|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Walt Yao |
Fidelis: A Policy-Driven Trust Management Framework. |
iTrust |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Glenn S. Wasson, Marty Humphrey |
Policy and Enforcement in Virtual Organizations. |
GRID |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jun-Jang Jeng, Henry Chang, Jen-Yao Chung |
A Policy Framework for Business Activity Management. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Nidal Nasser, Hossam S. Hassanein |
Multi-Class Bandwidth Allocation Policy for 3G Wireless Networks. |
LCN |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman, Toshio Tonouchi |
Tools for domain-based policy management of distributed systems. |
NOMS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Sandrine Duflos, Gladys Diaz, Valérie Gay, Eric Horlait |
A Comparative Study of Policy Specification Languages for Secure Distributed Applications. |
DSOM |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Nazim Agoulmine, Mauro Fonseca, Alan Marshall 0001 |
Multi-domain Policy Based Management Using Mobile Agents. |
MATA |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Larry Korba, Fuhua Lin |
Towards Policy-Driven Agent Development and Management. |
MATA |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Yavuz Günalay, Diwakar Gupta |
Threshold start-up control policy for polling systems. |
Queueing Syst. Theory Appl. |
1998 |
DBLP DOI BibTeX RDF |
threshold start-up control, dormant/patient server, descendant sets, globally gated service, queueing theory, polling models |
19 | Giuseppe A. Paleologo, Luca Benini, Alessandro Bogliolo, Giovanni De Micheli |
Policy Optimization for Dynamic Power Management. |
DAC |
1998 |
DBLP DOI BibTeX RDF |
reconstruction, emulation, visibility, functional simulation |
19 | Sivarama P. Dandamudi, K. C. Michael Lo |
A Hierarchical Load Sharing Policy for Distributed Systems. |
MASCOTS |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Martin Mundhenk, Judy Goldsmith, Eric Allender |
The Complexity of Policy Evaluation for Finite-Horizon Partially-Observable Markov Decision Processes. |
MFCS |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Sharman Lichtenstein |
Developing Internet Security Policy for Organizations. |
HICSS (4) |
1997 |
DBLP DOI BibTeX RDF |
|
19 | Leonidas Georgiadis, Wojciech Szpankowski, Leandros Tassiulas |
A scheduling policy with maximal stability region for ring networks with spatial reuse. |
Queueing Syst. Theory Appl. |
1995 |
DBLP DOI BibTeX RDF |
Lyapunov, function method, scheduling, stability analysis, Ring networks, spatial reuse |
19 | Ben G. Matley |
A national computer policy: forging the final synergy of computers and society. |
AFIPS National Computer Conference |
1984 |
DBLP DOI BibTeX RDF |
|
19 | Rob Kling |
Automated information systems as social resources in policy making. |
ACM Annual Conference (2) |
1978 |
DBLP DOI BibTeX RDF |
|
19 | Yuxi Li, Dale Schuurmans |
Policy Iteration for Learning an Exercise Policy for American Options. |
EWRL |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mpostol Jeremia Mashinini |
Challenges of ICT policy for rural communities: A case study from South Africa. |
HCC |
2008 |
DBLP DOI BibTeX RDF |
Traditional leadership, grounded theory method, ICT Policies, South Africa, rural communities |
19 | Rafae Bhatti, Tyrone Grandison |
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
Refinement, Healthcare, Compliance, HIPAA, Privacy Management |
19 | Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo |
The Policy Machine for Security Policy Management. |
International Conference on Computational Science (2) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Sandra Payette, Carl Lagoze |
Policy-Carrying, Policy-Enforcing Digital Objects. |
ECDL |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Pengchao Xu, Shen Gu, Lin Gao 0001, Hui Yu 0002, Xinbing Wang, Xiaoying Gan, Shenglong Dong |
Myopic sensing for multiple SUs in multichannel opportunistic access. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
multichannel MAC, multiple SUs, myopic policy, opportunistic access, cognitive radio, POMDP |
18 | Dean F. Sutherland, William L. Scherlis |
Composable thread coloring. |
PPoPP |
2010 |
DBLP DOI BibTeX RDF |
keywords: state consistency, state confinement, thread policy, java, annotation, multicore, race conditions |
18 | Sasa Junuzovic, Prasun Dewan |
Lazy scheduling of processing and transmission tasks in collaborative systems. |
GROUP |
2009 |
DBLP DOI BibTeX RDF |
local and remote response times, simulations, analytical model, scheduling policy, collaboration architecture |
18 | Jung-Woo Sohn, Sooyeon Lee, Tracy Mullen |
Impact of Misalignment of Trading Agent Strategy across Multiple Markets. |
AMMA |
2009 |
DBLP DOI BibTeX RDF |
market selection strategy, multiple markets, pricing policy, market design, trading strategy |
18 | Chao Huang, Jianling Sun, Xinyu Wang 0001, Yuanjie Si |
Selective Regression Test for Access Control System Employing RBAC. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
security, RBAC, regression test, test selection, policy verification |
18 | Jin Li 0002, Kui Ren 0001, Bo Zhu 0001, Zhiguo Wan |
Privacy-Aware Attribute-Based Encryption with User Accountability. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Attribute-based, Access control, Anonymity, Accountability, Ciphertext-policy |
18 | Trong Hieu Tran, Ngoc Thanh Nguyen 0001 |
A Consensus-Based Integration Method for Security Rules. |
KES (1) |
2009 |
DBLP DOI BibTeX RDF |
Policy-based security, knowledge integration |
18 | Maxim Schnjakin, Michael Menzel 0001, Christoph Meinel |
A pattern-driven security advisor for service-oriented architectures. |
SWS |
2009 |
DBLP DOI BibTeX RDF |
ws-security-policy, security, web service, soa |
18 | Patrik Eklund, Agnieszka Rusinowska, Harrie C. M. de Swart |
A consensus model of political decision-making. |
Ann. Oper. Res. |
2008 |
DBLP DOI BibTeX RDF |
Consensus reaching, Consensus degree, Policy, Government, Coalition |
18 | Jan Reineke 0001, Daniel Grund |
Relative competitive analysis of cache replacement policies. |
LCTES |
2008 |
DBLP DOI BibTeX RDF |
wcet analysis, predictability, worst-case execution time, cache performance, replacement policy |
18 | Youngseek Kim, Jessica Howard, Sharad Ravindranath, Joon S. Park |
Problem Analyses and Recommendations in DRM Security Policies. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
Security Policy, Digital Rights Management, DRM |
18 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
18 | Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo |
Enforcing DRM policies across applications. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
access control, digital rights management, usage control, policy enforcement |
18 | Feng Wang, Kenneth J. Turner |
Towards personalised home care systems. |
PETRA |
2008 |
DBLP DOI BibTeX RDF |
pervasive computing, personalisation, policy-based management, home care |
18 | Steffen Bartsch, Karsten Sohr, Carsten Bormann |
Supporting Agile Development of Authorization Rules for SME Applications. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
Agile Security Engineering, SME Applications, End-User Development, DSL, Authorization Policy |
18 | Sasa Junuzovic, Prasun Dewan |
Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
feedback time, feedthrough time, simulations, multicast, response time, unicast, scheduling policy, collaboration architecture |
18 | Mohammed Shahid Abdulla, Shalabh Bhatnagar |
Reinforcement Learning Based Algorithms for Average Cost Markov Decision Processes. |
Discret. Event Dyn. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Actor-critic algorithms, Two timescale stochastic approximation, Simultaneous perturbation stochastic approximation, Normalized Hadamard matrices, TD-learning, Reinforcement learning, Markov decision processes, Policy iteration |
18 | J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini |
Audit-based compliance control. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Access control, Policy, Audit |
18 | Katrina Peddle |
Telehealth in Context: Socio-technical Barriers to Telehealth use in Labrador, Canada. |
Comput. Support. Cooperative Work. |
2007 |
DBLP DOI BibTeX RDF |
health services, political economy, Smart Community, policy, work practice, telehealth, rural communications |
18 | Joaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés |
Building and implementing policies in autonomous and autonomic systems using MaCMAS. |
Innov. Syst. Softw. Eng. |
2007 |
DBLP DOI BibTeX RDF |
Autonomic computing, Agent-oriented software engineering, Policy-based management |
18 | Nevine AbouGhazaleh, Alexandre Peixoto Ferreira, Cosmin Rusu, Ruibin Xu, Frank Liberato, Bruce R. Childers, Daniel Mossé, Rami G. Melhem |
Integrated CPU and l2 cache voltage scaling using machine learning. |
LCTES |
2007 |
DBLP DOI BibTeX RDF |
integrated DVS policy, machine learning, power management, multiple clock domains |
18 | Pierre-Alain Masson, Jacques Julliand, Jean-Chritophe Plessis, Eddie Jaffuel, Georges Debois |
Automatic generation of model based tests for a class of security properties. |
A-MOST |
2007 |
DBLP DOI BibTeX RDF |
security policy, automatic test generation, security properties |
18 | Vladimir Kolovski, James A. Hendler, Bijan Parsia |
Analyzing web access control policies. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
access control, description logics, XACML, policy analysis |
18 | Lin Qiao, Basuki Soetarman, Gene Fuh, Adarsh Pannu, Baoqiu Cui, Thomas Beavin, William Kyu |
A framework for enforcing application policies in database systems. |
SIGMOD Conference |
2007 |
DBLP DOI BibTeX RDF |
policy, database system, self-managing |
18 | Vino Fernando Crescini, Yan Zhang 0003 |
PolicyUpdater: a system for dynamic access control. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Policy update, Access control, Artificial intelligence, Logic programming, Authorisation |
18 | Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting |
System Call Monitoring Using Authenticated System Calls. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
operating systems, security policy, Intrusion tolerance, compiler techniques, sandboxing |
18 | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang |
Resiliency policies in access control. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerant, access control, policy design |
18 | Guadalupe Ortiz 0001, Juan Hernández Núñez |
Service-Oriented Model-Driven Development: Filling the Extra-Functional Property Gap. |
ICSOC |
2006 |
DBLP DOI BibTeX RDF |
Extra-Functional property, aspect oriented techniques, web service, model-driven development, WS-policy, service component architecture |
18 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
NIDSs, Policy Anomalies, Network Security, Firewalls |
18 | Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri |
Semantic Web Policies - A Discussion of Requirements and Research Issues. |
ESWC |
2006 |
DBLP DOI BibTeX RDF |
Integrated heterogeneous policies, Cooperative policy enforcement, Lightweight trust, Explanation mechanisms, Trust management, Natural language interfaces |
18 | Di Wu, Xiyuan Chen, Jian Lin, Miaoliang Zhu |
Ontology-Based RBAC Specification for Interoperation in Distributed Environment. |
ASWC |
2006 |
DBLP DOI BibTeX RDF |
Ontology, interoperation, RBAC, access control policy |
18 | Takaki Makino, Kazuyuki Aihara |
Multi-agent reinforcement learning algorithm to handle beliefs of other agents' policies and embedded beliefs. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
embedded belief, iterated prisoners' dilemma, policy-based belief, multi-agent reinforcement learning |
18 | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi |
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
policy administration, XML, role-based access control, secure interoperation |
18 | Cixing Lv, Yunlong Zhu, Chaowan Yin |
Resource Allocation Based on Combinatorial Auction in E-manufacturing Environment. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
e-manufacturing, negotiation policy, multi-agent system, resource allocation, combinatorial auction |
18 | Lawrence Teo, Gail-Joon Ahn |
Supporting access control policies across multiple operating systems. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
Chameleos, access control, operating systems, flexibility, extensibility, policy specification |
18 | Zhongwen Li |
Security and Safety Assurance Architecture: Model and Implementation (Supporting Multiple Levels of Criticality). |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
Safety Kernel, Security and Safety Assurance Architecture, Integrity Policy for Criticality, Distributed Control System |
18 | Jian-Qiang Hu, Pirooz Vakili, Lei Huang |
Capacity and Production Managment in a Single Product Manufacturing System. |
Ann. Oper. Res. |
2004 |
DBLP DOI BibTeX RDF |
hedging policy, flow control, production systems |
18 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
18 | Jan Chomicki, Jorge Lobo 0001, Shamim A. Naqvi |
Conflict Resolution Using Logic Programming. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
action constraint, Policy, event, conflict resolution, action, active rules |
18 | Olivier Corre, Idir Fodil, Vladimir Ksinant, Guy Pujolle |
An Architecture for Access Network Management with Policies (AN-PBM. |
MMNS |
2003 |
DBLP DOI BibTeX RDF |
QoS, Architecture, Policy, Network Management, Customer, Service Provider |
18 | Cédric Llorens, Denis Valois, Yannick Le Teigner, Alexandre Gibouin |
Computational Complexity of the Network Routing Logical Security Assessment Process. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
Network Policy, Routing, Computational Complexity, Graph Theory, Assessment |
18 | R. Sekar 0001, V. N. Venkatakrishnan, Samik Basu 0001, Sandeep Bhatkar, Daniel C. DuVarney |
Model-carrying code: a practical approach for safe execution of untrusted applications. |
SOSP |
2003 |
DBLP DOI BibTeX RDF |
sand-boxing, security policies, policy enforcement, mobile code security |
18 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
An algebra for composing access control policies. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Access control, logic programs, algebra, policy composition |
18 | Stephan Reiff-Marganiec, Kenneth J. Turner |
Use of Logic to Describe Enhanced Communications Services. |
FORTE |
2002 |
DBLP DOI BibTeX RDF |
Enhanced Communications Services, Policy Description Language, Ponder, Policies, SIP |
18 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
18 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
18 | Igor Tatarinov, Alex Rousskov, Valery Soloviev |
Static caching in Web servers. |
ICCCN |
1997 |
DBLP DOI BibTeX RDF |
implementation complexity an, static caching, cache policies, LRU-threshold, LFU, LRU-SIZE, LRU-MIN, LRU-k-threshold, Pitkow/Recker policy, Web document access patterns, request log file, small cache sizes, primary Web servers, CPU overhead, performance analysis, cache performance, log files, online front-ends |
18 | Christos G. Cassandras, Vibhor Julka |
Scheduling policies using marked/phantom slot algorithms. |
Queueing Syst. Theory Appl. |
1995 |
DBLP DOI BibTeX RDF |
random polling, Golden Ratio policy, Scheduling, optimization, radio network, perturbation analysis |
18 | Davide Mambelli, Stephan Bongers, Onno Zoeter, Matthijs T. J. Spaan, Frans A. Oliehoek |
When Do Off-Policy and On-Policy Policy Gradient Methods Align? |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Nicholas E. Corrado, Josiah P. Hanna |
On-Policy Policy Gradient Reinforcement Learning Without On-Policy Sampling. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Paul Daoudi, Mathias Formoso, Othman Gaizi, Achraf Azize, Evrard Garcelon |
Conservative Exploration for Policy Optimization via Off-Policy Policy Evaluation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alberto Maria Metelli, Samuele Meta, Marcello Restelli |
On the Relation between Policy Improvement and Off-Policy Minimum-Variance Policy Evaluation. |
UAI |
2023 |
DBLP BibTeX RDF |
|
18 | Hongyao Tang, Zhaopeng Meng, Jianye Hao, Chen Chen 0077, Daniel Graves, Dong Li 0016, Changmin Yu, Hangyu Mao, Wulong Liu, Yaodong Yang 0001, Wenyuan Tao, Li Wang |
What about Inputting Policy in Value Function: Policy Representation and Policy-Extended Value Function Approximator. |
AAAI |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Yangyang Zhao, Zhenyu Wang 0001, Changxi Zhu, Shihan Wang 0001 |
Efficient Dialogue Complementary Policy Learning via Deep Q-network Policy and Episodic Memory Policy. |
EMNLP (1) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Haifeng Pan, DingSheng Zhang |
Coordination Effects and Optimal Policy Choices of Macroprudential Policy and Monetary Policy. |
Complex. |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Rasool Fakoor, Pratik Chaudhari, Alexander J. Smola |
P3O: Policy-on Policy-off Policy Optimization. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
18 | Rasool Fakoor, Pratik Chaudhari, Alexander J. Smola |
P3O: Policy-on Policy-off Policy Optimization. (PDF / PS) |
UAI |
2019 |
DBLP BibTeX RDF |
|
18 | Aniruddh Raghu, Omer Gottesman, Yao Liu 0009, Matthieu Komorowski, Aldo Faisal, Finale Doshi-Velez, Emma Brunskill |
Behaviour Policy Estimation in Off-Policy Policy Evaluation: Calibration Matters. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
18 | Shixiang Gu, Timothy P. Lillicrap, Zoubin Ghahramani, Richard E. Turner, Bernhard Schölkopf, Sergey Levine |
Interpolated Policy Gradient: Merging On-Policy and Off-Policy Gradient Estimation for Deep Reinforcement Learning. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
18 | Shixiang Gu, Tim Lillicrap, Richard E. Turner, Zoubin Ghahramani, Bernhard Schölkopf, Sergey Levine |
Interpolated Policy Gradient: Merging On-Policy and Off-Policy Gradient Estimation for Deep Reinforcement Learning. |
NIPS |
2017 |
DBLP BibTeX RDF |
|
18 | Ourania I. Markaki, Panagiotis Kokkinakos, Sotirios Koussouris, John E. Psarras, Habin Lee, Martin Löhe, Yuri Glikman |
Infusing Innovation in the Policy Analysis and Evaluation Phases of the Policy Cycle: The Policy Compass Approach. |
Int. J. Electron. Gov. Res. |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Bruno Scherrer, Matthieu Geist |
Local Policy Search in a Convex Space and Conservative Policy Iteration as Boosted Policy Search. |
ECML/PKDD (3) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Diana Rawlins, Amol Kulkarni, Martin Bokaemper, Kwok-Ho Chan |
Framework for Policy Usage Feedback for Common Open Policy Service with Policy Provisioning (COPS-PR). |
RFC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Seraphin B. Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh C. Verma, Alessandra Russo, Elisa Bertino |
AGENP: An ASGrammar-based GENerative Policy Framework. |
PADG@ESORICS |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Franck Le, Jorge Ortiz 0001, Dinesh C. Verma, Dilip D. Kandlur |
Policy-Based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis. |
PADG@ESORICS |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Maria A. Wimmer, Karol Furdík, Melanie Bicking, Marian Mach, Tomas Sabol, Peter Butka |
Open Collaboration in Policy Development: Concept and Architecture to Integrate Scenario Development and Formal Policy Modelling. |
Empowering Open and Collaborative Governance |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Georg Carle, Henning Sanneck, Lars-Christoph Schmelz |
Policy-driven workflows for mobile network management automation. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
management automation, workflow, policy, LTE |
18 | Joanna Goode |
Connecting k-16 curriculum & policy: making computer science engaging, accessible, and hospitable for underrepresented students. |
SIGCSE |
2010 |
DBLP DOI BibTeX RDF |
cs policy, cs reform, gender and ethnicity, pedagogy, curriculum, wider access |
18 | Andrew Besmer, Jason Watson, Heather Richter Lipford |
The impact of social navigation on privacy policy configuration. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
policy configuration, privacy, social networking, social navigation |
18 | Kristine M. Kuhn, K. D. Joshi 0001 |
The reported and revealed importance of job attributes to aspiring information technology: a policy-capturing study of gender differences. |
Data Base |
2009 |
DBLP DOI BibTeX RDF |
it recruitment, policy capturing, pre-hire issues, gender |
18 | Palanivel A. Kodeswaran, Evelyne Viegas |
Applying differential privacy to search queries in a policy based interactive framework. |
CIKM-PAVLAD |
2009 |
DBLP DOI BibTeX RDF |
privacy, semantics, policy |
18 | Pierre Imai, Bernd Lamparter, Marco Liebsch |
Policy-Based Device and Mobility Management. |
MOBILWARE |
2009 |
DBLP DOI BibTeX RDF |
home automation, Policy management, session mobility |
18 | Amir Tavasoli, Norman P. Archer |
A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment. |
MCETECH |
2009 |
DBLP DOI BibTeX RDF |
Mobile eHealth, intelligent agents, adaptive interfaces, policy-based networking |
18 | Pengcheng Zhang, Xin Xu 0001, Chunming Liu, Qiping Yuan |
Reinforcement Learning Control of a Real Mobile Robot Using Approximate Policy Iteration. |
ISNN (3) |
2009 |
DBLP DOI BibTeX RDF |
Approximate policy iteration, Approximate dynamic programming, Reinforcement learning, Mobile robots, Path following |
18 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
18 | Wei Koong Chai, Kin-Hon Ho, Marinos Charalambides, George Pavlou |
A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
Policy-driven management, military networks, traffic engineering |
18 | Kai Jakobs, Knut Blind |
The ICT standardisation policy of the EU: changes ahead!? |
EATIS |
2009 |
DBLP DOI BibTeX RDF |
ICT standardisation, standardisation policy |
18 | Shivaram Kalyanakrishnan, Peter Stone |
An empirical analysis of value function-based and policy search reinforcement learning. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
policy search, reinforcement learning, function approximation, temporal difference learning |
18 | Lihong Li 0001, Michael L. Littman, Christopher R. Mansley |
Online exploration in least-squares policy iteration. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
PAC-MDP, least-squares policy iteration (LSPI), reinforcement learning, Markov decision processes, exploration |
|
|