447 papers:
DAC-2015-McLaughlin #behaviour #policy- Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
DAC-2015-PengKPPJCL #3d #architecture #design #policy- Design, packaging, and architectural policy co-optimization for DC power integrity in 3D DRAM (YP, BWK, YSP, KIP, SJJ, JSC, SKL), p. 6.
DATE-2015-YinLLWG15a #policy- Cooperatively managing dynamic writeback and insertion policies in a last-level DRAM cache (SY, JL, LL, SW, YG), pp. 187–192.
SIGMOD-2015-UpadhyayaBS #automation #policy- Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
FM-2015-DuLT #independence #ltl #monitoring #policy #runtime- Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL (XD, YL, AT), pp. 231–247.
GCM-2015-BottoniNP #constraints #contract #modelling #policy- Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
CHI-2015-ZhangC #modelling #policy #predict #social #social media- Modeling Ideology and Predicting Policy Change with Social Media: Case of Same-Sex Marriage (AXZ, SC), pp. 2603–2612.
CSCW-2015-WongJ #framework #policy- Wireless Visions: Infrastructure, Imagination, and US Spectrum Policy (RYW, SJJ), pp. 105–115.
HIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #policy #simulation #visualisation- Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
CAiSE-2015-DelmasP #policy #requirements #verification- Need-to-Share and Non-diffusion Requirements Verification in Exchange Policies (RD, TP), pp. 151–165.
ICEIS-v2-2015-OliveiraF #bibliography #enterprise #framework #policy #sorting- A Spatial Data Infrastructure Review — Sorting the Actors and Policies from Enterprise Viewpoint (ILO, JLF), pp. 287–294.
ICML-2015-Bou-AmmarTE #learning #policy #sublinear- Safe Policy Search for Lifelong Reinforcement Learning with Sublinear Regret (HBA, RT, EE), pp. 2361–2369.
ICML-2015-HallakSMM #learning #modelling- Off-policy Model-based Learning under Unknown Factored Dynamics (AH, FS, TAM, SM), pp. 711–719.
ICML-2015-LesnerS #approximate #policy- Non-Stationary Approximate Modified Policy Iteration (BL, BS), pp. 1567–1575.
ICML-2015-SchulmanLAJM #optimisation #policy #trust- Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
ICML-2015-ThomasTG #policy- High Confidence Policy Improvement (PST, GT, MG), pp. 2380–2388.
KDD-2015-Athey #evaluation #machine learning #policy- Machine Learning and Causal Inference for Policy Evaluation (SA), pp. 5–6.
SEKE-2015-AbrantesC #exception #monitoring #policy #specification- Specifying and Dynamically Monitoring the Exception Handling Policy (JA, RC), pp. 370–374.
SEKE-2015-HuangWSQ #android #fine-grained #named #policy #security- DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
SEKE-2015-PeiYF #data access #in the cloud #performance #policy- Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
SEKE-2015-XuSZ #algorithm #policy #testing- Fault-Based Testing of Combining Algorithms in XACML3.0 Policies (DX, NS, YZ), pp. 433–438.
SIGIR-2015-YunHER #latency #policy #web- Optimal Aggregation Policy for Reducing Tail Latency of Web Search (JMY, YH, SE, SR), pp. 63–72.
MoDELS-2015-SoltanaSSB #framework #modelling #policy #probability #simulation- A model-based framework for probabilistic simulation of legal policies (GS, NS, MS, LCB), pp. 70–79.
POPL-2015-NgoMMP #black box #policy #runtime #security #source code- Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
POPL-2015-PadonIKLSS #policy- Decentralizing SDN Policies (OP, NI, AK, OL, MS, SS), pp. 663–676.
SAC-2015-RaniseTV #analysis #automation #constraints #policy- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
VMCAI-2015-CortesiFPT #mobile #policy #privacy #semantics #verification- Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
ECSA-2014-FreudenreichAFB #architecture #complexity #policy #using- Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
ECSA-2014-HorcasPF #policy #runtime #security- Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
CASE-2014-BaDR #maintenance #policy- Green management of Spare parts for an integrated optimal maintenance and production policy (KB, SD, NR), pp. 359–364.
CASE-2014-FrigerioM #energy #policy #probability- Energy saving policies for a machine tool with warm-up, stochastic arrivals and buffer information (NF, AM), pp. 646–651.
CASE-2014-JinNHXC #policy- Threshold-type admission policy for remanufacturing systems (XJ, JN, SJH, GX, QC), pp. 467–473.
CASE-2014-LiCW #policy #robust- A robust (r, Q) policy for a simple VMI system with inventory inaccuracy and time-delay (ML, FTSC, ZW), pp. 652–657.
CASE-2014-LiDZ #policy #social- Social incentive policies to engage commercial building occupants in demand response (SL, KD, MZ), pp. 407–412.
SIGMOD-2014-HeMD #policy #privacy #trade-off #using- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
FM-2014-RouxG #comparison #invariant #polynomial- Computing Quadratic Invariants with Min- and Max-Policy Iterations: A Practical Comparison (PR, PLG), pp. 563–578.
IFM-2014-DrossopoulouN #how #policy #semantics- How to Break the Bank: Semantics of Capability Policies (SD, JN), pp. 18–35.
SEFM-2014-PardoS #framework #network #policy #privacy #social- A Formal Privacy Policy Framework for Social Networks (RP, GS), pp. 378–392.
ICFP-2014-SchlesingerGW #concurrent #pipes and filters #policy- Concurrent NetCore: from policies to pipelines (CS, MG, DW), pp. 11–24.
CHI-2014-GrimpeHJ #design #human-computer #policy #towards- Towards a closer dialogue between policy and practice: responsible design in HCI (BG, MH, MJ), pp. 2965–2974.
CSCW-2014-JacksonGP #design #policy #social- The policy knot: re-integrating policy, practice and design in cscw studies of social computing (SJJ, TG, SP), pp. 588–602.
DUXU-DI-2014-SpiliotopoulosDK14a #authoring #design #interface #modelling #policy #prototype- Need Driven Prototype Design for a Policy Modeling Authoring Interface (DS, AD, DK), pp. 481–487.
ICEIS-v2-2014-WeiRT #data access #policy- Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
ECIR-2014-OstroumovaBCTG #crawling #policy #predict #web- Crawling Policies Based on Web Page Popularity Prediction (LO, IB, AC, AT, GG), pp. 100–111.
ICML-c1-2014-MannM #approximate #policy #scalability- Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations (TAM, SM), pp. 127–135.
ICML-c1-2014-SilverLHDWR #algorithm #policy- Deterministic Policy Gradient Algorithms (DS, GL, NH, TD, DW, MAR), pp. 387–395.
ICML-c2-2014-Bou-AmmarERT #learning #multi #online #policy- Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
ICML-c2-2014-LevineK #learning #network #optimisation #policy- Learning Complex Neural Network Policies with Trajectory Optimization (SL, VK), pp. 829–837.
ICML-c2-2014-Scherrer #approximate #comparison #policy- Approximate Policy Iteration Schemes: A Comparison (BS), pp. 1314–1322.
KEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
SEKE-2014-LiLWC #automation #data access #generative #policy #testing- Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
SIGIR-2014-MaLWSBWW #named #policy #query #web- PAAP: prefetch-aware admission policies for query results cache in web search engines (HM, WL, BW, LS, XB, LW, BW), pp. 983–986.
MoDELS-2014-SongZFCS0 #adaptation #constraints #modelling #policy- Modelling Adaptation Policies as Domain-Specific Constraints (HS, XZ, NF, FC, AS, GH), pp. 269–285.
MoDELS-2014-SongZFCS0 #adaptation #constraints #modelling #policy- Modelling Adaptation Policies as Domain-Specific Constraints (HS, XZ, NF, FC, AS, GH), pp. 269–285.
RE-2014-BreauxS #policy #privacy #requirements #scalability- Scaling requirements extraction to the crowd: Experiments with privacy policies (TDB, FS), pp. 163–172.
SAC-2014-KuhnCJN #flexibility #modelling- Flexible modeling of policy-driven upstream notification strategies (EK, SC, GJ, MN), pp. 1352–1354.
SAC-2014-YooLB #memory management #policy- The least-dirty-first cache replacement policy for phase-change memory (SY, EL, HB), pp. 1449–1454.
FSE-2014-JoinerRJDG #performance #policy #weaving- Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
ASPLOS-2014-0001KOTRKSHC #named #policy #security- Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
HPCA-2014-WangJXSX #adaptation #hybrid #migration #policy- Adaptive placement and migration policy for an STT-RAM-based hybrid cache (ZW, DAJ, CX, GS, YX), pp. 13–24.
HPDC-2014-GerofiSHTI #memory management #named #novel #policy- CMCP: a novel page replacement policy for system level hierarchical memory management on many-cores (BG, AS, AH, MT, YI), pp. 73–84.
CAV-2014-ChowdhuryJGD #monitoring #policy #privacy #runtime- Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (OC, LJ, DG, AD), pp. 131–149.
CAV-2014-FerraraMNP #data access #named #policy #verification- Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
SAT-2014-AudemardS #lazy evaluation #parallel #policy #satisfiability- Lazy Clause Exchange Policy for Parallel SAT Solvers (GA, LS), pp. 197–205.
VMCAI-2014-Masse #policy #ranking #termination- Policy Iteration-Based Conditional Termination and Ranking Functions (DM), pp. 453–471.
CASE-2013-FrigerioM #energy #policy- Machine control policies for energy saving in manufacturing (NF, AM), pp. 651–656.
CASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using- One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASE-2013-SinhaK #constraints #policy- Production and subcontracting policies for assemble-to-order systems with service level constraints (AKS, AK), pp. 570–575.
CASE-2013-TanTL #policy #resource management- Improving patient length-of-stay in emergency department through dynamic resource allocation policies (KWT, WHT, HCL), pp. 984–989.
CASE-2013-WangC #multi #policy #robust- A robust production control policy for a multiple-stage production system with inventory inaccuracy and time-delay (ZW, FTSC), pp. 77–82.
CASE-2013-WangJLC #capacity #policy- Integrated capacity allocation policies for a production service system with two-class customers and items (KW, ZJ, GL, JC), pp. 83–88.
CASE-2013-WuCY #analysis #policy #reachability- A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASE-2013-YueH13a #assembly #concurrent #petri net #policy #polynomial #process- A polynomial deadlock avoidance policy for a class of assembly processes based on Petri nets (HY, HH), pp. 1151–1156.
DATE-2013-GiraoSW #clustering #policy- Exploring resource mapping policies for dynamic clustering on NoC-based MPSoCs (GG, TS, FRW), pp. 681–684.
DATE-2013-GoossensAG #memory management #policy- Conservative open-page policy for mixed time-criticality memory controllers (SG, BA, KG), pp. 525–530.
DATE-2013-Milano #challenge #energy #policy #research- Sustainable energy policies: research challenges and opportunities (MM), pp. 1143–1148.
DATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy #using- Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATE-2013-WangDX #named #policy- OAP: an obstruction-aware cache management policy for STT-RAM last-level caches (JW, XD, YX), pp. 847–852.
DRR-2013-LipskyLN #policy- Optimal policy for labeling training samples (LL, DPL, GN).
TACAS-2013-FerraraMP #analysis #data access #policy #self- Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACAS-2013-KoleiniRR #data access #model checking #policy- Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
ICSM-2013-FrancisW #debugging #policy- Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
CHI-2013-KangBK #design #internet #people #policy #why- Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
CSCW-2013-JacksonSB #policy #why- Why CSCW needs science policy (and vice versa) (SJJ, SBS, AGB), pp. 1113–1124.
OCSC-2013-Meiselwitz #assessment #network #policy #readability #social- Readability Assessment of Policies and Procedures of Social Networking Sites (GM), pp. 67–75.
CAiSE-2013-DelmasP #formal method #policy #specification- Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
ICEIS-v1-2013-KaddesABSA #policy- Enhancement of Generalized Earliest Deadline First Policy (MK, LA, AB, BS, MA), pp. 231–238.
ICEIS-v1-2013-RibeiroRBFE #coordination #policy- Updating Strategies of Policies for Coordinating Agent Swarm in Dynamic Environments (RR, AFR, MACB, FF, FE), pp. 345–356.
ICML-c1-2013-SznitmanLFJF #locality #policy- An Optimal Policy for Target Localization with Application to Electron Microscopy (RS, AL, PIF, BJ, PF), pp. 1–9.
ICML-c3-2013-ChenLZ #crowdsourcing #policy- Optimistic Knowledge Gradient Policy for Optimal Budget Allocation in Crowdsourcing (XC, QL, DZ), pp. 64–72.
ICML-c3-2013-LevineK #policy- Guided Policy Search (SL, VK), pp. 1–9.
ICML-c3-2013-PirottaRPC #policy- Safe Policy Iteration (MP, MR, AP, DC), pp. 307–315.
ICML-c3-2013-RossZYDB #learning #policy #predict- Learning Policies for Contextual Submodular Prediction (SR, JZ, YY, DD, DB), pp. 1364–1372.
KDD-2013-AsadiLB #memory management #policy #realtime #twitter- Dynamic memory allocation policies for postings in real-time Twitter search (NA, JL, MB), pp. 1186–1194.
SEKE-2013-PereiraAS #data access #policy #relational #runtime- Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
PPDP-2013-StewartBN #data flow #data type #dependent type #policy #semistructured data- Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
RE-2013-MasseyEAS #analysis #automation #documentation #mining #policy #requirements- Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
SAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #using #video- Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SAC-2013-Schefer-WenzlS #information management #policy- Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
ICSE-2013-Slankas #data access #database #implementation #natural language #policy- Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
CC-2013-MooreC #automation #generative #machine learning #policy #using- Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
HPCA-2013-DasAMKA #manycore #memory management #policy- Application-to-core mapping policies to reduce memory system interference in multi-core systems (RD, RA, OM, AK, MA), pp. 107–118.
ICST-2013-BertolinoBDKLM #design #policy #testing- A Toolchain for Designing and Testing XACML Policies (AB, MB, SD, NK, FL, EM), pp. 495–496.
ASE-2012-HwangXKMT #evolution #policy #security #testing- Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
CASE-2012-HanXZLW #concurrent #policy- Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
CASE-2012-LiJJ #policy- A pull VPLs based release policy and dispatching rule for semiconductor wafer fabrication (YL, ZJ, WJ), pp. 396–400.
CASE-2012-SharabianiD #policy- Observation policies for patient and resource tracking in outpatient clinics (AS, HD), pp. 532–537.
DATE-2012-YangGBSC #game studies #graph #policy #resource management- Playing games with scenario- and resource-aware SDF graphs through policy iteration (YY, MG, TB, SS, HC), pp. 194–199.
ICEIS-v3-2012-CarvalhoRACJDM #energy #network #performance #policy #towards- Towards Sustainable Networks — Energy Efficiency Policy from Business to Device Instance Levels (TCMBC, ACR, MA, CHAC, GCJ, CKD, CM), pp. 238–243.
ICML-2012-CastroTM #policy- Policy Gradients with Variance Related Risk Criteria (DDC, AT, SM), p. 215.
ICML-2012-DegrisWS #linear- Linear Off-Policy Actor-Critic (TD, MW, RSS), p. 28.
ICML-2012-DekelTA #adaptation #learning #online #policy- Online Bandit Learning against an Adaptive Adversary: from Regret to Policy Regret (OD, AT, RA), p. 227.
ICML-2012-KalakrishnanRPS #learning #policy- Learning Force Control Policies for Compliant Robotic Manipulation (MK, LR, PP, SS), p. 10.
ICML-2012-ScherrerGGG #approximate #policy- Approximate Modified Policy Iteration (BS, VG, MG, MG), p. 245.
ICML-2012-StulpS #adaptation #matrix #policy- Path Integral Policy Improvement with Covariance Matrix Adaptation (FS, OS), p. 201.
SEKE-2012-MaarabaniAC #policy #security #testing- Testing Interoperability Security Policies (MEM, CA, ARC), pp. 464–469.
OOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management #using- Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
TOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #privacy #social- Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
PADL-2012-Coleman #classification #distributed #policy #specification- Distributed Policy Specification and Interpretation with Classified Advertisements (NC), pp. 198–211.
POPL-2012-YangYS #automation #policy #privacy- A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
SAC-2012-AnwarF #data access #network #policy #social #visualisation- A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
SAC-2012-BartschS #approach #policy- Guiding decisions on authorization policies: a participatory approach to decision support (SB, MAS), pp. 1502–1507.
SAC-2012-BeusterG #modelling #policy #security #smarttech- Formal security policy models for smart card evaluations (GB, KG), pp. 1640–1642.
SAC-2012-InzingerSHLD #adaptation #optimisation #policy- Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
SAC-2012-ShinWC #distributed #framework #in the cloud- A policy-based decentralized authorization management framework for cloud computing (DS, YW, WC), pp. 465–470.
FSE-2012-XiaoPTX #automation #documentation #policy #security- Automated extraction of security policies from natural-language software documents (XX, AMP, ST, TX), p. 12.
HPCA-2012-LeeK #architecture #cpu #gpu #named #policy- TAP: A TLP-aware cache management policy for a CPU-GPU heterogeneous architecture (JL, HK), pp. 91–102.
ISMM-2012-ZhouD #configuration management #locality #manycore #memory management #policy- Memory management for many-core processors with software configurable locality policies (JZ, BD), pp. 3–14.
CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICST-2012-BertolinoDLM #automation #generative #policy #testing- Automatic XACML Requests Generation for Policy Testing (AB, SD, FL, EM), pp. 842–849.
ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
CASE-2011-NazeemR #classification #concurrent #design #policy #resource management- Designing maximally permissive deadlock avoidance policies for sequential resource allocation systems through classification theory (AN, SAR), pp. 405–412.
DAC-2011-WangXAP #classification #learning #policy #power management #using- Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
HT-2011-SquicciariniSLW #adaptation #image #named #policy #predict #resource management- A3P: adaptive policy prediction for shared images over popular content sharing sites (ACS, SS, DL, JW), pp. 261–270.
VLDB-2011-AtaullahT #database #modelling #policy- Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
ESOP-2011-JensenKP #policy- Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
PLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using- A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
SEFM-2011-Pedercini #communication #modelling #policy #process- Models and Communication in the Policy Process (MP), pp. 35–37.
SEFM-2011-Pedercini11a #analysis #development #policy- Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
GCM-2010-BottoniFP11 #constraints #incremental #policy- Incremental update of constraint-compliant policy rules (PB, AF, FPP).
CHI-2011-KomanduriSKMBCCE #people #policy- Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
CSCW-2011-SantosSCKSRRT #open source #policy- Intellectual property policy and attractiveness: a longitudinal study of free and open source software projects (CDSJ, MBC, FK, JS, VR, DR, TT), pp. 705–708.
EDOC-2011-KharbiliMKP #modelling #named- CoReL: Policy-Based and Model-Driven Regulatory Compliance Management (MEK, QM, PK, EP), pp. 247–256.
ICEIS-v2-2011-LiQLZ #policy #research #simulation- Research and Demonstration of Agricultural Policy Simulation based on CGE Model (ZL, QQ, YL, DZ), pp. 13–17.
ICEIS-v3-2011-ZhangZZY #policy- Inventory Management Policies of Gold Jewelry Retailers (JZ, YZ, ZZ, HY), pp. 517–522.
ICEIS-v4-2011-YangZZZ #policy- Urban Motor Vehicle Limiting Policy based on System Dynamics (HY, ZZ, YZ, HZ), pp. 539–542.
ICML-2011-BazzaniFLMT #learning #network #policy #recognition #video- Learning attentional policies for tracking and recognition in video with deep networks (LB, NdF, HL, VM, JAT), pp. 937–944.
ICML-2011-DeisenrothR #approach #modelling #named #policy- PILCO: A Model-Based and Data-Efficient Approach to Policy Search (MPD, CER), pp. 465–472.
ICML-2011-DudikLL #evaluation #learning #policy #robust- Doubly Robust Policy Evaluation and Learning (MD, JL, LL), pp. 1097–1104.
ICML-2011-GabillonLGS #classification #policy- Classification-based Policy Iteration with a Critic (VG, AL, MG, BS), pp. 1049–1056.
ICML-2011-LiuLC #infinity #policy #representation- The Infinite Regionalized Policy Representation (ML, XL, LC), pp. 769–776.
ICML-2011-Neumann #policy- Variational Inference for Policy Search in changing situations (GN), pp. 817–824.
KEOD-2011-KhuratS #approach #ontology #policy #verification- An Ontological Approach to Verifying P3P Policies (AK, BS), pp. 349–353.
SEKE-2011-RomeikatBS #modelling #policy- Modeling of Domain-Specific ECA Policies (RR, BB, HS), pp. 52–58.
OOPSLA-2011-Kulkarni #compilation #jit #policy- JIT compilation policy for modern machines (PAK), pp. 773–788.
PPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
SAC-2011-FilhoSM #case study #network #simulation- Policy-driven network simulation: a resilience case study (AESF, PS, AM), pp. 492–497.
SAC-2011-ShiC #authoring #data access #interface #natural language #policy- A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
CADE-2011-AlbertiAR #analysis #automation #named #policy #security- ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
CASE-2010-FengZL #evaluation #multi #performance #policy #scheduling- Performance evaluation of a multi-product system with setups and dynamic scheduling policies (WF, LZ, NL), pp. 960–965.
CASE-2010-SinghR #clustering #energy #optimisation #policy- Energy optimization policies for server clusters (NS, SR), pp. 293–300.
DAC-2010-HaquePJP #approach #embedded #named #performance #policy #simulation- SCUD: a fast single-pass L1 cache simulation approach for embedded processors with round-robin replacement policy (MSH, JP, AJ, SP), pp. 356–361.
DATE-2010-HaquePJP #approach #embedded #named #performance #policy #simulation- DEW: A fast level 1 cache simulation approach for embedded processors with FIFO replacement policy (MSH, JP, AJ, SP), pp. 496–501.
DATE-2010-JanapsatyaIPP #adaptation #algorithm #policy- Dueling CLOCK: Adaptive cache replacement policy based on the CLOCK algorithm (AJ, AI, JP, SP), pp. 920–925.
DocEng-2010-SimskeB #automation #named #policy- APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
SIGMOD-2010-NabeelSZB #named #privacy- Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
VLDB-2010-FabbriLZ #named #query- PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting (DF, KL, QZ), pp. 36–47.
VLDB-2010-YiuUST #detection #mobile #performance #policy #proximity #self- Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
ESOP-2010-AdjeGG #invariant #policy #static analysis- Coupling Policy Iteration with Semi-definite Relaxation to Compute Accurate Numerical Invariants in Static Analysis (AA, SG, EG), pp. 23–42.
ESOP-2010-SwamyCC #data flow #policy- Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
ICALP-v2-2010-Fearnley #bound #exponential #policy- Exponential Lower Bounds for Policy Iteration (JF), pp. 551–562.
CHI-2010-InglesantS #cost analysis #policy- The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
CHI-2010-LipfordWWFR #comparison #interface #policy #privacy #visual notation- Visual vs. compact: a comparison of privacy policy interfaces (HRL, JW, MW, KF, RWR), pp. 1111–1114.
CAiSE-2010-GaaloulZCG #policy- Dynamic Authorisation Policies for Event-Based Task Delegation (KG, EZ, FC, CG), pp. 135–149.
ICEIS-AIDSS-2010-KhriyenkoNT #named #paradigm- Context-Policy-Configuration — Paradigm of Intelligent Autonomous System Creation (OK, SN, VYT), pp. 198–205.
ICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #policy #security- Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
CIKM-2010-KulkarniC #distributed #documentation #policy- Document allocation policies for selective searching of distributed indexes (AK, JC), pp. 449–458.
ICML-2010-LazaricGM #algorithm #analysis #classification #policy- Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
ICML-2010-MaeiSBS #approximate #learning #towards- Toward Off-Policy Learning Control with Function Approximation (HRM, CS, SB, RSS), pp. 719–726.
ICML-2010-ThieryS #policy #problem #trade-off- Least-Squares Policy Iteration: Bias-Variance Trade-off in Control Problems (CT, BS), pp. 1071–1078.
KEOD-2010-Occelli #policy- Reconciling Tempus and Hora — Policy Knowledge in an Information Wired Environment (SO), pp. 213–217.
MoDELS-v2-2010-MorinKKJ #aspect-oriented #flexibility #modelling #policy- Flexible Model Element Introduction Policies for Aspect-Oriented Modeling (BM, JK, JK, JMJ), pp. 63–77.
POPL-2010-MartinHCAC #c #c++ #concurrent #policy #source code- Dynamically checking ownership policies in concurrent c/c++ programs (JPM, MH, MC, PA, MC), pp. 457–470.
RE-2010-YoungA #identification #policy #requirements- A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
SAC-2010-BaffaC #generative #modelling #policy #simulation- Modeling POMDPs for generating and simulating stock investment policies (ACEB, AEMC), pp. 2394–2399.
SAC-2010-ClaycombLSK #network #policy #security- A group-based security policy for wireless sensor networks (WC, RL, DS, BK), pp. 778–785.
SAC-2010-HeinzlS #using #validation #xml- Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
SAC-2010-KhakpourKSJ #adaptation #analysis #formal method #self- Formal analysis of policy-based self-adaptive systems (NK, RK, MS, SJ), pp. 2536–2543.
SAC-2010-LeePKKS #hybrid #network #policy #retrieval- A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks (JL, GLP, SWK, HJK, SYS), pp. 189–193.
ICSE-2010-WangZ #case study #development #multi #policy- Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
OSDI-2010-Chlipala #policy #security #static analysis- Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications (AC), pp. 105–118.
CAV-2010-BasinKM #first-order #logic #monitoring #policy- Policy Monitoring in First-Order Temporal Logic (DAB, FK, SM), pp. 1–18.
ICST-2010-BruckerBKW #generative #policy #testing- Verified Firewall Policy Transformations for Test Case Generation (ADB, LB, PK, BW), pp. 345–354.
DATE-2009-SubramanianGD #adaptation #configuration management #design #embedded #grid #network #online #policy- Online adaptation policy design for grid sensor networks with reconfigurable embedded nodes (VS, MG, AD), pp. 1273–1278.
ESOP-2009-RajanTSL #composition #design #named #policy #verification #web #web service- Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services (HR, JT, SMS, GTL), pp. 333–347.
TACAS-2009-GofmanLSZYS #analysis #data access #named #policy- RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
ICPC-2009-HuangDS #policy #prototype #source code- Prototyping synchronization policies for existing programs (YH, LKD, REKS), pp. 289–290.
LATA-2009-BaaderBT #policy- Matching Trace Patterns with Regular Policies (FB, AB, AT), pp. 105–116.
SIGAda-2009-TijeroG #ada #experience #middleware #policy #scheduling- Experience in integrating interchangeable scheduling policies into a distribution middleware for Ada (HPT, JJG), pp. 73–78.
EDOC-2009-GovernatoriI #modelling #network #policy #reasoning #social- Modelling and Reasoning Languages for Social Networks Policies (GG, RI), pp. 193–200.
ICEIS-ISAS-2009-EdgeSPC #compilation #policy #specification- Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
ICEIS-ISAS-2009-FerriniB #approach #policy- A Comprehensive Approach for Solving Policy Heterogeneity (RF, EB), pp. 63–68.
ICML-2009-BoulariasC #policy #predict- Predictive representations for policy gradient in POMDPs (AB, BCd), pp. 65–72.
ICML-2009-Heidrich-MeisnerI #policy- Hoeffding and Bernstein races for selecting policies in evolutionary direct policy search (VHM, CI), pp. 401–408.
ICML-2009-PazisL #learning #policy- Binary action search for learning continuous-action control policies (JP, MGL), pp. 793–800.
SEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy- iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
SIGIR-2009-FetterlyCV #effectiveness #policy #web- The impact of crawl policy on web search effectiveness (DF, NC, VV), pp. 580–587.
SAC-2009-ChiangWLC #clustering #multi #policy #web- New content-aware request distribution policies in web clusters providing multiple services (MLC, CHW, YJL, YFC), pp. 79–83.
SAC-2009-MarconSLS #architecture #policy- Policy management architecture based on provisioning model and authorization certificates (ALMJ, AOS, LAdPLJ, MS), pp. 1594–1598.
SAC-2009-YokoyamaHSK #internet #operating system #policy #security- Simplifying security policy descriptions for internet servers in secure operating systems (TY, MH, MS, KK), pp. 326–333.
HPCA-2009-Chaudhuri #locality #multi #named #policy #scalability- PageNUCA: Selected policies for page-grain locality management in large shared chip-multiprocessor caches (MC), pp. 227–238.
ISMM-2009-GuanSJ #performance #policy #using- Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
LCTES-2009-CaspiCGPR #memory management #policy #scheduling- Synchronous objects with scheduling policies: introducing safe shared memory in lustre (PC, JLC, LG, MP, PR), pp. 11–20.
ICST-2009-MouelhiTB #functional #policy #security #testing- Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
SAT-2009-NikolicMJ #policy #satisfiability- Instance-Based Selection of Policies for SAT Solvers (MN, FM, PJ), pp. 326–340.
SAT-2009-PipatsrisawatD #policy #satisfiability- Width-Based Restart Policies for Clause-Learning Satisfiability Solvers (KP, AD), pp. 341–355.
CBSE-2008-RusselloMD #component #framework #named #policy- ESCAPE: A Component-Based Policy Framework for Sense and React Applications (GR, LM, ND), pp. 212–229.
ASE-2008-ChauvelBBJ #adaptation #composition #policy- Composition of Qualitative Adaptation Policies (FC, OB, IB, JMJ), pp. 455–458.
DATE-2008-MassasP #comparison #manycore #memory management #policy- Comparison of memory write policies for NoC based Multicore Cache Coherent Systems (PGdM, FP), pp. 997–1002.
DATE-2008-MulasPBCABAM #architecture #multi #policy #streaming- Thermal Balancing Policy for Streaming Computing on Multiprocessor Architectures (FM, MP, MB, SC, AA, LB, DA, GDM), pp. 734–739.
ICALP-C-2008-GoyalJPS #bound #encryption #policy- Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
SEFM-2008-SalasK #modelling #policy #privacy #testing #using- Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFM-2008-TschantzW #policy- Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
CHI-2008-BauerCRRV #case study #flexibility #policy- A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
CHI-2008-ButlerJP #policy #wiki- Don’t look now, but we’ve created a bureaucracy: the nature and roles of policies and rules in wikipedia (BSB, EJ, JP), pp. 1101–1110.
CHI-2008-ReederBCRBHS #authoring #policy #security #visualisation- Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
ICEIS-DISI-2008-MuldnerML #data access #dataset #policy #xml- Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
ICML-2008-BarrettN #learning #multi #policy- Learning all optimal policies with multiple criteria (LB, SN), pp. 41–47.
ICML-2008-KerstingD #parametricity #policy #relational- Non-parametric policy gradients: a unified treatment of propositional and relational domains (KK, KD), pp. 456–463.
ICML-2008-UenoKMMI #approach #evaluation #policy #statistics- A semiparametric statistical approach to model-free policy evaluation (TU, MK, TM, SiM, SI), pp. 1072–1079.
KR-2008-MartinezPPSS #consistency #nondeterminism #policy- Inconsistency Management Policies (MVM, FP, AP, GIS, VSS), pp. 367–377.
MoDELS-2008-CombemaleBCDH #domain-specific language #policy #specification #uml- Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
MoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MoDELS-2008-RosseboR #composition #policy #specification #uml #using- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MoDELS-2008-CombemaleBCDH #domain-specific language #policy #specification #uml- Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
MoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MoDELS-2008-RosseboR #composition #policy #specification #uml #using- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
PPDP-2008-BertolissiF #composition #data access #framework #policy- A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
PADL-2008-BeckerN #abduction #declarative #policy- The Role of Abduction in Declarative Authorization Policies (MYB, SN), pp. 84–99.
SAC-2008-BaveraB #analysis #bytecode #data flow #policy #type system- Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
SAC-2008-BrotoHSPT #policy #specification- Autonomic management policy specification in Tune (LB, DH, PS, NDP, ST), pp. 1658–1663.
SAC-2008-ChaariBB #ontology #web #web service- Enhancing web service selection by QoS-based ontology and WS-policy (SC, YB, FB), pp. 2426–2431.
LCTES-2008-ReinekeG #analysis #policy- Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
OSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
ICLP-2008-BeniniBM #constraints #multi #policy #programming #resource management #using- Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLP-2008-BonattiCOS #privacy #security #trust- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
ICLP-2008-GelfondL #policy- Authorization and Obligation Policies in Dynamic Systems (MG, JL), pp. 22–36.
ICST-2008-PretschnerMT #data access #modelling #policy #testing- Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
CASE-2007-ReveliotisR0 #algebra #concurrent #correctness #policy #programming #verification- Correctness Verification of Generalized Algebraic Deadlock Avoidance Policies through Mathematical Programming (SR, ER, JYC), pp. 200–206.
SIGMOD-2007-QiaoSFPCBK #database #framework #policy- A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
ESOP-2007-GaubertGTZ #policy #relational #static analysis- Static Analysis by Policy Iteration on Relational Domains (SG, EG, AT, SZ), pp. 237–252.
IFM-2007-BraghinSB #automation #mobile #policy #security #verification- Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
ILC-2007-WozniakDW #abstraction #data type #policy- Dynamic ADTs: a “don’t ask, don’t tell” policy for data abstraction (GW, MD, SW), p. 26.
HIMI-IIE-2007-KrachinaRT #ontology #perspective #policy #privacy #semantics- Reconciling Privacy Policies and Regulations: Ontological Semantics Perspective (OK, VR, KET), pp. 730–739.
HIMI-IIE-2007-VuCGCSNPP #how #policy #privacy- How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
CAiSE-2007-BaresiGP #aspect-oriented #policy #process- Policies and Aspects for the Supervision of BPEL Processes (LB, SG, PP), pp. 340–354.
CAiSE-2007-MaamarNBS #policy #transaction #web #web service- Policies for Context-Driven Transactional Web Services (ZM, NCN, DB, SS), pp. 249–263.
EDOC-2007-TosicSL #composition #uml #web #web service- UML Profiles for WS-Policy4MASC as Support for Business Value Driven Engineering and Management of Web Services and their Compositions (VT, BS, HL), pp. 157–168.
ICEIS-DISI-2007-BarkerD #algebra #information management #policy- Secure knowledge exchange by policy algebra and erml (SB, PD), pp. 212–217.
ICEIS-DISI-2007-NowalczykT #approach #privacy- A policy-based privacy storage approach (JN, FTC), pp. 605–608.
ICEIS-SAIC-2007-LazanasKK #hybrid #policy #recommendation #web #web service- Applying Hybrid Recommendation Policies through Agent-Invoked Web Services in E-Markets (AL, NIK, VK), pp. 161–166.
CIKM-2007-TanMG #clustering #crawling #design #policy #web- Designing clustering-based web crawling policies for search engine crawlers (QT, PM, CLG), pp. 535–544.
SIGIR-2007-NtoulasC #correctness #policy- Pruning policies for two-tiered inverted index with correctness guarantee (AN, JC), pp. 191–198.
PPDP-2007-HristovaTL #analysis #performance #policy #trust- Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
SAC-2007-KumarMS #mobile #policy- A weighted cache replacement policy for location dependent data in mobile environments (AK, MM, AKS), pp. 920–924.
SAC-2007-OrlovskyR #distributed #policy #security- Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
ICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation- When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
HPCA-2007-EyermanE #parallel #policy #smt- A Memory-Level Parallelism Aware Fetch Policy for SMT Processors (SE, LE), pp. 240–249.
ISMM-2007-XianSJ #concurrent #garbage collection #performance #policy #scheduling #thread- Allocation-phase aware thread scheduling policies to improve garbage collection performance (FX, WSa, HJ), pp. 79–90.
CSL-2007-Goller #complexity #on the #policy #reasoning- On the Complexity of Reasoning About Dynamic Policies (SG), pp. 358–373.
CBSE-2006-GoeminneJTDG #framework #policy- Service Policy Enhancements for the OSGi Service Platform (NG, GDJ, FDT, BD, FG), pp. 238–253.
ASE-2006-MurtaHW #architecture #evolution #implementation #named #traceability- ArchTrace: Policy-Based Support for Managing Evolving Architecture-to-Implementation Traceability Links (LGPM, AvdH, CMLW), pp. 135–144.
CASE-2006-XingTXH #complexity #concurrent #flexibility #policy #polynomial- Optimal Polynomial Complexity Deadlock Avoidance Policies for Manufacturing Systems with Flexible Routings (KX, FT, HX, BH), pp. 448–453.
DATE-2006-PettisRL #automation #operating system #policy #runtime- Automatic run-time selection of power policies for operating systems (NP, JR, YHL), pp. 508–513.
HT-2006-McCownN #crawling #evaluation #policy- Evaluation of crawling policies for a web-repository crawler (FM, MLN), pp. 157–168.
VLDB-2006-Song #policy- IT839 Policy Leading to u-Korea (JHS), p. 1103.
ESOP-2006-BrobergS #calculus #policy #towards- Flow Locks: Towards a Core Calculus for Dynamic Flow Policies (NB, DS), pp. 180–196.
FoSSaCS-2006-PitcherR #policy- Dynamic Policy Discovery with Remote Attestation (CP, JR), pp. 111–125.
CHI-2006-KaratKBF #authoring #interface #policy #privacy- Evaluating interfaces for privacy policy rule authoring (CMK, JK, CB, JF), pp. 83–92.
AdaEurope-2006-CamposGH #middleware #policy #realtime #scheduling- Interchangeable Scheduling Policies in Real-Time Middleware for Distribution (JLC, JJG, MGH), pp. 227–240.
EDOC-2006-LiG #policy- Composing Administrative Scope of Delegation Policies based on extended XACML (XFL, DF), pp. 467–470.
EDOC-2006-SzydloSZ #adaptation #component- Policy-based Context-aware Adaptable Software Components for Mobility Computing (TS, RS, KZ), pp. 483–487.
ICEIS-ISAS-2006-BenferhatB #policy #security- Argument-Based Approaches in Prioritized Conflicting Security Policies (SB, REB), pp. 349–354.
ICEIS-SAIC-2006-MaamarMB #approach #web #web service- A Policy-Based Approach to Secure Context in a Web Services Environment (ZM, GKM, DB), pp. 100–105.
ICEIS-SAIC-2006-SattanathanNMM #policy #web #web service- Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
ICML-2006-BowlingMJNW #learning #policy #predict #using- Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process #using- Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICPR-v3-2006-IsukapalliE #identification #learning #policy- Learning Policies for Efficiently Identifying Objects of Many Classes (RI, AME, RG), pp. 356–361.
KR-2006-Coste-MarquisFLBM #policy #quantifier #representation- Representing Policies for Quantified Boolean Formulae (SCM, HF, JL, DLB, PM), pp. 286–297.
SAC-2006-LeongG #policy- Improving the performances of proxy cache replacement policies by considering infrequent objects (HWL, BG), pp. 791–796.
SAC-2006-SousaM #adaptation #biology #comparison #grid #multi #named #sequence- PackageBLAST: an adaptive multi-policy grid service for biological sequence comparison (MSS, ACMAdM), pp. 156–160.
SAC-2006-WelchL #policy #security- Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
HPDC-2006-BaiardiRMV #monitoring #policy #virtual machine- Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
OSDI-2006-KimR #interface #network #policy- Connection Handoff Policies for TCP Offload Network Interfaces (HyK, SR), pp. 293–306.
FATES-RV-2006-FalconeFMR #calculus #framework #network #policy #security- A Test Calculus Framework Applied to Network Security Policies (YF, JCF, LM, JLR), pp. 55–69.
IJCAR-2006-DoughertyFK #policy #reasoning #specification- Specifying and Reasoning About Dynamic Access-Control Policies (DJD, KF, SK), pp. 632–646.
CASE-2005-WeiL #concurrent #policy #programming #using- A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
DocEng-2005-GenevesR #compilation #policy #streaming #xpath- Compiling XPath for streaming access policy (PG, KHR), pp. 52–54.
ESOP-2005-FournetGM #policy- A Type Discipline for Authorization Policies (CF, ADG, SM), pp. 141–156.
ESOP-2005-Myers #policy #programming #security- Programming with Explicit Security Policies (ACM), pp. 1–4.
FoSSaCS-2005-BartolettDF #data access #policy- History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
PLDI-2005-BauerLW #policy #security- Composing security policies with polymer (LB, JL, DW), pp. 305–314.
SEFM-2005-WilsonMC #approach #configuration management #flexibility #policy #verification- Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification (TW, SM, RGC), pp. 150–159.
AdaEurope-2005-RivasMH #ada #policy #scheduling- Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks (MAR, JM, MGH), pp. 220–235.
ICEIS-v1-2005-EzekielM #health #policy- An Integrated Decision Support Tool for EU Policies on Health, Transport and Artistic Heritage Recovery (KE, FM), pp. 261–266.
ICEIS-v3-2005-KurumaH #community #policy- A Model for Policy Based Service Community (HK, SH), pp. 360–366.
PPDP-2005-EchahedP #declarative #policy #security- Security policy in a declarative style (RE, FP), pp. 153–163.
POPL-2005-LiZ #policy- Downgrading policies and relaxed noninterference (PL, SZ), pp. 158–170.
RE-2005-Corniou #challenge #information management #policy- The Role of Information Systems within Corporate Strategy and Management Policies: New Challenges (JPC), p. 4.
RE-2005-CrookIN #modelling #on the #policy- On Modelling Access Policies: Relating Roles to their Organisational Context (RC, DCI, BN), pp. 157–166.
SAC-2005-MendoncaS #empirical #evaluation #policy #web #web service- An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
SAC-2005-NeisseAGT #network #policy- Policies translation for integrated management of grids and networks (RN, MJBA, LZG, LMRT), pp. 724–729.
SAC-2005-SohrDA #information management #policy #security #specification- Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
SAC-2005-Ungureanu #enterprise #performance #policy- Efficient support for enterprise delegation policies (VU), pp. 340–345.
ICSE-2005-ChinKQPN #alias #policy #safety #verification- Verifying safety policies with size properties and alias controls (WNC, SCK, SQ, CP, HHN), pp. 186–195.
ICSE-2005-FislerKMT #impact analysis #policy #verification- Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
LCTES-2005-XuZRMM #clustering #embedded #energy #policy- Energy-efficient policies for embedded clusters (RX, DZ, CR, RGM, DM), pp. 1–10.
CAV-2005-CostanGGMP #algorithm #fixpoint #policy #source code #static analysis- A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs (AC, SG, EG, MM, SP), pp. 462–475.
SIGMOD-2004-Hall #challenge #policy #requirements- Requirements and Policy Challenges in Highly Secure Environments (DEH), pp. 897–898.
FoSSaCS-2004-PucellaW #policy #reasoning- Reasoning about Dynamic Policies (RP, VW), pp. 453–467.
CHI-2004-JensenP #evaluation #online #policy #privacy #tool support- Privacy policies as decision-making tools: an evaluation of online privacy notices (CJ, CP), pp. 471–478.
CSCW-2004-MorrisRSFV #coordination #multi #policy #protocol #social- Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
AdaEurope-2004-MinguetFGB #ada #policy #scheduling- Mixing Scheduling Policies in Ada (AEM, AGF, VLG, ATB), pp. 273–282.
ICML-2004-Strens #performance #policy- Efficient hierarchical MCMC for policy search (MJAS).
KR-2004-BaralE #algorithm #policy #polynomial- A Polynomial-Time Algorithm for Constructing k-Maintainable Policies (CB, TE), pp. 720–730.
ECOOP-2004-AldrichC #alias #policy- Ownership Domains: Separating Aliasing Policy from Mechanism (JA, CC), pp. 1–25.
ECOOP-2004-ScharliDNW #composition #encapsulation #policy- Composable Encapsulation Policies (NS, SD, ON, RW), pp. 26–50.
SAC-2004-BackesKBS #comparison #enterprise #performance #policy #privacy- Efficient comparison of enterprise privacy policies (MB, GK, WB, MS), pp. 375–382.
SAC-2004-ParkerC #policy #protocol- Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
ICSE-2004-LingenH #composition #configuration management #framework #policy- An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition (RvdL, AvdH), pp. 573–582.
ICSE-2004-WohlstadterTMRD #interactive #middleware #named #policy- GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions (EW, ST, TAM, IR, PTD), pp. 189–199.
ISMM-2004-Smaragdakis #adaptation #policy- General adaptive replacement policies (YS), pp. 108–119.
DAC-2003-MeyerowitzPS #policy #realtime #scheduling- A tool for describing and evaluating hierarchical real-time bus scheduling policies (TM, CP, ALSV), pp. 312–317.
ITiCSE-2003-GrangerL #internet #policy- Classroom discussions: policies and responsibilities of Internet Service Providers (MJG, JCL), pp. 99–103.
FASE-2003-KochP #policy #specification #verification #visual notation- Visual Specifications of Policies and Their Verification (MK, FPP), pp. 278–293.
FASE-2003-ScottBM #mobile #policy #security- Spatial Security Policies for Mobile Agents in a Sentient Computing Environment (DJS, ARB, AM), pp. 102–117.
ICSM-2003-MadhavjiT #evolution- Policy-guided Software Evolution (NHM, JT), pp. 75–82.
FME-2003-DenneyF #correctness #policy #safety- Correctness of Source-Level Safety Policies (ED, BF), pp. 894–913.
AdaEurope-2003-BurnsHW #ada #policy #scheduling- A Round Robin Scheduling Policy for Ada (AB, MGH, AJW), pp. 334–343.
EDOC-2003-DunlopIR- Methods for Conflict Resolution in Policy-Based Management Systems (ND, JI, KR), pp. 98–111.
ICEIS-v4-2003-KammanahalliSGV #policy- A Time Zone Based Dynamic Cache Replacement Policy (HK, KS, SG, SV), pp. 494–497.
ICEIS-v4-2003-RoqueOL #component #composition #policy #visual notation- Policies Composition Through Graphical Components (VR, JLO, RPL), pp. 464–467.
ICML-2003-GhavamzadehM #algorithm #policy- Hierarchical Policy Gradient Algorithms (MG, SM), pp. 226–233.
ICML-2003-MannorRG #performance #policy- The Cross Entropy Method for Fast Policy Search (SM, RYR, YG), pp. 512–519.
ICML-2003-Munos #approximate #bound #fault #policy- Error Bounds for Approximate Policy Iteration (RM), pp. 560–567.
ICML-2003-WangD #learning #modelling #policy- Model-based Policy Gradient Reinforcement Learning (XW, TGD), pp. 776–783.
UML-2003-AlghathbarW #case study #consistency #data access #policy- Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
REFSQ-J-2002-AntonEC03 #behaviour #policy #privacy #requirements #security- Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
REFSQ-J-2002-CrookIN03 #modelling #policy #requirements #using- Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
RE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off- Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
SAC-2003-MucciniM #coordination #elicitation #policy #requirements- Eliciting Coordination Policies from Requirements (HM, FM), pp. 387–393.
ESEC-FSE-2003-LeeA #component- Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
HPCA-2003-El-MoursyA #performance #policy #smt- Front-End Policies for Improved Issue Efficiency in SMT Processors (AEM, DHA), pp. 31–40.
HPDC-2003-BucurE #clustering #multi #policy #simulation- Trace-Based Simulations of Processor Co-Allocation Policies in Multiclusters (AIDB, DHJE), pp. 70–79.
HPDC-2003-RamanLS #policy #resource management- Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching (RR, ML, MHS), pp. 80–89.
HPDC-2003-SievertC #policy #process- Policies for Swapping MPI Processes (OS, HC), pp. 104–113.
SOSP-2003-Arpaci-DusseauABDEGNP #kernel #policy- Transforming policies into mechanisms with infokernel (ACAD, RHAD, NCB, TED, TJE, HSG, JAN, FIP), pp. 90–105.
CBSE-2003-VecellioT #framework #policy #predict- Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
HT-2002-TataGW #concept #hypermedia #implementation #policy #prototype- Policies for cooperative hypermedia systems: concepts and prototype implementation (ST, CG, UKW), pp. 140–141.
VLDB-2002-BettiniJWW #policy #security- Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
VLDB-2002-SeifertS #hybrid #multi #policy- A Multi-version Cache Replacement and Prefetching Policy for Hybrid Data Delivery Environments (AS, MHS), pp. 850–861.
FoSSaCS-2002-KochMP #data access #detection #policy #specification- Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
ICGT-2002-KochP #constraints #graph #policy- Describing Policies with Graph Constraints and Rules (MK, FPP), pp. 223–238.
EDOC-2002-DunlopIR #detection- Dynamic Conflict Detection in Policy-Based Management Systems (ND, JI, KR), pp. 15–26.
ICML-2002-AberdeenB #scalability- Scalable Internal-State Policy-Gradient Methods for POMDPs (DA, JB), pp. 3–10.
ICML-2002-PickettB #algorithm #learning #named- PolicyBlocks: An Algorithm for Creating Useful Macro-Actions in Reinforcement Learning (MP, AGB), pp. 506–513.
SEKE-2002-ReisRSN #process- A policy-based resource instantiation mechanism to automate software process management (CALR, RQR, HS, DJN), pp. 795–802.
SAC-2002-Bell #interactive #policy #security #simulation- Interactive simulation of security policies (GB), pp. 247–252.
ICSE-2002-GreenhouseS #concurrent #evolution #policy #source code- Assuring and evolving concurrent programs: annotations and policy (AG, WLS), pp. 453–463.
ASE-2001-AndradeFW #automation #configuration management #policy- Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
ASE-2001-LowryPR #policy- Certifying Domain-Specific Policies (MRL, TP, GR), pp. 81–90.
FoSSaCS-2001-KochMP #approach #data access #graph #policy #specification- Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
AdaEurope-2001-Burns #ada #policy- Defining New Non-preemptive Dispatching and Locking Policies for Ada (AB), pp. 328–336.
EDOC-2001-DunlopIR #enterprise #evolution #policy #scalability- Dynamic Policy Model for Large Evolving Enterprises (ND, JI, KR), p. 193–?.
ICEIS-v2-2001-MartinCLG #e-commerce #policy #security- Planning Security Policy on E-Commerce (MM, AC, JL, RG), pp. 915–919.
ICML-2001-GlickmanS #learning #memory management #policy #probability #search-based- Evolutionary Search, Stochastic Policies with Memory, and Reinforcement Learning with Hidden State (MRG, KPS), pp. 194–201.
ICML-2001-PrecupSD #approximate #difference #learning- Off-Policy Temporal Difference Learning with Function Approximation (DP, RSS, SD), pp. 417–424.
ICML-2001-StrensM #policy #statistics #testing #using- Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
ICML-2001-TaoBW #approach #multi #network- A Multi-Agent Policy-Gradient Approach to Network Routing (NT, JB, LW), pp. 553–560.
TOOLS-USA-2001-MichaelOR- Natural-Language Processing Support for Developing Policy-Governed Software Systems (JBM, VLO, NCR), pp. 263–275.
RE-2001-AntonEAP #policy #privacy #requirements- The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
SAC-2001-VuongSD #distributed #policy #security #using #xml- Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
HPDC-2001-SanderAFR #network #policy- End-to-End Provision of Policy Information for Network QoS (VS, WAA, ITF, AJR), pp. 115–126.
ASE-2000-BoseM #automation #coordination #generative #policy- Systematic Generation of Dependable Change Coordination Plans for Automated Switching of Coordination Policies (PKB, MGM), p. 325–?.
SIGMOD-2000-BressanGOT #approach #policy- Integrating Replacement Policies in StorM: An Extensible Approach (CLG, BCO, SB, KLT), p. 599.
FASE-2000-Parisi-PresicceW #configuration management #graph transformation #policy #using- Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
CIKM-2000-XuHLL #named #on-demand #performance #policy- SAIU: An Efficient Cache Replacement Policy for Wireless On-demand Broadcasts (JX, QH, DLL, WCL), pp. 46–53.
ICML-2000-GrudicU #policy- Localizing Policy Gradient Estimates to Action Transition (GZG, LHU), pp. 343–350.
ICML-2000-PrecupSS #evaluation #policy- Eligibility Traces for Off-Policy Policy Evaluation (DP, RSS, SPS), pp. 759–766.
KR-2000-ChomickiLN #approach #logic programming #policy- A Logic Programming Approach to Conflict Resolution in Policy Management (JC, JL, SAN), pp. 121–132.
KR-2000-MartinG #concept #learning #policy #using- Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
POPL-2000-Walker #policy #security #type system- A Type System for Expressive Security Policies (DW), pp. 254–267.
HPCA-2000-WongB #behaviour #policy- Modified LRU Policies for Improving Second-Level Cache Behavior (WAW, JLB), pp. 49–60.
HPDC-2000-SchroderH #evaluation #policy- Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness (BS, MHB), pp. 211–220.
OSDI-2000-GrunwaldLFMN #policy #scheduling- Policies for Dynamic Clock Scheduling (DG, PL, KIF, CBMI, MN), pp. 73–86.
STOC-1999-Gamarnik #adaptation #network #policy- Stability of Adaptive and Non-Adaptive Packet Routing Policies in Adversarial Queueing Networks (DG), pp. 206–214.
HCI-CCAD-1999-StephanidisSEA #design #policy- Policy perspectives on “design for all” (CS, GS, PLE, DA), pp. 868–872.
CAiSE-1999-HuanS #resource management- Policy-Based Resource Management (YNH, MCS), pp. 422–428.
EDOC-1999-Linington #community #enterprise #policy #uml #using- Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
EDOC-1999-SteenD #enterprise #formal method #policy- Formalising ODP enterprise policies (MWAS, JD), pp. 84–93.
ICML-1999-NgHR #policy #theory and practice- Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping (AYN, DH, SJR), pp. 278–287.
ICML-1999-PeshkinMK #learning #memory management #policy- Learning Policies with External Memory (LP, NM, LPK), pp. 307–314.
ICML-1999-WangM #markov #optimisation #process- Hierarchical Optimization of Policy-Coupled Semi-Markov Decision Processes (GW, SM), pp. 464–473.
DAC-1998-PaleologoBBM #optimisation #policy #power management- Policy Optimization for Dynamic Power Management (GAP, LB, AB, GDM), pp. 182–187.
ITiCSE-1998-Culwin #assessment #policy #web- Web hosted assessment — possibilities and policy (FC), pp. 55–58.
FM-1998-KoobUW #formal method #modelling #policy #process #security #topic #using- The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
EDOC-1998-LiningtonMR #community #enterprise #policy- Policies in communities: extending the ODP enterprise viewpoint (PFL, ZM, KR), pp. 14–24.
CIKM-1998-Horvitz #policy- Continual Computation Policies for Utility-Directed Prefetching (EH), pp. 175–184.
ICML-1998-LochS #markov #policy #process #using- Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
TOOLS-ASIA-1998-Poo #policy- Policy Definition in Application-Domain-Related Classes (DCCP), pp. 94–103.
SAC-1998-KimYL #analysis #policy- Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
FSE-1998-AstleyA #abstraction #distributed #middleware #policy- Customizaton and Compositon of Distributed Objects: Middleware Abstractions for Policy Management (MA, GA), pp. 1–9.
CAV-1998-Wilding #policy #proving #realtime #scheduling- A Machine-Checked Proof of the Optimality of a Real-Time Scheduling Policy (MW), pp. 369–378.
SIGMOD-1997-ColbyKLMR #maintenance #multi #policy- Supporting Multiple View Maintenance Policies (LSC, AK, DFL, ISM, KAR), pp. 405–416.
SIGMOD-1997-JajodiaSSB #data access #framework #multi #policy- A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
CAiSE-1997-DiazP #calculus #modelling #policy #validation- Stimuli and Business Policies as Modelling Constructs: Their Definition and Validation Through the Event Calculus (OD, NWP), pp. 33–46.
EDOC-1997-LupuS #policy- A Policy Based Role Object Model (EL, MS), pp. 36–47.
CSCW-1996-Edwards #collaboration #policy- Policies and Roles in Collaborative Applications (WKE), pp. 11–20.
PODS-1995-ChaudhriH #database #policy- Safe Locking Policies for Dynamic Databases (VKC, VH), pp. 233–244.
SIGMOD-1995-DanS #online #policy #video- An Online Video Placement Policy based on Bandwith to Space Ratio (BSR) (AD, DS), pp. 376–385.
ICML-1995-LittmanCK #learning #policy #scalability- Learning Policies for Partially Observable Environments: Scaling Up (MLL, ARC, LPK), pp. 362–370.
SIGMOD-1994-CookWZ #database #garbage collection #policy- Partition Selection Policies in Object Database Garbage Collection (JEC, ALW, BGZ), pp. 371–382.
CIKM-1994-Shrufi #clustering #performance #policy- Performance of Clustering Policies in Object Bases (AS), pp. 80–87.
DAC-1993-Nurnberger #policy- The Clinton/Gore Technology Policies (RDN), pp. 331–335.
FME-1993-Boswell #policy #security #specification #validation- Specification and Validation of a Security Policy Model (AB), pp. 42–51.
TOOLS-PACIFIC-1993-HaebichT #object-oriented #policy- An Object-Oriented, Computational Model to Support the Formulation of a National Retirement Icome Policy (WH, TT), pp. 393–406.
TOOLS-PACIFIC-1993-Taylor #policy #reuse #towards- Towards a Reuse Policy (PT), pp. 49–60.
RE-1993-SibleyWMTL #policy #requirements- The role of policy in requirements definition (EHS, RLW, JBM, MCT, DCL), pp. 277–280.
SAC-1993-RamakrishnanDN #policy- An Integrated Optimal Task Assignment Policy (SR, LAD, TN), pp. 789–795.
SIGMOD-1992-DanY #analysis #performance #policy- Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
HPDC-1992-PuFSWY #comparison #distributed #performance #policy- Performance Comparison of Active-Sender and Active-Receiver Policies for Distributed Caching (CP, DF, PS, KLW, PSY), pp. 218–227.
CAiSE-1991-McBrienNPSSTTW #policy #specification- A Rule Language to Capture and Model Business Policy Specifications (PM, MN, DP, AHS, US, BT, GT, RW), pp. 307–318.
ASPLOS-1991-BoloskySFFC #architecture #memory management #policy- NUMA Policies and Their Relation to Memory Architecture (WJB, MLS, RPF, RJF, ALC), pp. 212–221.
CSCW-1988-ConklinB #hypermedia #named #policy- gIBIS: A Hypertext Tool for Exploratory Policy Discussion (JC, MLB), pp. 140–152.
OOPSLA-1988-UngarJ #policy- Tenuring Policies for Generation-Based Storage Reclamation (DU, FJ), pp. 1–17.
VLDB-1985-LausenSW #concurrent #policy- Pre-Analysis Locking: A Safe and Deadlock Free Locking Policy (GL, ESS, PW), pp. 270–281.
VLDB-1985-MedeirosT #comprehension #policy- Understanding the Implications of View Update Policies (CBM, FWT), pp. 316–323.
SOSP-1985-MalkawiP #compilation #memory management #policy #source code- Compiler Directed Memory Management Policy For Numerical Programs (MM, JHP), pp. 97–106.
SIGMOD-1983-KohlerWS #comparison #database #policy- An Experimental Comparison of Locking Policies in a Testbed Database System (WHK, KCW, JAS), pp. 108–119.
SIGMOD-1977-LohmanM #policy- Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (Abstract) (GML, JAM), p. 157.
SOSP-1977-Potier #analysis #policy #set- Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
SOSP-1975-JonesL #policy #security- The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.
SOSP-1975-LevinCCPW #policy- Policy/Mechanism Separation in HYDRA (RL, ESC, WMC, FJP, WAW), pp. 132–140.
SOSP-J-1973-TeoreyP72 #analysis #comparative #policy #scheduling- A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
SOSP-1971-TeoreyP #analysis #comparative #policy #scheduling- A Comparative Analysis of Disk Scheduling Policies (Abstract) (TJT, TBP), pp. 114–121.