(1), pp. 17-31, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Autonomic computing, Agent-oriented software engineering, Policy-based management |
18 | Nevine AbouGhazaleh, Alexandre Peixoto Ferreira, Cosmin Rusu, Ruibin Xu, Frank Liberato, Bruce R. Childers, Daniel Mossé, Rami G. Melhem |
Integrated CPU and l2 cache voltage scaling using machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCTES ![In: Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'07), San Diego, California, USA, June 13-15, 2007, pp. 41-50, 2007, ACM, 978-1-59593-632-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
integrated DVS policy, machine learning, power management, multiple clock domains |
18 | Pierre-Alain Masson, Jacques Julliand, Jean-Chritophe Plessis, Eddie Jaffuel, Georges Debois |
Automatic generation of model based tests for a class of security properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
A-MOST ![In: Proceedings of the 3rd Workshop on Advances in Model Based Testing, A-MOST 2007, co-located with the ISSTA 2007 International Symposium on Software Testing and Analysis, London, United Kingdom, July 9-12, pp. 12-22, 2007, ACM, 978-1-59593-850-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security policy, automatic test generation, security properties |
18 | Vladimir Kolovski, James A. Hendler, Bijan Parsia |
Analyzing web access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 677-686, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, description logics, XACML, policy analysis |
18 | Lin Qiao, Basuki Soetarman, Gene Fuh, Adarsh Pannu, Baoqiu Cui, Thomas Beavin, William Kyu |
A framework for enforcing application policies in database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pp. 981-992, 2007, ACM, 978-1-59593-686-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
policy, database system, self-managing |
18 | Vino Fernando Crescini, Yan Zhang 0003 |
PolicyUpdater: a system for dynamic access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 145-165, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Policy update, Access control, Artificial intelligence, Logic programming, Authorisation |
18 | Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting |
System Call Monitoring Using Authenticated System Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(3), pp. 216-229, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
operating systems, security policy, Intrusion tolerance, compiler techniques, sandboxing |
18 | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang |
Resiliency policies in access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 113-123, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerant, access control, policy design |
18 | Guadalupe Ortiz 0001, Juan Hernández Núñez |
Service-Oriented Model-Driven Development: Filling the Extra-Functional Property Gap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2006, 4th International Conference, Chicago, IL, USA, December 4-7, 2006, Proceedings, pp. 471-476, 2006, Springer, 3-540-68147-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Extra-Functional property, aspect oriented techniques, web service, model-driven development, WS-policy, service component architecture |
18 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings, pp. 182-194, 2006, Springer, 3-540-45762-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
NIDSs, Policy Anomalies, Network Security, Firewalls |
18 | Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri |
Semantic Web Policies - A Discussion of Requirements and Research Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESWC ![In: The Semantic Web: Research and Applications, 3rd European Semantic Web Conference, ESWC 2006, Budva, Montenegro, June 11-14, 2006, Proceedings, pp. 712-724, 2006, Springer, 3-540-34544-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Integrated heterogeneous policies, Cooperative policy enforcement, Lightweight trust, Explanation mechanisms, Trust management, Natural language interfaces |
18 | Di Wu, Xiyuan Chen, Jian Lin, Miaoliang Zhu |
Ontology-Based RBAC Specification for Interoperation in Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWC ![In: The Semantic Web - ASWC 2006, First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, Proceedings, pp. 179-190, 2006, Springer, 3-540-38329-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ontology, interoperation, RBAC, access control policy |
18 | Takaki Makino, Kazuyuki Aihara |
Multi-agent reinforcement learning algorithm to handle beliefs of other agents' policies and embedded beliefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 789-791, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
embedded belief, iterated prisoners' dilemma, policy-based belief, multi-agent reinforcement learning |
18 | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi |
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 388-423, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy administration, XML, role-based access control, secure interoperation |
18 | Cixing Lv, Yunlong Zhu, Chaowan Yin |
Resource Allocation Based on Combinatorial Auction in E-manufacturing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 983-988, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
e-manufacturing, negotiation policy, multi-agent system, resource allocation, combinatorial auction |
18 | Lawrence Teo, Gail-Joon Ahn |
Supporting access control policies across multiple operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (2) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2, pp. 288-293, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Chameleos, access control, operating systems, flexibility, extensibility, policy specification |
18 | Zhongwen Li |
Security and Safety Assurance Architecture: Model and Implementation (Supporting Multiple Levels of Criticality). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings, pp. 363-369, 2005, Springer, 3-540-29235-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Safety Kernel, Security and Safety Assurance Architecture, Integrity Policy for Criticality, Distributed Control System |
18 | Jian-Qiang Hu, Pirooz Vakili, Lei Huang |
Capacity and Production Managment in a Single Product Manufacturing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 125(1-4), pp. 191-204, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
hedging policy, flow control, production systems |
18 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 31-40, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
18 | Jan Chomicki, Jorge Lobo 0001, Shamim A. Naqvi |
Conflict Resolution Using Logic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(1), pp. 244-249, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
action constraint, Policy, event, conflict resolution, action, active rules |
18 | Olivier Corre, Idir Fodil, Vladimir Ksinant, Guy Pujolle |
An Architecture for Access Network Management with Policies (AN-PBM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia Networks and Services, 6th IFIP/IEEE International Conference, MMNS 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings, pp. 328-340, 2003, Springer, 3-540-20050-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
QoS, Architecture, Policy, Network Management, Customer, Service Provider |
18 | Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin |
Computational Complexity of the Network Routing Logical Security Assessment Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany, pp. 37-48, 2003, IEEE Computer Society, 0-7695-2019-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Network Policy, Routing, Computational Complexity, Graph Theory, Assessment |
18 | R. Sekar 0001, V. N. Venkatakrishnan, Samik Basu 0001, Sandeep Bhatkar, Daniel C. DuVarney |
Model-carrying code: a practical approach for safe execution of untrusted applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 15-28, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
sand-boxing, security policies, policy enforcement, mobile code security |
18 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
An algebra for composing access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(1), pp. 1-35, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Access control, logic programs, algebra, policy composition |
18 | Stephan Reiff-Marganiec, Kenneth J. Turner |
Use of Logic to Describe Enhanced Communications Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2002, 22nd IFIP WG 6.1 International Conference Houston, Texas, USA, November 11-14, 2002, Proceedings, pp. 130-145, 2002, Springer, 3-540-00141-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Enhanced Communications Services, Policy Description Language, Ponder, Policies, SIP |
18 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 298-307, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
18 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP'99, Toulouse, France, September, 1999, Proceedings, pp. 375-384, 1999, Springer, 3-540-66488-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
18 | Igor Tatarinov, Alex Rousskov, Valery Soloviev |
Static caching in Web servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), September 22-25, 1997 Las Vegas, NV, USA, pp. 410-417, 1997, IEEE Computer Society, 0-8186-8186-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
implementation complexity an, static caching, cache policies, LRU-threshold, LFU, LRU-SIZE, LRU-MIN, LRU-k-threshold, Pitkow/Recker policy, Web document access patterns, request log file, small cache sizes, primary Web servers, CPU overhead, performance analysis, cache performance, log files, online front-ends |
18 | Christos G. Cassandras, Vibhor Julka |
Scheduling policies using marked/phantom slot algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 20(1-2), pp. 207-254, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
random polling, Golden Ratio policy, Scheduling, optimization, radio network, perturbation analysis |
18 | Davide Mambelli, Stephan Bongers, Onno Zoeter, Matthijs T. J. Spaan, Frans A. Oliehoek |
When Do Off-Policy and On-Policy Policy Gradient Methods Align? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.12034, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Nicholas E. Corrado, Josiah P. Hanna |
On-Policy Policy Gradient Reinforcement Learning Without On-Policy Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.08290, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Paul Daoudi, Mathias Formoso, Othman Gaizi, Achraf Azize, Evrard Garcelon |
Conservative Exploration for Policy Optimization via Off-Policy Policy Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.15458, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alberto Maria Metelli, Samuele Meta, Marcello Restelli |
On the Relation between Policy Improvement and Off-Policy Minimum-Variance Policy Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UAI ![In: Uncertainty in Artificial Intelligence, UAI 2023, July 31 - 4 August 2023, Pittsburgh, PA, USA., pp. 1423-1433, 2023, PMLR. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Hongyao Tang, Zhaopeng Meng, Jianye Hao, Chen Chen 0077, Daniel Graves, Dong Li 0016, Changmin Yu, Hangyu Mao, Wulong Liu, Yaodong Yang 0001, Wenyuan Tao, Li Wang |
What about Inputting Policy in Value Function: Policy Representation and Policy-Extended Value Function Approximator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Sixth AAAI Conference on Artificial Intelligence, AAAI 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, IAAI 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, EAAI 2022 Virtual Event, February 22 - March 1, 2022, pp. 8441-8449, 2022, AAAI Press, 978-1-57735-876-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Yangyang Zhao, Zhenyu Wang 0001, Changxi Zhu, Shihan Wang 0001 |
Efficient Dialogue Complementary Policy Learning via Deep Q-network Policy and Episodic Memory Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP (1) ![In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, EMNLP 2021, Virtual Event / Punta Cana, Dominican Republic, 7-11 November, 2021, pp. 4311-4323, 2021, Association for Computational Linguistics. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Haifeng Pan, DingSheng Zhang |
Coordination Effects and Optimal Policy Choices of Macroprudential Policy and Monetary Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2020, pp. 9798063:1-9798063:11, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Rasool Fakoor, Pratik Chaudhari, Alexander J. Smola |
P3O: Policy-on Policy-off Policy Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.01756, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
18 | Rasool Fakoor, Pratik Chaudhari, Alexander J. Smola |
P3O: Policy-on Policy-off Policy Optimization. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
UAI ![In: Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019, Tel Aviv, Israel, July 22-25, 2019, pp. 1017-1027, 2019, AUAI Press. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
18 | Aniruddh Raghu, Omer Gottesman, Yao Liu 0009, Matthieu Komorowski, Aldo Faisal, Finale Doshi-Velez, Emma Brunskill |
Behaviour Policy Estimation in Off-Policy Policy Evaluation: Calibration Matters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1807.01066, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
18 | Shixiang Gu, Timothy P. Lillicrap, Zoubin Ghahramani, Richard E. Turner, Bernhard Schölkopf, Sergey Levine |
Interpolated Policy Gradient: Merging On-Policy and Off-Policy Gradient Estimation for Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1706.00387, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Shixiang Gu, Tim Lillicrap, Richard E. Turner, Zoubin Ghahramani, Bernhard Schölkopf, Sergey Levine |
Interpolated Policy Gradient: Merging On-Policy and Off-Policy Gradient Estimation for Deep Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NIPS ![In: Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, pp. 3846-3855, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Ourania I. Markaki, Panagiotis Kokkinakos, Sotirios Koussouris, John E. Psarras, Habin Lee, Martin Löhe, Yuri Glikman |
Infusing Innovation in the Policy Analysis and Evaluation Phases of the Policy Cycle: The Policy Compass Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Gov. Res. ![In: Int. J. Electron. Gov. Res. 10(3), pp. 19-36, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Bruno Scherrer, Matthieu Geist |
Local Policy Search in a Convex Space and Conservative Policy Iteration as Boosted Policy Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML/PKDD (3) ![In: Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2014, Nancy, France, September 15-19, 2014. Proceedings, Part III, pp. 35-50, 2014, Springer, 978-3-662-44844-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Diana Rawlins, Amol Kulkarni, Martin Bokaemper, Kwok-Ho Chan |
Framework for Policy Usage Feedback for Common Open Policy Service with Policy Provisioning (COPS-PR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3483, pp. 1-10, March 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Seraphin B. Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh C. Verma, Alessandra Russo, Elisa Bertino |
AGENP: An ASGrammar-based GENerative Policy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADG@ESORICS ![In: Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]., pp. 3-20, 2018, Springer, 978-3-030-17276-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Franck Le, Jorge Ortiz 0001, Dinesh C. Verma, Dilip D. Kandlur |
Policy-Based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADG@ESORICS ![In: Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]., pp. 180-201, 2018, Springer, 978-3-030-17276-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Maria A. Wimmer, Karol Furdík, Melanie Bicking, Marian Mach, Tomas Sabol, Peter Butka |
Open Collaboration in Policy Development: Concept and Architecture to Integrate Scenario Development and Formal Policy Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empowering Open and Collaborative Governance ![In: Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making., pp. 199-219, 2012, Springer, 978-3-642-27218-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Georg Carle, Henning Sanneck, Lars-Christoph Schmelz |
Policy-driven workflows for mobile network management automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1111-1115, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
management automation, workflow, policy, LTE |
18 | Joanna Goode |
Connecting k-16 curriculum & policy: making computer science engaging, accessible, and hospitable for underrepresented students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 22-26, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cs policy, cs reform, gender and ethnicity, pedagogy, curriculum, wider access |
18 | Andrew Besmer, Jason Watson, Heather Richter Lipford |
The impact of social navigation on privacy policy configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
policy configuration, privacy, social networking, social navigation |
18 | Kristine M. Kuhn, K. D. Joshi 0001 |
The reported and revealed importance of job attributes to aspiring information technology: a policy-capturing study of gender differences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 40(3), pp. 40-60, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
it recruitment, policy capturing, pre-hire issues, gender |
18 | Palanivel A. Kodeswaran, Evelyne Viegas |
Applying differential privacy to search queries in a policy based interactive framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-PAVLAD ![In: Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, CIKM-PAVLAD 2009, Hong Kong, China, November 6, 2009, pp. 25-32, 2009, ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, semantics, policy |
18 | Pierre Imai, Bernd Lamparter, Marco Liebsch |
Policy-Based Device and Mobility Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILWARE ![In: Mobile Wireless Middleware, Operating Systems, and Applications, Second International Conference, Mobilware 2009, Berlin, Germany, April 28-29, 2009, Proceedings, pp. 101-114, 2009, Springer, 978-3-642-01801-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
home automation, Policy management, session mobility |
18 | Amir Tavasoli, Norman P. Archer |
A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 246-251, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mobile eHealth, intelligent agents, adaptive interfaces, policy-based networking |
18 | Pengcheng Zhang, Xin Xu 0001, Chunming Liu, Qiping Yuan |
Reinforcement Learning Control of a Real Mobile Robot Using Approximate Policy Iteration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (3) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part III, pp. 278-288, 2009, Springer, 978-3-642-01512-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Approximate policy iteration, Approximate dynamic programming, Reinforcement learning, Mobile robots, Path following |
18 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 249-267, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
18 | Wei Koong Chai, Kin-Hon Ho, Marinos Charalambides, George Pavlou |
A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Scalability of Networks and Services, Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009, Enschede, The Netherlands, June 30-July 2, 2009. Proceedings, pp. 108-121, 2009, Springer, 978-3-642-02626-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Policy-driven management, military networks, traffic engineering |
18 | Kai Jakobs, Knut Blind |
The ICT standardisation policy of the EU: changes ahead!? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, EATIS 2009, Prague, Czech Republic, June 3-5, 2009, pp. 3, 2009, 978-1-60558-398-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ICT standardisation, standardisation policy |
18 | Shivaram Kalyanakrishnan, Peter Stone |
An empirical analysis of value function-based and policy search reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 749-756, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
policy search, reinforcement learning, function approximation, temporal difference learning |
18 | Lihong Li 0001, Michael L. Littman, Christopher R. Mansley |
Online exploration in least-squares policy iteration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 733-739, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
PAC-MDP, least-squares policy iteration (LSPI), reinforcement learning, Markov decision processes, exploration |
|
|