BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
policy
Google policy

Tag #policy

550 papers:

ICSAICSA-2019-GerkingS #architecture #component #cyber-physical #data flow #refinement #security #verification
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures (CG, DS), pp. 61–70.
EDMEDM-2019-AusinABC #induction #learning
Leveraging Deep Reinforcement Learning for Pedagogical Policy Induction in an Intelligent Tutoring System (MSA, HA, TB, MC).
ICSMEICSME-2019-Khalil #debugging #performance
Studying the Impact of Policy Changes on Bug Handling Performance (ZAK), pp. 590–594.
CoGCoG-2019-HuangL #approach #optimisation #self
A Self-Play Policy Optimization Approach to Battling Pokémon (DH, SL), pp. 1–4.
CoGCoG-2019-Nagorko #adaptation #parallel
Parallel Nested Rollout Policy Adaptation (AN), pp. 1–7.
CoGCoG-2019-RatcliffeHD #optimisation #performance
Win or Learn Fast Proximal Policy Optimisation (DSR, KH, SD), pp. 1–4.
CoGCoG-2019-RebstockSB #learning
Learning Policies from Human Data for Skat (DR, CS, MB), pp. 1–8.
CoGCoG-2019-RebstockSBS #game studies
Policy Based Inference in Trick-Taking Card Games (DR, CS, MB, NRS), pp. 1–8.
CoGCoG-2019-SoemersPSB #learning #self
Learning Policies from Self-Play with Policy Gradients and MCTS Value Estimates (DJNJS, ÉP, MS, CB), pp. 1–8.
CoGCoG-2019-TongLL #evolution #network
Enhancing Rolling Horizon Evolution with Policy and Value Networks (XT, WL, BL0), pp. 1–8.
ICMLICML-2019-0002VY #constraints #learning
Batch Policy Learning under Constraints (HML0, CV, YY), pp. 3703–3712.
ICMLICML-2019-AhmedR0S #comprehension #optimisation
Understanding the Impact of Entropy on Policy Optimization (ZA, NLR, MN0, DS), pp. 151–160.
ICMLICML-2019-AkrourP0N #algorithm #approximate
Projections for Approximate Policy Iteration Algorithms (RA, JP, JP0, GN), pp. 181–190.
ICMLICML-2019-ChengYRB #optimisation #predict
Predictor-Corrector Policy Optimization (CAC, XY, NDR, BB), pp. 1151–1161.
ICMLICML-2019-Dann0WB #learning #towards
Policy Certificates: Towards Accountable Reinforcement Learning (CD, LL0, WW, EB), pp. 1507–1516.
ICMLICML-2019-EdwardsSSI
Imitating Latent Policies from Observation (ADE, HS, YS, CLIJ), pp. 1755–1763.
ICMLICML-2019-FreirichSMT #evaluation #multi
Distributional Multivariate Policy Evaluation and Exploration with the Bellman GAN (DF, TS, RM, AT), pp. 1983–1992.
ICMLICML-2019-FujiiS #adaptation #approximate
Beyond Adaptive Submodularity: Approximation Guarantees of Greedy Policy with Adaptive Submodularity Ratio (KF, SS), pp. 2042–2051.
ICMLICML-2019-HannaNS #behaviour #evaluation
Importance Sampling Policy Evaluation with an Estimated Behavior Policy (JH, SN, PS), pp. 2605–2613.
ICMLICML-2019-HeidariNG #algorithm #learning #on the #social
On the Long-term Impact of Algorithmic Decision Policies: Effort Unfairness and Feature Segregation through Social Learning (HH, VN, KPG), pp. 2692–2701.
ICMLICML-2019-HoLCSA #learning #performance
Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules (DH, EL, XC0, IS, PA), pp. 2731–2741.
ICMLICML-2019-HuntBLH #using
Composing Entropic Policies using Divergence Correction (JJH, AB, TPL, NH), pp. 2911–2920.
ICMLICML-2019-KaplanisSC #learning
Policy Consolidation for Continual Reinforcement Learning (CK, MS, CC), pp. 3242–3251.
ICMLICML-2019-LarocheTC
Safe Policy Improvement with Baseline Bootstrapping (RL, PT, RTdC), pp. 3652–3661.
ICMLICML-2019-NabiMS #learning
Learning Optimal Fair Policies (RN, DM, IS), pp. 4674–4682.
ICMLICML-2019-PapiniMLR #multi #optimisation
Optimistic Policy Optimization via Multiple Importance Sampling (MP, AMM, LL, MR), pp. 4989–4999.
ICMLICML-2019-PaulOW #learning #optimisation #robust
Fingerprint Policy Optimisation for Robust Reinforcement Learning (SP, MAO, SW), pp. 5082–5091.
ICMLICML-2019-ShenRHQM
Hessian Aided Policy Gradient (ZS, AR, HH, HQ, CM), pp. 5729–5738.
ICMLICML-2019-SuWSJ #adaptation #evaluation #learning #named
CAB: Continuous Adaptive Blending for Policy Evaluation and Learning (YS, LW, MS, TJ), pp. 6005–6014.
ICMLICML-2019-TirinzoniSR #multi
Transfer of Samples in Policy Search via Multiple Importance Sampling (AT, MS, MR), pp. 6264–6274.
ICMLICML-2019-WangCAD #estimation #learning #random
Random Expert Distillation: Imitation Learning via Expert Policy Support Estimation (RW, CC, PVA, YD), pp. 6536–6544.
ICMLICML-2019-X #bound #named #predict #using
POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
ICMLICML-2019-ZhangYT #learning #novel
Learning Novel Policies For Tasks (YZ, WY, GT), pp. 7483–7492.
KDDKDD-2019-Do0V #graph transformation #network #predict
Graph Transformation Policy Network for Chemical Reaction Prediction (KD, TT0, SV), pp. 750–760.
KDDKDD-2019-HartvigsenSKR #adaptation #classification #network
Adaptive-Halting Policy Network for Early Classification (TH, CS, XK, EAR), pp. 101–110.
KDDKDD-2019-RizzoVC
Time Critic Policy Gradient Methods for Traffic Signal Control in Complex and Congested Scenarios (SGR, GV, SC), pp. 1654–1664.
KDDKDD-2019-ZouKCC0 #evaluation #robust
Focused Context Balancing for Robust Offline Policy Evaluation (HZ, KK, BC, PC, PC0), pp. 696–704.
KDDKDD-2019-ZouZCW0 #optimisation #trust
Separated Trust Regions Policy Optimization Method (LZ, ZZ, YC, XW, WZ0), pp. 1471–1479.
SASSAS-2019-VolkerK #heuristic #static analysis
A Change-Based Heuristic for Static Analysis with Policy Iteration (MV, SK), pp. 73–95.
ASPLOSASPLOS-2019-TannuQ #quantum #variability
Not All Qubits Are Created Equal: A Case for Variability-Aware Policies for NISQ-Era Quantum Computers (SST, MKQ), pp. 987–999.
CASECASE-2019-DaiGLY #energy #multi #robust #scheduling
A Time-domain Decoupling Policy for Multi-stage Robust Scheduling in a Corporate Energy System with V2G* (SD, FG, KL, LY), pp. 972–978.
CASECASE-2019-Huang0C #learning
Machine Preventive Replacement Policy for Serial Production Lines Based on Reinforcement Learning (JH0, QC0, NC), pp. 523–528.
CASECASE-2019-MarzanoFM #energy #performance #tool support
Energy Efficient State Control of Machine Tools: a Time-Based Dynamic Control Policy (LM, NF, AM), pp. 596–601.
CASECASE-2019-RazaL #approach #learning #multi
Constructive Policy: Reinforcement Learning Approach for Connected Multi-Agent Systems (SJAR, ML), pp. 257–262.
SANERSANER-2018-MontenegroMCB #developer #exception
Improving developers awareness of the exception handling policy (TM, HM, RC, EB), pp. 413–422.
ICMLICML-2018-AbelJGKL #learning
Policy and Value Transfer in Lifelong Reinforcement Learning (DA, YJ, SYG, GDK, MLL), pp. 20–29.
ICMLICML-2018-ArenzZN #performance #using
Efficient Gradient-Free Variational Inference using Policy Search (OA, MZ, GN), pp. 234–243.
ICMLICML-2018-BarretoBQSSHMZM #learning #using
Transfer in Deep Reinforcement Learning Using Successor Features and Generalised Policy Improvement (AB, DB, JQ, TS, DS, MH, DJM, AZ, RM), pp. 510–519.
ICMLICML-2018-ChoromanskiRSTW #architecture #evolution #optimisation #scalability
Structured Evolution with Compact Architectures for Scalable Policy Optimization (KC, MR, VS, RET, AW), pp. 969–977.
ICMLICML-2018-Fazel0KM #convergence #linear #polynomial
Global Convergence of Policy Gradient Methods for the Linear Quadratic Regulator (MF, RG0, SMK, MM), pp. 1466–1475.
ICMLICML-2018-FellowsCW #fourier
Fourier Policy Gradients (MF, KC, SW), pp. 1485–1494.
ICMLICML-2018-FujitaM
Clipped Action Policy Gradient (YF0, SiM), pp. 1592–1601.
ICMLICML-2018-GroverAGBE #learning #multi
Learning Policy Representations in Multiagent Systems (AG, MAS, JKG, YB, HE), pp. 1797–1806.
ICMLICML-2018-HaarnojaHAL #learning
Latent Space Policies for Hierarchical Reinforcement Learning (TH, KH, PA, SL), pp. 1846–1855.
ICMLICML-2018-HefnyM0SG #network #predict
Recurrent Predictive State Policy Networks (AH, ZM, WS0, SSS, GJG), pp. 1954–1963.
ICMLICML-2018-KangJF #optimisation
Policy Optimization with Demonstrations (BK, ZJ, JF), pp. 2474–2483.
ICMLICML-2018-Nachum0TS #learning
Smoothed Action Value Functions for Learning Gaussian Policies (ON, MN0, GT, DS), pp. 3689–3697.
ICMLICML-2018-PapiniBCPR #probability
Stochastic Variance-Reduced Policy Gradient (MP, DB, GC, MP, MR), pp. 4023–4032.
ICMLICML-2018-ParmasR0D #flexibility #modelling #named #robust
PIPPS: Flexible Model-Based Policy Search Robust to the Curse of Chaos (PP, CER, JP0, KD), pp. 4062–4071.
ICMLICML-2018-SmithHP #learning
An Inference-Based Policy Gradient Method for Learning Options (MS, HvH, JP), pp. 4710–4719.
ICMLICML-2018-ZhangCLC #optimisation
Policy Optimization as Wasserstein Gradient Flows (RZ, CC, CL, LC), pp. 5741–5750.
ICPRICPR-2018-LabaoN #approximate
Stabilizing Actor Policies by Approximating Advantage Distributions from K Critics (ABL, PCN), pp. 1253–1258.
ICPRICPR-2018-MandalSVM #named #robust
CANDID: Robust Change Dynamics and Deterministic Update Policy for Dynamic Background Subtraction (MM, PS, SKV, SM), pp. 2468–2473.
KDDKDD-2018-AckermannWUNRLB #framework #machine learning #modelling
Deploying Machine Learning Models for Public Policy: A Framework (KA, JW, ADU, HN, ANR, SJL, JB, MD, CC, LH, RG), pp. 15–22.
KDDKDD-2018-LiAKMVW #evaluation #modelling #ranking
Offline Evaluation of Ranking Policies with Click Models (SL, YAY, BK, SM, VV, ZW), pp. 1685–1694.
KDDKDD-2018-LiY #classification #learning #network
Learning Adversarial Networks for Semi-Supervised Text Classification via Policy Gradient (YL, JY), pp. 1715–1723.
AdaEuropeAdaEurope-2018-GarridoZAP #ada #on the
On the Effect of Protected Entry Servicing Policies on the Response Time of Ada Tasks (JG, JZ, AA0, JAdlP), pp. 73–86.
ASEASE-2018-FadhelBB #data access #modelling #runtime
Model-driven run-time enforcement of complex role-based access control policies (ABF, DB, LCB), pp. 248–258.
ESEC-FSEESEC-FSE-2018-Hosseini #android #natural language #privacy #semantics
Semantic inference from natural language privacy policies and Android code (MBH), pp. 940–943.
ICSE-2018-WangQHSB0 #android #named #privacy
GUILeak: tracing privacy policy claims on user input data for Android applications (XW, XQ, MBH, RS, TDB, JN0), pp. 37–47.
CASECASE-2018-CuiZFKM #kernel #programming
Factorial Kernel Dynamic Policy Programming for Vinyl Acetate Monomer Plant Model Control (YC, LZ, MF, HK, TM), pp. 304–309.
CASECASE-2018-DanielczukMCG #linear
Linear Push Policies to Increase Grasp Access for Robot Bin Picking (MD, JM, CC, KG), pp. 1249–1256.
CASECASE-2018-MatsubaraNOC #analysis #component #simulation
Policy Transfer from Simulations to Real World by Transfer Component Analysis (TM, YN, YO, YC), pp. 264–269.
CASECASE-2018-ZhangW
Integrated Ordering and Pricing Policy for Perishable Products with Inventory Inaccuracy (YZ, ZW0), pp. 1230–1236.
EDMEDM-2017-ZhouWLC #learning #towards
Towards Closing the Loop: Bridging Machine-induced Pedagogical Policies to Learning Theories (GZ, JW, CL, MC).
CoGCIG-2017-ZhangB #learning
Improving hearthstone AI by learning high-level rollout policies and bucketing chance node events (SZ, MB), pp. 309–316.
ICMLICML-2017-AchiamHTA #optimisation
Constrained Policy Optimization (JA, DH, AT, PA), pp. 22–31.
ICMLICML-2017-AndreasKL #composition #learning #multi #sketching
Modular Multitask Reinforcement Learning with Policy Sketches (JA, DK, SL), pp. 166–175.
ICMLICML-2017-BalleM #finite #learning
Spectral Learning from a Single Trajectory under Finite-State Policies (BB, OAM), pp. 361–370.
ICMLICML-2017-ChouMS #learning #probability #using
Improving Stochastic Policy Gradients in Continuous Control with Deep Reinforcement Learning using the Beta Distribution (PWC, DM, SAS), pp. 834–843.
ICMLICML-2017-DuCLXZ #evaluation #probability #reduction
Stochastic Variance Reduction Methods for Policy Evaluation (SSD, JC, LL0, LX, DZ), pp. 1049–1058.
ICMLICML-2017-HaarnojaTAL #energy #learning
Reinforcement Learning with Deep Energy-Based Policies (TH, HT, PA, SL), pp. 1352–1361.
ICMLICML-2017-HannaTSN #behaviour #evaluation
Data-Efficient Policy Evaluation Through Behavior Policy Search (JPH, PST, PS, SN), pp. 1394–1403.
ICMLICML-2017-WangWTS #process
Variational Policy for Guiding Point Processes (YW0, GW, EAT, LS), pp. 3684–3693.
KDDKDD-2017-DebGIPVYY #automation #learning #named #network #predict
AESOP: Automatic Policy Learning for Predicting and Mitigating Network Service Impairments (SD, ZG, SI, SCP, SV, HY, JY), pp. 1783–1792.
ICSE-2017-KafaliJPWS #case study #how #security
How good is a security policy against real breaches?: a HIPAA case study (ÖK, JJ, MP, LW, MPS), pp. 530–540.
CASECASE-2017-ChenWC #multi #probability
Steady state probability distribution of a two-product-type and multi-parallel-machine system under prioritized hedging point control policy (WC, ZW, FTSC), pp. 224–230.
CASECASE-2017-JiangZ0X #anti
An optimal POMDP-based anti-jamming policy for cognitive radar (XJ, FZ, JY0, HX), pp. 938–943.
CASECASE-2017-LeeZLZBKSBL
Incentive-based optimal intervention policy to reduce hospital readmissions for COPD patients (SL, XZ, HKL, CZ, PAB, TK, CS, CB, JL), pp. 562–567.
CASECASE-2017-TengLPK
Threshold control policy for patient referral under cooperation scenarios (DT, NL0, ZP, NK), pp. 195–200.
CASECASE-2017-XiangYML #parallel #research
Research on release control policies of parallel semiconductor production lines (NX, QY, ZM, LL), pp. 296–301.
CASECASE-2017-ZhengLC #comparison #learning #realtime
Comparison study of two reinforcement learning based real-time control policies for two-machine-one-buffer production system (WZ, YL, QC), pp. 1163–1168.
FASEFASE-2017-AydinPTFP #mobile #privacy #visual notation
Visual Configuration of Mobile Privacy Policies (AA, DP, OT, PF, MP), pp. 338–355.
AIIDEAIIDE-2016-UriarteO #modelling #monte carlo #probability
Improving Monte Carlo Tree Search Policies in StarCraft via Probabilistic Models Learned from Replay Data (AU, SO), pp. 100–106.
ICMLICML-2016-BalleGP #evaluation
Differentially Private Policy Evaluation (BB, MG, DP), pp. 2130–2138.
ICMLICML-2016-FinnLA #learning #optimisation
Guided Cost Learning: Deep Inverse Optimal Control via Policy Optimization (CF, SL, PA), pp. 49–58.
ICMLICML-2016-HoGE #learning #optimisation
Model-Free Imitation Learning with Policy Optimization (JH, JKG, SE), pp. 2760–2769.
ICMLICML-2016-PerolatPGSP #approximate #game studies #markov
Softened Approximate Policy Iteration for Markov Games (JP, BP, MG, BS, OP), pp. 1860–1868.
ICMLICML-2016-ThomasB #evaluation #learning
Data-Efficient Off-Policy Policy Evaluation for Reinforcement Learning (PST, EB), pp. 2139–2148.
KDDKDD-2016-AckermannRHKBKG #design #recommendation
Designing Policy Recommendations to Reduce Home Abandonment in Mexico (KA, EBR, SH, TAK, PvdB, RK, RG, JCG), pp. 13–20.
OOPSLAOOPSLA-2016-GollamudiC #automation #security #using
Automatic enforcement of expressive security policies using enclaves (AG, SC), pp. 494–513.
PPDPPPDP-2016-BertolissiTV #analysis #data access
Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
QAPLQAPL-2016-BergPH #energy #performance
Evaluating load balancing policies for performance and energy-efficiency (FvdB, BFP, BRH), pp. 98–117.
SASSAS-2016-AbdullaJT #automation #verification
Automated Verification of Linearization Policies (PAA, BJ, CQT), pp. 61–83.
ICSE-2016-SlavinWHHKBBN #android #detection #framework #privacy #towards
Toward a framework for detecting privacy policy violations in android application code (RS, XW, MBH, JH, RK, JB, TDB, JN0), pp. 25–36.
CASECASE-2016-MavrommatiM #automation #synthesis
Automatic synthesis of control alphabet policies (AM, TDM), pp. 313–320.
VMCAIVMCAI-2016-KarpenkovMW #program analysis
Program Analysis with Local Policy Iteration (EGK, DM, PW), pp. 127–146.
SIGMODSIGMOD-2015-UpadhyayaBS #automation
Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
EDMEDM-2015-MorettiMS #analysis #education #evaluation #sentiment #topic
Application of Sentiment and Topic Analysis to Teacher Evaluation Policy in the U.S (AM, KM, ASA), pp. 628–629.
EDMEDM-2015-RollinsonB #modelling #predict
From Predictive Models to Instructional Policies (JR, EB), pp. 179–186.
FMFM-2015-DuLT #independence #ltl #monitoring #runtime
Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL (XD, YL, AT), pp. 231–247.
GCMGCM-2015-BottoniNP #constraints #contract #modelling #using
Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
CHICHI-2015-ZhangC #modelling #predict #social #social media
Modeling Ideology and Predicting Policy Change with Social Media: Case of Same-Sex Marriage (AXZ, SC), pp. 2603–2612.
CSCWCSCW-2015-WongJ #framework
Wireless Visions: Infrastructure, Imagination, and US Spectrum Policy (RYW, SJJ), pp. 105–115.
HCIHIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #simulation #visualisation
Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
CAiSECAiSE-2015-DelmasP #requirements #verification
Need-to-Share and Non-diffusion Requirements Verification in Exchange Policies (RD, TP), pp. 151–165.
ICEISICEIS-v2-2015-OliveiraF #enterprise #framework #overview #sorting
A Spatial Data Infrastructure Review — Sorting the Actors and Policies from Enterprise Viewpoint (ILO, JLF), pp. 287–294.
ICMLICML-2015-Bou-AmmarTE #learning #sublinear
Safe Policy Search for Lifelong Reinforcement Learning with Sublinear Regret (HBA, RT, EE), pp. 2361–2369.
ICMLICML-2015-LesnerS #approximate
Non-Stationary Approximate Modified Policy Iteration (BL, BS), pp. 1567–1575.
ICMLICML-2015-SchulmanLAJM #optimisation #trust
Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
ICMLICML-2015-ThomasTG
High Confidence Policy Improvement (PST, GT, MG), pp. 2380–2388.
KDDKDD-2015-Athey #evaluation #machine learning
Machine Learning and Causal Inference for Policy Evaluation (SA), pp. 5–6.
SEKESEKE-2015-AbrantesC #exception #monitoring #specification
Specifying and Dynamically Monitoring the Exception Handling Policy (JA, RC), pp. 370–374.
SEKESEKE-2015-HuangWSQ #android #fine-grained #named #security
DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
SEKESEKE-2015-PeiYF #data access #in the cloud #performance
Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
SEKESEKE-2015-XuSZ #algorithm #testing
Fault-Based Testing of Combining Algorithms in XACML3.0 Policies (DX, NS, YZ), pp. 433–438.
SIGIRSIGIR-2015-YunHER #latency #web
Optimal Aggregation Policy for Reducing Tail Latency of Web Search (JMY, YH, SE, SR), pp. 63–72.
MoDELSMoDELS-2015-SoltanaSSB #framework #modelling #probability #simulation
A model-based framework for probabilistic simulation of legal policies (GS, NS, MS, LCB), pp. 70–79.
LOPSTRLOPSTR-2015-RiescoAA #analysis #maude #memory management #semantics #specification
Memory Policy Analysis for Semantics Specifications in Maude (AR0, IMA, MA), pp. 293–310.
POPLPOPL-2015-NgoMMP #black box #runtime #security #source code
Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
POPLPOPL-2015-PadonIKLSS
Decentralizing SDN Policies (OP, NI, AK, OL, MS, SS), pp. 663–676.
SACSAC-2015-RaniseTV #analysis #automation #constraints
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
DACDAC-2015-McLaughlin #behaviour
Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
DACDAC-2015-PengKPPJCL #3d #architecture #delivery #design
Design, packaging, and architectural policy co-optimization for DC power integrity in 3D DRAM (YP, BWK, YSP, KIP, SJJ, JSC, SKL), p. 6.
DATEDATE-2015-YinLLWG15a
Cooperatively managing dynamic writeback and insertion policies in a last-level DRAM cache (SY, JL, LL, SW, YG), pp. 187–192.
PDPPDP-2015-BasileLPZ #formal method
A Formal Model of Policy Reconciliation (CB, AL, CP, SZ), pp. 587–594.
PDPPDP-2015-DienerCN #locality
Locality vs. Balance: Exploring Data Mapping Policies on NUMA Systems (MD, EHMdC, POAN), pp. 9–16.
VMCAIVMCAI-2015-CortesiFPT #mobile #privacy #semantics #verification
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
ECSAECSA-2014-FreudenreichAFB #architecture #complexity #using
Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
ECSAECSA-2014-HorcasPF #runtime #security
Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
SIGMODSIGMOD-2014-HeMD #privacy #trade-off #using
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
IFMIFM-2014-DrossopoulouN #how #semantics
How to Break the Bank: Semantics of Capability Policies (SD, JN), pp. 18–35.
SEFMSEFM-2014-PardoS #framework #network #privacy #social
A Formal Privacy Policy Framework for Social Networks (RP, GS), pp. 378–392.
ICFPICFP-2014-SchlesingerGW #concurrent #pipes and filters
Concurrent NetCore: from policies to pipelines (CS, MG, DW), pp. 11–24.
CoGCIG-2014-EdelkampG #adaptation #physics #problem
Solving Physical Traveling Salesman Problems with policy adaptation (SE, CG), pp. 1–8.
CHICHI-2014-GrimpeHJ #design #human-computer #towards
Towards a closer dialogue between policy and practice: responsible design in HCI (BG, MH, MJ), pp. 2965–2974.
CSCWCSCW-2014-JacksonGP #design #social
The policy knot: re-integrating policy, practice and design in cscw studies of social computing (SJJ, TG, SP), pp. 588–602.
HCIDUXU-DI-2014-SpiliotopoulosDK14a #authoring #design #interface #modelling #prototype
Need Driven Prototype Design for a Policy Modeling Authoring Interface (DS, AD, DK), pp. 481–487.
ICEISICEIS-v2-2014-WeiRT #data access
Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
ECIRECIR-2014-OstroumovaBCTG #crawling #predict #web
Crawling Policies Based on Web Page Popularity Prediction (LO, IB, AC, AT, GG), pp. 100–111.
ICMLICML-c1-2014-MannM #approximate #scalability
Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations (TAM, SM), pp. 127–135.
ICMLICML-c1-2014-SilverLHDWR #algorithm
Deterministic Policy Gradient Algorithms (DS, GL, NH, TD, DW, MAR), pp. 387–395.
ICMLICML-c2-2014-Bou-AmmarERT #learning #multi #online
Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
ICMLICML-c2-2014-LevineK #learning #network #optimisation
Learning Complex Neural Network Policies with Trajectory Optimization (SL, VK), pp. 829–837.
ICMLICML-c2-2014-Scherrer #approximate #comparison
Approximate Policy Iteration Schemes: A Comparison (BS), pp. 1314–1322.
KEODKEOD-2014-KruppS0 #mobile #ontology #privacy #security
An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
SEKESEKE-2014-LiLWC #automation #data access #generative #testing
Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
SIGIRSIGIR-2014-MaLWSBWW #named #query #web
PAAP: prefetch-aware admission policies for query results cache in web search engines (HM, WL, BW, LS, XB, LW, BW), pp. 983–986.
MODELSMoDELS-2014-SongZFCS0 #adaptation #constraints #modelling
Modelling Adaptation Policies as Domain-Specific Constraints (HS, XZ, NF, FC, AS, GH), pp. 269–285.
RERE-2014-BreauxS #privacy #requirements #scalability
Scaling requirements extraction to the crowd: Experiments with privacy policies (TDB, FS), pp. 163–172.
FSEFSE-2014-JoinerRJDG #performance #weaving
Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
SACSAC-2014-YooLB #memory management
The least-dirty-first cache replacement policy for phase-change memory (SY, EL, HB), pp. 1449–1454.
ASPLOSASPLOS-2014-0001KOTRKSHC #named #security
Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
CASECASE-2014-BaDR #maintenance
Green management of Spare parts for an integrated optimal maintenance and production policy (KB, SD, NR), pp. 359–364.
CASECASE-2014-FrigerioM #energy #probability
Energy saving policies for a machine tool with warm-up, stochastic arrivals and buffer information (NF, AM), pp. 646–651.
CASECASE-2014-JinNHXC
Threshold-type admission policy for remanufacturing systems (XJ, JN, SJH, GX, QC), pp. 467–473.
CASECASE-2014-LiCW #robust
A robust (r, Q) policy for a simple VMI system with inventory inaccuracy and time-delay (ML, FTSC, ZW), pp. 652–657.
CASECASE-2014-LiDZ #social
Social incentive policies to engage commercial building occupants in demand response (SL, KD, MZ), pp. 407–412.
HPCAHPCA-2014-WangJXSX #adaptation #hybrid #migration
Adaptive placement and migration policy for an STT-RAM-based hybrid cache (ZW, DAJ, CX, GS, YX), pp. 13–24.
HPDCHPDC-2014-GerofiSHTI #memory management #named #novel
CMCP: a novel page replacement policy for system level hierarchical memory management on many-cores (BG, AS, AH, MT, YI), pp. 73–84.
PDPPDP-2014-EinzigerF #named #performance
TinyLFU: A Highly Efficient Cache Admission Policy (GE, RF), pp. 146–153.
CAVCAV-2014-ChowdhuryJGD #monitoring #privacy #runtime
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (OC, LJ, DG, AD), pp. 131–149.
CAVCAV-2014-FerraraMNP #data access #named #verification
Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
ICSTSAT-2014-AudemardS #lazy evaluation #parallel #satisfiability
Lazy Clause Exchange Policy for Parallel SAT Solvers (GA, LS), pp. 197–205.
VMCAIVMCAI-2014-Masse #ranking #termination
Policy Iteration-Based Conditional Termination and Ranking Functions (DM), pp. 453–471.
DRRDRR-2013-LipskyLN
Optimal policy for labeling training samples (LL, DPL, GN).
JCDLJCDL-2013-AinsworthN #web
Evaluating sliding and sticky target policies by measuring temporal drift in acyclic walks through a web archive (SA, MLN), pp. 39–48.
JCDLJCDL-2013-BrunelleN #evaluation
An evaluation of caching policies for memento timemaps (JFB, MLN), pp. 267–276.
TPDLTPDL-2013-MaceviciuteW #library
E-Books in Swedish Public Libraries: Policy Implications (EM, TDW), pp. 29–34.
ICSMEICSM-2013-FrancisW #debugging
Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
CoGCIG-2013-PowleyWC #monte carlo #simulation
Bandits all the way down: UCB1 as a simulation policy in Monte Carlo Tree Search (EJP, DW, PIC), pp. 1–8.
CoGCIG-2013-Thibodeau-LauferFYDB #evaluation #game studies #video
Stacked calibration of off-policy policy evaluation for video game matchmaking (ETL, RCF, LY, OD, YB), pp. 1–8.
CHICHI-2013-KangBK #design #internet #people #why
Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
CSCWCSCW-2013-JacksonSB #why
Why CSCW needs science policy (and vice versa) (SJJ, SBS, AGB), pp. 1113–1124.
HCIOCSC-2013-Meiselwitz #assessment #network #readability #social
Readability Assessment of Policies and Procedures of Social Networking Sites (GM), pp. 67–75.
CAiSECAiSE-2013-DelmasP #formal method #specification
Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
ICEISICEIS-v1-2013-KaddesABSA
Enhancement of Generalized Earliest Deadline First Policy (MK, LA, AB, BS, MA), pp. 231–238.
ICEISICEIS-v1-2013-RibeiroRBFE #coordination
Updating Strategies of Policies for Coordinating Agent Swarm in Dynamic Environments (RR, AFR, MACB, FF, FE), pp. 345–356.
ICMLICML-c1-2013-SznitmanLFJF #locality
An Optimal Policy for Target Localization with Application to Electron Microscopy (RS, AL, PIF, BJ, PF), pp. 1–9.
ICMLICML-c3-2013-ChenLZ #crowdsourcing
Optimistic Knowledge Gradient Policy for Optimal Budget Allocation in Crowdsourcing (XC, QL, DZ), pp. 64–72.
ICMLICML-c3-2013-LevineK
Guided Policy Search (SL, VK), pp. 1–9.
ICMLICML-c3-2013-PirottaRPC
Safe Policy Iteration (MP, MR, AP, DC), pp. 307–315.
ICMLICML-c3-2013-RossZYDB #learning #predict
Learning Policies for Contextual Submodular Prediction (SR, JZ, YY, DD, DB), pp. 1364–1372.
KDDKDD-2013-AsadiLB #memory management #realtime #twitter
Dynamic memory allocation policies for postings in real-time Twitter search (NA, JL, MB), pp. 1186–1194.
SEKESEKE-2013-PereiraAS #data access #relational #runtime
Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
PPDPPPDP-2013-StewartBN #data flow #data type #dependent type #semistructured data
Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
RERE-2013-MasseyEAS #analysis #automation #documentation #mining #requirements
Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
ICSEICSE-2013-Slankas #data access #database #implementation #natural language
Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
SACSAC-2013-ProvensiEVR #adaptation #fuzzy #streaming #using #video
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SACSAC-2013-Schefer-WenzlS #information management
Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
CASECASE-2013-FrigerioM #energy
Machine control policies for energy saving in manufacturing (NF, AM), pp. 651–656.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #using
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASECASE-2013-SinhaK #constraints
Production and subcontracting policies for assemble-to-order systems with service level constraints (AKS, AK), pp. 570–575.
CASECASE-2013-TanTL #resource management
Improving patient length-of-stay in emergency department through dynamic resource allocation policies (KWT, WHT, HCL), pp. 984–989.
CASECASE-2013-WangC #multi #robust
A robust production control policy for a multiple-stage production system with inventory inaccuracy and time-delay (ZW, FTSC), pp. 77–82.
CASECASE-2013-WangJLC #capacity
Integrated capacity allocation policies for a production service system with two-class customers and items (KW, ZJ, GL, JC), pp. 83–88.
CASECASE-2013-WuCY #analysis #reachability
A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASECASE-2013-YueH13a #assembly #concurrent #petri net #polynomial #process
A polynomial deadlock avoidance policy for a class of assembly processes based on Petri nets (HY, HH), pp. 1151–1156.
CCCC-2013-MooreC #automation #generative #machine learning #using
Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
DATEDATE-2013-GiraoSW #clustering
Exploring resource mapping policies for dynamic clustering on NoC-based MPSoCs (GG, TS, FRW), pp. 681–684.
DATEDATE-2013-GoossensAG #memory management
Conservative open-page policy for mixed time-criticality memory controllers (SG, BA, KG), pp. 525–530.
DATEDATE-2013-Milano #challenge #energy #research
Sustainable energy policies: research challenges and opportunities (MM), pp. 1143–1148.
DATEDATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #using
Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATEDATE-2013-WangDX #named
OAP: an obstruction-aware cache management policy for STT-RAM last-level caches (JW, XD, YX), pp. 847–852.
HPCAHPCA-2013-DasAMKA #manycore #memory management
Application-to-core mapping policies to reduce memory system interference in multi-core systems (RD, RA, OM, AK, MA), pp. 107–118.
TACASTACAS-2013-FerraraMP #analysis #data access #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-KoleiniRR #data access #model checking
Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
ICSTICST-2013-BertolinoBDKLM #design #testing
A Toolchain for Designing and Testing XACML Policies (AB, MB, SD, NK, FL, EM), pp. 495–496.
FDGFDG-2012-PettitH #learning #simulation
Evolutionary learning of policies for MCTS simulations (JP, DPH), pp. 212–219.
ICEISICEIS-v3-2012-CarvalhoRACJDM #energy #network #performance #towards
Towards Sustainable Networks — Energy Efficiency Policy from Business to Device Instance Levels (TCMBC, ACR, MA, CHAC, GCJ, CKD, CM), pp. 238–243.
ICMLICML-2012-CastroTM
Policy Gradients with Variance Related Risk Criteria (DDC, AT, SM), p. 215.
ICMLICML-2012-DekelTA #adaptation #learning #online
Online Bandit Learning against an Adaptive Adversary: from Regret to Policy Regret (OD, AT, RA), p. 227.
ICMLICML-2012-KalakrishnanRPS #learning
Learning Force Control Policies for Compliant Robotic Manipulation (MK, LR, PP, SS), p. 10.
ICMLICML-2012-ScherrerGGG #approximate
Approximate Modified Policy Iteration (BS, VG, MG, MG), p. 245.
ICMLICML-2012-StulpS #adaptation #matrix
Path Integral Policy Improvement with Covariance Matrix Adaptation (FS, OS), p. 201.
SEKESEKE-2012-MaarabaniAC #security #testing
Testing Interoperability Security Policies (MEM, CA, ARC), pp. 464–469.
OOPSLAOOPSLA-2012-Anderson #fine-grained #parallel #resource management #using
Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
TOOLSTOOLS-EUROPE-2012-CatanoHR #formal method #named #network #privacy #social
Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
PADLPADL-2012-Coleman #classification #distributed #specification
Distributed Policy Specification and Interpretation with Classified Advertisements (NC), pp. 198–211.
POPLPOPL-2012-YangYS #automation #privacy
A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
ASEASE-2012-HwangXKMT #evolution #security #testing
Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
FSEFSE-2012-XiaoPTX #automation #documentation #security
Automated extraction of security policies from natural-language software documents (XX, AMP, ST, TX), p. 12.
SACSAC-2012-AnwarF #data access #network #social #visualisation
A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
SACSAC-2012-BartschS #approach
Guiding decisions on authorization policies: a participatory approach to decision support (SB, MAS), pp. 1502–1507.
SACSAC-2012-BeusterG #modelling #security #smarttech
Formal security policy models for smart card evaluations (GB, KG), pp. 1640–1642.
SACSAC-2012-InzingerSHLD #adaptation #optimisation
Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
CASECASE-2012-HanXZLW #concurrent
Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
CASECASE-2012-LiJJ
A pull VPLs based release policy and dispatching rule for semiconductor wafer fabrication (YL, ZJ, WJ), pp. 396–400.
CASECASE-2012-SharabianiD
Observation policies for patient and resource tracking in outpatient clinics (AS, HD), pp. 532–537.
DATEDATE-2012-YangGBSC #game studies #graph #resource management
Playing games with scenario- and resource-aware SDF graphs through policy iteration (YY, MG, TB, SS, HC), pp. 194–199.
HPCAHPCA-2012-LeeK #architecture #cpu #gpu #named
TAP: A TLP-aware cache management policy for a CPU-GPU heterogeneous architecture (JL, HK), pp. 91–102.
ISMMISMM-2012-ZhouD #configuration management #locality #manycore #memory management
Memory management for many-core processors with software configurable locality policies (JZ, BD), pp. 3–14.
PDPPDP-2012-AzampanahKBJS #adaptation #named #tex
LATEX: New Selection Policy for Adaptive Routing in Application-Specific NoC (SA, AK, NB, MJ, RS), pp. 515–519.
CAVCAV-2012-FredriksonJJRPSY #abstraction #performance #refinement #runtime #using
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICSTICST-2012-BertolinoDLM #automation #generative #testing
Automatic XACML Requests Generation for Policy Testing (AB, SD, FL, EM), pp. 842–849.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
HTHT-2011-SquicciariniSLW #adaptation #image #named #predict #resource management
A3P: adaptive policy prediction for shared images over popular content sharing sites (ACS, SS, DL, JW), pp. 261–270.
JCDLJCDL-2011-WingetS #development #documentation #game studies
Game development documentation and institutional collection development policy (MAW, WWS), pp. 29–38.
VLDBVLDB-2011-AtaullahT #database #modelling
Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
SEFMSEFM-2011-Pedercini #communication #modelling #process
Models and Communication in the Policy Process (MP), pp. 35–37.
SEFMSEFM-2011-Pedercini11a #analysis #development
Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
AIIDEAIIDE-2011-TastanS #game studies #learning #using
Learning Policies for First Person Shooter Games Using Inverse Reinforcement Learning (BT, GRS).
CoGCIG-2011-SarjantPDS #game studies #online #relational #using
Using the online cross-entropy method to learn relational policies for playing different games (SS, BP, KD, TS), pp. 182–189.
CoGVS-Games-2011-KardaraFAPTV #architecture #simulation
A Service Oriented Architecture Enabling Policy Simulation in Virtual Spaces (MK, OF, FA, AP, KT, TAV), pp. 236–243.
GCMGCM-2010-BottoniFP11 #constraints #incremental
Incremental update of constraint-compliant policy rules (PB, AF, FPP).
CHICHI-2011-KomanduriSKMBCCE #people
Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
CSCWCSCW-2011-SantosSCKSRRT #open source
Intellectual property policy and attractiveness: a longitudinal study of free and open source software projects (CDSJ, MBC, FK, JS, VR, DR, TT), pp. 705–708.
ICEISICEIS-v2-2011-LiQLZ #research #simulation
Research and Demonstration of Agricultural Policy Simulation based on CGE Model (ZL, QQ, YL, DZ), pp. 13–17.
ICEISICEIS-v3-2011-ZhangZZY
Inventory Management Policies of Gold Jewelry Retailers (JZ, YZ, ZZ, HY), pp. 517–522.
ICEISICEIS-v4-2011-YangZZZ
Urban Motor Vehicle Limiting Policy based on System Dynamics (HY, ZZ, YZ, HZ), pp. 539–542.
ICMLICML-2011-BazzaniFLMT #learning #network #recognition #video
Learning attentional policies for tracking and recognition in video with deep networks (LB, NdF, HL, VM, JAT), pp. 937–944.
ICMLICML-2011-DeisenrothR #approach #modelling #named
PILCO: A Model-Based and Data-Efficient Approach to Policy Search (MPD, CER), pp. 465–472.
ICMLICML-2011-DudikLL #evaluation #learning #robust
Doubly Robust Policy Evaluation and Learning (MD, JL, LL), pp. 1097–1104.
ICMLICML-2011-GabillonLGS #classification
Classification-based Policy Iteration with a Critic (VG, AL, MG, BS), pp. 1049–1056.
ICMLICML-2011-LiuLC #infinity #representation
The Infinite Regionalized Policy Representation (ML, XL, LC), pp. 769–776.
ICMLICML-2011-Neumann
Variational Inference for Policy Search in changing situations (GN), pp. 817–824.
KEODKEOD-2011-KhuratS #approach #ontology #verification
An Ontological Approach to Verifying P3P Policies (AK, BS), pp. 349–353.
SEKESEKE-2011-RomeikatBS #modelling
Modeling of Domain-Specific ECA Policies (RR, BB, HS), pp. 52–58.
OOPSLAOOPSLA-2011-Kulkarni #compilation #jit
JIT compilation policy for modern machines (PAK), pp. 773–788.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #security #using
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
PPDPPPDP-2011-BourdierC #analysis #network #security #term rewriting #using
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
SACSAC-2011-ShiC #authoring #data access #interface #natural language
A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
CASECASE-2011-NazeemR #classification #concurrent #design #resource management
Designing maximally permissive deadlock avoidance policies for sequential resource allocation systems through classification theory (AN, SAR), pp. 405–412.
DACDAC-2011-WangXAP #classification #learning #power management #using
Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
ESOPESOP-2011-JensenKP
Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
CADECADE-2011-AlbertiAR #analysis #automation #named #security
ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
DocEngDocEng-2010-SimskeB #automation #named
APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
VLDBVLDB-2010-YiuUST #detection #mobile #performance #proximity #self
Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
ICALPICALP-v2-2010-Fearnley #bound #exponential
Exponential Lower Bounds for Policy Iteration (JF), pp. 551–562.
CHICHI-2010-InglesantS #cost analysis
The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
CHICHI-2010-LipfordWWFR #comparison #interface #privacy #visual notation
Visual vs. compact: a comparison of privacy policy interfaces (HRL, JW, MW, KF, RWR), pp. 1111–1114.
CAiSECAiSE-2010-GaaloulZCG
Dynamic Authorisation Policies for Event-Based Task Delegation (KG, EZ, FC, CG), pp. 135–149.
ICEISICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #security
Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
CIKMCIKM-2010-KulkarniC #distributed #documentation
Document allocation policies for selective searching of distributed indexes (AK, JC), pp. 449–458.
ICMLICML-2010-LazaricGM #algorithm #analysis #classification
Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
ICMLICML-2010-ThieryS #problem #trade-off
Least-Squares Policy Iteration: Bias-Variance Trade-off in Control Problems (CT, BS), pp. 1071–1078.
KEODKEOD-2010-Occelli
Reconciling Tempus and Hora — Policy Knowledge in an Information Wired Environment (SO), pp. 213–217.
MODELSMoDELS-v2-2010-MorinKKJ #aspect-oriented #flexibility #modelling
Flexible Model Element Introduction Policies for Aspect-Oriented Modeling (BM, JK, JK, JMJ), pp. 63–77.
POPLPOPL-2010-MartinHCAC #c #c++ #concurrent #source code
Dynamically checking ownership policies in concurrent c/c++ programs (JPM, MH, MC, PA, MC), pp. 457–470.
RERE-2010-YoungA #identification #requirements
A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
ICSEICSE-2010-WangZ #case study #development #multi
Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
SACSAC-2010-BaffaC #generative #modelling #simulation
Modeling POMDPs for generating and simulating stock investment policies (ACEB, AEMC), pp. 2394–2399.
SACSAC-2010-ClaycombLSK #network #security
A group-based security policy for wireless sensor networks (WC, RL, DS, BK), pp. 778–785.
SACSAC-2010-LeePKKS #hybrid #network #retrieval
A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks (JL, GLP, SWK, HJK, SYS), pp. 189–193.
CASECASE-2010-FengZL #evaluation #multi #performance #scheduling
Performance evaluation of a multi-product system with setups and dynamic scheduling policies (WF, LZ, NL), pp. 960–965.
CASECASE-2010-SinghR #clustering #energy #optimisation
Energy optimization policies for server clusters (NS, SR), pp. 293–300.
DACDAC-2010-HaquePJP #approach #embedded #named #performance #simulation
SCUD: a fast single-pass L1 cache simulation approach for embedded processors with round-robin replacement policy (MSH, JP, AJ, SP), pp. 356–361.
DATEDATE-2010-HaquePJP #approach #embedded #named #performance #simulation
DEW: A fast level 1 cache simulation approach for embedded processors with FIFO replacement policy (MSH, JP, AJ, SP), pp. 496–501.
DATEDATE-2010-JanapsatyaIPP #adaptation #algorithm
Dueling CLOCK: Adaptive cache replacement policy based on the CLOCK algorithm (AJ, AI, JP, SP), pp. 920–925.
OSDIOSDI-2010-Chlipala #security #static analysis
Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications (AC), pp. 105–118.
PDPPDP-2010-BasileLV #independence #specification #towards
Towards a Network-Independent Policy Specification (CB, AL, MV), pp. 649–653.
ESOPESOP-2010-AdjeGG #invariant #static analysis
Coupling Policy Iteration with Semi-definite Relaxation to Compute Accurate Numerical Invariants in Static Analysis (AA, SG, EG), pp. 23–42.
ESOPESOP-2010-SwamyCC #data flow
Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
CAVCAV-2010-BasinKM #first-order #logic #monitoring
Policy Monitoring in First-Order Temporal Logic (DAB, FK, SM), pp. 1–18.
ICSTICST-2010-BruckerBKW #generative #testing
Verified Firewall Policy Transformations for Test Case Generation (ADB, LB, PK, BW), pp. 345–354.
ICPCICPC-2009-HuangDS #prototype #source code
Prototyping synchronization policies for existing programs (YH, LKD, REKS), pp. 289–290.
LATALATA-2009-BaaderBT
Matching Trace Patterns with Regular Policies (FB, AB, AT), pp. 105–116.
CoGCIG-2009-GalliLL #learning
Learning a context-aware weapon selection policy for Unreal Tournament III (LG, DL, PLL), pp. 310–316.
FDGFDG-2009-Greene #social
Waging wars in wangba: political policy and social practice in Chinese MMO culture (MG), pp. 342–343.
EDOCEDOC-2009-GovernatoriI #modelling #network #reasoning #social
Modelling and Reasoning Languages for Social Networks Policies (GG, RI), pp. 193–200.
ICEISICEIS-ISAS-2009-EdgeSPC #compilation #specification
Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
ICEISICEIS-ISAS-2009-FerriniB #approach
A Comprehensive Approach for Solving Policy Heterogeneity (RF, EB), pp. 63–68.
ICMLICML-2009-BoulariasC #predict
Predictive representations for policy gradient in POMDPs (AB, BCd), pp. 65–72.
ICMLICML-2009-Heidrich-MeisnerI
Hoeffding and Bernstein races for selecting policies in evolutionary direct policy search (VHM, CI), pp. 401–408.
ICMLICML-2009-PazisL #learning
Binary action search for learning continuous-action control policies (JP, MGL), pp. 793–800.
SEKESEKE-2009-KulkarniCZ #framework #monitoring #named #online
iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
SIGIRSIGIR-2009-FetterlyCV #effectiveness #web
The impact of crawl policy on web search effectiveness (DF, NC, VV), pp. 580–587.
AdaSIGAda-2009-TijeroG #ada #experience #middleware #scheduling
Experience in integrating interchangeable scheduling policies into a distribution middleware for Ada (HPT, JJG), pp. 73–78.
SACSAC-2009-ChiangWLC #clustering #multi #web
New content-aware request distribution policies in web clusters providing multiple services (MLC, CHW, YJL, YFC), pp. 79–83.
SACSAC-2009-MarconSLS #architecture
Policy management architecture based on provisioning model and authorization certificates (ALMJ, AOS, LAdPLJ, MS), pp. 1594–1598.
SACSAC-2009-YokoyamaHSK #internet #operating system #security
Simplifying security policy descriptions for internet servers in secure operating systems (TY, MH, MS, KK), pp. 326–333.
DATEDATE-2009-SubramanianGD #adaptation #configuration management #design #embedded #grid #network #online
Online adaptation policy design for grid sensor networks with reconfigurable embedded nodes (VS, MG, AD), pp. 1273–1278.
HPCAHPCA-2009-Chaudhuri #locality #multi #named #scalability
PageNUCA: Selected policies for page-grain locality management in large shared chip-multiprocessor caches (MC), pp. 227–238.
ISMMISMM-2009-GuanSJ #performance #using
Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
LCTESLCTES-2009-CaspiCGPR #memory management #scheduling
Synchronous objects with scheduling policies: introducing safe shared memory in lustre (PC, JLC, LG, MP, PR), pp. 11–20.
ESOPESOP-2009-RajanTSL #composition #design #named #verification #web #web service
Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services (HR, JT, SMS, GTL), pp. 333–347.
TACASTACAS-2009-GofmanLSZYS #analysis #data access #named
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
ICSTICST-2009-MouelhiTB #functional #security #testing
Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
ICSTSAT-2009-NikolicMJ #satisfiability
Instance-Based Selection of Policies for SAT Solvers (MN, FM, PJ), pp. 326–340.
ICSTSAT-2009-PipatsrisawatD #satisfiability
Width-Based Restart Policies for Clause-Learning Satisfiability Solvers (KP, AD), pp. 341–355.
CBSECBSE-2008-RusselloMD #component #framework #named
ESCAPE: A Component-Based Policy Framework for Sense and React Applications (GR, LM, ND), pp. 212–229.
ICALPICALP-C-2008-GoyalJPS #bound #encryption
Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
SEFMSEFM-2008-SalasK #modelling #privacy #testing #using
Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFMSEFM-2008-TschantzW
Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
CHICHI-2008-BauerCRRV #case study #flexibility #user study
A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
CHICHI-2008-ButlerJP #wiki
Don’t look now, but we’ve created a bureaucracy: the nature and roles of policies and rules in wikipedia (BSB, EJ, JP), pp. 1101–1110.
CHICHI-2008-ReederBCRBHS #authoring #security #visualisation
Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
ICEISICEIS-DISI-2008-MuldnerML #data access #dataset #xml
Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
ICMLICML-2008-BarrettN #learning #multi
Learning all optimal policies with multiple criteria (LB, SN), pp. 41–47.
ICMLICML-2008-KerstingD #parametricity #relational
Non-parametric policy gradients: a unified treatment of propositional and relational domains (KK, KD), pp. 456–463.
ICMLICML-2008-UenoKMMI #approach #evaluation #statistics
A semiparametric statistical approach to model-free policy evaluation (TU, MK, TM, SiM, SI), pp. 1072–1079.
KRKR-2008-MartinezPPSS #consistency #nondeterminism
Inconsistency Management Policies (MVM, FP, AP, GIS, VSS), pp. 367–377.
MODELSMoDELS-2008-CombemaleBCDH #domain-specific language #specification #uml
Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
MODELSMoDELS-2008-MouelhiFBT #deployment #framework #modelling #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MODELSMoDELS-2008-RosseboR #composition #specification #uml #using
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-CombemaleBCDH #domain-specific language #specification #uml
Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
MODELSMoDELS-2008-MouelhiFBT #deployment #framework #modelling #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MODELSMoDELS-2008-RosseboR #composition #specification #uml #using
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
PADLPADL-2008-BeckerN #abduction #declarative
The Role of Abduction in Declarative Authorization Policies (MYB, SN), pp. 84–99.
PPDPPPDP-2008-BertolissiF #composition #data access #framework
A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
ASEASE-2008-ChauvelBBJ #adaptation #composition
Composition of Qualitative Adaptation Policies (FC, OB, IB, JMJ), pp. 455–458.
SACSAC-2008-BaveraB #analysis #bytecode #data flow #type system
Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
SACSAC-2008-BrotoHSPT #specification
Autonomic management policy specification in Tune (LB, DH, PS, NDP, ST), pp. 1658–1663.
DATEDATE-2008-MassasP #comparison #manycore #memory management
Comparison of memory write policies for NoC based Multicore Cache Coherent Systems (PGdM, FP), pp. 997–1002.
DATEDATE-2008-MulasPBCABAM #architecture #multi #streaming
Thermal Balancing Policy for Streaming Computing on Multiprocessor Architectures (FM, MP, MB, SC, AA, LB, DA, GDM), pp. 734–739.
LCTESLCTES-2008-ReinekeG #analysis
Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #security #using
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
ICLPICLP-2008-BeniniBM #constraints #multi #platform #programming #resource management #using
Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLPICLP-2008-GelfondL
Authorization and Obligation Policies in Dynamic Systems (MG, JL), pp. 22–36.
ICSTICST-2008-PretschnerMT #data access #modelling #testing
Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
TPDLECDL-2007-KoulourisK
Policy Decision Tree for Academic Digital Collections (AK, SK), pp. 481–484.
SIGMODSIGMOD-2007-QiaoSFPCBK #database #framework
A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
IFMIFM-2007-BraghinSB #automation #mobile #security #verification
Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
LISPILC-2007-WozniakDW #abstraction #data type
Dynamic ADTs: a “don’t ask, don’t tell” policy for data abstraction (GW, MD, SW), p. 26.
HCIHIMI-IIE-2007-KrachinaRT #ontology #perspective #privacy #semantics
Reconciling Privacy Policies and Regulations: Ontological Semantics Perspective (OK, VR, KET), pp. 730–739.
HCIHIMI-IIE-2007-VuCGCSNPP #how #privacy
How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
CAiSECAiSE-2007-BaresiGP #aspect-oriented #process
Policies and Aspects for the Supervision of BPEL Processes (LB, SG, PP), pp. 340–354.
CAiSECAiSE-2007-MaamarNBS #transaction #web #web service
Policies for Context-Driven Transactional Web Services (ZM, NCN, DB, SS), pp. 249–263.
ICEISICEIS-DISI-2007-BarkerD #algebra #information management
Secure knowledge exchange by policy algebra and erml (SB, PD), pp. 212–217.
ICEISICEIS-SAIC-2007-LazanasKK #hybrid #recommendation #web #web service
Applying Hybrid Recommendation Policies through Agent-Invoked Web Services in E-Markets (AL, NIK, VK), pp. 161–166.
CIKMCIKM-2007-TanMG #clustering #crawling #design #web
Designing clustering-based web crawling policies for search engine crawlers (QT, PM, CLG), pp. 535–544.
SIGIRSIGIR-2007-NtoulasC #correctness
Pruning policies for two-tiered inverted index with correctness guarantee (AN, JC), pp. 191–198.
PPDPPPDP-2007-HristovaTL #analysis #performance #trust
Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
ICSEICSE-2007-PistoiaFFY #enterprise #modelling #security #validation
When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
SACSAC-2007-KumarMS #mobile
A weighted cache replacement policy for location dependent data in mobile environments (AK, MM, AKS), pp. 920–924.
SACSAC-2007-OrlovskyR #distributed #security
Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
CASECASE-2007-ReveliotisR0 #algebra #concurrent #correctness #programming #verification
Correctness Verification of Generalized Algebraic Deadlock Avoidance Policies through Mathematical Programming (SR, ER, JYC), pp. 200–206.
HPCAHPCA-2007-EyermanE #parallel #smt
A Memory-Level Parallelism Aware Fetch Policy for SMT Processors (SE, LE), pp. 240–249.
ISMMISMM-2007-XianSJ #concurrent #garbage collection #performance #scheduling #thread
Allocation-phase aware thread scheduling policies to improve garbage collection performance (FX, WSa, HJ), pp. 79–90.
ESOPESOP-2007-GaubertGTZ #relational #static analysis
Static Analysis by Policy Iteration on Relational Domains (SG, EG, AT, SZ), pp. 237–252.
CSLCSL-2007-Goller #complexity #on the #reasoning
On the Complexity of Reasoning About Dynamic Policies (SG), pp. 358–373.
CBSECBSE-2006-GoeminneJTDG #framework #platform
Service Policy Enhancements for the OSGi Service Platform (NG, GDJ, FDT, BD, FG), pp. 238–253.
HTHT-2006-McCownN #crawling #evaluation
Evaluation of crawling policies for a web-repository crawler (FM, MLN), pp. 157–168.
VLDBVLDB-2006-Song
IT839 Policy Leading to u-Korea (JHS), p. 1103.
CHICHI-2006-KaratKBF #authoring #interface #privacy
Evaluating interfaces for privacy policy rule authoring (CMK, JK, CB, JF), pp. 83–92.
EDOCEDOC-2006-LiG
Composing Administrative Scope of Delegation Policies based on extended XACML (XFL, DF), pp. 467–470.
ICEISICEIS-ISAS-2006-BenferhatB #security
Argument-Based Approaches in Prioritized Conflicting Security Policies (SB, REB), pp. 349–354.
ICEISICEIS-SAIC-2006-SattanathanNMM #web #web service
Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
ICMLICML-2006-BowlingMJNW #learning #predict #using
Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICMLICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #process #using
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICPRICPR-v3-2006-IsukapalliE #identification #learning
Learning Policies for Efficiently Identifying Objects of Many Classes (RI, AME, RG), pp. 356–361.
KRKR-2006-Coste-MarquisFLBM #quantifier #representation
Representing Policies for Quantified Boolean Formulae (SCM, HF, JL, DLB, PM), pp. 286–297.
AdaEuropeAdaEurope-2006-CamposGH #middleware #realtime #scheduling
Interchangeable Scheduling Policies in Real-Time Middleware for Distribution (JLC, JJG, MGH), pp. 227–240.
SACSAC-2006-LeongG
Improving the performances of proxy cache replacement policies by considering infrequent objects (HWL, BG), pp. 791–796.
SACSAC-2006-WelchL #security
Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
CASECASE-2006-XingTXH #complexity #concurrent #flexibility #polynomial
Optimal Polynomial Complexity Deadlock Avoidance Policies for Manufacturing Systems with Flexible Routings (KX, FT, HX, BH), pp. 448–453.
DATEDATE-2006-PettisRL #automation #operating system #runtime
Automatic run-time selection of power policies for operating systems (NP, JR, YHL), pp. 508–513.
HPDCHPDC-2006-BaiardiRMV #monitoring #virtual machine
Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
OSDIOSDI-2006-KimR #interface #network
Connection Handoff Policies for TCP Offload Network Interfaces (HyK, SR), pp. 293–306.
ESOPESOP-2006-BrobergS #calculus #towards
Flow Locks: Towards a Core Calculus for Dynamic Flow Policies (NB, DS), pp. 180–196.
FoSSaCSFoSSaCS-2006-PitcherR
Dynamic Policy Discovery with Remote Attestation (CP, JR), pp. 111–125.
FATESFATES-RV-2006-FalconeFMR #calculus #framework #network #security
A Test Calculus Framework Applied to Network Security Policies (YF, JCF, LM, JLR), pp. 55–69.
IJCARIJCAR-2006-DoughertyFK #reasoning #specification
Specifying and Reasoning About Dynamic Access-Control Policies (DJD, KF, SK), pp. 632–646.
DocEngDocEng-2005-GenevesR #compilation #streaming #xpath
Compiling XPath for streaming access policy (PG, KHR), pp. 52–54.
TPDLECDL-2005-KoulourisK
Policy Model for University Digital Collections (AK, SK), pp. 356–367.
TPDLECDL-2005-KoulourisK05a
Policy Model for National and Academic Digital Collections (AK, SK), pp. 525–526.
SEFMSEFM-2005-WilsonMC #approach #configuration management #flexibility #verification
Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification (TW, SM, RGC), pp. 150–159.
ICEISICEIS-v1-2005-EzekielM #health
An Integrated Decision Support Tool for EU Policies on Health, Transport and Artistic Heritage Recovery (KE, FM), pp. 261–266.
ICEISICEIS-v3-2005-KurumaH #community
A Model for Policy Based Service Community (HK, SH), pp. 360–366.
AdaEuropeAdaEurope-2005-RivasMH #ada #scheduling
Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks (MAR, JM, MGH), pp. 220–235.
PLDIPLDI-2005-BauerLW #security
Composing security policies with polymer (LB, JL, DW), pp. 305–314.
POPLPOPL-2005-LiZ
Downgrading policies and relaxed noninterference (PL, SZ), pp. 158–170.
PPDPPPDP-2005-EchahedP #declarative #security
Security policy in a declarative style (RE, FP), pp. 153–163.
RERE-2005-Corniou #challenge #information management
The Role of Information Systems within Corporate Strategy and Management Policies: New Challenges (JPC), p. 4.
RERE-2005-CrookIN #modelling #on the
On Modelling Access Policies: Relating Roles to their Organisational Context (RC, DCI, BN), pp. 157–166.
ICSEICSE-2005-ChinKQPN #alias #safety #verification
Verifying safety policies with size properties and alias controls (WNC, SCK, SQ, CP, HHN), pp. 186–195.
ICSEICSE-2005-FislerKMT #impact analysis #verification
Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
SACSAC-2005-MendoncaS #empirical #evaluation #web #web service
An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
SACSAC-2005-NeisseAGT #network
Policies translation for integrated management of grids and networks (RN, MJBA, LZG, LMRT), pp. 724–729.
SACSAC-2005-SohrDA #information management #security #specification
Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
SACSAC-2005-Ungureanu #enterprise #performance
Efficient support for enterprise delegation policies (VU), pp. 340–345.
CASECASE-2005-WeiL #concurrent #programming #using
A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
LCTESLCTES-2005-XuZRMM #clustering #embedded #energy
Energy-efficient policies for embedded clusters (RX, DZ, CR, RGM, DM), pp. 1–10.
ESOPESOP-2005-FournetGM
A Type Discipline for Authorization Policies (CF, ADG, SM), pp. 141–156.
ESOPESOP-2005-Myers #programming #security
Programming with Explicit Security Policies (ACM), pp. 1–4.
FoSSaCSFoSSaCS-2005-BartolettDF #data access
History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
CAVCAV-2005-CostanGGMP #algorithm #fixpoint #source code #static analysis
A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs (AC, SG, EG, MM, SP), pp. 462–475.
TPDLECDL-2004-Holmstrom #paradigm #privacy #standard
Managing a Paradigm Shift — Aligning Management, Privacy Policy, Technology and Standards (JH), pp. 442–451.
TPDLECDL-2004-WeissmanL #towards
Towards a Policy Language for Humans and Computers (VW, CL), pp. 513–525.
SIGMODSIGMOD-2004-Hall #challenge #requirements
Requirements and Policy Challenges in Highly Secure Environments (DEH), pp. 897–898.
CHICHI-2004-JensenP #evaluation #online #privacy #tool support
Privacy policies as decision-making tools: an evaluation of online privacy notices (CJ, CP), pp. 471–478.
CSCWCSCW-2004-MorrisRSFV #coordination #multi #protocol #social
Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
ICMLICML-2004-Strens #performance
Efficient hierarchical MCMC for policy search (MJAS).
KRKR-2004-BaralE #algorithm #polynomial
A Polynomial-Time Algorithm for Constructing k-Maintainable Policies (CB, TE), pp. 720–730.
ECOOPECOOP-2004-AldrichC #alias
Ownership Domains: Separating Aliasing Policy from Mechanism (JA, CC), pp. 1–25.
ECOOPECOOP-2004-ScharliDNW #composition #encapsulation
Composable Encapsulation Policies (NS, SD, ON, RW), pp. 26–50.
AdaEuropeAdaEurope-2004-MinguetFGB #ada #scheduling
Mixing Scheduling Policies in Ada (AEM, AGF, VLG, ATB), pp. 273–282.
ICSEICSE-2004-LingenH #composition #configuration management #framework
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition (RvdL, AvdH), pp. 573–582.
ICSEICSE-2004-WohlstadterTMRD #interactive #middleware #named
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions (EW, ST, TAM, IR, PTD), pp. 189–199.
SACSAC-2004-BackesKBS #comparison #enterprise #performance #privacy
Efficient comparison of enterprise privacy policies (MB, GK, WB, MS), pp. 375–382.
SACSAC-2004-ParkerC #protocol
Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
ISMMISMM-2004-Smaragdakis #adaptation
General adaptive replacement policies (YS), pp. 108–119.
FoSSaCSFoSSaCS-2004-PucellaW #reasoning
Reasoning about Dynamic Policies (RP, VW), pp. 453–467.
ITiCSEITiCSE-2003-GrangerL #internet
Classroom discussions: policies and responsibilities of Internet Service Providers (MJG, JCL), pp. 99–103.
FMFME-2003-DenneyF #correctness #safety
Correctness of Source-Level Safety Policies (ED, BF), pp. 894–913.
ICEISICEIS-v4-2003-KammanahalliSGV
A Time Zone Based Dynamic Cache Replacement Policy (HK, KS, SG, SV), pp. 494–497.
ICEISICEIS-v4-2003-RoqueOL #component #composition #visual notation
Policies Composition Through Graphical Components (VR, JLO, RPL), pp. 464–467.
ICMLICML-2003-GhavamzadehM #algorithm
Hierarchical Policy Gradient Algorithms (MG, SM), pp. 226–233.
ICMLICML-2003-MannorRG #performance
The Cross Entropy Method for Fast Policy Search (SM, RYR, YG), pp. 512–519.
ICMLICML-2003-Munos #approximate #bound #fault
Error Bounds for Approximate Policy Iteration (RM), pp. 560–567.
ICMLICML-2003-WangD #learning #modelling
Model-based Policy Gradient Reinforcement Learning (XW, TGD), pp. 776–783.
UMLUML-2003-AlghathbarW #case study #consistency #data access
Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
AdaEuropeAdaEurope-2003-BurnsHW #ada #scheduling
A Round Robin Scheduling Policy for Ada (AB, MGH, AJW), pp. 334–343.
REFSQREFSQ-J-2002-AntonEC03 #behaviour #privacy #requirements #security
Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
REFSQREFSQ-J-2002-CrookIN03 #modelling #requirements #using
Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
RERE-2003-KaiyaSMK #analysis #java #mobile #requirements #security #trade-off
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
SACSAC-2003-MucciniM #coordination #elicitation #requirements
Eliciting Coordination Policies from Requirements (HM, FM), pp. 387–393.
DACDAC-2003-MeyerowitzPS #realtime #scheduling
A tool for describing and evaluating hierarchical real-time bus scheduling policies (TM, CP, ALSV), pp. 312–317.
HPCAHPCA-2003-El-MoursyA #performance #smt
Front-End Policies for Improved Issue Efficiency in SMT Processors (AEM, DHA), pp. 31–40.
HPDCHPDC-2003-BucurE #clustering #multi #simulation
Trace-Based Simulations of Processor Co-Allocation Policies in Multiclusters (AIDB, DHJE), pp. 70–79.
HPDCHPDC-2003-RamanLS #resource management
Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching (RR, ML, MHS), pp. 80–89.
HPDCHPDC-2003-SievertC #process
Policies for Swapping MPI Processes (OS, HC), pp. 104–113.
PDPPDP-2003-VerdosciaS #communication
CODACS Project: Level-Node Communication Policies (LV, US), pp. 134–139.
SOSPSOSP-2003-Arpaci-DusseauABDEGNP #kernel
Transforming policies into mechanisms with infokernel (ACAD, RHAD, NCB, TED, TJE, HSG, JAN, FIP), pp. 90–105.
FASEFASE-2003-KochP #specification #verification #visual notation
Visual Specifications of Policies and Their Verification (MK, FPP), pp. 278–293.
FASEFASE-2003-ScottBM #mobile #security
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment (DJS, ARB, AM), pp. 102–117.
CBSECBSE-2003-VecellioT #framework #predict
Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
HTHT-2002-TataGW #concept #hypermedia #implementation #prototype
Policies for cooperative hypermedia systems: concepts and prototype implementation (ST, CG, UKW), pp. 140–141.
JCDLJCDL-2002-Heidorn #implementation
Biodiversity and biocomplexity informatics: policy and implementation science versus citizen science (PBH), pp. 362–364.
VLDBVLDB-2002-BettiniJWW #security
Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
VLDBVLDB-2002-SeifertS #hybrid #multi
A Multi-version Cache Replacement and Prefetching Policy for Hybrid Data Delivery Environments (AS, MHS), pp. 850–861.
ICGTICGT-2002-KochP #constraints #graph
Describing Policies with Graph Constraints and Rules (MK, FPP), pp. 223–238.
ICSEICSE-2002-GreenhouseS #concurrent #evolution #source code
Assuring and evolving concurrent programs: annotations and policy (AG, WLS), pp. 453–463.
SACSAC-2002-Bell #interactive #security #simulation
Interactive simulation of security policies (GB), pp. 247–252.
FoSSaCSFoSSaCS-2002-KochMP #data access #detection #specification
Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
JCDLJCDL-2001-Khoo #analysis #community #design #overview
Community design of DLESE’s collections review policy: a technological frames analysis (MK), pp. 157–164.
EDOCEDOC-2001-DunlopIR #enterprise #evolution #scalability
Dynamic Policy Model for Large Evolving Enterprises (ND, JI, KR), p. 193–?.
ICEISICEIS-v2-2001-MartinCLG #e-commerce #security
Planning Security Policy on E-Commerce (MM, AC, JL, RG), pp. 915–919.
ICMLICML-2001-GlickmanS #learning #memory management #probability #search-based
Evolutionary Search, Stochastic Policies with Memory, and Reinforcement Learning with Hidden State (MRG, KPS), pp. 194–201.
ICMLICML-2001-StrensM #statistics #testing #using
Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
AdaEuropeAdaEurope-2001-Burns #ada
Defining New Non-preemptive Dispatching and Locking Policies for Ada (AB), pp. 328–336.
RERE-2001-AntonEAP #privacy #requirements
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
ASEASE-2001-AndradeFW #automation #configuration management
Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
ASEASE-2001-LowryPR
Certifying Domain-Specific Policies (MRL, TP, GR), pp. 81–90.
SACSAC-2001-VuongSD #distributed #security #using #xml
Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
HPDCHPDC-2001-SanderAFR #network
End-to-End Provision of Policy Information for Network QoS (VS, WAA, ITF, AJR), pp. 115–126.
PDPPDP-2001-TesseraD #case study #communication #performance
Communication Policies Performance: A Case Study (DT, AD), p. 491–?.
FoSSaCSFoSSaCS-2001-KochMP #approach #data access #graph #specification
Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
SIGMODSIGMOD-2000-BressanGOT #approach
Integrating Replacement Policies in StorM: An Extensible Approach (CLG, BCO, SB, KLT), p. 599.
CIKMCIKM-2000-XuHLL #named #on-demand #performance
SAIU: An Efficient Cache Replacement Policy for Wireless On-demand Broadcasts (JX, QH, DLL, WCL), pp. 46–53.
ICMLICML-2000-GrudicU
Localizing Policy Gradient Estimates to Action Transition (GZG, LHU), pp. 343–350.
ICMLICML-2000-PrecupSS #evaluation
Eligibility Traces for Off-Policy Policy Evaluation (DP, RSS, SPS), pp. 759–766.
KRKR-2000-ChomickiLN #approach #logic programming
A Logic Programming Approach to Conflict Resolution in Policy Management (JC, JL, SAN), pp. 121–132.
KRKR-2000-MartinG #concept #learning #using
Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
POPLPOPL-2000-Walker #security #type system
A Type System for Expressive Security Policies (DW), pp. 254–267.
ASEASE-2000-BoseM #automation #coordination #generative
Systematic Generation of Dependable Change Coordination Plans for Automated Switching of Coordination Policies (PKB, MGM), p. 325–?.
HPCAHPCA-2000-WongB #behaviour
Modified LRU Policies for Improving Second-Level Cache Behavior (WAW, JLB), pp. 49–60.
HPDCHPDC-2000-SchroderH #evaluation
Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness (BS, MHB), pp. 211–220.
OSDIOSDI-2000-GrunwaldLFMN #scheduling
Policies for Dynamic Clock Scheduling (DG, PL, KIF, CBMI, MN), pp. 73–86.
FASEFASE-2000-Parisi-PresicceW #configuration management #graph transformation #using
Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
HCIHCI-CCAD-1999-StephanidisSEA #design
Policy perspectives on “design for all” (CS, GS, PLE, DA), pp. 868–872.
EDOCEDOC-1999-Linington #community #enterprise #uml #using
Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
EDOCEDOC-1999-SteenD #enterprise #formal method
Formalising ODP enterprise policies (MWAS, JD), pp. 84–93.
ICMLICML-1999-NgHR #theory and practice
Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping (AYN, DH, SJR), pp. 278–287.
ICMLICML-1999-PeshkinMK #learning #memory management
Learning Policies with External Memory (LP, NM, LPK), pp. 307–314.
STOCSTOC-1999-Gamarnik #adaptation #network
Stability of Adaptive and Non-Adaptive Packet Routing Policies in Adversarial Queueing Networks (DG), pp. 206–214.
ITiCSEITiCSE-1998-Culwin #assessment #web
Web hosted assessment — possibilities and policy (FC), pp. 55–58.
FMFM-1998-KoobUW #formal method #modelling #process #security #topic #using
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
EDOCEDOC-1998-LiningtonMR #community #enterprise
Policies in communities: extending the ODP enterprise viewpoint (PFL, ZM, KR), pp. 14–24.
CIKMCIKM-1998-Horvitz
Continual Computation Policies for Utility-Directed Prefetching (EH), pp. 175–184.
ICMLICML-1998-LochS #markov #process #using
Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
TOOLSTOOLS-ASIA-1998-Poo
Policy Definition in Application-Domain-Related Classes (DCCP), pp. 94–103.
FSEFSE-1998-AstleyA #abstraction #distributed #middleware
Customizaton and Compositon of Distributed Objects: Middleware Abstractions for Policy Management (MA, GA), pp. 1–9.
SACSAC-1998-KimYL #analysis
Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
DACDAC-1998-PaleologoBBM #optimisation #power management
Policy Optimization for Dynamic Power Management (GAP, LB, AB, GDM), pp. 182–187.
CAVCAV-1998-Wilding #proving #realtime #scheduling
A Machine-Checked Proof of the Optimality of a Real-Time Scheduling Policy (MW), pp. 369–378.
ADLADL-1997-WinslettCJS #library #privacy #security #transaction #web
Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies (MW, NC, VEJ, IS), pp. 140–152.
SIGMODSIGMOD-1997-ColbyKLMR #maintenance #multi
Supporting Multiple View Maintenance Policies (LSC, AK, DFL, ISM, KAR), pp. 405–416.
SIGMODSIGMOD-1997-JajodiaSSB #data access #framework #multi
A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
CAiSECAiSE-1997-DiazP #calculus #modelling #validation
Stimuli and Business Policies as Modelling Constructs: Their Definition and Validation Through the Event Calculus (OD, NWP), pp. 33–46.
EDOCEDOC-1997-LupuS
A Policy Based Role Object Model (EL, MS), pp. 36–47.
CSCWCSCW-1996-Edwards #collaboration
Policies and Roles in Collaborative Applications (WKE), pp. 11–20.
PODSPODS-1995-ChaudhriH #database
Safe Locking Policies for Dynamic Databases (VKC, VH), pp. 233–244.
SIGMODSIGMOD-1995-DanS #online #video
An Online Video Placement Policy based on Bandwith to Space Ratio (BSR) (AD, DS), pp. 376–385.
ICMLICML-1995-LittmanCK #learning #scalability
Learning Policies for Partially Observable Environments: Scaling Up (MLL, ARC, LPK), pp. 362–370.
SIGMODSIGMOD-1994-CookWZ #database #garbage collection
Partition Selection Policies in Object Database Garbage Collection (JEC, ALW, BGZ), pp. 371–382.
CIKMCIKM-1994-Shrufi #clustering #performance
Performance of Clustering Policies in Object Bases (AS), pp. 80–87.
FMFME-1993-Boswell #security #specification #validation
Specification and Validation of a Security Policy Model (AB), pp. 42–51.
TOOLSTOOLS-PACIFIC-1993-HaebichT #object-oriented
An Object-Oriented, Computational Model to Support the Formulation of a National Retirement Icome Policy (WH, TT), pp. 393–406.
TOOLSTOOLS-PACIFIC-1993-Taylor #reuse #towards
Towards a Reuse Policy (PT), pp. 49–60.
RERE-1993-SibleyWMTL #requirements
The role of policy in requirements definition (EHS, RLW, JBM, MCT, DCL), pp. 277–280.
SACSAC-1993-RamakrishnanDN
An Integrated Optimal Task Assignment Policy (SR, LAD, TN), pp. 789–795.
DACDAC-1993-Nurnberger
The Clinton/Gore Technology Policies (RDN), pp. 331–335.
SIGMODSIGMOD-1992-DanY #analysis #performance
Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
HPDCHPDC-1992-PuFSWY #comparison #distributed #performance
Performance Comparison of Active-Sender and Active-Receiver Policies for Distributed Caching (CP, DF, PS, KLW, PSY), pp. 218–227.
CAiSECAiSE-1991-McBrienNPSSTTW #specification
A Rule Language to Capture and Model Business Policy Specifications (PM, MN, DP, AHS, US, BT, GT, RW), pp. 307–318.
ASPLOSASPLOS-1991-BoloskySFFC #architecture #memory management
NUMA Policies and Their Relation to Memory Architecture (WJB, MLS, RPF, RJF, ALC), pp. 212–221.
CSCWCSCW-1988-ConklinB #hypermedia #named
gIBIS: A Hypertext Tool for Exploratory Policy Discussion (JC, MLB), pp. 140–152.
OOPSLAOOPSLA-1988-UngarJ
Tenuring Policies for Generation-Based Storage Reclamation (DU, FJ), pp. 1–17.
VLDBVLDB-1985-LausenSW #concurrent
Pre-Analysis Locking: A Safe and Deadlock Free Locking Policy (GL, ESS, PW), pp. 270–281.
VLDBVLDB-1985-MedeirosT #comprehension
Understanding the Implications of View Update Policies (CBM, FWT), pp. 316–323.
SOSPSOSP-1985-MalkawiP #compilation #memory management #source code
Compiler Directed Memory Management Policy For Numerical Programs (MM, JHP), pp. 97–106.
SIGMODSIGMOD-1983-KohlerWS #comparison #database
An Experimental Comparison of Locking Policies in a Testbed Database System (WHK, KCW, JAS), pp. 108–119.
SIGMODSIGMOD-1977-LohmanM
Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (GML, JAM), p. 157.
SOSPSOSP-1977-Potier #analysis #set
Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
SOSPSOSP-1975-JonesL #security
The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.
SOSPSOSP-1975-LevinCCPW
Policy/Mechanism Separation in HYDRA (RL, ESC, WMC, FJP, WAW), pp. 132–140.
SOSPSOSP-J-1973-TeoreyP72 #analysis #comparative #scheduling
A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
SOSPSOSP-1971-TeoreyP #analysis #comparative #scheduling
A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 114–121.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.