Tag #policy
550 papers:
- ICSA-2019-GerkingS #architecture #component #cyber-physical #data flow #refinement #security #verification
- Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures (CG, DS), pp. 61–70.
- EDM-2019-AusinABC #induction #learning
- Leveraging Deep Reinforcement Learning for Pedagogical Policy Induction in an Intelligent Tutoring System (MSA, HA, TB, MC).
- ICSME-2019-Khalil #debugging #performance
- Studying the Impact of Policy Changes on Bug Handling Performance (ZAK), pp. 590–594.
- CoG-2019-HuangL #approach #optimisation #self
- A Self-Play Policy Optimization Approach to Battling Pokémon (DH, SL), pp. 1–4.
- CoG-2019-Nagorko #adaptation #parallel
- Parallel Nested Rollout Policy Adaptation (AN), pp. 1–7.
- CoG-2019-RatcliffeHD #optimisation #performance
- Win or Learn Fast Proximal Policy Optimisation (DSR, KH, SD), pp. 1–4.
- CoG-2019-RebstockSB #learning
- Learning Policies from Human Data for Skat (DR, CS, MB), pp. 1–8.
- CoG-2019-RebstockSBS #game studies
- Policy Based Inference in Trick-Taking Card Games (DR, CS, MB, NRS), pp. 1–8.
- CoG-2019-SoemersPSB #learning #self
- Learning Policies from Self-Play with Policy Gradients and MCTS Value Estimates (DJNJS, ÉP, MS, CB), pp. 1–8.
- CoG-2019-TongLL #evolution #network
- Enhancing Rolling Horizon Evolution with Policy and Value Networks (XT, WL, BL0), pp. 1–8.
- ICML-2019-0002VY #constraints #learning
- Batch Policy Learning under Constraints (HML0, CV, YY), pp. 3703–3712.
- ICML-2019-AhmedR0S #comprehension #optimisation
- Understanding the Impact of Entropy on Policy Optimization (ZA, NLR, MN0, DS), pp. 151–160.
- ICML-2019-AkrourP0N #algorithm #approximate
- Projections for Approximate Policy Iteration Algorithms (RA, JP, JP0, GN), pp. 181–190.
- ICML-2019-ChengYRB #optimisation #predict
- Predictor-Corrector Policy Optimization (CAC, XY, NDR, BB), pp. 1151–1161.
- ICML-2019-Dann0WB #learning #towards
- Policy Certificates: Towards Accountable Reinforcement Learning (CD, LL0, WW, EB), pp. 1507–1516.
- ICML-2019-EdwardsSSI
- Imitating Latent Policies from Observation (ADE, HS, YS, CLIJ), pp. 1755–1763.
- ICML-2019-FreirichSMT #evaluation #multi
- Distributional Multivariate Policy Evaluation and Exploration with the Bellman GAN (DF, TS, RM, AT), pp. 1983–1992.
- ICML-2019-FujiiS #adaptation #approximate
- Beyond Adaptive Submodularity: Approximation Guarantees of Greedy Policy with Adaptive Submodularity Ratio (KF, SS), pp. 2042–2051.
- ICML-2019-HannaNS #behaviour #evaluation
- Importance Sampling Policy Evaluation with an Estimated Behavior Policy (JH, SN, PS), pp. 2605–2613.
- ICML-2019-HeidariNG #algorithm #learning #on the #social
- On the Long-term Impact of Algorithmic Decision Policies: Effort Unfairness and Feature Segregation through Social Learning (HH, VN, KPG), pp. 2692–2701.
- ICML-2019-HoLCSA #learning #performance
- Population Based Augmentation: Efficient Learning of Augmentation Policy Schedules (DH, EL, XC0, IS, PA), pp. 2731–2741.
- ICML-2019-HuntBLH #using
- Composing Entropic Policies using Divergence Correction (JJH, AB, TPL, NH), pp. 2911–2920.
- ICML-2019-KaplanisSC #learning
- Policy Consolidation for Continual Reinforcement Learning (CK, MS, CC), pp. 3242–3251.
- ICML-2019-LarocheTC
- Safe Policy Improvement with Baseline Bootstrapping (RL, PT, RTdC), pp. 3652–3661.
- ICML-2019-NabiMS #learning
- Learning Optimal Fair Policies (RN, DM, IS), pp. 4674–4682.
- ICML-2019-PapiniMLR #multi #optimisation
- Optimistic Policy Optimization via Multiple Importance Sampling (MP, AMM, LL, MR), pp. 4989–4999.
- ICML-2019-PaulOW #learning #optimisation #robust
- Fingerprint Policy Optimisation for Robust Reinforcement Learning (SP, MAO, SW), pp. 5082–5091.
- ICML-2019-ShenRHQM
- Hessian Aided Policy Gradient (ZS, AR, HH, HQ, CM), pp. 5729–5738.
- ICML-2019-SuWSJ #adaptation #evaluation #learning #named
- CAB: Continuous Adaptive Blending for Policy Evaluation and Learning (YS, LW, MS, TJ), pp. 6005–6014.
- ICML-2019-TirinzoniSR #multi
- Transfer of Samples in Policy Search via Multiple Importance Sampling (AT, MS, MR), pp. 6264–6274.
- ICML-2019-WangCAD #estimation #learning #random
- Random Expert Distillation: Imitation Learning via Expert Policy Support Estimation (RW, CC, PVA, YD), pp. 6536–6544.
- ICML-2019-X #bound #named #predict #using
- POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
- ICML-2019-ZhangYT #learning #novel
- Learning Novel Policies For Tasks (YZ, WY, GT), pp. 7483–7492.
- KDD-2019-Do0V #graph transformation #network #predict
- Graph Transformation Policy Network for Chemical Reaction Prediction (KD, TT0, SV), pp. 750–760.
- KDD-2019-HartvigsenSKR #adaptation #classification #network
- Adaptive-Halting Policy Network for Early Classification (TH, CS, XK, EAR), pp. 101–110.
- KDD-2019-RizzoVC
- Time Critic Policy Gradient Methods for Traffic Signal Control in Complex and Congested Scenarios (SGR, GV, SC), pp. 1654–1664.
- KDD-2019-ZouKCC0 #evaluation #robust
- Focused Context Balancing for Robust Offline Policy Evaluation (HZ, KK, BC, PC, PC0), pp. 696–704.
- KDD-2019-ZouZCW0 #optimisation #trust
- Separated Trust Regions Policy Optimization Method (LZ, ZZ, YC, XW, WZ0), pp. 1471–1479.
- SAS-2019-VolkerK #heuristic #static analysis
- A Change-Based Heuristic for Static Analysis with Policy Iteration (MV, SK), pp. 73–95.
- ASPLOS-2019-TannuQ #quantum #variability
- Not All Qubits Are Created Equal: A Case for Variability-Aware Policies for NISQ-Era Quantum Computers (SST, MKQ), pp. 987–999.
- CASE-2019-DaiGLY #energy #multi #robust #scheduling
- A Time-domain Decoupling Policy for Multi-stage Robust Scheduling in a Corporate Energy System with V2G* (SD, FG, KL, LY), pp. 972–978.
- CASE-2019-Huang0C #learning
- Machine Preventive Replacement Policy for Serial Production Lines Based on Reinforcement Learning (JH0, QC0, NC), pp. 523–528.
- CASE-2019-MarzanoFM #energy #performance #tool support
- Energy Efficient State Control of Machine Tools: a Time-Based Dynamic Control Policy (LM, NF, AM), pp. 596–601.
- CASE-2019-RazaL #approach #learning #multi
- Constructive Policy: Reinforcement Learning Approach for Connected Multi-Agent Systems (SJAR, ML), pp. 257–262.
- SANER-2018-MontenegroMCB #developer #exception
- Improving developers awareness of the exception handling policy (TM, HM, RC, EB), pp. 413–422.
- ICML-2018-AbelJGKL #learning
- Policy and Value Transfer in Lifelong Reinforcement Learning (DA, YJ, SYG, GDK, MLL), pp. 20–29.
- ICML-2018-ArenzZN #performance #using
- Efficient Gradient-Free Variational Inference using Policy Search (OA, MZ, GN), pp. 234–243.
- ICML-2018-BarretoBQSSHMZM #learning #using
- Transfer in Deep Reinforcement Learning Using Successor Features and Generalised Policy Improvement (AB, DB, JQ, TS, DS, MH, DJM, AZ, RM), pp. 510–519.
- ICML-2018-ChoromanskiRSTW #architecture #evolution #optimisation #scalability
- Structured Evolution with Compact Architectures for Scalable Policy Optimization (KC, MR, VS, RET, AW), pp. 969–977.
- ICML-2018-Fazel0KM #convergence #linear #polynomial
- Global Convergence of Policy Gradient Methods for the Linear Quadratic Regulator (MF, RG0, SMK, MM), pp. 1466–1475.
- ICML-2018-FellowsCW #fourier
- Fourier Policy Gradients (MF, KC, SW), pp. 1485–1494.
- ICML-2018-FujitaM
- Clipped Action Policy Gradient (YF0, SiM), pp. 1592–1601.
- ICML-2018-GroverAGBE #learning #multi
- Learning Policy Representations in Multiagent Systems (AG, MAS, JKG, YB, HE), pp. 1797–1806.
- ICML-2018-HaarnojaHAL #learning
- Latent Space Policies for Hierarchical Reinforcement Learning (TH, KH, PA, SL), pp. 1846–1855.
- ICML-2018-HefnyM0SG #network #predict
- Recurrent Predictive State Policy Networks (AH, ZM, WS0, SSS, GJG), pp. 1954–1963.
- ICML-2018-KangJF #optimisation
- Policy Optimization with Demonstrations (BK, ZJ, JF), pp. 2474–2483.
- ICML-2018-Nachum0TS #learning
- Smoothed Action Value Functions for Learning Gaussian Policies (ON, MN0, GT, DS), pp. 3689–3697.
- ICML-2018-PapiniBCPR #probability
- Stochastic Variance-Reduced Policy Gradient (MP, DB, GC, MP, MR), pp. 4023–4032.
- ICML-2018-ParmasR0D #flexibility #modelling #named #robust
- PIPPS: Flexible Model-Based Policy Search Robust to the Curse of Chaos (PP, CER, JP0, KD), pp. 4062–4071.
- ICML-2018-SmithHP #learning
- An Inference-Based Policy Gradient Method for Learning Options (MS, HvH, JP), pp. 4710–4719.
- ICML-2018-ZhangCLC #optimisation
- Policy Optimization as Wasserstein Gradient Flows (RZ, CC, CL, LC), pp. 5741–5750.
- ICPR-2018-LabaoN #approximate
- Stabilizing Actor Policies by Approximating Advantage Distributions from K Critics (ABL, PCN), pp. 1253–1258.
- ICPR-2018-MandalSVM #named #robust
- CANDID: Robust Change Dynamics and Deterministic Update Policy for Dynamic Background Subtraction (MM, PS, SKV, SM), pp. 2468–2473.
- KDD-2018-AckermannWUNRLB #framework #machine learning #modelling
- Deploying Machine Learning Models for Public Policy: A Framework (KA, JW, ADU, HN, ANR, SJL, JB, MD, CC, LH, RG), pp. 15–22.
- KDD-2018-LiAKMVW #evaluation #modelling #ranking
- Offline Evaluation of Ranking Policies with Click Models (SL, YAY, BK, SM, VV, ZW), pp. 1685–1694.
- KDD-2018-LiY #classification #learning #network
- Learning Adversarial Networks for Semi-Supervised Text Classification via Policy Gradient (YL, JY), pp. 1715–1723.
- AdaEurope-2018-GarridoZAP #ada #on the
- On the Effect of Protected Entry Servicing Policies on the Response Time of Ada Tasks (JG, JZ, AA0, JAdlP), pp. 73–86.
- ASE-2018-FadhelBB #data access #modelling #runtime
- Model-driven run-time enforcement of complex role-based access control policies (ABF, DB, LCB), pp. 248–258.
- ESEC-FSE-2018-Hosseini #android #natural language #privacy #semantics
- Semantic inference from natural language privacy policies and Android code (MBH), pp. 940–943.
- ICSE-2018-WangQHSB0 #android #named #privacy
- GUILeak: tracing privacy policy claims on user input data for Android applications (XW, XQ, MBH, RS, TDB, JN0), pp. 37–47.
- CASE-2018-CuiZFKM #kernel #programming
- Factorial Kernel Dynamic Policy Programming for Vinyl Acetate Monomer Plant Model Control (YC, LZ, MF, HK, TM), pp. 304–309.
- CASE-2018-DanielczukMCG #linear
- Linear Push Policies to Increase Grasp Access for Robot Bin Picking (MD, JM, CC, KG), pp. 1249–1256.
- CASE-2018-MatsubaraNOC #analysis #component #simulation
- Policy Transfer from Simulations to Real World by Transfer Component Analysis (TM, YN, YO, YC), pp. 264–269.
- CASE-2018-ZhangW
- Integrated Ordering and Pricing Policy for Perishable Products with Inventory Inaccuracy (YZ, ZW0), pp. 1230–1236.
- EDM-2017-ZhouWLC #learning #towards
- Towards Closing the Loop: Bridging Machine-induced Pedagogical Policies to Learning Theories (GZ, JW, CL, MC).
- CIG-2017-ZhangB #learning
- Improving hearthstone AI by learning high-level rollout policies and bucketing chance node events (SZ, MB), pp. 309–316.
- ICML-2017-AchiamHTA #optimisation
- Constrained Policy Optimization (JA, DH, AT, PA), pp. 22–31.
- ICML-2017-AndreasKL #composition #learning #multi #sketching
- Modular Multitask Reinforcement Learning with Policy Sketches (JA, DK, SL), pp. 166–175.
- ICML-2017-BalleM #finite #learning
- Spectral Learning from a Single Trajectory under Finite-State Policies (BB, OAM), pp. 361–370.
- ICML-2017-ChouMS #learning #probability #using
- Improving Stochastic Policy Gradients in Continuous Control with Deep Reinforcement Learning using the Beta Distribution (PWC, DM, SAS), pp. 834–843.
- ICML-2017-DuCLXZ #evaluation #probability #reduction
- Stochastic Variance Reduction Methods for Policy Evaluation (SSD, JC, LL0, LX, DZ), pp. 1049–1058.
- ICML-2017-HaarnojaTAL #energy #learning
- Reinforcement Learning with Deep Energy-Based Policies (TH, HT, PA, SL), pp. 1352–1361.
- ICML-2017-HannaTSN #behaviour #evaluation
- Data-Efficient Policy Evaluation Through Behavior Policy Search (JPH, PST, PS, SN), pp. 1394–1403.
- ICML-2017-WangWTS #process
- Variational Policy for Guiding Point Processes (YW0, GW, EAT, LS), pp. 3684–3693.
- KDD-2017-DebGIPVYY #automation #learning #named #network #predict
- AESOP: Automatic Policy Learning for Predicting and Mitigating Network Service Impairments (SD, ZG, SI, SCP, SV, HY, JY), pp. 1783–1792.
- ICSE-2017-KafaliJPWS #case study #how #security
- How good is a security policy against real breaches?: a HIPAA case study (ÖK, JJ, MP, LW, MPS), pp. 530–540.
- CASE-2017-ChenWC #multi #probability
- Steady state probability distribution of a two-product-type and multi-parallel-machine system under prioritized hedging point control policy (WC, ZW, FTSC), pp. 224–230.
- CASE-2017-JiangZ0X #anti
- An optimal POMDP-based anti-jamming policy for cognitive radar (XJ, FZ, JY0, HX), pp. 938–943.
- CASE-2017-LeeZLZBKSBL
- Incentive-based optimal intervention policy to reduce hospital readmissions for COPD patients (SL, XZ, HKL, CZ, PAB, TK, CS, CB, JL), pp. 562–567.
- CASE-2017-TengLPK
- Threshold control policy for patient referral under cooperation scenarios (DT, NL0, ZP, NK), pp. 195–200.
- CASE-2017-XiangYML #parallel #research
- Research on release control policies of parallel semiconductor production lines (NX, QY, ZM, LL), pp. 296–301.
- CASE-2017-ZhengLC #comparison #learning #realtime
- Comparison study of two reinforcement learning based real-time control policies for two-machine-one-buffer production system (WZ, YL, QC), pp. 1163–1168.
- FASE-2017-AydinPTFP #mobile #privacy #visual notation
- Visual Configuration of Mobile Privacy Policies (AA, DP, OT, PF, MP), pp. 338–355.
- AIIDE-2016-UriarteO #modelling #monte carlo #probability
- Improving Monte Carlo Tree Search Policies in StarCraft via Probabilistic Models Learned from Replay Data (AU, SO), pp. 100–106.
- ICML-2016-BalleGP #evaluation
- Differentially Private Policy Evaluation (BB, MG, DP), pp. 2130–2138.
- ICML-2016-FinnLA #learning #optimisation
- Guided Cost Learning: Deep Inverse Optimal Control via Policy Optimization (CF, SL, PA), pp. 49–58.
- ICML-2016-HoGE #learning #optimisation
- Model-Free Imitation Learning with Policy Optimization (JH, JKG, SE), pp. 2760–2769.
- ICML-2016-PerolatPGSP #approximate #game studies #markov
- Softened Approximate Policy Iteration for Markov Games (JP, BP, MG, BS, OP), pp. 1860–1868.
- ICML-2016-ThomasB #evaluation #learning
- Data-Efficient Off-Policy Policy Evaluation for Reinforcement Learning (PST, EB), pp. 2139–2148.
- KDD-2016-AckermannRHKBKG #design #recommendation
- Designing Policy Recommendations to Reduce Home Abandonment in Mexico (KA, EBR, SH, TAK, PvdB, RK, RG, JCG), pp. 13–20.
- OOPSLA-2016-GollamudiC #automation #security #using
- Automatic enforcement of expressive security policies using enclaves (AG, SC), pp. 494–513.
- PPDP-2016-BertolissiTV #analysis #data access
- Analysis of access control policy updates through narrowing (CB, JMT, DV), pp. 62–75.
- QAPL-2016-BergPH #energy #performance
- Evaluating load balancing policies for performance and energy-efficiency (FvdB, BFP, BRH), pp. 98–117.
- SAS-2016-AbdullaJT #automation #verification
- Automated Verification of Linearization Policies (PAA, BJ, CQT), pp. 61–83.
- ICSE-2016-SlavinWHHKBBN #android #detection #framework #privacy #towards
- Toward a framework for detecting privacy policy violations in android application code (RS, XW, MBH, JH, RK, JB, TDB, JN0), pp. 25–36.
- CASE-2016-MavrommatiM #automation #synthesis
- Automatic synthesis of control alphabet policies (AM, TDM), pp. 313–320.
- VMCAI-2016-KarpenkovMW #program analysis
- Program Analysis with Local Policy Iteration (EGK, DM, PW), pp. 127–146.
- SIGMOD-2015-UpadhyayaBS #automation
- Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
- EDM-2015-MorettiMS #analysis #education #evaluation #sentiment #topic
- Application of Sentiment and Topic Analysis to Teacher Evaluation Policy in the U.S (AM, KM, ASA), pp. 628–629.
- EDM-2015-RollinsonB #modelling #predict
- From Predictive Models to Instructional Policies (JR, EB), pp. 179–186.
- FM-2015-DuLT #independence #ltl #monitoring #runtime
- Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL (XD, YL, AT), pp. 231–247.
- GCM-2015-BottoniNP #constraints #contract #modelling #using
- Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
- CHI-2015-ZhangC #modelling #predict #social #social media
- Modeling Ideology and Predicting Policy Change with Social Media: Case of Same-Sex Marriage (AXZ, SC), pp. 2603–2612.
- CSCW-2015-WongJ #framework
- Wireless Visions: Infrastructure, Imagination, and US Spectrum Policy (RYW, SJJ), pp. 105–115.
- HIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #simulation #visualisation
- Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
- CAiSE-2015-DelmasP #requirements #verification
- Need-to-Share and Non-diffusion Requirements Verification in Exchange Policies (RD, TP), pp. 151–165.
- ICEIS-v2-2015-OliveiraF #enterprise #framework #overview #sorting
- A Spatial Data Infrastructure Review — Sorting the Actors and Policies from Enterprise Viewpoint (ILO, JLF), pp. 287–294.
- ICML-2015-Bou-AmmarTE #learning #sublinear
- Safe Policy Search for Lifelong Reinforcement Learning with Sublinear Regret (HBA, RT, EE), pp. 2361–2369.
- ICML-2015-LesnerS #approximate
- Non-Stationary Approximate Modified Policy Iteration (BL, BS), pp. 1567–1575.
- ICML-2015-SchulmanLAJM #optimisation #trust
- Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
- ICML-2015-ThomasTG
- High Confidence Policy Improvement (PST, GT, MG), pp. 2380–2388.
- KDD-2015-Athey #evaluation #machine learning
- Machine Learning and Causal Inference for Policy Evaluation (SA), pp. 5–6.
- SEKE-2015-AbrantesC #exception #monitoring #specification
- Specifying and Dynamically Monitoring the Exception Handling Policy (JA, RC), pp. 370–374.
- SEKE-2015-HuangWSQ #android #fine-grained #named #security
- DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
- SEKE-2015-PeiYF #data access #in the cloud #performance
- Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
- SEKE-2015-XuSZ #algorithm #testing
- Fault-Based Testing of Combining Algorithms in XACML3.0 Policies (DX, NS, YZ), pp. 433–438.
- SIGIR-2015-YunHER #latency #web
- Optimal Aggregation Policy for Reducing Tail Latency of Web Search (JMY, YH, SE, SR), pp. 63–72.
- MoDELS-2015-SoltanaSSB #framework #modelling #probability #simulation
- A model-based framework for probabilistic simulation of legal policies (GS, NS, MS, LCB), pp. 70–79.
- LOPSTR-2015-RiescoAA #analysis #maude #memory management #semantics #specification
- Memory Policy Analysis for Semantics Specifications in Maude (AR0, IMA, MA), pp. 293–310.
- POPL-2015-NgoMMP #black box #runtime #security #source code
- Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
- POPL-2015-PadonIKLSS
- Decentralizing SDN Policies (OP, NI, AK, OL, MS, SS), pp. 663–676.
- SAC-2015-RaniseTV #analysis #automation #constraints
- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
- DAC-2015-McLaughlin #behaviour
- Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
- DAC-2015-PengKPPJCL #3d #architecture #delivery #design
- Design, packaging, and architectural policy co-optimization for DC power integrity in 3D DRAM (YP, BWK, YSP, KIP, SJJ, JSC, SKL), p. 6.
- DATE-2015-YinLLWG15a
- Cooperatively managing dynamic writeback and insertion policies in a last-level DRAM cache (SY, JL, LL, SW, YG), pp. 187–192.
- PDP-2015-BasileLPZ #formal method
- A Formal Model of Policy Reconciliation (CB, AL, CP, SZ), pp. 587–594.
- PDP-2015-DienerCN #locality
- Locality vs. Balance: Exploring Data Mapping Policies on NUMA Systems (MD, EHMdC, POAN), pp. 9–16.
- VMCAI-2015-CortesiFPT #mobile #privacy #semantics #verification
- Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
- ECSA-2014-FreudenreichAFB #architecture #complexity #using
- Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
- ECSA-2014-HorcasPF #runtime #security
- Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
- SIGMOD-2014-HeMD #privacy #trade-off #using
- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
- IFM-2014-DrossopoulouN #how #semantics
- How to Break the Bank: Semantics of Capability Policies (SD, JN), pp. 18–35.
- SEFM-2014-PardoS #framework #network #privacy #social
- A Formal Privacy Policy Framework for Social Networks (RP, GS), pp. 378–392.
- ICFP-2014-SchlesingerGW #concurrent #pipes and filters
- Concurrent NetCore: from policies to pipelines (CS, MG, DW), pp. 11–24.
- CIG-2014-EdelkampG #adaptation #physics #problem
- Solving Physical Traveling Salesman Problems with policy adaptation (SE, CG), pp. 1–8.
- CHI-2014-GrimpeHJ #design #human-computer #towards
- Towards a closer dialogue between policy and practice: responsible design in HCI (BG, MH, MJ), pp. 2965–2974.
- CSCW-2014-JacksonGP #design #social
- The policy knot: re-integrating policy, practice and design in cscw studies of social computing (SJJ, TG, SP), pp. 588–602.
- DUXU-DI-2014-SpiliotopoulosDK14a #authoring #design #interface #modelling #prototype
- Need Driven Prototype Design for a Policy Modeling Authoring Interface (DS, AD, DK), pp. 481–487.
- ICEIS-v2-2014-WeiRT #data access
- Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
- ECIR-2014-OstroumovaBCTG #crawling #predict #web
- Crawling Policies Based on Web Page Popularity Prediction (LO, IB, AC, AT, GG), pp. 100–111.
- ICML-c1-2014-MannM #approximate #scalability
- Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations (TAM, SM), pp. 127–135.
- ICML-c1-2014-SilverLHDWR #algorithm
- Deterministic Policy Gradient Algorithms (DS, GL, NH, TD, DW, MAR), pp. 387–395.
- ICML-c2-2014-Bou-AmmarERT #learning #multi #online
- Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
- ICML-c2-2014-LevineK #learning #network #optimisation
- Learning Complex Neural Network Policies with Trajectory Optimization (SL, VK), pp. 829–837.
- ICML-c2-2014-Scherrer #approximate #comparison
- Approximate Policy Iteration Schemes: A Comparison (BS), pp. 1314–1322.
- KEOD-2014-KruppS0 #mobile #ontology #privacy #security
- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
- SEKE-2014-LiLWC #automation #data access #generative #testing
- Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
- SIGIR-2014-MaLWSBWW #named #query #web
- PAAP: prefetch-aware admission policies for query results cache in web search engines (HM, WL, BW, LS, XB, LW, BW), pp. 983–986.
- MoDELS-2014-SongZFCS0 #adaptation #constraints #modelling
- Modelling Adaptation Policies as Domain-Specific Constraints (HS, XZ, NF, FC, AS, GH), pp. 269–285.
- RE-2014-BreauxS #privacy #requirements #scalability
- Scaling requirements extraction to the crowd: Experiments with privacy policies (TDB, FS), pp. 163–172.
- FSE-2014-JoinerRJDG #performance #weaving
- Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
- SAC-2014-YooLB #memory management
- The least-dirty-first cache replacement policy for phase-change memory (SY, EL, HB), pp. 1449–1454.
- ASPLOS-2014-0001KOTRKSHC #named #security
- Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
- CASE-2014-BaDR #maintenance
- Green management of Spare parts for an integrated optimal maintenance and production policy (KB, SD, NR), pp. 359–364.
- CASE-2014-FrigerioM #energy #probability
- Energy saving policies for a machine tool with warm-up, stochastic arrivals and buffer information (NF, AM), pp. 646–651.
- CASE-2014-JinNHXC
- Threshold-type admission policy for remanufacturing systems (XJ, JN, SJH, GX, QC), pp. 467–473.
- CASE-2014-LiCW #robust
- A robust (r, Q) policy for a simple VMI system with inventory inaccuracy and time-delay (ML, FTSC, ZW), pp. 652–657.
- CASE-2014-LiDZ #social
- Social incentive policies to engage commercial building occupants in demand response (SL, KD, MZ), pp. 407–412.
- HPCA-2014-WangJXSX #adaptation #hybrid #migration
- Adaptive placement and migration policy for an STT-RAM-based hybrid cache (ZW, DAJ, CX, GS, YX), pp. 13–24.
- HPDC-2014-GerofiSHTI #memory management #named #novel
- CMCP: a novel page replacement policy for system level hierarchical memory management on many-cores (BG, AS, AH, MT, YI), pp. 73–84.
- PDP-2014-EinzigerF #named #performance
- TinyLFU: A Highly Efficient Cache Admission Policy (GE, RF), pp. 146–153.
- CAV-2014-ChowdhuryJGD #monitoring #privacy #runtime
- Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (OC, LJ, DG, AD), pp. 131–149.
- CAV-2014-FerraraMNP #data access #named #verification
- Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
- SAT-2014-AudemardS #lazy evaluation #parallel #satisfiability
- Lazy Clause Exchange Policy for Parallel SAT Solvers (GA, LS), pp. 197–205.
- VMCAI-2014-Masse #ranking #termination
- Policy Iteration-Based Conditional Termination and Ranking Functions (DM), pp. 453–471.
- DRR-2013-LipskyLN
- Optimal policy for labeling training samples (LL, DPL, GN).
- JCDL-2013-AinsworthN #web
- Evaluating sliding and sticky target policies by measuring temporal drift in acyclic walks through a web archive (SA, MLN), pp. 39–48.
- JCDL-2013-BrunelleN #evaluation
- An evaluation of caching policies for memento timemaps (JFB, MLN), pp. 267–276.
- TPDL-2013-MaceviciuteW #library
- E-Books in Swedish Public Libraries: Policy Implications (EM, TDW), pp. 29–34.
- ICSM-2013-FrancisW #debugging
- Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
- CIG-2013-PowleyWC #monte carlo #simulation
- Bandits all the way down: UCB1 as a simulation policy in Monte Carlo Tree Search (EJP, DW, PIC), pp. 1–8.
- CIG-2013-Thibodeau-LauferFYDB #evaluation #game studies #video
- Stacked calibration of off-policy policy evaluation for video game matchmaking (ETL, RCF, LY, OD, YB), pp. 1–8.
- CHI-2013-KangBK #design #internet #people #why
- Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
- CSCW-2013-JacksonSB #why
- Why CSCW needs science policy (and vice versa) (SJJ, SBS, AGB), pp. 1113–1124.
- OCSC-2013-Meiselwitz #assessment #network #readability #social
- Readability Assessment of Policies and Procedures of Social Networking Sites (GM), pp. 67–75.
- CAiSE-2013-DelmasP #formal method #specification
- Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
- ICEIS-v1-2013-KaddesABSA
- Enhancement of Generalized Earliest Deadline First Policy (MK, LA, AB, BS, MA), pp. 231–238.
- ICEIS-v1-2013-RibeiroRBFE #coordination
- Updating Strategies of Policies for Coordinating Agent Swarm in Dynamic Environments (RR, AFR, MACB, FF, FE), pp. 345–356.
- ICML-c1-2013-SznitmanLFJF #locality
- An Optimal Policy for Target Localization with Application to Electron Microscopy (RS, AL, PIF, BJ, PF), pp. 1–9.
- ICML-c3-2013-ChenLZ #crowdsourcing
- Optimistic Knowledge Gradient Policy for Optimal Budget Allocation in Crowdsourcing (XC, QL, DZ), pp. 64–72.
- ICML-c3-2013-LevineK
- Guided Policy Search (SL, VK), pp. 1–9.
- ICML-c3-2013-PirottaRPC
- Safe Policy Iteration (MP, MR, AP, DC), pp. 307–315.
- ICML-c3-2013-RossZYDB #learning #predict
- Learning Policies for Contextual Submodular Prediction (SR, JZ, YY, DD, DB), pp. 1364–1372.
- KDD-2013-AsadiLB #memory management #realtime #twitter
- Dynamic memory allocation policies for postings in real-time Twitter search (NA, JL, MB), pp. 1186–1194.
- SEKE-2013-PereiraAS #data access #relational #runtime
- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
- MoDELS-2013-PerezGCCC #analysis #modelling #network #security
- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
- PPDP-2013-StewartBN #data flow #data type #dependent type #semistructured data
- Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
- RE-2013-MasseyEAS #analysis #automation #documentation #mining #requirements
- Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
- ICSE-2013-Slankas #data access #database #implementation #natural language
- Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
- SAC-2013-ProvensiEVR #adaptation #fuzzy #streaming #using #video
- Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
- SAC-2013-Schefer-WenzlS #information management
- Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
- CASE-2013-FrigerioM #energy
- Machine control policies for energy saving in manufacturing (NF, AM), pp. 651–656.
- CASE-2013-PanHJ #concurrent #flexibility #petri net #using
- One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
- CASE-2013-SinhaK #constraints
- Production and subcontracting policies for assemble-to-order systems with service level constraints (AKS, AK), pp. 570–575.
- CASE-2013-TanTL #resource management
- Improving patient length-of-stay in emergency department through dynamic resource allocation policies (KWT, WHT, HCL), pp. 984–989.
- CASE-2013-WangC #multi #robust
- A robust production control policy for a multiple-stage production system with inventory inaccuracy and time-delay (ZW, FTSC), pp. 77–82.
- CASE-2013-WangJLC #capacity
- Integrated capacity allocation policies for a production service system with two-class customers and items (KW, ZJ, GL, JC), pp. 83–88.
- CASE-2013-WuCY #analysis #reachability
- A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
- CASE-2013-YueH13a #assembly #concurrent #petri net #polynomial #process
- A polynomial deadlock avoidance policy for a class of assembly processes based on Petri nets (HY, HH), pp. 1151–1156.
- CC-2013-MooreC #automation #generative #machine learning #using
- Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
- DATE-2013-GiraoSW #clustering
- Exploring resource mapping policies for dynamic clustering on NoC-based MPSoCs (GG, TS, FRW), pp. 681–684.
- DATE-2013-GoossensAG #memory management
- Conservative open-page policy for mixed time-criticality memory controllers (SG, BA, KG), pp. 525–530.
- DATE-2013-Milano #challenge #energy #research
- Sustainable energy policies: research challenges and opportunities (MM), pp. 1143–1148.
- DATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #using
- Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
- DATE-2013-WangDX #named
- OAP: an obstruction-aware cache management policy for STT-RAM last-level caches (JW, XD, YX), pp. 847–852.
- HPCA-2013-DasAMKA #manycore #memory management
- Application-to-core mapping policies to reduce memory system interference in multi-core systems (RD, RA, OM, AK, MA), pp. 107–118.
- TACAS-2013-FerraraMP #analysis #data access #self
- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
- TACAS-2013-KoleiniRR #data access #model checking
- Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
- ICST-2013-BertolinoBDKLM #design #testing
- A Toolchain for Designing and Testing XACML Policies (AB, MB, SD, NK, FL, EM), pp. 495–496.
- FDG-2012-PettitH #learning #simulation
- Evolutionary learning of policies for MCTS simulations (JP, DPH), pp. 212–219.
- ICEIS-v3-2012-CarvalhoRACJDM #energy #network #performance #towards
- Towards Sustainable Networks — Energy Efficiency Policy from Business to Device Instance Levels (TCMBC, ACR, MA, CHAC, GCJ, CKD, CM), pp. 238–243.
- ICML-2012-CastroTM
- Policy Gradients with Variance Related Risk Criteria (DDC, AT, SM), p. 215.
- ICML-2012-DekelTA #adaptation #learning #online
- Online Bandit Learning against an Adaptive Adversary: from Regret to Policy Regret (OD, AT, RA), p. 227.
- ICML-2012-KalakrishnanRPS #learning
- Learning Force Control Policies for Compliant Robotic Manipulation (MK, LR, PP, SS), p. 10.
- ICML-2012-ScherrerGGG #approximate
- Approximate Modified Policy Iteration (BS, VG, MG, MG), p. 245.
- ICML-2012-StulpS #adaptation #matrix
- Path Integral Policy Improvement with Covariance Matrix Adaptation (FS, OS), p. 201.
- SEKE-2012-MaarabaniAC #security #testing
- Testing Interoperability Security Policies (MEM, CA, ARC), pp. 464–469.
- OOPSLA-2012-Anderson #fine-grained #parallel #resource management #using
- Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
- TOOLS-EUROPE-2012-CatanoHR #formal method #named #network #privacy #social
- Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
- PADL-2012-Coleman #classification #distributed #specification
- Distributed Policy Specification and Interpretation with Classified Advertisements (NC), pp. 198–211.
- POPL-2012-YangYS #automation #privacy
- A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
- ASE-2012-HwangXKMT #evolution #security #testing
- Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
- FSE-2012-XiaoPTX #automation #documentation #security
- Automated extraction of security policies from natural-language software documents (XX, AMP, ST, TX), p. 12.
- SAC-2012-AnwarF #data access #network #social #visualisation
- A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
- SAC-2012-BartschS #approach
- Guiding decisions on authorization policies: a participatory approach to decision support (SB, MAS), pp. 1502–1507.
- SAC-2012-BeusterG #modelling #security #smarttech
- Formal security policy models for smart card evaluations (GB, KG), pp. 1640–1642.
- SAC-2012-InzingerSHLD #adaptation #optimisation
- Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
- CASE-2012-HanXZLW #concurrent
- Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
- CASE-2012-LiJJ
- A pull VPLs based release policy and dispatching rule for semiconductor wafer fabrication (YL, ZJ, WJ), pp. 396–400.
- CASE-2012-SharabianiD
- Observation policies for patient and resource tracking in outpatient clinics (AS, HD), pp. 532–537.
- DATE-2012-YangGBSC #game studies #graph #resource management
- Playing games with scenario- and resource-aware SDF graphs through policy iteration (YY, MG, TB, SS, HC), pp. 194–199.
- HPCA-2012-LeeK #architecture #cpu #gpu #named
- TAP: A TLP-aware cache management policy for a CPU-GPU heterogeneous architecture (JL, HK), pp. 91–102.
- ISMM-2012-ZhouD #configuration management #locality #manycore #memory management
- Memory management for many-core processors with software configurable locality policies (JZ, BD), pp. 3–14.
- PDP-2012-AzampanahKBJS #adaptation #named #tex
- LATEX: New Selection Policy for Adaptive Routing in Application-Specific NoC (SA, AK, NB, MJ, RS), pp. 515–519.
- CAV-2012-FredriksonJJRPSY #abstraction #performance #refinement #runtime #using
- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
- ICST-2012-BertolinoDLM #automation #generative #testing
- Automatic XACML Requests Generation for Policy Testing (AB, SD, FL, EM), pp. 842–849.
- ICST-2012-ElrakaibyMT #analysis #mutation testing #testing #using
- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
- HT-2011-SquicciariniSLW #adaptation #image #named #predict #resource management
- A3P: adaptive policy prediction for shared images over popular content sharing sites (ACS, SS, DL, JW), pp. 261–270.
- JCDL-2011-WingetS #development #documentation #game studies
- Game development documentation and institutional collection development policy (MAW, WWS), pp. 29–38.
- VLDB-2011-AtaullahT #database #modelling
- Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
- SEFM-2011-Pedercini #communication #modelling #process
- Models and Communication in the Policy Process (MP), pp. 35–37.
- SEFM-2011-Pedercini11a #analysis #development
- Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
- AIIDE-2011-TastanS #game studies #learning #using
- Learning Policies for First Person Shooter Games Using Inverse Reinforcement Learning (BT, GRS).
- CIG-2011-SarjantPDS #game studies #online #relational #using
- Using the online cross-entropy method to learn relational policies for playing different games (SS, BP, KD, TS), pp. 182–189.
- VS-Games-2011-KardaraFAPTV #architecture #simulation
- A Service Oriented Architecture Enabling Policy Simulation in Virtual Spaces (MK, OF, FA, AP, KT, TAV), pp. 236–243.
- GCM-2010-BottoniFP11 #constraints #incremental
- Incremental update of constraint-compliant policy rules (PB, AF, FPP).
- CHI-2011-KomanduriSKMBCCE #people
- Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
- CSCW-2011-SantosSCKSRRT #open source
- Intellectual property policy and attractiveness: a longitudinal study of free and open source software projects (CDSJ, MBC, FK, JS, VR, DR, TT), pp. 705–708.
- ICEIS-v2-2011-LiQLZ #research #simulation
- Research and Demonstration of Agricultural Policy Simulation based on CGE Model (ZL, QQ, YL, DZ), pp. 13–17.
- ICEIS-v3-2011-ZhangZZY
- Inventory Management Policies of Gold Jewelry Retailers (JZ, YZ, ZZ, HY), pp. 517–522.
- ICEIS-v4-2011-YangZZZ
- Urban Motor Vehicle Limiting Policy based on System Dynamics (HY, ZZ, YZ, HZ), pp. 539–542.
- ICML-2011-BazzaniFLMT #learning #network #recognition #video
- Learning attentional policies for tracking and recognition in video with deep networks (LB, NdF, HL, VM, JAT), pp. 937–944.
- ICML-2011-DeisenrothR #approach #modelling #named
- PILCO: A Model-Based and Data-Efficient Approach to Policy Search (MPD, CER), pp. 465–472.
- ICML-2011-DudikLL #evaluation #learning #robust
- Doubly Robust Policy Evaluation and Learning (MD, JL, LL), pp. 1097–1104.
- ICML-2011-GabillonLGS #classification
- Classification-based Policy Iteration with a Critic (VG, AL, MG, BS), pp. 1049–1056.
- ICML-2011-LiuLC #infinity #representation
- The Infinite Regionalized Policy Representation (ML, XL, LC), pp. 769–776.
- ICML-2011-Neumann
- Variational Inference for Policy Search in changing situations (GN), pp. 817–824.
- KEOD-2011-KhuratS #approach #ontology #verification
- An Ontological Approach to Verifying P3P Policies (AK, BS), pp. 349–353.
- SEKE-2011-RomeikatBS #modelling
- Modeling of Domain-Specific ECA Policies (RR, BB, HS), pp. 52–58.
- OOPSLA-2011-Kulkarni #compilation #jit
- JIT compilation policy for modern machines (PAK), pp. 773–788.
- PLDI-2011-SrivastavaBMS #api #detection #implementation #multi #security #using
- A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
- PPDP-2011-BourdierC #analysis #network #security #term rewriting #using
- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
- SAC-2011-ShiC #authoring #data access #interface #natural language
- A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
- CASE-2011-NazeemR #classification #concurrent #design #resource management
- Designing maximally permissive deadlock avoidance policies for sequential resource allocation systems through classification theory (AN, SAR), pp. 405–412.
- DAC-2011-WangXAP #classification #learning #power management #using
- Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
- ESOP-2011-JensenKP
- Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
- CADE-2011-AlbertiAR #analysis #automation #named #security
- ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
- DocEng-2010-SimskeB #automation #named
- APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
- VLDB-2010-YiuUST #detection #mobile #performance #proximity #self
- Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
- ICALP-v2-2010-Fearnley #bound #exponential
- Exponential Lower Bounds for Policy Iteration (JF), pp. 551–562.
- CHI-2010-InglesantS #cost analysis
- The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
- CHI-2010-LipfordWWFR #comparison #interface #privacy #visual notation
- Visual vs. compact: a comparison of privacy policy interfaces (HRL, JW, MW, KF, RWR), pp. 1111–1114.
- CAiSE-2010-GaaloulZCG
- Dynamic Authorisation Policies for Event-Based Task Delegation (KG, EZ, FC, CG), pp. 135–149.
- ICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #security
- Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
- CIKM-2010-KulkarniC #distributed #documentation
- Document allocation policies for selective searching of distributed indexes (AK, JC), pp. 449–458.
- ICML-2010-LazaricGM #algorithm #analysis #classification
- Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
- ICML-2010-ThieryS #problem #trade-off
- Least-Squares Policy Iteration: Bias-Variance Trade-off in Control Problems (CT, BS), pp. 1071–1078.
- KEOD-2010-Occelli
- Reconciling Tempus and Hora — Policy Knowledge in an Information Wired Environment (SO), pp. 213–217.
- MoDELS-v2-2010-MorinKKJ #aspect-oriented #flexibility #modelling
- Flexible Model Element Introduction Policies for Aspect-Oriented Modeling (BM, JK, JK, JMJ), pp. 63–77.
- POPL-2010-MartinHCAC #c #c++ #concurrent #source code
- Dynamically checking ownership policies in concurrent c/c++ programs (JPM, MH, MC, PA, MC), pp. 457–470.
- RE-2010-YoungA #identification #requirements
- A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
- ICSE-2010-WangZ #case study #development #multi
- Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
- SAC-2010-BaffaC #generative #modelling #simulation
- Modeling POMDPs for generating and simulating stock investment policies (ACEB, AEMC), pp. 2394–2399.
- SAC-2010-ClaycombLSK #network #security
- A group-based security policy for wireless sensor networks (WC, RL, DS, BK), pp. 778–785.
- SAC-2010-LeePKKS #hybrid #network #retrieval
- A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks (JL, GLP, SWK, HJK, SYS), pp. 189–193.
- CASE-2010-FengZL #evaluation #multi #performance #scheduling
- Performance evaluation of a multi-product system with setups and dynamic scheduling policies (WF, LZ, NL), pp. 960–965.
- CASE-2010-SinghR #clustering #energy #optimisation
- Energy optimization policies for server clusters (NS, SR), pp. 293–300.
- DAC-2010-HaquePJP #approach #embedded #named #performance #simulation
- SCUD: a fast single-pass L1 cache simulation approach for embedded processors with round-robin replacement policy (MSH, JP, AJ, SP), pp. 356–361.
- DATE-2010-HaquePJP #approach #embedded #named #performance #simulation
- DEW: A fast level 1 cache simulation approach for embedded processors with FIFO replacement policy (MSH, JP, AJ, SP), pp. 496–501.
- DATE-2010-JanapsatyaIPP #adaptation #algorithm
- Dueling CLOCK: Adaptive cache replacement policy based on the CLOCK algorithm (AJ, AI, JP, SP), pp. 920–925.
- OSDI-2010-Chlipala #security #static analysis
- Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications (AC), pp. 105–118.
- PDP-2010-BasileLV #independence #specification #towards
- Towards a Network-Independent Policy Specification (CB, AL, MV), pp. 649–653.
- ESOP-2010-AdjeGG #invariant #static analysis
- Coupling Policy Iteration with Semi-definite Relaxation to Compute Accurate Numerical Invariants in Static Analysis (AA, SG, EG), pp. 23–42.
- ESOP-2010-SwamyCC #data flow
- Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
- CAV-2010-BasinKM #first-order #logic #monitoring
- Policy Monitoring in First-Order Temporal Logic (DAB, FK, SM), pp. 1–18.
- ICST-2010-BruckerBKW #generative #testing
- Verified Firewall Policy Transformations for Test Case Generation (ADB, LB, PK, BW), pp. 345–354.
- ICPC-2009-HuangDS #prototype #source code
- Prototyping synchronization policies for existing programs (YH, LKD, REKS), pp. 289–290.
- LATA-2009-BaaderBT
- Matching Trace Patterns with Regular Policies (FB, AB, AT), pp. 105–116.
- CIG-2009-GalliLL #learning
- Learning a context-aware weapon selection policy for Unreal Tournament III (LG, DL, PLL), pp. 310–316.
- FDG-2009-Greene #social
- Waging wars in wangba: political policy and social practice in Chinese MMO culture (MG), pp. 342–343.
- EDOC-2009-GovernatoriI #modelling #network #reasoning #social
- Modelling and Reasoning Languages for Social Networks Policies (GG, RI), pp. 193–200.
- ICEIS-ISAS-2009-EdgeSPC #compilation #specification
- Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
- ICEIS-ISAS-2009-FerriniB #approach
- A Comprehensive Approach for Solving Policy Heterogeneity (RF, EB), pp. 63–68.
- ICML-2009-BoulariasC #predict
- Predictive representations for policy gradient in POMDPs (AB, BCd), pp. 65–72.
- ICML-2009-Heidrich-MeisnerI
- Hoeffding and Bernstein races for selecting policies in evolutionary direct policy search (VHM, CI), pp. 401–408.
- ICML-2009-PazisL #learning
- Binary action search for learning continuous-action control policies (JP, MGL), pp. 793–800.
- SEKE-2009-KulkarniCZ #framework #monitoring #named #online
- iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
- SIGIR-2009-FetterlyCV #effectiveness #web
- The impact of crawl policy on web search effectiveness (DF, NC, VV), pp. 580–587.
- SIGAda-2009-TijeroG #ada #experience #middleware #scheduling
- Experience in integrating interchangeable scheduling policies into a distribution middleware for Ada (HPT, JJG), pp. 73–78.
- SAC-2009-ChiangWLC #clustering #multi #web
- New content-aware request distribution policies in web clusters providing multiple services (MLC, CHW, YJL, YFC), pp. 79–83.
- SAC-2009-MarconSLS #architecture
- Policy management architecture based on provisioning model and authorization certificates (ALMJ, AOS, LAdPLJ, MS), pp. 1594–1598.
- SAC-2009-YokoyamaHSK #internet #operating system #security
- Simplifying security policy descriptions for internet servers in secure operating systems (TY, MH, MS, KK), pp. 326–333.
- DATE-2009-SubramanianGD #adaptation #configuration management #design #embedded #grid #network #online
- Online adaptation policy design for grid sensor networks with reconfigurable embedded nodes (VS, MG, AD), pp. 1273–1278.
- HPCA-2009-Chaudhuri #locality #multi #named #scalability
- PageNUCA: Selected policies for page-grain locality management in large shared chip-multiprocessor caches (MC), pp. 227–238.
- ISMM-2009-GuanSJ #performance #using
- Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
- LCTES-2009-CaspiCGPR #memory management #scheduling
- Synchronous objects with scheduling policies: introducing safe shared memory in lustre (PC, JLC, LG, MP, PR), pp. 11–20.
- ESOP-2009-RajanTSL #composition #design #named #verification #web #web service
- Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services (HR, JT, SMS, GTL), pp. 333–347.
- TACAS-2009-GofmanLSZYS #analysis #data access #named
- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
- ICST-2009-MouelhiTB #functional #security #testing
- Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
- SAT-2009-NikolicMJ #satisfiability
- Instance-Based Selection of Policies for SAT Solvers (MN, FM, PJ), pp. 326–340.
- SAT-2009-PipatsrisawatD #satisfiability
- Width-Based Restart Policies for Clause-Learning Satisfiability Solvers (KP, AD), pp. 341–355.
- CBSE-2008-RusselloMD #component #framework #named
- ESCAPE: A Component-Based Policy Framework for Sense and React Applications (GR, LM, ND), pp. 212–229.
- ICALP-C-2008-GoyalJPS #bound #encryption
- Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
- SEFM-2008-SalasK #modelling #privacy #testing #using
- Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
- SEFM-2008-TschantzW
- Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
- CHI-2008-BauerCRRV #case study #flexibility #user study
- A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
- CHI-2008-ButlerJP #wiki
- Don’t look now, but we’ve created a bureaucracy: the nature and roles of policies and rules in wikipedia (BSB, EJ, JP), pp. 1101–1110.
- CHI-2008-ReederBCRBHS #authoring #security #visualisation
- Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
- ICEIS-DISI-2008-MuldnerML #data access #dataset #xml
- Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
- ICML-2008-BarrettN #learning #multi
- Learning all optimal policies with multiple criteria (LB, SN), pp. 41–47.
- ICML-2008-KerstingD #parametricity #relational
- Non-parametric policy gradients: a unified treatment of propositional and relational domains (KK, KD), pp. 456–463.
- ICML-2008-UenoKMMI #approach #evaluation #statistics
- A semiparametric statistical approach to model-free policy evaluation (TU, MK, TM, SiM, SI), pp. 1072–1079.
- KR-2008-MartinezPPSS #consistency #nondeterminism
- Inconsistency Management Policies (MVM, FP, AP, GIS, VSS), pp. 367–377.
- MoDELS-2008-CombemaleBCDH #domain-specific language #specification #uml
- Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
- MoDELS-2008-MouelhiFBT #deployment #framework #modelling #security #specification #testing
- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
- MoDELS-2008-RosseboR #composition #specification #uml #using
- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
- MoDELS-2008-CombemaleBCDH #domain-specific language #specification #uml
- Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
- MoDELS-2008-MouelhiFBT #deployment #framework #modelling #security #specification #testing
- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
- MoDELS-2008-RosseboR #composition #specification #uml #using
- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
- PADL-2008-BeckerN #abduction #declarative
- The Role of Abduction in Declarative Authorization Policies (MYB, SN), pp. 84–99.
- PPDP-2008-BertolissiF #composition #data access #framework
- A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
- ASE-2008-ChauvelBBJ #adaptation #composition
- Composition of Qualitative Adaptation Policies (FC, OB, IB, JMJ), pp. 455–458.
- SAC-2008-BaveraB #analysis #bytecode #data flow #type system
- Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
- SAC-2008-BrotoHSPT #specification
- Autonomic management policy specification in Tune (LB, DH, PS, NDP, ST), pp. 1658–1663.
- DATE-2008-MassasP #comparison #manycore #memory management
- Comparison of memory write policies for NoC based Multicore Cache Coherent Systems (PGdM, FP), pp. 997–1002.
- DATE-2008-MulasPBCABAM #architecture #multi #streaming
- Thermal Balancing Policy for Streaming Computing on Multiprocessor Architectures (FM, MP, MB, SC, AA, LB, DA, GDM), pp. 734–739.
- LCTES-2008-ReinekeG #analysis
- Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
- OSDI-2008-ZeldovichKDK #hardware #memory management #security #using
- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
- ICLP-2008-BeniniBM #constraints #multi #platform #programming #resource management #using
- Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
- ICLP-2008-GelfondL
- Authorization and Obligation Policies in Dynamic Systems (MG, JL), pp. 22–36.
- ICST-2008-PretschnerMT #data access #modelling #testing
- Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
- ECDL-2007-KoulourisK
- Policy Decision Tree for Academic Digital Collections (AK, SK), pp. 481–484.
- SIGMOD-2007-QiaoSFPCBK #database #framework
- A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
- IFM-2007-BraghinSB #automation #mobile #security #verification
- Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
- ILC-2007-WozniakDW #abstraction #data type
- Dynamic ADTs: a “don’t ask, don’t tell” policy for data abstraction (GW, MD, SW), p. 26.
- HIMI-IIE-2007-KrachinaRT #ontology #perspective #privacy #semantics
- Reconciling Privacy Policies and Regulations: Ontological Semantics Perspective (OK, VR, KET), pp. 730–739.
- HIMI-IIE-2007-VuCGCSNPP #how #privacy
- How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
- CAiSE-2007-BaresiGP #aspect-oriented #process
- Policies and Aspects for the Supervision of BPEL Processes (LB, SG, PP), pp. 340–354.
- CAiSE-2007-MaamarNBS #transaction #web #web service
- Policies for Context-Driven Transactional Web Services (ZM, NCN, DB, SS), pp. 249–263.
- ICEIS-DISI-2007-BarkerD #algebra #information management
- Secure knowledge exchange by policy algebra and erml (SB, PD), pp. 212–217.
- ICEIS-SAIC-2007-LazanasKK #hybrid #recommendation #web #web service
- Applying Hybrid Recommendation Policies through Agent-Invoked Web Services in E-Markets (AL, NIK, VK), pp. 161–166.
- CIKM-2007-TanMG #clustering #crawling #design #web
- Designing clustering-based web crawling policies for search engine crawlers (QT, PM, CLG), pp. 535–544.
- SIGIR-2007-NtoulasC #correctness
- Pruning policies for two-tiered inverted index with correctness guarantee (AN, JC), pp. 191–198.
- PPDP-2007-HristovaTL #analysis #performance #trust
- Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
- ICSE-2007-PistoiaFFY #enterprise #modelling #security #validation
- When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
- SAC-2007-KumarMS #mobile
- A weighted cache replacement policy for location dependent data in mobile environments (AK, MM, AKS), pp. 920–924.
- SAC-2007-OrlovskyR #distributed #security
- Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
- CASE-2007-ReveliotisR0 #algebra #concurrent #correctness #programming #verification
- Correctness Verification of Generalized Algebraic Deadlock Avoidance Policies through Mathematical Programming (SR, ER, JYC), pp. 200–206.
- HPCA-2007-EyermanE #parallel #smt
- A Memory-Level Parallelism Aware Fetch Policy for SMT Processors (SE, LE), pp. 240–249.
- ISMM-2007-XianSJ #concurrent #garbage collection #performance #scheduling #thread
- Allocation-phase aware thread scheduling policies to improve garbage collection performance (FX, WSa, HJ), pp. 79–90.
- ESOP-2007-GaubertGTZ #relational #static analysis
- Static Analysis by Policy Iteration on Relational Domains (SG, EG, AT, SZ), pp. 237–252.
- CSL-2007-Goller #complexity #on the #reasoning
- On the Complexity of Reasoning About Dynamic Policies (SG), pp. 358–373.
- CBSE-2006-GoeminneJTDG #framework #platform
- Service Policy Enhancements for the OSGi Service Platform (NG, GDJ, FDT, BD, FG), pp. 238–253.
- HT-2006-McCownN #crawling #evaluation
- Evaluation of crawling policies for a web-repository crawler (FM, MLN), pp. 157–168.
- VLDB-2006-Song
- IT839 Policy Leading to u-Korea (JHS), p. 1103.
- CHI-2006-KaratKBF #authoring #interface #privacy
- Evaluating interfaces for privacy policy rule authoring (CMK, JK, CB, JF), pp. 83–92.
- EDOC-2006-LiG
- Composing Administrative Scope of Delegation Policies based on extended XACML (XFL, DF), pp. 467–470.
- ICEIS-ISAS-2006-BenferhatB #security
- Argument-Based Approaches in Prioritized Conflicting Security Policies (SB, REB), pp. 349–354.
- ICEIS-SAIC-2006-SattanathanNMM #web #web service
- Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
- ICML-2006-BowlingMJNW #learning #predict #using
- Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
- ICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #process #using
- Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
- ICPR-v3-2006-IsukapalliE #identification #learning
- Learning Policies for Efficiently Identifying Objects of Many Classes (RI, AME, RG), pp. 356–361.
- KR-2006-Coste-MarquisFLBM #quantifier #representation
- Representing Policies for Quantified Boolean Formulae (SCM, HF, JL, DLB, PM), pp. 286–297.
- AdaEurope-2006-CamposGH #middleware #realtime #scheduling
- Interchangeable Scheduling Policies in Real-Time Middleware for Distribution (JLC, JJG, MGH), pp. 227–240.
- SAC-2006-LeongG
- Improving the performances of proxy cache replacement policies by considering infrequent objects (HWL, BG), pp. 791–796.
- SAC-2006-WelchL #security
- Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
- CASE-2006-XingTXH #complexity #concurrent #flexibility #polynomial
- Optimal Polynomial Complexity Deadlock Avoidance Policies for Manufacturing Systems with Flexible Routings (KX, FT, HX, BH), pp. 448–453.
- DATE-2006-PettisRL #automation #operating system #runtime
- Automatic run-time selection of power policies for operating systems (NP, JR, YHL), pp. 508–513.
- HPDC-2006-BaiardiRMV #monitoring #virtual machine
- Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
- OSDI-2006-KimR #interface #network
- Connection Handoff Policies for TCP Offload Network Interfaces (HyK, SR), pp. 293–306.
- ESOP-2006-BrobergS #calculus #towards
- Flow Locks: Towards a Core Calculus for Dynamic Flow Policies (NB, DS), pp. 180–196.
- FoSSaCS-2006-PitcherR
- Dynamic Policy Discovery with Remote Attestation (CP, JR), pp. 111–125.
- FATES-RV-2006-FalconeFMR #calculus #framework #network #security
- A Test Calculus Framework Applied to Network Security Policies (YF, JCF, LM, JLR), pp. 55–69.
- IJCAR-2006-DoughertyFK #reasoning #specification
- Specifying and Reasoning About Dynamic Access-Control Policies (DJD, KF, SK), pp. 632–646.
- DocEng-2005-GenevesR #compilation #streaming #xpath
- Compiling XPath for streaming access policy (PG, KHR), pp. 52–54.
- ECDL-2005-KoulourisK
- Policy Model for University Digital Collections (AK, SK), pp. 356–367.
- ECDL-2005-KoulourisK05a
- Policy Model for National and Academic Digital Collections (AK, SK), pp. 525–526.
- SEFM-2005-WilsonMC #approach #configuration management #flexibility #verification
- Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification (TW, SM, RGC), pp. 150–159.
- ICEIS-v1-2005-EzekielM #health
- An Integrated Decision Support Tool for EU Policies on Health, Transport and Artistic Heritage Recovery (KE, FM), pp. 261–266.
- ICEIS-v3-2005-KurumaH #community
- A Model for Policy Based Service Community (HK, SH), pp. 360–366.
- AdaEurope-2005-RivasMH #ada #scheduling
- Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks (MAR, JM, MGH), pp. 220–235.
- PLDI-2005-BauerLW #security
- Composing security policies with polymer (LB, JL, DW), pp. 305–314.
- POPL-2005-LiZ
- Downgrading policies and relaxed noninterference (PL, SZ), pp. 158–170.
- PPDP-2005-EchahedP #declarative #security
- Security policy in a declarative style (RE, FP), pp. 153–163.
- RE-2005-Corniou #challenge #information management
- The Role of Information Systems within Corporate Strategy and Management Policies: New Challenges (JPC), p. 4.
- RE-2005-CrookIN #modelling #on the
- On Modelling Access Policies: Relating Roles to their Organisational Context (RC, DCI, BN), pp. 157–166.
- ICSE-2005-ChinKQPN #alias #safety #verification
- Verifying safety policies with size properties and alias controls (WNC, SCK, SQ, CP, HHN), pp. 186–195.
- ICSE-2005-FislerKMT #impact analysis #verification
- Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
- SAC-2005-MendoncaS #empirical #evaluation #web #web service
- An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
- SAC-2005-NeisseAGT #network
- Policies translation for integrated management of grids and networks (RN, MJBA, LZG, LMRT), pp. 724–729.
- SAC-2005-SohrDA #information management #security #specification
- Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
- SAC-2005-Ungureanu #enterprise #performance
- Efficient support for enterprise delegation policies (VU), pp. 340–345.
- CASE-2005-WeiL #concurrent #programming #using
- A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
- LCTES-2005-XuZRMM #clustering #embedded #energy
- Energy-efficient policies for embedded clusters (RX, DZ, CR, RGM, DM), pp. 1–10.
- ESOP-2005-FournetGM
- A Type Discipline for Authorization Policies (CF, ADG, SM), pp. 141–156.
- ESOP-2005-Myers #programming #security
- Programming with Explicit Security Policies (ACM), pp. 1–4.
- FoSSaCS-2005-BartolettDF #data access
- History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
- CAV-2005-CostanGGMP #algorithm #fixpoint #source code #static analysis
- A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs (AC, SG, EG, MM, SP), pp. 462–475.
- ECDL-2004-Holmstrom #paradigm #privacy #standard
- Managing a Paradigm Shift — Aligning Management, Privacy Policy, Technology and Standards (JH), pp. 442–451.
- ECDL-2004-WeissmanL #towards
- Towards a Policy Language for Humans and Computers (VW, CL), pp. 513–525.
- SIGMOD-2004-Hall #challenge #requirements
- Requirements and Policy Challenges in Highly Secure Environments (DEH), pp. 897–898.
- CHI-2004-JensenP #evaluation #online #privacy #tool support
- Privacy policies as decision-making tools: an evaluation of online privacy notices (CJ, CP), pp. 471–478.
- CSCW-2004-MorrisRSFV #coordination #multi #protocol #social
- Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
- ICML-2004-Strens #performance
- Efficient hierarchical MCMC for policy search (MJAS).
- KR-2004-BaralE #algorithm #polynomial
- A Polynomial-Time Algorithm for Constructing k-Maintainable Policies (CB, TE), pp. 720–730.
- ECOOP-2004-AldrichC #alias
- Ownership Domains: Separating Aliasing Policy from Mechanism (JA, CC), pp. 1–25.
- ECOOP-2004-ScharliDNW #composition #encapsulation
- Composable Encapsulation Policies (NS, SD, ON, RW), pp. 26–50.
- AdaEurope-2004-MinguetFGB #ada #scheduling
- Mixing Scheduling Policies in Ada (AEM, AGF, VLG, ATB), pp. 273–282.
- ICSE-2004-LingenH #composition #configuration management #framework
- An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition (RvdL, AvdH), pp. 573–582.
- ICSE-2004-WohlstadterTMRD #interactive #middleware #named
- GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions (EW, ST, TAM, IR, PTD), pp. 189–199.
- SAC-2004-BackesKBS #comparison #enterprise #performance #privacy
- Efficient comparison of enterprise privacy policies (MB, GK, WB, MS), pp. 375–382.
- SAC-2004-ParkerC #protocol
- Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
- ISMM-2004-Smaragdakis #adaptation
- General adaptive replacement policies (YS), pp. 108–119.
- FoSSaCS-2004-PucellaW #reasoning
- Reasoning about Dynamic Policies (RP, VW), pp. 453–467.
- ITiCSE-2003-GrangerL #internet
- Classroom discussions: policies and responsibilities of Internet Service Providers (MJG, JCL), pp. 99–103.
- FME-2003-DenneyF #correctness #safety
- Correctness of Source-Level Safety Policies (ED, BF), pp. 894–913.
- ICEIS-v4-2003-KammanahalliSGV
- A Time Zone Based Dynamic Cache Replacement Policy (HK, KS, SG, SV), pp. 494–497.
- ICEIS-v4-2003-RoqueOL #component #composition #visual notation
- Policies Composition Through Graphical Components (VR, JLO, RPL), pp. 464–467.
- ICML-2003-GhavamzadehM #algorithm
- Hierarchical Policy Gradient Algorithms (MG, SM), pp. 226–233.
- ICML-2003-MannorRG #performance
- The Cross Entropy Method for Fast Policy Search (SM, RYR, YG), pp. 512–519.
- ICML-2003-Munos #approximate #bound #fault
- Error Bounds for Approximate Policy Iteration (RM), pp. 560–567.
- ICML-2003-WangD #learning #modelling
- Model-based Policy Gradient Reinforcement Learning (XW, TGD), pp. 776–783.
- UML-2003-AlghathbarW #case study #consistency #data access
- Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
- AdaEurope-2003-BurnsHW #ada #scheduling
- A Round Robin Scheduling Policy for Ada (AB, MGH, AJW), pp. 334–343.
- REFSQ-J-2002-AntonEC03 #behaviour #privacy #requirements #security
- Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
- REFSQ-J-2002-CrookIN03 #modelling #requirements #using
- Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
- RE-2003-KaiyaSMK #analysis #java #mobile #requirements #security #trade-off
- Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
- SAC-2003-MucciniM #coordination #elicitation #requirements
- Eliciting Coordination Policies from Requirements (HM, FM), pp. 387–393.
- DAC-2003-MeyerowitzPS #realtime #scheduling
- A tool for describing and evaluating hierarchical real-time bus scheduling policies (TM, CP, ALSV), pp. 312–317.
- HPCA-2003-El-MoursyA #performance #smt
- Front-End Policies for Improved Issue Efficiency in SMT Processors (AEM, DHA), pp. 31–40.
- HPDC-2003-BucurE #clustering #multi #simulation
- Trace-Based Simulations of Processor Co-Allocation Policies in Multiclusters (AIDB, DHJE), pp. 70–79.
- HPDC-2003-RamanLS #resource management
- Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching (RR, ML, MHS), pp. 80–89.
- HPDC-2003-SievertC #process
- Policies for Swapping MPI Processes (OS, HC), pp. 104–113.
- PDP-2003-VerdosciaS #communication
- CODACS Project: Level-Node Communication Policies (LV, US), pp. 134–139.
- SOSP-2003-Arpaci-DusseauABDEGNP #kernel
- Transforming policies into mechanisms with infokernel (ACAD, RHAD, NCB, TED, TJE, HSG, JAN, FIP), pp. 90–105.
- FASE-2003-KochP #specification #verification #visual notation
- Visual Specifications of Policies and Their Verification (MK, FPP), pp. 278–293.
- FASE-2003-ScottBM #mobile #security
- Spatial Security Policies for Mobile Agents in a Sentient Computing Environment (DJS, ARB, AM), pp. 102–117.
- CBSE-2003-VecellioT #framework #predict
- Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
- HT-2002-TataGW #concept #hypermedia #implementation #prototype
- Policies for cooperative hypermedia systems: concepts and prototype implementation (ST, CG, UKW), pp. 140–141.
- JCDL-2002-Heidorn #implementation
- Biodiversity and biocomplexity informatics: policy and implementation science versus citizen science (PBH), pp. 362–364.
- VLDB-2002-BettiniJWW #security
- Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
- VLDB-2002-SeifertS #hybrid #multi
- A Multi-version Cache Replacement and Prefetching Policy for Hybrid Data Delivery Environments (AS, MHS), pp. 850–861.
- ICGT-2002-KochP #constraints #graph
- Describing Policies with Graph Constraints and Rules (MK, FPP), pp. 223–238.
- ICSE-2002-GreenhouseS #concurrent #evolution #source code
- Assuring and evolving concurrent programs: annotations and policy (AG, WLS), pp. 453–463.
- SAC-2002-Bell #interactive #security #simulation
- Interactive simulation of security policies (GB), pp. 247–252.
- FoSSaCS-2002-KochMP #data access #detection #specification
- Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
- JCDL-2001-Khoo #analysis #community #design #overview
- Community design of DLESE’s collections review policy: a technological frames analysis (MK), pp. 157–164.
- EDOC-2001-DunlopIR #enterprise #evolution #scalability
- Dynamic Policy Model for Large Evolving Enterprises (ND, JI, KR), p. 193–?.
- ICEIS-v2-2001-MartinCLG #e-commerce #security
- Planning Security Policy on E-Commerce (MM, AC, JL, RG), pp. 915–919.
- ICML-2001-GlickmanS #learning #memory management #probability #search-based
- Evolutionary Search, Stochastic Policies with Memory, and Reinforcement Learning with Hidden State (MRG, KPS), pp. 194–201.
- ICML-2001-StrensM #statistics #testing #using
- Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
- AdaEurope-2001-Burns #ada
- Defining New Non-preemptive Dispatching and Locking Policies for Ada (AB), pp. 328–336.
- RE-2001-AntonEAP #privacy #requirements
- The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
- ASE-2001-AndradeFW #automation #configuration management
- Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
- ASE-2001-LowryPR
- Certifying Domain-Specific Policies (MRL, TP, GR), pp. 81–90.
- SAC-2001-VuongSD #distributed #security #using #xml
- Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
- HPDC-2001-SanderAFR #network
- End-to-End Provision of Policy Information for Network QoS (VS, WAA, ITF, AJR), pp. 115–126.
- PDP-2001-TesseraD #case study #communication #performance
- Communication Policies Performance: A Case Study (DT, AD), p. 491–?.
- FoSSaCS-2001-KochMP #approach #data access #graph #specification
- Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
- SIGMOD-2000-BressanGOT #approach
- Integrating Replacement Policies in StorM: An Extensible Approach (CLG, BCO, SB, KLT), p. 599.
- CIKM-2000-XuHLL #named #on-demand #performance
- SAIU: An Efficient Cache Replacement Policy for Wireless On-demand Broadcasts (JX, QH, DLL, WCL), pp. 46–53.
- ICML-2000-GrudicU
- Localizing Policy Gradient Estimates to Action Transition (GZG, LHU), pp. 343–350.
- ICML-2000-PrecupSS #evaluation
- Eligibility Traces for Off-Policy Policy Evaluation (DP, RSS, SPS), pp. 759–766.
- KR-2000-ChomickiLN #approach #logic programming
- A Logic Programming Approach to Conflict Resolution in Policy Management (JC, JL, SAN), pp. 121–132.
- KR-2000-MartinG #concept #learning #using
- Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
- POPL-2000-Walker #security #type system
- A Type System for Expressive Security Policies (DW), pp. 254–267.
- ASE-2000-BoseM #automation #coordination #generative
- Systematic Generation of Dependable Change Coordination Plans for Automated Switching of Coordination Policies (PKB, MGM), p. 325–?.
- HPCA-2000-WongB #behaviour
- Modified LRU Policies for Improving Second-Level Cache Behavior (WAW, JLB), pp. 49–60.
- HPDC-2000-SchroderH #evaluation
- Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness (BS, MHB), pp. 211–220.
- OSDI-2000-GrunwaldLFMN #scheduling
- Policies for Dynamic Clock Scheduling (DG, PL, KIF, CBMI, MN), pp. 73–86.
- FASE-2000-Parisi-PresicceW #configuration management #graph transformation #using
- Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
- HCI-CCAD-1999-StephanidisSEA #design
- Policy perspectives on “design for all” (CS, GS, PLE, DA), pp. 868–872.
- EDOC-1999-Linington #community #enterprise #uml #using
- Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
- EDOC-1999-SteenD #enterprise #formal method
- Formalising ODP enterprise policies (MWAS, JD), pp. 84–93.
- ICML-1999-NgHR #theory and practice
- Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping (AYN, DH, SJR), pp. 278–287.
- ICML-1999-PeshkinMK #learning #memory management
- Learning Policies with External Memory (LP, NM, LPK), pp. 307–314.
- STOC-1999-Gamarnik #adaptation #network
- Stability of Adaptive and Non-Adaptive Packet Routing Policies in Adversarial Queueing Networks (DG), pp. 206–214.
- ITiCSE-1998-Culwin #assessment #web
- Web hosted assessment — possibilities and policy (FC), pp. 55–58.
- FM-1998-KoobUW #formal method #modelling #process #security #topic #using
- The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
- EDOC-1998-LiningtonMR #community #enterprise
- Policies in communities: extending the ODP enterprise viewpoint (PFL, ZM, KR), pp. 14–24.
- CIKM-1998-Horvitz
- Continual Computation Policies for Utility-Directed Prefetching (EH), pp. 175–184.
- ICML-1998-LochS #markov #process #using
- Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
- TOOLS-ASIA-1998-Poo
- Policy Definition in Application-Domain-Related Classes (DCCP), pp. 94–103.
- FSE-1998-AstleyA #abstraction #distributed #middleware
- Customizaton and Compositon of Distributed Objects: Middleware Abstractions for Policy Management (MA, GA), pp. 1–9.
- SAC-1998-KimYL #analysis
- Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
- DAC-1998-PaleologoBBM #optimisation #power management
- Policy Optimization for Dynamic Power Management (GAP, LB, AB, GDM), pp. 182–187.
- CAV-1998-Wilding #proving #realtime #scheduling
- A Machine-Checked Proof of the Optimality of a Real-Time Scheduling Policy (MW), pp. 369–378.
- ADL-1997-WinslettCJS #library #privacy #security #transaction #web
- Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies (MW, NC, VEJ, IS), pp. 140–152.
- SIGMOD-1997-ColbyKLMR #maintenance #multi
- Supporting Multiple View Maintenance Policies (LSC, AK, DFL, ISM, KAR), pp. 405–416.
- SIGMOD-1997-JajodiaSSB #data access #framework #multi
- A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
- CAiSE-1997-DiazP #calculus #modelling #validation
- Stimuli and Business Policies as Modelling Constructs: Their Definition and Validation Through the Event Calculus (OD, NWP), pp. 33–46.
- EDOC-1997-LupuS
- A Policy Based Role Object Model (EL, MS), pp. 36–47.
- CSCW-1996-Edwards #collaboration
- Policies and Roles in Collaborative Applications (WKE), pp. 11–20.
- PODS-1995-ChaudhriH #database
- Safe Locking Policies for Dynamic Databases (VKC, VH), pp. 233–244.
- SIGMOD-1995-DanS #online #video
- An Online Video Placement Policy based on Bandwith to Space Ratio (BSR) (AD, DS), pp. 376–385.
- ICML-1995-LittmanCK #learning #scalability
- Learning Policies for Partially Observable Environments: Scaling Up (MLL, ARC, LPK), pp. 362–370.
- SIGMOD-1994-CookWZ #database #garbage collection
- Partition Selection Policies in Object Database Garbage Collection (JEC, ALW, BGZ), pp. 371–382.
- CIKM-1994-Shrufi #clustering #performance
- Performance of Clustering Policies in Object Bases (AS), pp. 80–87.
- FME-1993-Boswell #security #specification #validation
- Specification and Validation of a Security Policy Model (AB), pp. 42–51.
- TOOLS-PACIFIC-1993-HaebichT #object-oriented
- An Object-Oriented, Computational Model to Support the Formulation of a National Retirement Icome Policy (WH, TT), pp. 393–406.
- TOOLS-PACIFIC-1993-Taylor #reuse #towards
- Towards a Reuse Policy (PT), pp. 49–60.
- RE-1993-SibleyWMTL #requirements
- The role of policy in requirements definition (EHS, RLW, JBM, MCT, DCL), pp. 277–280.
- SAC-1993-RamakrishnanDN
- An Integrated Optimal Task Assignment Policy (SR, LAD, TN), pp. 789–795.
- DAC-1993-Nurnberger
- The Clinton/Gore Technology Policies (RDN), pp. 331–335.
- SIGMOD-1992-DanY #analysis #performance
- Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
- HPDC-1992-PuFSWY #comparison #distributed #performance
- Performance Comparison of Active-Sender and Active-Receiver Policies for Distributed Caching (CP, DF, PS, KLW, PSY), pp. 218–227.
- CAiSE-1991-McBrienNPSSTTW #specification
- A Rule Language to Capture and Model Business Policy Specifications (PM, MN, DP, AHS, US, BT, GT, RW), pp. 307–318.
- ASPLOS-1991-BoloskySFFC #architecture #memory management
- NUMA Policies and Their Relation to Memory Architecture (WJB, MLS, RPF, RJF, ALC), pp. 212–221.
- CSCW-1988-ConklinB #hypermedia #named
- gIBIS: A Hypertext Tool for Exploratory Policy Discussion (JC, MLB), pp. 140–152.
- OOPSLA-1988-UngarJ
- Tenuring Policies for Generation-Based Storage Reclamation (DU, FJ), pp. 1–17.
- VLDB-1985-LausenSW #concurrent
- Pre-Analysis Locking: A Safe and Deadlock Free Locking Policy (GL, ESS, PW), pp. 270–281.
- VLDB-1985-MedeirosT #comprehension
- Understanding the Implications of View Update Policies (CBM, FWT), pp. 316–323.
- SOSP-1985-MalkawiP #compilation #memory management #source code
- Compiler Directed Memory Management Policy For Numerical Programs (MM, JHP), pp. 97–106.
- SIGMOD-1983-KohlerWS #comparison #database
- An Experimental Comparison of Locking Policies in a Testbed Database System (WHK, KCW, JAS), pp. 108–119.
- SIGMOD-1977-LohmanM
- Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (GML, JAM), p. 157.
- SOSP-1977-Potier #analysis #set
- Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
- SOSP-1975-JonesL #security
- The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.
- SOSP-1975-LevinCCPW
- Policy/Mechanism Separation in HYDRA (RL, ESC, WMC, FJP, WAW), pp. 132–140.
- SOSP-J-1973-TeoreyP72 #analysis #comparative #scheduling
- A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
- SOSP-1971-TeoreyP #analysis #comparative #scheduling
- A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 114–121.