|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Michael R. Lowry, Thomas Pressburger, Grigore Rosu |
Certifying Domain-Specific Policies. |
ASE |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Raouf Boutaba, Andreas Polyrakis |
Towards Extensible Policy Enforcement Points. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Yasusi Kanada |
Taxonomy and Description of Policy Combination Methods. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Michael Hitchens, Vijay Varadharajan |
Tower: A Language for Role Based Access Control. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman |
The Ponder Policy Specification Language. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Daniel A. Menascé, Rodrigo C. Fonseca, Virgílio A. F. Almeida, Marco A. Mendes |
Resource management policies for e-commerce servers. |
SIGMETRICS Perform. Evaluation Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
18 | David Walker 0001 |
A Type System for Expressive Security Policies. |
POPL |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Kai Cheng, Yahiko Kambayashi |
Advanced Replacement Policies for WWW Caching. |
Web-Age Information Management |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Ciarán Bryce |
Security Engineering of Lattice-Based Policies. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
lattice policy modeling, Security engineering, information flow security |
18 | Richard W. Oliver |
Corporate Policies for Electronic Commerce. |
HICSS (4) |
1997 |
DBLP DOI BibTeX RDF |
|
18 | Sanjeev Setia |
Trace-driven Analysis of Migration-based Gang Scheduling Policies for Parallel Computers. |
ICPP |
1997 |
DBLP DOI BibTeX RDF |
parallel supercomputers, performance evaluation, Job scheduling, trace-driven simulation, gang-scheduling |
18 | Alexander Thomasian |
Performance of Locking Policies with Limited Wait Depth. |
SIGMETRICS |
1992 |
DBLP DOI BibTeX RDF |
|
18 | Asit Dan, Philip S. Yu |
Performance comparisons of buffer coherency policies. |
ICDCS |
1991 |
DBLP DOI BibTeX RDF |
|
18 | Gail E. Kaiser, Wenwey Hseush, Steven S. Popovich, Shyhtsun Felix Wu |
Multiple concurrency control policies in an object-oriented programming system. |
SPDP |
1990 |
DBLP DOI BibTeX RDF |
|
18 | Dominique Potier |
Analysis of Demand Paging Policies with Swapped Working Sets. |
SOSP |
1977 |
DBLP DOI BibTeX RDF |
Demand paging algorithms, Program behaviour, Working-set memory management, Virtual memory, Queueing network model, Swapping, Semi-Markov model, Paging algorithms |
18 | Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino |
Mask: a system for privacy-preserving policy-based access to published content. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
broadcast systems, privacy, access control, identity, group key management |
18 | Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, Lorrie Faith Cranor |
Standardizing privacy notices: an online study of the nutrition label approach. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
privacy, standardization, policy, information design, p3p |
18 | Gabriel A. Weaver, Scott A. Rea, Sean W. Smith |
Computational techniques for increasing PKI policy comprehension by human analysts. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
certificate policy formalization, XML, PKI |
18 | Apurva Mohan, Douglas M. Blough |
An attribute-based authorization policy framework with dynamic conflict resolution. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
attribute-based authorization, conflict resolution, authorization policy |
18 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Detecting network-wide and router-specific misconfigurations through data mining. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
static analysis, network management, error detection, association rules mining |
18 | Zhenbo Wang, Wenxun Xing, Bo Chen 0002 |
On-line service scheduling. |
J. Sched. |
2009 |
DBLP DOI BibTeX RDF |
Service policy evaluation, On-line, Competitive ratio, Parallel machine scheduling |
18 | Reetuparna Das, Onur Mutlu, Thomas Moscibroda, Chita R. Das |
Application-aware prioritization mechanisms for on-chip networks. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
multi-core, packet scheduling, memory systems, arbitration, prioritization, on-chip networks |
18 | Ralph Mietzner, Tammo van Lessen, Alexander Wiese, Matthias Wieland 0001, Dimka Karastoyanova, Frank Leymann |
Virtualizing Services and Resources with ProBus: The WS-Policy-Aware Service and Resource Bus. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks |
Cross-tier, label-based security enforcement for web applications. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
database programming, security enforcement, compilers, web applications, type systems |
18 | Hejiao Huang, Hélène Kirchner |
Policy Composition Based on Petri Nets. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Kambiz Ghazinour, Maryam Majedi, Ken Barker 0001 |
A Model for Privacy Policy Visualization. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Limin Jia 0001, Steve Zdancewic |
Encoding information flow in Aura. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
access control, information flow control, declassification, security type system, authorization logic |
18 | Lars E. Olson 0001, Carl A. Gunter, William R. Cook, Marianne Winslett |
Implementing Reflective Access Control in SQL. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali |
Remote Attestation of Attribute Updates and Information Flows in a UCON System. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
security, Information flow, usage control, remote attestation |
18 | Christopher Ward, Michael D. Naish |
Scheduling active camera resources for multiple moving targets. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Matthew Might, Panagiotis Manolios |
A PosterioriSoundness for Non-deterministic Abstract Interpretations. |
VMCAI |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Abdeslam Boularias, Brahim Chaib-draa |
Predictive representations for policy gradient in POMDPs. |
ICML |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Steve Barker, Marek J. Sergot, Duminda Wijesekera |
Status-Based Access Control. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
distributed security, status-based access control, logic, algebras |
18 | Raphael M. Bahati, Michael A. Bauer 0001 |
Reinforcement learning in policy-driven autonomic management. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Daniel O'Neill, Andrea J. Goldsmith, Stephen P. Boyd |
Optimizing Adaptive Modulation in Wireless Networks via Utility Maximization. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea |
A user study of policy creation in a flexible access-control system. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
discresionary access control, policy creation, access control, smartphones, distributed access control |
18 | Fumiko Satoh, Takehiro Tokuda |
Security Policy Composition for Composite Services. |
ICWE |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu |
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Secure Policy Interoperation, RBAC, Multi-Domain |
18 | J. Zico Kolter, Adam Coates 0002, Andrew Y. Ng, Yi Gu, Charles DuHadway |
Space-indexed dynamic programming: learning to follow trajectories. |
ICML |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Federica Paci, Mourad Ouzzani, Massimo Mecella |
Verification of Access Control Requirements in Web Services Choreography. |
IEEE SCC (1) |
2008 |
DBLP DOI BibTeX RDF |
web services, verification, access control, choreography |
18 | J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini |
Audit-based compliance control. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Access control, Policy, Audit |
18 | Divya Arora, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Architectural Support for Run-Time Validation of Program Data Properties. |
IEEE Trans. Very Large Scale Integr. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Heng Yin 0001, Haining Wang |
Building an application-aware IPsec policy system. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
IP, computer network security, communication system security |
18 | Hédi Hamdi, Adel Bouhoula, Mohamed Mosbah 0001 |
A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
18 | Adam Wierzbicki, Lukasz Zaczek, Radoslaw Adamus, Edgar Glowacki |
Access Control Management in Open Distributed Virtual Repositories and the Grid. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
Access Control Management, Virtual Repository, Role-based access control, data grid |
18 | Jorge Lobo 0001 |
Policy-Based Computing: From Systems and Applications to Theory. |
LPNMR |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan |
Managing the risk of covert information flows in virtual machine systems. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
chinese wall policy, information flow secrecy, covert channels |
18 | Bogdan Cautis |
Distributed access control: a privacy-conscious approach. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
XML, privacy, access control, digital signatures, semi-structured data, relational data |
18 | Vijayalakshmi Atluri, Heechang Shin |
Efficient Security Policy Enforcement in a Location Based Service Environment. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira |
Modular Access Control Via Strategic Rewriting. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Paramai Supadulchai, Finn Arve Aagesen |
Policy-based Adaptable Service Systems Architecture. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Albert F. Harris III, Robin Snader, Robin Kravets |
Energy-efficient transmission for multimedia streams in last-hop wireless internet. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Nikhil Bansal 0001, David Gamarnik |
Handling load with less stress. |
Queueing Syst. Theory Appl. |
2006 |
DBLP DOI BibTeX RDF |
Average solourn time, Large deviations, Heavy traffic, Heavy tailed distributions, M/G/1 queues |
18 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
ontology, Privacy, trust negotiations |
18 | Nauman Rafique, Won-Taek Lim, Mithuna Thottethodi |
Architectural support for operating system-driven CMP cache management. |
PACT |
2006 |
DBLP DOI BibTeX RDF |
quotas, QoS, cache, interface, fairness, CMP, SLAs, OS |
18 | Adam J. Lee, Jodie P. Boyer, Lars E. Olson 0001, Carl A. Gunter |
Defeasible security policy composition for web services. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
security policy composition, web services, defeasible logic |
18 | Weiping Wang 0006, Wenhui Chen, Zhepeng Li, Huaping Chen 0001 |
Comparison Model and Algorithm for Distributed Firewall Policy. |
ICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Joan Feigenbaum, Vijay Ramachandran, Michael Schapira |
Incentive-compatible interdomain routing. |
EC |
2006 |
DBLP DOI BibTeX RDF |
distributed algorithmic mechanism design, border gateway protocol (BGP), interdomain routing |
18 | Pradeep Varakantham, Ranjit Nair, Milind Tambe, Makoto Yokoo |
Winning back the CUP for distributed POMDPs: planning over continuous belief spaces. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
continuous initial beliefs, distributed POMDP, partially observable Markov decision process (POMDP), multi-agent systems |
18 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
18 | Kathy S. Schwaig, Gerald C. Kane, Veda C. Storey |
Privacy, fair information practices and the fortune 500: the virtual reality of compliance. |
Data Base |
2005 |
DBLP DOI BibTeX RDF |
internet, electronic commerce, information privacy, web surveys |
18 | Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 |
CPOL: high-performance policy evaluation. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
performance, privacy policy, policy evaluation |
18 | Karl Krukow, Mogens Nielsen, Vladimiro Sassone |
A framework for concrete reputation-systems with applications to history-based access control. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
history-based access control, model checking, temporal logic, reputation, trust management |
18 | Alexandros Koulouris, Sarantos Kapidakis |
Policy Model for National and Academic Digital Collections. |
ECDL |
2005 |
DBLP DOI BibTeX RDF |
|
18 | David Starobinski, Tao Wu |
Performance of Server Selection Algorithms for Content Replication Networks. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Mario Coppo, Federico Cozzi, Mariangiola Dezani-Ciancaglini, Elio Giovannetti, Rosario Pugliese |
A Mobility Calculus with Local and Dependent Types. |
Processes, Terms and Cycles |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Cláudio Carvalho, Edmundo Roberto Mauro Madeira, Fábio Luciano Verdi, Maurício F. Magalhães |
Policy-Based Fault Management for Integrating IP over Optical Networks. |
IPOM |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jaijit Bhattacharya, S. K. Gupta 0001 |
EPAL Based Privacy Enforcement Using ECA Rules. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Rema Ananthanarayanan, Mukesh K. Mohania, Ajay Gupta 0004 |
Management of Conflicting Obligations in Self-Protecting Policy-Based Systems. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Divya Arora, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha |
Enhancing security through hardware-assisted run-time validation of program data properties. |
CODES+ISSS |
2005 |
DBLP DOI BibTeX RDF |
data tagging, secure architectures, run-time checks |
18 | Caixia Sun, Hong-Wei Tang, Minxuan Zhang |
A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors. |
APPT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Naoto Mukai, Toyohide Watanabe, Jun Feng 0001 |
Proactive Route Planning Based on Expected Rewards for Transport Systems. |
ICTAI |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino |
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. |
IEEE SCC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Leonidas Lymberopoulos, Emil Lupu, Morris Sloman |
PONDER policy implementation and validation in a CIM and differentiated services framework. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Idris A. Rai, Guillaume Urvoy-Keller, Mary K. Vernon, Ernst W. Biersack |
Performance analysis of LAS-based scheduling disciplines in a packet switched network. |
SIGMETRICS |
2004 |
DBLP DOI BibTeX RDF |
FCFS and LAS models, LAS-based scheduling and models, simulations, scheduling, models validation, service differentiation |
18 | Xianghua Xu, Jiajun Bu, Chun Chen 0001, Yong Li 0004 |
Distributed Dynamic-Locking in Real-Time Collaborative Editing Systems. |
CRIWG |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Xuhui Ao, Naftaly H. Minsky |
On the role of roles: from role-based to role-sensitive access control. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
access control policy specification and decentralized enforcement, security, role-based access control, law-governed interaction |
18 | Martin Wimmer 0001, Daniela Eberhardt, Pia Ehrnlechner, Alfons Kemper |
Reliable and Adaptable Security Engineering for Database-Web Services. |
ICWE |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Srikanth T. Srinivasan, Haitham Akkary, Tom Holman, Konrad Lai |
A Minimal Dual-Core Speculative Multi-Threading Architecture. |
ICCD |
2004 |
DBLP DOI BibTeX RDF |
|
18 | A. Radhika Sarma, R. Govindarajan |
An Efficient Web Cache Replacement Policy. |
HiPC |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Simon D. Byers, Lorrie Faith Cranor, David P. Kormann |
Automated analysis of P3P-enabled Web sites. |
ICEC |
2003 |
DBLP DOI BibTeX RDF |
platform for privacy preferences, privacy, privacy policy, P3P |
18 | Elisa Bertino, Elena Ferrari |
Secure and selective dissemination of XML documents. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
secure distribution, XML, Access control |
18 | Edith Cohen, Haim Kaplan |
Exploiting Regularities in Web Traffic Patterns for Cache Replacement. |
Algorithmica |
2002 |
DBLP DOI BibTeX RDF |
Varying page sizes and fetching costs, Predictable load, Inter-request time distribution, Caching, Interval caching |
18 | Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman, Toshio Tonouchi |
Tools for domain-based policy management of distributed systems. |
NOMS |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Annie I. Antón, Julia Brande Earp, Angela Reese |
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy. |
RE |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru |
Use of a P3P user agent by early adopters. |
WPES |
2002 |
DBLP DOI BibTeX RDF |
privacy, user study, survey, P3P, user agent |
18 | William Goveia, Carol Rhodes |
Navigating new waters: a proposal for dealing with emerging technology. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
methodology, emerging technology, needs assessment, new technology |
18 | B. Clifford Neuman |
Condition-Driven Integration of Security Services. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo |
The Policy Machine for Security Policy Management. |
International Conference on Computational Science (2) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Naftaly H. Minsky, Victoria Ungureanu |
Scalable Regulation of Inter-enterprise Electronic Commerce. |
WELCOM |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Mouhsine Lakhdissi, Hamid Harroud, Ahmed Karmouch, Clifford Grossner |
A Policy Management System for Mobile Agent-Based Services. |
MATA |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Takahiro Koita, Tetsuro Katayama, Keizo Saisho, Akira Fukuda |
Memory Conscious Scheduling for Cluster-based NUMA Multiprocessors. |
J. Supercomput. |
2000 |
DBLP DOI BibTeX RDF |
dynamic space-sharing, page placement, cluster-based NUMA multiprocessors, multiprogrammed environments, processor scheduling |
18 | Xiaodong Zhang 0001, Yanxia Qu, Li Xiao 0001 |
Improving Distributed Workload Performance by Sharing both CPU and Memory Resources. |
ICDCS |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Christophe Bidan, Valérie Issarny |
Dealing with Multi-policy Security in Large Open Distributed Systems. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Jonathan E. Cook, Artur Klauser, Alexander L. Wolf, Benjamin G. Zorn |
Semi-automatic, Self-adaptive Control of Garbage Collection Rates in Object Databases. |
SIGMOD Conference |
1996 |
DBLP DOI BibTeX RDF |
|
15 | Blai Bonet, Dominik Drexler, Hector Geffner |
On Policy Reuse: An Expressive Language for Representing and Executing General Policies that Call Other Policies. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Pankaj Mishra, Netra Pal Singh, Ayesha Farooq |
The nexus between allied policies of GST and FDI with dependent telecom policies of licensing and universal service in India. |
Int. J. Netw. Virtual Organisations |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Isabel Wagner |
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021. |
ACM Trans. Priv. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Riccardo Zanella, Gianluca Palli, Stefano Stramigioli, Federico Califano |
Passivizing learned policies and learning passive policies with virtual energy tanks in robotics. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
|
|