BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (61)
secur (54)
model (43)
system (37)
manag (36)

Stem polici$ (all stems)

447 papers:

DACDAC-2015-McLaughlin #behaviour #policy
Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
DACDAC-2015-PengKPPJCL #3d #architecture #design #policy
Design, packaging, and architectural policy co-optimization for DC power integrity in 3D DRAM (YP, BWK, YSP, KIP, SJJ, JSC, SKL), p. 6.
DATEDATE-2015-YinLLWG15a #policy
Cooperatively managing dynamic writeback and insertion policies in a last-level DRAM cache (SY, JL, LL, SW, YG), pp. 187–192.
SIGMODSIGMOD-2015-UpadhyayaBS #automation #policy
Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
FMFM-2015-DuLT #independence #ltl #monitoring #policy #runtime
Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL (XD, YL, AT), pp. 231–247.
GCMGCM-2015-BottoniNP #constraints #contract #modelling #policy
Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
CHICHI-2015-ZhangC #modelling #policy #predict #social #social media
Modeling Ideology and Predicting Policy Change with Social Media: Case of Same-Sex Marriage (AXZ, SC), pp. 2603–2612.
CSCWCSCW-2015-WongJ #framework #policy
Wireless Visions: Infrastructure, Imagination, and US Spectrum Policy (RYW, SJJ), pp. 105–115.
HCIHIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #policy #simulation #visualisation
Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
CAiSECAiSE-2015-DelmasP #policy #requirements #verification
Need-to-Share and Non-diffusion Requirements Verification in Exchange Policies (RD, TP), pp. 151–165.
ICEISICEIS-v2-2015-OliveiraF #bibliography #enterprise #framework #policy #sorting
A Spatial Data Infrastructure Review — Sorting the Actors and Policies from Enterprise Viewpoint (ILO, JLF), pp. 287–294.
ICMLICML-2015-Bou-AmmarTE #learning #policy #sublinear
Safe Policy Search for Lifelong Reinforcement Learning with Sublinear Regret (HBA, RT, EE), pp. 2361–2369.
ICMLICML-2015-HallakSMM #learning #modelling
Off-policy Model-based Learning under Unknown Factored Dynamics (AH, FS, TAM, SM), pp. 711–719.
ICMLICML-2015-LesnerS #approximate #policy
Non-Stationary Approximate Modified Policy Iteration (BL, BS), pp. 1567–1575.
ICMLICML-2015-SchulmanLAJM #optimisation #policy #trust
Trust Region Policy Optimization (JS, SL, PA, MIJ, PM), pp. 1889–1897.
ICMLICML-2015-ThomasTG #policy
High Confidence Policy Improvement (PST, GT, MG), pp. 2380–2388.
KDDKDD-2015-Athey #evaluation #machine learning #policy
Machine Learning and Causal Inference for Policy Evaluation (SA), pp. 5–6.
SEKESEKE-2015-AbrantesC #exception #monitoring #policy #specification
Specifying and Dynamically Monitoring the Exception Handling Policy (JA, RC), pp. 370–374.
SEKESEKE-2015-HuangWSQ #android #fine-grained #named #policy #security
DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
SEKESEKE-2015-PeiYF #data access #in the cloud #performance #policy
Achieving Efficient Access Control via XACML Policy in Cloud Computing (XP, HY, GF), pp. 110–115.
SEKESEKE-2015-XuSZ #algorithm #policy #testing
Fault-Based Testing of Combining Algorithms in XACML3.0 Policies (DX, NS, YZ), pp. 433–438.
SIGIRSIGIR-2015-YunHER #latency #policy #web
Optimal Aggregation Policy for Reducing Tail Latency of Web Search (JMY, YH, SE, SR), pp. 63–72.
MoDELSMoDELS-2015-SoltanaSSB #framework #modelling #policy #probability #simulation
A model-based framework for probabilistic simulation of legal policies (GS, NS, MS, LCB), pp. 70–79.
POPLPOPL-2015-NgoMMP #black box #policy #runtime #security #source code
Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
POPLPOPL-2015-PadonIKLSS #policy
Decentralizing SDN Policies (OP, NI, AK, OL, MS, SS), pp. 663–676.
SACSAC-2015-RaniseTV #analysis #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
VMCAIVMCAI-2015-CortesiFPT #mobile #policy #privacy #semantics #verification
Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
ECSAECSA-2014-FreudenreichAFB #architecture #complexity #policy #using
Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
ECSAECSA-2014-HorcasPF #policy #runtime #security
Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
CASECASE-2014-BaDR #maintenance #policy
Green management of Spare parts for an integrated optimal maintenance and production policy (KB, SD, NR), pp. 359–364.
CASECASE-2014-FrigerioM #energy #policy #probability
Energy saving policies for a machine tool with warm-up, stochastic arrivals and buffer information (NF, AM), pp. 646–651.
CASECASE-2014-JinNHXC #policy
Threshold-type admission policy for remanufacturing systems (XJ, JN, SJH, GX, QC), pp. 467–473.
CASECASE-2014-LiCW #policy #robust
A robust (r, Q) policy for a simple VMI system with inventory inaccuracy and time-delay (ML, FTSC, ZW), pp. 652–657.
CASECASE-2014-LiDZ #policy #social
Social incentive policies to engage commercial building occupants in demand response (SL, KD, MZ), pp. 407–412.
SIGMODSIGMOD-2014-HeMD #policy #privacy #trade-off #using
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
FMFM-2014-RouxG #comparison #invariant #polynomial
Computing Quadratic Invariants with Min- and Max-Policy Iterations: A Practical Comparison (PR, PLG), pp. 563–578.
IFMIFM-2014-DrossopoulouN #how #policy #semantics
How to Break the Bank: Semantics of Capability Policies (SD, JN), pp. 18–35.
SEFMSEFM-2014-PardoS #framework #network #policy #privacy #social
A Formal Privacy Policy Framework for Social Networks (RP, GS), pp. 378–392.
ICFPICFP-2014-SchlesingerGW #concurrent #pipes and filters #policy
Concurrent NetCore: from policies to pipelines (CS, MG, DW), pp. 11–24.
CHICHI-2014-GrimpeHJ #design #human-computer #policy #towards
Towards a closer dialogue between policy and practice: responsible design in HCI (BG, MH, MJ), pp. 2965–2974.
CSCWCSCW-2014-JacksonGP #design #policy #social
The policy knot: re-integrating policy, practice and design in cscw studies of social computing (SJJ, TG, SP), pp. 588–602.
HCIDUXU-DI-2014-SpiliotopoulosDK14a #authoring #design #interface #modelling #policy #prototype
Need Driven Prototype Design for a Policy Modeling Authoring Interface (DS, AD, DK), pp. 481–487.
ICEISICEIS-v2-2014-WeiRT #data access #policy
Enhance OpenStack Access Control via Policy Enforcement Based on XACML (HW, JSR, AT), pp. 283–289.
ECIRECIR-2014-OstroumovaBCTG #crawling #policy #predict #web
Crawling Policies Based on Web Page Popularity Prediction (LO, IB, AC, AT, GG), pp. 100–111.
ICMLICML-c1-2014-MannM #approximate #policy #scalability
Scaling Up Approximate Value Iteration with Options: Better Policies with Fewer Iterations (TAM, SM), pp. 127–135.
ICMLICML-c1-2014-SilverLHDWR #algorithm #policy
Deterministic Policy Gradient Algorithms (DS, GL, NH, TD, DW, MAR), pp. 387–395.
ICMLICML-c2-2014-Bou-AmmarERT #learning #multi #online #policy
Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
ICMLICML-c2-2014-LevineK #learning #network #optimisation #policy
Learning Complex Neural Network Policies with Trajectory Optimization (SL, VK), pp. 829–837.
ICMLICML-c2-2014-Scherrer #approximate #comparison #policy
Approximate Policy Iteration Schemes: A Comparison (BS), pp. 1314–1322.
KEODKEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security
An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
SEKESEKE-2014-LiLWC #automation #data access #generative #policy #testing
Automatic XACML requests generation for testing access control policies (YL, YL, LW, GC), pp. 217–222.
SIGIRSIGIR-2014-MaLWSBWW #named #policy #query #web
PAAP: prefetch-aware admission policies for query results cache in web search engines (HM, WL, BW, LS, XB, LW, BW), pp. 983–986.
MODELSMoDELS-2014-SongZFCS0 #adaptation #constraints #modelling #policy
Modelling Adaptation Policies as Domain-Specific Constraints (HS, XZ, NF, FC, AS, GH), pp. 269–285.
MODELSMoDELS-2014-SongZFCS0 #adaptation #constraints #modelling #policy
Modelling Adaptation Policies as Domain-Specific Constraints (HS, XZ, NF, FC, AS, GH), pp. 269–285.
RERE-2014-BreauxS #policy #privacy #requirements #scalability
Scaling requirements extraction to the crowd: Experiments with privacy policies (TDB, FS), pp. 163–172.
SACSAC-2014-KuhnCJN #flexibility #modelling
Flexible modeling of policy-driven upstream notification strategies (EK, SC, GJ, MN), pp. 1352–1354.
SACSAC-2014-YooLB #memory management #policy
The least-dirty-first cache replacement policy for phase-change memory (SY, EL, HB), pp. 1449–1454.
FSEFSE-2014-JoinerRJDG #performance #policy #weaving
Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
ASPLOSASPLOS-2014-0001KOTRKSHC #named #policy #security
Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
HPCAHPCA-2014-WangJXSX #adaptation #hybrid #migration #policy
Adaptive placement and migration policy for an STT-RAM-based hybrid cache (ZW, DAJ, CX, GS, YX), pp. 13–24.
HPDCHPDC-2014-GerofiSHTI #memory management #named #novel #policy
CMCP: a novel page replacement policy for system level hierarchical memory management on many-cores (BG, AS, AH, MT, YI), pp. 73–84.
CAVCAV-2014-ChowdhuryJGD #monitoring #policy #privacy #runtime
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (OC, LJ, DG, AD), pp. 131–149.
CAVCAV-2014-FerraraMNP #data access #named #policy #verification
Vac — Verifier of Administrative Role-Based Access Control Policies (ALF, PM, TLN, GP), pp. 184–191.
ICSTSAT-2014-AudemardS #lazy evaluation #parallel #policy #satisfiability
Lazy Clause Exchange Policy for Parallel SAT Solvers (GA, LS), pp. 197–205.
VMCAIVMCAI-2014-Masse #policy #ranking #termination
Policy Iteration-Based Conditional Termination and Ranking Functions (DM), pp. 453–471.
CASECASE-2013-FrigerioM #energy #policy
Machine control policies for energy saving in manufacturing (NF, AM), pp. 651–656.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASECASE-2013-SinhaK #constraints #policy
Production and subcontracting policies for assemble-to-order systems with service level constraints (AKS, AK), pp. 570–575.
CASECASE-2013-TanTL #policy #resource management
Improving patient length-of-stay in emergency department through dynamic resource allocation policies (KWT, WHT, HCL), pp. 984–989.
CASECASE-2013-WangC #multi #policy #robust
A robust production control policy for a multiple-stage production system with inventory inaccuracy and time-delay (ZW, FTSC), pp. 77–82.
CASECASE-2013-WangJLC #capacity #policy
Integrated capacity allocation policies for a production service system with two-class customers and items (KW, ZJ, GL, JC), pp. 83–88.
CASECASE-2013-WuCY #analysis #policy #reachability
A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASECASE-2013-YueH13a #assembly #concurrent #petri net #policy #polynomial #process
A polynomial deadlock avoidance policy for a class of assembly processes based on Petri nets (HY, HH), pp. 1151–1156.
DATEDATE-2013-GiraoSW #clustering #policy
Exploring resource mapping policies for dynamic clustering on NoC-based MPSoCs (GG, TS, FRW), pp. 681–684.
DATEDATE-2013-GoossensAG #memory management #policy
Conservative open-page policy for mixed time-criticality memory controllers (SG, BA, KG), pp. 525–530.
DATEDATE-2013-Milano #challenge #energy #policy #research
Sustainable energy policies: research challenges and opportunities (MM), pp. 1143–1148.
DATEDATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy #using
Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATEDATE-2013-WangDX #named #policy
OAP: an obstruction-aware cache management policy for STT-RAM last-level caches (JW, XD, YX), pp. 847–852.
DRRDRR-2013-LipskyLN #policy
Optimal policy for labeling training samples (LL, DPL, GN).
TACASTACAS-2013-FerraraMP #analysis #data access #policy #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-KoleiniRR #data access #model checking #policy
Model Checking Agent Knowledge in Dynamic Access Control Policies (MK, ER, MR), pp. 448–462.
ICSMEICSM-2013-FrancisW #debugging #policy
Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
CHICHI-2013-KangBK #design #internet #people #policy #why
Why do people seek anonymity on the internet?: informing policy and design (RK, SB, SBK), pp. 2657–2666.
CSCWCSCW-2013-JacksonSB #policy #why
Why CSCW needs science policy (and vice versa) (SJJ, SBS, AGB), pp. 1113–1124.
HCIOCSC-2013-Meiselwitz #assessment #network #policy #readability #social
Readability Assessment of Policies and Procedures of Social Networking Sites (GM), pp. 67–75.
CAiSECAiSE-2013-DelmasP #formal method #policy #specification
Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
ICEISICEIS-v1-2013-KaddesABSA #policy
Enhancement of Generalized Earliest Deadline First Policy (MK, LA, AB, BS, MA), pp. 231–238.
ICEISICEIS-v1-2013-RibeiroRBFE #coordination #policy
Updating Strategies of Policies for Coordinating Agent Swarm in Dynamic Environments (RR, AFR, MACB, FF, FE), pp. 345–356.
ICMLICML-c1-2013-SznitmanLFJF #locality #policy
An Optimal Policy for Target Localization with Application to Electron Microscopy (RS, AL, PIF, BJ, PF), pp. 1–9.
ICMLICML-c3-2013-ChenLZ #crowdsourcing #policy
Optimistic Knowledge Gradient Policy for Optimal Budget Allocation in Crowdsourcing (XC, QL, DZ), pp. 64–72.
ICMLICML-c3-2013-LevineK #policy
Guided Policy Search (SL, VK), pp. 1–9.
ICMLICML-c3-2013-PirottaRPC #policy
Safe Policy Iteration (MP, MR, AP, DC), pp. 307–315.
ICMLICML-c3-2013-RossZYDB #learning #policy #predict
Learning Policies for Contextual Submodular Prediction (SR, JZ, YY, DD, DB), pp. 1364–1372.
KDDKDD-2013-AsadiLB #memory management #policy #realtime #twitter
Dynamic memory allocation policies for postings in real-time Twitter search (NA, JL, MB), pp. 1186–1194.
SEKESEKE-2013-PereiraAS #data access #policy #relational #runtime
Runtime Values Driven by Access Control Policies — Statically Enforced at the Level of Relational Business Tiers (ÓMP, RLA, MYS), pp. 1–7.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
PPDPPPDP-2013-StewartBN #data flow #data type #dependent type #policy #semistructured data
Dependent types for enforcement of information flow and erasure policies in heterogeneous data structures (GS, AB, AN), pp. 145–156.
RERE-2013-MasseyEAS #analysis #automation #documentation #mining #policy #requirements
Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
SACSAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #using #video
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SACSAC-2013-Schefer-WenzlS #information management #policy
Generic support for RBAC break-glass policies in process-aware information systems (SSW, MS), pp. 1441–1446.
ICSEICSE-2013-Slankas #data access #database #implementation #natural language #policy
Implementing database access control policy from unconstrained natural language text (JS), pp. 1357–1360.
CCCC-2013-MooreC #automation #generative #machine learning #policy #using
Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
HPCAHPCA-2013-DasAMKA #manycore #memory management #policy
Application-to-core mapping policies to reduce memory system interference in multi-core systems (RD, RA, OM, AK, MA), pp. 107–118.
ICSTICST-2013-BertolinoBDKLM #design #policy #testing
A Toolchain for Designing and Testing XACML Policies (AB, MB, SD, NK, FL, EM), pp. 495–496.
ASEASE-2012-HwangXKMT #evolution #policy #security #testing
Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
CASECASE-2012-HanXZLW #concurrent #policy
Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
CASECASE-2012-LiJJ #policy
A pull VPLs based release policy and dispatching rule for semiconductor wafer fabrication (YL, ZJ, WJ), pp. 396–400.
CASECASE-2012-SharabianiD #policy
Observation policies for patient and resource tracking in outpatient clinics (AS, HD), pp. 532–537.
DATEDATE-2012-YangGBSC #game studies #graph #policy #resource management
Playing games with scenario- and resource-aware SDF graphs through policy iteration (YY, MG, TB, SS, HC), pp. 194–199.
ICEISICEIS-v3-2012-CarvalhoRACJDM #energy #network #performance #policy #towards
Towards Sustainable Networks — Energy Efficiency Policy from Business to Device Instance Levels (TCMBC, ACR, MA, CHAC, GCJ, CKD, CM), pp. 238–243.
ICMLICML-2012-CastroTM #policy
Policy Gradients with Variance Related Risk Criteria (DDC, AT, SM), p. 215.
ICMLICML-2012-DegrisWS #linear
Linear Off-Policy Actor-Critic (TD, MW, RSS), p. 28.
ICMLICML-2012-DekelTA #adaptation #learning #online #policy
Online Bandit Learning against an Adaptive Adversary: from Regret to Policy Regret (OD, AT, RA), p. 227.
ICMLICML-2012-KalakrishnanRPS #learning #policy
Learning Force Control Policies for Compliant Robotic Manipulation (MK, LR, PP, SS), p. 10.
ICMLICML-2012-ScherrerGGG #approximate #policy
Approximate Modified Policy Iteration (BS, VG, MG, MG), p. 245.
ICMLICML-2012-StulpS #adaptation #matrix #policy
Path Integral Policy Improvement with Covariance Matrix Adaptation (FS, OS), p. 201.
SEKESEKE-2012-MaarabaniAC #policy #security #testing
Testing Interoperability Security Policies (MEM, CA, ARC), pp. 464–469.
OOPSLAOOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management #using
Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
TOOLSTOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #privacy #social
Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
PADLPADL-2012-Coleman #classification #distributed #policy #specification
Distributed Policy Specification and Interpretation with Classified Advertisements (NC), pp. 198–211.
POPLPOPL-2012-YangYS #automation #policy #privacy
A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
SACSAC-2012-AnwarF #data access #network #policy #social #visualisation
A visualization tool for evaluating access control policies in facebook-style social network systems (MMA, PWLF), pp. 1443–1450.
SACSAC-2012-BartschS #approach #policy
Guiding decisions on authorization policies: a participatory approach to decision support (SB, MAS), pp. 1502–1507.
SACSAC-2012-BeusterG #modelling #policy #security #smarttech
Formal security policy models for smart card evaluations (GB, KG), pp. 1640–1642.
SACSAC-2012-InzingerSHLD #adaptation #optimisation #policy
Non-intrusive policy optimization for dependable and adaptive service-oriented systems (CI, BS, WH, PL, SD), pp. 504–510.
SACSAC-2012-ShinWC #distributed #framework #in the cloud
A policy-based decentralized authorization management framework for cloud computing (DS, YW, WC), pp. 465–470.
FSEFSE-2012-XiaoPTX #automation #documentation #policy #security
Automated extraction of security policies from natural-language software documents (XX, AMP, ST, TX), p. 12.
HPCAHPCA-2012-LeeK #architecture #cpu #gpu #named #policy
TAP: A TLP-aware cache management policy for a CPU-GPU heterogeneous architecture (JL, HK), pp. 91–102.
ISMMISMM-2012-ZhouD #configuration management #locality #manycore #memory management #policy
Memory management for many-core processors with software configurable locality policies (JZ, BD), pp. 3–14.
CAVCAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICSTICST-2012-BertolinoDLM #automation #generative #policy #testing
Automatic XACML Requests Generation for Policy Testing (AB, SD, FL, EM), pp. 842–849.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
CASECASE-2011-NazeemR #classification #concurrent #design #policy #resource management
Designing maximally permissive deadlock avoidance policies for sequential resource allocation systems through classification theory (AN, SAR), pp. 405–412.
DACDAC-2011-WangXAP #classification #learning #policy #power management #using
Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
HTHT-2011-SquicciariniSLW #adaptation #image #named #policy #predict #resource management
A3P: adaptive policy prediction for shared images over popular content sharing sites (ACS, SS, DL, JW), pp. 261–270.
VLDBVLDB-2011-AtaullahT #database #modelling #policy
Business Policy Modeling and Enforcement in Databases (AAA, FWT), pp. 921–931.
ESOPESOP-2011-JensenKP #policy
Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
SEFMSEFM-2011-Pedercini #communication #modelling #policy #process
Models and Communication in the Policy Process (MP), pp. 35–37.
SEFMSEFM-2011-Pedercini11a #analysis #development #policy
Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
GCMGCM-2010-BottoniFP11 #constraints #incremental #policy
Incremental update of constraint-compliant policy rules (PB, AF, FPP).
CHICHI-2011-KomanduriSKMBCCE #people #policy
Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
CSCWCSCW-2011-SantosSCKSRRT #open source #policy
Intellectual property policy and attractiveness: a longitudinal study of free and open source software projects (CDSJ, MBC, FK, JS, VR, DR, TT), pp. 705–708.
EDOCEDOC-2011-KharbiliMKP #modelling #named
CoReL: Policy-Based and Model-Driven Regulatory Compliance Management (MEK, QM, PK, EP), pp. 247–256.
ICEISICEIS-v2-2011-LiQLZ #policy #research #simulation
Research and Demonstration of Agricultural Policy Simulation based on CGE Model (ZL, QQ, YL, DZ), pp. 13–17.
ICEISICEIS-v3-2011-ZhangZZY #policy
Inventory Management Policies of Gold Jewelry Retailers (JZ, YZ, ZZ, HY), pp. 517–522.
ICEISICEIS-v4-2011-YangZZZ #policy
Urban Motor Vehicle Limiting Policy based on System Dynamics (HY, ZZ, YZ, HZ), pp. 539–542.
ICMLICML-2011-BazzaniFLMT #learning #network #policy #recognition #video
Learning attentional policies for tracking and recognition in video with deep networks (LB, NdF, HL, VM, JAT), pp. 937–944.
ICMLICML-2011-DeisenrothR #approach #modelling #named #policy
PILCO: A Model-Based and Data-Efficient Approach to Policy Search (MPD, CER), pp. 465–472.
ICMLICML-2011-DudikLL #evaluation #learning #policy #robust
Doubly Robust Policy Evaluation and Learning (MD, JL, LL), pp. 1097–1104.
ICMLICML-2011-GabillonLGS #classification #policy
Classification-based Policy Iteration with a Critic (VG, AL, MG, BS), pp. 1049–1056.
ICMLICML-2011-LiuLC #infinity #policy #representation
The Infinite Regionalized Policy Representation (ML, XL, LC), pp. 769–776.
ICMLICML-2011-Neumann #policy
Variational Inference for Policy Search in changing situations (GN), pp. 817–824.
KEODKEOD-2011-KhuratS #approach #ontology #policy #verification
An Ontological Approach to Verifying P3P Policies (AK, BS), pp. 349–353.
SEKESEKE-2011-RomeikatBS #modelling #policy
Modeling of Domain-Specific ECA Policies (RR, BB, HS), pp. 52–58.
OOPSLAOOPSLA-2011-Kulkarni #compilation #jit #policy
JIT compilation policy for modern machines (PAK), pp. 773–788.
PPDPPPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
SACSAC-2011-FilhoSM #case study #network #simulation
Policy-driven network simulation: a resilience case study (AESF, PS, AM), pp. 492–497.
SACSAC-2011-ShiC #authoring #data access #interface #natural language #policy
A controlled natural language interface for authoring access control policies (LLS, DWC), pp. 1524–1530.
CADECADE-2011-AlbertiAR #analysis #automation #named #policy #security
ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
CASECASE-2010-FengZL #evaluation #multi #performance #policy #scheduling
Performance evaluation of a multi-product system with setups and dynamic scheduling policies (WF, LZ, NL), pp. 960–965.
CASECASE-2010-SinghR #clustering #energy #optimisation #policy
Energy optimization policies for server clusters (NS, SR), pp. 293–300.
DACDAC-2010-HaquePJP #approach #embedded #named #performance #policy #simulation
SCUD: a fast single-pass L1 cache simulation approach for embedded processors with round-robin replacement policy (MSH, JP, AJ, SP), pp. 356–361.
DATEDATE-2010-HaquePJP #approach #embedded #named #performance #policy #simulation
DEW: A fast level 1 cache simulation approach for embedded processors with FIFO replacement policy (MSH, JP, AJ, SP), pp. 496–501.
DATEDATE-2010-JanapsatyaIPP #adaptation #algorithm #policy
Dueling CLOCK: Adaptive cache replacement policy based on the CLOCK algorithm (AJ, AI, JP, SP), pp. 920–925.
DocEngDocEng-2010-SimskeB #automation #named #policy
APEX: automated policy enforcement eXchange (SJS, HB), pp. 139–142.
SIGMODSIGMOD-2010-NabeelSZB #named #privacy
Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
VLDBVLDB-2010-FabbriLZ #named #query
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting (DF, KL, QZ), pp. 36–47.
VLDBVLDB-2010-YiuUST #detection #mobile #performance #policy #proximity #self
Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
ESOPESOP-2010-AdjeGG #invariant #policy #static analysis
Coupling Policy Iteration with Semi-definite Relaxation to Compute Accurate Numerical Invariants in Static Analysis (AA, SG, EG), pp. 23–42.
ESOPESOP-2010-SwamyCC #data flow #policy
Enforcing Stateful Authorization and Information Flow Policies in Fine (NS, JC, RC), pp. 529–549.
ICALPICALP-v2-2010-Fearnley #bound #exponential #policy
Exponential Lower Bounds for Policy Iteration (JF), pp. 551–562.
CHICHI-2010-InglesantS #cost analysis #policy
The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
CHICHI-2010-LipfordWWFR #comparison #interface #policy #privacy #visual notation
Visual vs. compact: a comparison of privacy policy interfaces (HRL, JW, MW, KF, RWR), pp. 1111–1114.
CAiSECAiSE-2010-GaaloulZCG #policy
Dynamic Authorisation Policies for Event-Based Task Delegation (KG, EZ, FC, CG), pp. 135–149.
ICEISICEIS-AIDSS-2010-KhriyenkoNT #named #paradigm
Context-Policy-Configuration — Paradigm of Intelligent Autonomous System Creation (OK, SN, VYT), pp. 198–205.
ICEISICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #policy #security
Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
CIKMCIKM-2010-KulkarniC #distributed #documentation #policy
Document allocation policies for selective searching of distributed indexes (AK, JC), pp. 449–458.
ICMLICML-2010-LazaricGM #algorithm #analysis #classification #policy
Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
ICMLICML-2010-MaeiSBS #approximate #learning #towards
Toward Off-Policy Learning Control with Function Approximation (HRM, CS, SB, RSS), pp. 719–726.
ICMLICML-2010-ThieryS #policy #problem #trade-off
Least-Squares Policy Iteration: Bias-Variance Trade-off in Control Problems (CT, BS), pp. 1071–1078.
KEODKEOD-2010-Occelli #policy
Reconciling Tempus and Hora — Policy Knowledge in an Information Wired Environment (SO), pp. 213–217.
MODELSMoDELS-v2-2010-MorinKKJ #aspect-oriented #flexibility #modelling #policy
Flexible Model Element Introduction Policies for Aspect-Oriented Modeling (BM, JK, JK, JMJ), pp. 63–77.
POPLPOPL-2010-MartinHCAC #c #c++ #concurrent #policy #source code
Dynamically checking ownership policies in concurrent c/c++ programs (JPM, MH, MC, PA, MC), pp. 457–470.
RERE-2010-YoungA #identification #policy #requirements
A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
SACSAC-2010-BaffaC #generative #modelling #policy #simulation
Modeling POMDPs for generating and simulating stock investment policies (ACEB, AEMC), pp. 2394–2399.
SACSAC-2010-ClaycombLSK #network #policy #security
A group-based security policy for wireless sensor networks (WC, RL, DS, BK), pp. 778–785.
SACSAC-2010-HeinzlS #using #validation #xml
Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
SACSAC-2010-KhakpourKSJ #adaptation #analysis #formal method #self
Formal analysis of policy-based self-adaptive systems (NK, RK, MS, SJ), pp. 2536–2543.
SACSAC-2010-LeePKKS #hybrid #network #policy #retrieval
A hybrid prefetch policy for the retrieval of link-associated information on vehicular networks (JL, GLP, SWK, HJK, SYS), pp. 189–193.
ICSEICSE-2010-WangZ #case study #development #multi #policy
Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
OSDIOSDI-2010-Chlipala #policy #security #static analysis
Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications (AC), pp. 105–118.
CAVCAV-2010-BasinKM #first-order #logic #monitoring #policy
Policy Monitoring in First-Order Temporal Logic (DAB, FK, SM), pp. 1–18.
ICSTICST-2010-BruckerBKW #generative #policy #testing
Verified Firewall Policy Transformations for Test Case Generation (ADB, LB, PK, BW), pp. 345–354.
DATEDATE-2009-SubramanianGD #adaptation #configuration management #design #embedded #grid #network #online #policy
Online adaptation policy design for grid sensor networks with reconfigurable embedded nodes (VS, MG, AD), pp. 1273–1278.
ESOPESOP-2009-RajanTSL #composition #design #named #policy #verification #web #web service
Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services (HR, JT, SMS, GTL), pp. 333–347.
TACASTACAS-2009-GofmanLSZYS #analysis #data access #named #policy
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
ICPCICPC-2009-HuangDS #policy #prototype #source code
Prototyping synchronization policies for existing programs (YH, LKD, REKS), pp. 289–290.
LATALATA-2009-BaaderBT #policy
Matching Trace Patterns with Regular Policies (FB, AB, AT), pp. 105–116.
AdaSIGAda-2009-TijeroG #ada #experience #middleware #policy #scheduling
Experience in integrating interchangeable scheduling policies into a distribution middleware for Ada (HPT, JJG), pp. 73–78.
EDOCEDOC-2009-GovernatoriI #modelling #network #policy #reasoning #social
Modelling and Reasoning Languages for Social Networks Policies (GG, RI), pp. 193–200.
ICEISICEIS-ISAS-2009-EdgeSPC #compilation #policy #specification
Specifying and Compiling High Level Financial Fraud Policies into StreamSQL (MEE, PRFS, OP, MC), pp. 194–199.
ICEISICEIS-ISAS-2009-FerriniB #approach #policy
A Comprehensive Approach for Solving Policy Heterogeneity (RF, EB), pp. 63–68.
ICMLICML-2009-BoulariasC #policy #predict
Predictive representations for policy gradient in POMDPs (AB, BCd), pp. 65–72.
ICMLICML-2009-Heidrich-MeisnerI #policy
Hoeffding and Bernstein races for selecting policies in evolutionary direct policy search (VHM, CI), pp. 401–408.
ICMLICML-2009-PazisL #learning #policy
Binary action search for learning continuous-action control policies (JP, MGL), pp. 793–800.
SEKESEKE-2009-KulkarniCZ #framework #monitoring #named #online #policy
iPass: An Integrated Framework for Educating, Monitoring and Enforcing Password Policies for Online Services (DK, DC, FZ), pp. 548–551.
SIGIRSIGIR-2009-FetterlyCV #effectiveness #policy #web
The impact of crawl policy on web search effectiveness (DF, NC, VV), pp. 580–587.
SACSAC-2009-ChiangWLC #clustering #multi #policy #web
New content-aware request distribution policies in web clusters providing multiple services (MLC, CHW, YJL, YFC), pp. 79–83.
SACSAC-2009-MarconSLS #architecture #policy
Policy management architecture based on provisioning model and authorization certificates (ALMJ, AOS, LAdPLJ, MS), pp. 1594–1598.
SACSAC-2009-YokoyamaHSK #internet #operating system #policy #security
Simplifying security policy descriptions for internet servers in secure operating systems (TY, MH, MS, KK), pp. 326–333.
HPCAHPCA-2009-Chaudhuri #locality #multi #named #policy #scalability
PageNUCA: Selected policies for page-grain locality management in large shared chip-multiprocessor caches (MC), pp. 227–238.
ISMMISMM-2009-GuanSJ #performance #policy #using
Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
LCTESLCTES-2009-CaspiCGPR #memory management #policy #scheduling
Synchronous objects with scheduling policies: introducing safe shared memory in lustre (PC, JLC, LG, MP, PR), pp. 11–20.
ICSTICST-2009-MouelhiTB #functional #policy #security #testing
Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
ICSTSAT-2009-NikolicMJ #policy #satisfiability
Instance-Based Selection of Policies for SAT Solvers (MN, FM, PJ), pp. 326–340.
ICSTSAT-2009-PipatsrisawatD #policy #satisfiability
Width-Based Restart Policies for Clause-Learning Satisfiability Solvers (KP, AD), pp. 341–355.
CBSECBSE-2008-RusselloMD #component #framework #named #policy
ESCAPE: A Component-Based Policy Framework for Sense and React Applications (GR, LM, ND), pp. 212–229.
ASEASE-2008-ChauvelBBJ #adaptation #composition #policy
Composition of Qualitative Adaptation Policies (FC, OB, IB, JMJ), pp. 455–458.
DATEDATE-2008-MassasP #comparison #manycore #memory management #policy
Comparison of memory write policies for NoC based Multicore Cache Coherent Systems (PGdM, FP), pp. 997–1002.
DATEDATE-2008-MulasPBCABAM #architecture #multi #policy #streaming
Thermal Balancing Policy for Streaming Computing on Multiprocessor Architectures (FM, MP, MB, SC, AA, LB, DA, GDM), pp. 734–739.
ICALPICALP-C-2008-GoyalJPS #bound #encryption #policy
Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
SEFMSEFM-2008-SalasK #modelling #policy #privacy #testing #using
Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFMSEFM-2008-TschantzW #policy
Extracting Conditional Confidentiality Policies (MCT, JMW), pp. 107–116.
CHICHI-2008-BauerCRRV #case study #flexibility #policy
A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
CHICHI-2008-ButlerJP #policy #wiki
Don’t look now, but we’ve created a bureaucracy: the nature and roles of policies and rules in wikipedia (BSB, EJ, JP), pp. 1101–1110.
CHICHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
ICEISICEIS-DISI-2008-MuldnerML #data access #dataset #policy #xml
Succinct Access Control Policies for Published XML Datasets (TM, JKM, GL), pp. 380–385.
ICMLICML-2008-BarrettN #learning #multi #policy
Learning all optimal policies with multiple criteria (LB, SN), pp. 41–47.
ICMLICML-2008-KerstingD #parametricity #policy #relational
Non-parametric policy gradients: a unified treatment of propositional and relational domains (KK, KD), pp. 456–463.
ICMLICML-2008-UenoKMMI #approach #evaluation #policy #statistics
A semiparametric statistical approach to model-free policy evaluation (TU, MK, TM, SiM, SI), pp. 1072–1079.
KRKR-2008-MartinezPPSS #consistency #nondeterminism #policy
Inconsistency Management Policies (MVM, FP, AP, GIS, VSS), pp. 367–377.
MODELSMoDELS-2008-CombemaleBCDH #domain-specific language #policy #specification #uml
Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
MODELSMoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml #using
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-CombemaleBCDH #domain-specific language #policy #specification #uml
Autonomic Management Policy Specification: From UML to DSML (BC, LB, XC, MJD, DH), pp. 584–599.
MODELSMoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml #using
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
PPDPPPDP-2008-BertolissiF #composition #data access #framework #policy
A rewriting framework for the composition of access control policies (CB, MF), pp. 217–225.
PADLPADL-2008-BeckerN #abduction #declarative #policy
The Role of Abduction in Declarative Authorization Policies (MYB, SN), pp. 84–99.
SACSAC-2008-BaveraB #analysis #bytecode #data flow #policy #type system
Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
SACSAC-2008-BrotoHSPT #policy #specification
Autonomic management policy specification in Tune (LB, DH, PS, NDP, ST), pp. 1658–1663.
SACSAC-2008-ChaariBB #ontology #web #web service
Enhancing web service selection by QoS-based ontology and WS-policy (SC, YB, FB), pp. 2426–2431.
LCTESLCTES-2008-ReinekeG #analysis #policy
Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
ICLPICLP-2008-BeniniBM #constraints #multi #policy #programming #resource management #using
Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLPICLP-2008-BonattiCOS #privacy #security #trust
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
ICLPICLP-2008-GelfondL #policy
Authorization and Obligation Policies in Dynamic Systems (MG, JL), pp. 22–36.
ICSTICST-2008-PretschnerMT #data access #modelling #policy #testing
Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
CASECASE-2007-ReveliotisR0 #algebra #concurrent #correctness #policy #programming #verification
Correctness Verification of Generalized Algebraic Deadlock Avoidance Policies through Mathematical Programming (SR, ER, JYC), pp. 200–206.
SIGMODSIGMOD-2007-QiaoSFPCBK #database #framework #policy
A framework for enforcing application policies in database systems (LQ, BS, GF, AP, BC, TB, WK), pp. 981–992.
ESOPESOP-2007-GaubertGTZ #policy #relational #static analysis
Static Analysis by Policy Iteration on Relational Domains (SG, EG, AT, SZ), pp. 237–252.
IFMIFM-2007-BraghinSB #automation #mobile #policy #security #verification
Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
LISPILC-2007-WozniakDW #abstraction #data type #policy
Dynamic ADTs: a “don’t ask, don’t tell” policy for data abstraction (GW, MD, SW), p. 26.
HCIHIMI-IIE-2007-KrachinaRT #ontology #perspective #policy #privacy #semantics
Reconciling Privacy Policies and Regulations: Ontological Semantics Perspective (OK, VR, KET), pp. 730–739.
HCIHIMI-IIE-2007-VuCGCSNPP #how #policy #privacy
How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
CAiSECAiSE-2007-BaresiGP #aspect-oriented #policy #process
Policies and Aspects for the Supervision of BPEL Processes (LB, SG, PP), pp. 340–354.
CAiSECAiSE-2007-MaamarNBS #policy #transaction #web #web service
Policies for Context-Driven Transactional Web Services (ZM, NCN, DB, SS), pp. 249–263.
EDOCEDOC-2007-TosicSL #composition #uml #web #web service
UML Profiles for WS-Policy4MASC as Support for Business Value Driven Engineering and Management of Web Services and their Compositions (VT, BS, HL), pp. 157–168.
ICEISICEIS-DISI-2007-BarkerD #algebra #information management #policy
Secure knowledge exchange by policy algebra and erml (SB, PD), pp. 212–217.
ICEISICEIS-DISI-2007-NowalczykT #approach #privacy
A policy-based privacy storage approach (JN, FTC), pp. 605–608.
ICEISICEIS-SAIC-2007-LazanasKK #hybrid #policy #recommendation #web #web service
Applying Hybrid Recommendation Policies through Agent-Invoked Web Services in E-Markets (AL, NIK, VK), pp. 161–166.
CIKMCIKM-2007-TanMG #clustering #crawling #design #policy #web
Designing clustering-based web crawling policies for search engine crawlers (QT, PM, CLG), pp. 535–544.
SIGIRSIGIR-2007-NtoulasC #correctness #policy
Pruning policies for two-tiered inverted index with correctness guarantee (AN, JC), pp. 191–198.
PPDPPPDP-2007-HristovaTL #analysis #performance #policy #trust
Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
SACSAC-2007-KumarMS #mobile #policy
A weighted cache replacement policy for location dependent data in mobile environments (AK, MM, AKS), pp. 920–924.
SACSAC-2007-OrlovskyR #distributed #policy #security
Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
ICSEICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
HPCAHPCA-2007-EyermanE #parallel #policy #smt
A Memory-Level Parallelism Aware Fetch Policy for SMT Processors (SE, LE), pp. 240–249.
ISMMISMM-2007-XianSJ #concurrent #garbage collection #performance #policy #scheduling #thread
Allocation-phase aware thread scheduling policies to improve garbage collection performance (FX, WSa, HJ), pp. 79–90.
CSLCSL-2007-Goller #complexity #on the #policy #reasoning
On the Complexity of Reasoning About Dynamic Policies (SG), pp. 358–373.
CBSECBSE-2006-GoeminneJTDG #framework #policy
Service Policy Enhancements for the OSGi Service Platform (NG, GDJ, FDT, BD, FG), pp. 238–253.
ASEASE-2006-MurtaHW #architecture #evolution #implementation #named #traceability
ArchTrace: Policy-Based Support for Managing Evolving Architecture-to-Implementation Traceability Links (LGPM, AvdH, CMLW), pp. 135–144.
CASECASE-2006-XingTXH #complexity #concurrent #flexibility #policy #polynomial
Optimal Polynomial Complexity Deadlock Avoidance Policies for Manufacturing Systems with Flexible Routings (KX, FT, HX, BH), pp. 448–453.
DATEDATE-2006-PettisRL #automation #operating system #policy #runtime
Automatic run-time selection of power policies for operating systems (NP, JR, YHL), pp. 508–513.
HTHT-2006-McCownN #crawling #evaluation #policy
Evaluation of crawling policies for a web-repository crawler (FM, MLN), pp. 157–168.
VLDBVLDB-2006-Song #policy
IT839 Policy Leading to u-Korea (JHS), p. 1103.
ESOPESOP-2006-BrobergS #calculus #policy #towards
Flow Locks: Towards a Core Calculus for Dynamic Flow Policies (NB, DS), pp. 180–196.
FoSSaCSFoSSaCS-2006-PitcherR #policy
Dynamic Policy Discovery with Remote Attestation (CP, JR), pp. 111–125.
CHICHI-2006-KaratKBF #authoring #interface #policy #privacy
Evaluating interfaces for privacy policy rule authoring (CMK, JK, CB, JF), pp. 83–92.
AdaEuropeAdaEurope-2006-CamposGH #middleware #policy #realtime #scheduling
Interchangeable Scheduling Policies in Real-Time Middleware for Distribution (JLC, JJG, MGH), pp. 227–240.
EDOCEDOC-2006-LiG #policy
Composing Administrative Scope of Delegation Policies based on extended XACML (XFL, DF), pp. 467–470.
EDOCEDOC-2006-SzydloSZ #adaptation #component
Policy-based Context-aware Adaptable Software Components for Mobility Computing (TS, RS, KZ), pp. 483–487.
ICEISICEIS-ISAS-2006-BenferhatB #policy #security
Argument-Based Approaches in Prioritized Conflicting Security Policies (SB, REB), pp. 349–354.
ICEISICEIS-SAIC-2006-MaamarMB #approach #web #web service
A Policy-Based Approach to Secure Context in a Web Services Environment (ZM, GKM, DB), pp. 100–105.
ICEISICEIS-SAIC-2006-SattanathanNMM #policy #web #web service
Context-Driven Policy Enforcement and Reconciliation for Web Services (SS, NCN, ZM, GKM), pp. 93–99.
ICMLICML-2006-BowlingMJNW #learning #policy #predict #using
Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICMLICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process #using
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICPRICPR-v3-2006-IsukapalliE #identification #learning #policy
Learning Policies for Efficiently Identifying Objects of Many Classes (RI, AME, RG), pp. 356–361.
KRKR-2006-Coste-MarquisFLBM #policy #quantifier #representation
Representing Policies for Quantified Boolean Formulae (SCM, HF, JL, DLB, PM), pp. 286–297.
SACSAC-2006-LeongG #policy
Improving the performances of proxy cache replacement policies by considering infrequent objects (HWL, BG), pp. 791–796.
SACSAC-2006-SousaM #adaptation #biology #comparison #grid #multi #named #sequence
PackageBLAST: an adaptive multi-policy grid service for biological sequence comparison (MSS, ACMAdM), pp. 156–160.
SACSAC-2006-WelchL #policy #security
Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
HPDCHPDC-2006-BaiardiRMV #monitoring #policy #virtual machine
Policy Driven Virtual Machine Monitor for Protected Grids (FB, LR, PM, AV), pp. 313–316.
OSDIOSDI-2006-KimR #interface #network #policy
Connection Handoff Policies for TCP Offload Network Interfaces (HyK, SR), pp. 293–306.
FATESFATES-RV-2006-FalconeFMR #calculus #framework #network #policy #security
A Test Calculus Framework Applied to Network Security Policies (YF, JCF, LM, JLR), pp. 55–69.
IJCARIJCAR-2006-DoughertyFK #policy #reasoning #specification
Specifying and Reasoning About Dynamic Access-Control Policies (DJD, KF, SK), pp. 632–646.
CASECASE-2005-WeiL #concurrent #policy #programming #using
A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
DocEngDocEng-2005-GenevesR #compilation #policy #streaming #xpath
Compiling XPath for streaming access policy (PG, KHR), pp. 52–54.
ESOPESOP-2005-FournetGM #policy
A Type Discipline for Authorization Policies (CF, ADG, SM), pp. 141–156.
ESOPESOP-2005-Myers #policy #programming #security
Programming with Explicit Security Policies (ACM), pp. 1–4.
FoSSaCSFoSSaCS-2005-BartolettDF #data access #policy
History-Based Access Control with Local Policies (MB, PD, GLF), pp. 316–332.
PLDIPLDI-2005-BauerLW #policy #security
Composing security policies with polymer (LB, JL, DW), pp. 305–314.
SEFMSEFM-2005-WilsonMC #approach #configuration management #flexibility #policy #verification
Omnibus Verification Policies: A flexible, configurable approach to assertion-based software verification (TW, SM, RGC), pp. 150–159.
AdaEuropeAdaEurope-2005-RivasMH #ada #policy #scheduling
Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks (MAR, JM, MGH), pp. 220–235.
ICEISICEIS-v1-2005-EzekielM #health #policy
An Integrated Decision Support Tool for EU Policies on Health, Transport and Artistic Heritage Recovery (KE, FM), pp. 261–266.
ICEISICEIS-v3-2005-KurumaH #community #policy
A Model for Policy Based Service Community (HK, SH), pp. 360–366.
PPDPPPDP-2005-EchahedP #declarative #policy #security
Security policy in a declarative style (RE, FP), pp. 153–163.
POPLPOPL-2005-LiZ #policy
Downgrading policies and relaxed noninterference (PL, SZ), pp. 158–170.
RERE-2005-Corniou #challenge #information management #policy
The Role of Information Systems within Corporate Strategy and Management Policies: New Challenges (JPC), p. 4.
RERE-2005-CrookIN #modelling #on the #policy
On Modelling Access Policies: Relating Roles to their Organisational Context (RC, DCI, BN), pp. 157–166.
SACSAC-2005-MendoncaS #empirical #evaluation #policy #web #web service
An empirical evaluation of client-side server selection policies for accessing replicated web services (NCM, JAFS), pp. 1704–1708.
SACSAC-2005-NeisseAGT #network #policy
Policies translation for integrated management of grids and networks (RN, MJBA, LZG, LMRT), pp. 724–729.
SACSAC-2005-SohrDA #information management #policy #security #specification
Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
SACSAC-2005-Ungureanu #enterprise #performance #policy
Efficient support for enterprise delegation policies (VU), pp. 340–345.
ICSEICSE-2005-ChinKQPN #alias #policy #safety #verification
Verifying safety policies with size properties and alias controls (WNC, SCK, SQ, CP, HHN), pp. 186–195.
ICSEICSE-2005-FislerKMT #impact analysis #policy #verification
Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
LCTESLCTES-2005-XuZRMM #clustering #embedded #energy #policy
Energy-efficient policies for embedded clusters (RX, DZ, CR, RGM, DM), pp. 1–10.
CAVCAV-2005-CostanGGMP #algorithm #fixpoint #policy #source code #static analysis
A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs (AC, SG, EG, MM, SP), pp. 462–475.
SIGMODSIGMOD-2004-Hall #challenge #policy #requirements
Requirements and Policy Challenges in Highly Secure Environments (DEH), pp. 897–898.
FoSSaCSFoSSaCS-2004-PucellaW #policy #reasoning
Reasoning about Dynamic Policies (RP, VW), pp. 453–467.
CHICHI-2004-JensenP #evaluation #online #policy #privacy #tool support
Privacy policies as decision-making tools: an evaluation of online privacy notices (CJ, CP), pp. 471–478.
CSCWCSCW-2004-MorrisRSFV #coordination #multi #policy #protocol #social
Beyond “social protocols”: multi-user coordination policies for co-located groupware (MRM, KR, CS, CF, FV), pp. 262–265.
AdaEuropeAdaEurope-2004-MinguetFGB #ada #policy #scheduling
Mixing Scheduling Policies in Ada (AEM, AGF, VLG, ATB), pp. 273–282.
ICMLICML-2004-Strens #performance #policy
Efficient hierarchical MCMC for policy search (MJAS).
KRKR-2004-BaralE #algorithm #policy #polynomial
A Polynomial-Time Algorithm for Constructing k-Maintainable Policies (CB, TE), pp. 720–730.
ECOOPECOOP-2004-AldrichC #alias #policy
Ownership Domains: Separating Aliasing Policy from Mechanism (JA, CC), pp. 1–25.
ECOOPECOOP-2004-ScharliDNW #composition #encapsulation #policy
Composable Encapsulation Policies (NS, SD, ON, RW), pp. 26–50.
SACSAC-2004-BackesKBS #comparison #enterprise #performance #policy #privacy
Efficient comparison of enterprise privacy policies (MB, GK, WB, MS), pp. 375–382.
SACSAC-2004-ParkerC #policy #protocol
Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
ICSEICSE-2004-LingenH #composition #configuration management #framework #policy
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition (RvdL, AvdH), pp. 573–582.
ICSEICSE-2004-WohlstadterTMRD #interactive #middleware #named #policy
GlueQoS: Middleware to Sweeten Quality-of-Service Policy Interactions (EW, ST, TAM, IR, PTD), pp. 189–199.
ISMMISMM-2004-Smaragdakis #adaptation #policy
General adaptive replacement policies (YS), pp. 108–119.
DACDAC-2003-MeyerowitzPS #policy #realtime #scheduling
A tool for describing and evaluating hierarchical real-time bus scheduling policies (TM, CP, ALSV), pp. 312–317.
ITiCSEITiCSE-2003-GrangerL #internet #policy
Classroom discussions: policies and responsibilities of Internet Service Providers (MJG, JCL), pp. 99–103.
FASEFASE-2003-KochP #policy #specification #verification #visual notation
Visual Specifications of Policies and Their Verification (MK, FPP), pp. 278–293.
FASEFASE-2003-ScottBM #mobile #policy #security
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment (DJS, ARB, AM), pp. 102–117.
ICSMEICSM-2003-MadhavjiT #evolution
Policy-guided Software Evolution (NHM, JT), pp. 75–82.
FMFME-2003-DenneyF #correctness #policy #safety
Correctness of Source-Level Safety Policies (ED, BF), pp. 894–913.
AdaEuropeAdaEurope-2003-BurnsHW #ada #policy #scheduling
A Round Robin Scheduling Policy for Ada (AB, MGH, AJW), pp. 334–343.
EDOCEDOC-2003-DunlopIR
Methods for Conflict Resolution in Policy-Based Management Systems (ND, JI, KR), pp. 98–111.
ICEISICEIS-v4-2003-KammanahalliSGV #policy
A Time Zone Based Dynamic Cache Replacement Policy (HK, KS, SG, SV), pp. 494–497.
ICEISICEIS-v4-2003-RoqueOL #component #composition #policy #visual notation
Policies Composition Through Graphical Components (VR, JLO, RPL), pp. 464–467.
ICMLICML-2003-GhavamzadehM #algorithm #policy
Hierarchical Policy Gradient Algorithms (MG, SM), pp. 226–233.
ICMLICML-2003-MannorRG #performance #policy
The Cross Entropy Method for Fast Policy Search (SM, RYR, YG), pp. 512–519.
ICMLICML-2003-Munos #approximate #bound #fault #policy
Error Bounds for Approximate Policy Iteration (RM), pp. 560–567.
ICMLICML-2003-WangD #learning #modelling #policy
Model-based Policy Gradient Reinforcement Learning (XW, TGD), pp. 776–783.
UMLUML-2003-AlghathbarW #case study #consistency #data access #policy
Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
REFSQREFSQ-J-2002-AntonEC03 #behaviour #policy #privacy #requirements #security
Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
REFSQREFSQ-J-2002-CrookIN03 #modelling #policy #requirements #using
Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
RERE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
SACSAC-2003-MucciniM #coordination #elicitation #policy #requirements
Eliciting Coordination Policies from Requirements (HM, FM), pp. 387–393.
ESEC-FSEESEC-FSE-2003-LeeA #component
Policy-enforced linking of untrusted components (EL, AWA), pp. 371–374.
HPCAHPCA-2003-El-MoursyA #performance #policy #smt
Front-End Policies for Improved Issue Efficiency in SMT Processors (AEM, DHA), pp. 31–40.
HPDCHPDC-2003-BucurE #clustering #multi #policy #simulation
Trace-Based Simulations of Processor Co-Allocation Policies in Multiclusters (AIDB, DHJE), pp. 70–79.
HPDCHPDC-2003-RamanLS #policy #resource management
Policy Driven Heterogeneous Resource Co-Allocation with Gangmatching (RR, ML, MHS), pp. 80–89.
HPDCHPDC-2003-SievertC #policy #process
Policies for Swapping MPI Processes (OS, HC), pp. 104–113.
SOSPSOSP-2003-Arpaci-DusseauABDEGNP #kernel #policy
Transforming policies into mechanisms with infokernel (ACAD, RHAD, NCB, TED, TJE, HSG, JAN, FIP), pp. 90–105.
CBSECBSE-2003-VecellioT #framework #policy #predict
Infrastructure Support for Predictable Policy Enforcement (GV, WT), p. 13.
HTHT-2002-TataGW #concept #hypermedia #implementation #policy #prototype
Policies for cooperative hypermedia systems: concepts and prototype implementation (ST, CG, UKW), pp. 140–141.
VLDBVLDB-2002-BettiniJWW #policy #security
Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
VLDBVLDB-2002-SeifertS #hybrid #multi #policy
A Multi-version Cache Replacement and Prefetching Policy for Hybrid Data Delivery Environments (AS, MHS), pp. 850–861.
FoSSaCSFoSSaCS-2002-KochMP #data access #detection #policy #specification
Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
ICGTICGT-2002-KochP #constraints #graph #policy
Describing Policies with Graph Constraints and Rules (MK, FPP), pp. 223–238.
EDOCEDOC-2002-DunlopIR #detection
Dynamic Conflict Detection in Policy-Based Management Systems (ND, JI, KR), pp. 15–26.
ICMLICML-2002-AberdeenB #scalability
Scalable Internal-State Policy-Gradient Methods for POMDPs (DA, JB), pp. 3–10.
ICMLICML-2002-PickettB #algorithm #learning #named
PolicyBlocks: An Algorithm for Creating Useful Macro-Actions in Reinforcement Learning (MP, AGB), pp. 506–513.
SEKESEKE-2002-ReisRSN #process
A policy-based resource instantiation mechanism to automate software process management (CALR, RQR, HS, DJN), pp. 795–802.
SACSAC-2002-Bell #interactive #policy #security #simulation
Interactive simulation of security policies (GB), pp. 247–252.
ICSEICSE-2002-GreenhouseS #concurrent #evolution #policy #source code
Assuring and evolving concurrent programs: annotations and policy (AG, WLS), pp. 453–463.
ASEASE-2001-AndradeFW #automation #configuration management #policy
Enforcing Business Policies Through Automated Reconfiguration (LFA, JLF, MW), p. 426–?.
ASEASE-2001-LowryPR #policy
Certifying Domain-Specific Policies (MRL, TP, GR), pp. 81–90.
FoSSaCSFoSSaCS-2001-KochMP #approach #data access #graph #policy #specification
Foundations for a Graph-Based Approach to the Specification of Access Control Policies (MK, LVM, FPP), pp. 287–302.
AdaEuropeAdaEurope-2001-Burns #ada #policy
Defining New Non-preemptive Dispatching and Locking Policies for Ada (AB), pp. 328–336.
EDOCEDOC-2001-DunlopIR #enterprise #evolution #policy #scalability
Dynamic Policy Model for Large Evolving Enterprises (ND, JI, KR), p. 193–?.
ICEISICEIS-v2-2001-MartinCLG #e-commerce #policy #security
Planning Security Policy on E-Commerce (MM, AC, JL, RG), pp. 915–919.
ICMLICML-2001-GlickmanS #learning #memory management #policy #probability #search-based
Evolutionary Search, Stochastic Policies with Memory, and Reinforcement Learning with Hidden State (MRG, KPS), pp. 194–201.
ICMLICML-2001-PrecupSD #approximate #difference #learning
Off-Policy Temporal Difference Learning with Function Approximation (DP, RSS, SD), pp. 417–424.
ICMLICML-2001-StrensM #policy #statistics #testing #using
Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
ICMLICML-2001-TaoBW #approach #multi #network
A Multi-Agent Policy-Gradient Approach to Network Routing (NT, JB, LW), pp. 553–560.
TOOLSTOOLS-USA-2001-MichaelOR
Natural-Language Processing Support for Developing Policy-Governed Software Systems (JBM, VLO, NCR), pp. 263–275.
RERE-2001-AntonEAP #policy #privacy #requirements
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
SACSAC-2001-VuongSD #distributed #policy #security #using #xml
Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
HPDCHPDC-2001-SanderAFR #network #policy
End-to-End Provision of Policy Information for Network QoS (VS, WAA, ITF, AJR), pp. 115–126.
ASEASE-2000-BoseM #automation #coordination #generative #policy
Systematic Generation of Dependable Change Coordination Plans for Automated Switching of Coordination Policies (PKB, MGM), p. 325–?.
SIGMODSIGMOD-2000-BressanGOT #approach #policy
Integrating Replacement Policies in StorM: An Extensible Approach (CLG, BCO, SB, KLT), p. 599.
FASEFASE-2000-Parisi-PresicceW #configuration management #graph transformation #policy #using
Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
CIKMCIKM-2000-XuHLL #named #on-demand #performance #policy
SAIU: An Efficient Cache Replacement Policy for Wireless On-demand Broadcasts (JX, QH, DLL, WCL), pp. 46–53.
ICMLICML-2000-GrudicU #policy
Localizing Policy Gradient Estimates to Action Transition (GZG, LHU), pp. 343–350.
ICMLICML-2000-PrecupSS #evaluation #policy
Eligibility Traces for Off-Policy Policy Evaluation (DP, RSS, SPS), pp. 759–766.
KRKR-2000-ChomickiLN #approach #logic programming #policy
A Logic Programming Approach to Conflict Resolution in Policy Management (JC, JL, SAN), pp. 121–132.
KRKR-2000-MartinG #concept #learning #policy #using
Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
POPLPOPL-2000-Walker #policy #security #type system
A Type System for Expressive Security Policies (DW), pp. 254–267.
HPCAHPCA-2000-WongB #behaviour #policy
Modified LRU Policies for Improving Second-Level Cache Behavior (WAW, JLB), pp. 49–60.
HPDCHPDC-2000-SchroderH #evaluation #policy
Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness (BS, MHB), pp. 211–220.
OSDIOSDI-2000-GrunwaldLFMN #policy #scheduling
Policies for Dynamic Clock Scheduling (DG, PL, KIF, CBMI, MN), pp. 73–86.
STOCSTOC-1999-Gamarnik #adaptation #network #policy
Stability of Adaptive and Non-Adaptive Packet Routing Policies in Adversarial Queueing Networks (DG), pp. 206–214.
HCIHCI-CCAD-1999-StephanidisSEA #design #policy
Policy perspectives on “design for all” (CS, GS, PLE, DA), pp. 868–872.
CAiSECAiSE-1999-HuanS #resource management
Policy-Based Resource Management (YNH, MCS), pp. 422–428.
EDOCEDOC-1999-Linington #community #enterprise #policy #uml #using
Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
EDOCEDOC-1999-SteenD #enterprise #formal method #policy
Formalising ODP enterprise policies (MWAS, JD), pp. 84–93.
ICMLICML-1999-NgHR #policy #theory and practice
Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping (AYN, DH, SJR), pp. 278–287.
ICMLICML-1999-PeshkinMK #learning #memory management #policy
Learning Policies with External Memory (LP, NM, LPK), pp. 307–314.
ICMLICML-1999-WangM #markov #optimisation #process
Hierarchical Optimization of Policy-Coupled Semi-Markov Decision Processes (GW, SM), pp. 464–473.
DACDAC-1998-PaleologoBBM #optimisation #policy #power management
Policy Optimization for Dynamic Power Management (GAP, LB, AB, GDM), pp. 182–187.
ITiCSEITiCSE-1998-Culwin #assessment #policy #web
Web hosted assessment — possibilities and policy (FC), pp. 55–58.
FMFM-1998-KoobUW #formal method #modelling #policy #process #security #topic #using
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
EDOCEDOC-1998-LiningtonMR #community #enterprise #policy
Policies in communities: extending the ODP enterprise viewpoint (PFL, ZM, KR), pp. 14–24.
CIKMCIKM-1998-Horvitz #policy
Continual Computation Policies for Utility-Directed Prefetching (EH), pp. 175–184.
ICMLICML-1998-LochS #markov #policy #process #using
Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
TOOLSTOOLS-ASIA-1998-Poo #policy
Policy Definition in Application-Domain-Related Classes (DCCP), pp. 94–103.
SACSAC-1998-KimYL #analysis #policy
Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
FSEFSE-1998-AstleyA #abstraction #distributed #middleware #policy
Customizaton and Compositon of Distributed Objects: Middleware Abstractions for Policy Management (MA, GA), pp. 1–9.
CAVCAV-1998-Wilding #policy #proving #realtime #scheduling
A Machine-Checked Proof of the Optimality of a Real-Time Scheduling Policy (MW), pp. 369–378.
SIGMODSIGMOD-1997-ColbyKLMR #maintenance #multi #policy
Supporting Multiple View Maintenance Policies (LSC, AK, DFL, ISM, KAR), pp. 405–416.
SIGMODSIGMOD-1997-JajodiaSSB #data access #framework #multi #policy
A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
CAiSECAiSE-1997-DiazP #calculus #modelling #policy #validation
Stimuli and Business Policies as Modelling Constructs: Their Definition and Validation Through the Event Calculus (OD, NWP), pp. 33–46.
EDOCEDOC-1997-LupuS #policy
A Policy Based Role Object Model (EL, MS), pp. 36–47.
CSCWCSCW-1996-Edwards #collaboration #policy
Policies and Roles in Collaborative Applications (WKE), pp. 11–20.
PODSPODS-1995-ChaudhriH #database #policy
Safe Locking Policies for Dynamic Databases (VKC, VH), pp. 233–244.
SIGMODSIGMOD-1995-DanS #online #policy #video
An Online Video Placement Policy based on Bandwith to Space Ratio (BSR) (AD, DS), pp. 376–385.
ICMLICML-1995-LittmanCK #learning #policy #scalability
Learning Policies for Partially Observable Environments: Scaling Up (MLL, ARC, LPK), pp. 362–370.
SIGMODSIGMOD-1994-CookWZ #database #garbage collection #policy
Partition Selection Policies in Object Database Garbage Collection (JEC, ALW, BGZ), pp. 371–382.
CIKMCIKM-1994-Shrufi #clustering #performance #policy
Performance of Clustering Policies in Object Bases (AS), pp. 80–87.
DACDAC-1993-Nurnberger #policy
The Clinton/Gore Technology Policies (RDN), pp. 331–335.
FMFME-1993-Boswell #policy #security #specification #validation
Specification and Validation of a Security Policy Model (AB), pp. 42–51.
TOOLSTOOLS-PACIFIC-1993-HaebichT #object-oriented #policy
An Object-Oriented, Computational Model to Support the Formulation of a National Retirement Icome Policy (WH, TT), pp. 393–406.
TOOLSTOOLS-PACIFIC-1993-Taylor #policy #reuse #towards
Towards a Reuse Policy (PT), pp. 49–60.
RERE-1993-SibleyWMTL #policy #requirements
The role of policy in requirements definition (EHS, RLW, JBM, MCT, DCL), pp. 277–280.
SACSAC-1993-RamakrishnanDN #policy
An Integrated Optimal Task Assignment Policy (SR, LAD, TN), pp. 789–795.
SIGMODSIGMOD-1992-DanY #analysis #performance #policy
Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
HPDCHPDC-1992-PuFSWY #comparison #distributed #performance #policy
Performance Comparison of Active-Sender and Active-Receiver Policies for Distributed Caching (CP, DF, PS, KLW, PSY), pp. 218–227.
CAiSECAiSE-1991-McBrienNPSSTTW #policy #specification
A Rule Language to Capture and Model Business Policy Specifications (PM, MN, DP, AHS, US, BT, GT, RW), pp. 307–318.
ASPLOSASPLOS-1991-BoloskySFFC #architecture #memory management #policy
NUMA Policies and Their Relation to Memory Architecture (WJB, MLS, RPF, RJF, ALC), pp. 212–221.
CSCWCSCW-1988-ConklinB #hypermedia #named #policy
gIBIS: A Hypertext Tool for Exploratory Policy Discussion (JC, MLB), pp. 140–152.
OOPSLAOOPSLA-1988-UngarJ #policy
Tenuring Policies for Generation-Based Storage Reclamation (DU, FJ), pp. 1–17.
VLDBVLDB-1985-LausenSW #concurrent #policy
Pre-Analysis Locking: A Safe and Deadlock Free Locking Policy (GL, ESS, PW), pp. 270–281.
VLDBVLDB-1985-MedeirosT #comprehension #policy
Understanding the Implications of View Update Policies (CBM, FWT), pp. 316–323.
SOSPSOSP-1985-MalkawiP #compilation #memory management #policy #source code
Compiler Directed Memory Management Policy For Numerical Programs (MM, JHP), pp. 97–106.
SIGMODSIGMOD-1983-KohlerWS #comparison #database #policy
An Experimental Comparison of Locking Policies in a Testbed Database System (WHK, KCW, JAS), pp. 108–119.
SIGMODSIGMOD-1977-LohmanM #policy
Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating (Abstract) (GML, JAM), p. 157.
SOSPSOSP-1977-Potier #analysis #policy #set
Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
SOSPSOSP-1975-JonesL #policy #security
The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.
SOSPSOSP-1975-LevinCCPW #policy
Policy/Mechanism Separation in HYDRA (RL, ESC, WMC, FJP, WAW), pp. 132–140.
SOSPSOSP-J-1973-TeoreyP72 #analysis #comparative #policy #scheduling
A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
SOSPSOSP-1971-TeoreyP #analysis #comparative #policy #scheduling
A Comparative Analysis of Disk Scheduling Policies (Abstract) (TJT, TBP), pp. 114–121.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.