نتایج جستجو برای: operating policy

تعداد نتایج: 412364  

2007
Boniface Hicks Tim Misiak Patrick McDaniel

Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information flow labels, and the STL compiler guarantees that data always obeys its label as it flows within an application. As data flows into or out of an application, however, a runtime system is needed to mediate between the i...

2007
Boniface Hicks Tim Misiak Patrick McDaniel

Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information flow labels, and the STL compiler guarantees that data always obeys its label as it flows within an application. As data flows into or out of an application, however, a runtime system is needed to mediate between the i...

2011
Maroun Touma Seraphin Calo Keith Grueneberg Xiping Wang David Wood

A Resilient Distributed Policy Repository (RDPR) supports the modification, dissemination and uniform execution of operational policies across complex network topologies spanning multiple organizations, geographies and domains. Operating in a highly dynamic environment, such as in Mobile Ad Hoc Networks (MANETs), network partitions form due to nodes disconnecting and reconnecting to the system....

Journal: :IJICS 2013
Lawrence Teo Gail-Joon Ahn

Security policy management is critical to meet organisational needs and reduce potential risks because almost every organisation depends on computer networks and the internet for their daily operations. It is therefore important to specify and enforce security policies effectively. However, as organisations grow, so do their networks – this increases the difficulty of deploying a security polic...

2015
Adam M. Bates Kevin R. B. Butler Thomas Moyer

When performing automatic provenance collection within the operating system, inevitable storage overheads are made worse by the fact that much of the generated lineage is uninteresting, describing noise and background activities that lie outside the scope the system’s intended use. In this work, we propose a novel approach to policy-based provenance pruning – leverage the confinement properties...

Journal: :CoRR 2013
Gerhard Wunder Chan Zhou Martin Kasparick

The control of large queueing networks is a notoriously difficult problem. Recently, an interesting new policy design framework for the control problem called h-MaxWeight has been proposed: h-MaxWeight is a natural generalization of the famous MaxWeight policy where instead of the quadratic any other surrogate value function can be applied. Stability of the policy is then achieved through a per...

2005
Dionyssis G. Dimitrakopoulos Imelda Maher Argyris Passas Jeremy Richardson Jonathan Robinson

The transposition of EU law into national law is a significant part of the EU policy process. However, political scientists haven’t devoted to it the attention that it deserves. The author, a political scientist, construes transposition as a part of the wider process of policy implementation. Following implementation theory from the field of public policy, the article outlines three sets of fac...

2016
Mirjam Strupler Leiser Stefan C. Wolter

Empirical Evidence on the Effectiveness of Social Public Procurement Policy: The Case of the Swiss Apprenticeship Training System* In this paper we assess the effectiveness of a social public procurement policy in Switzerland that gives firms that train apprentices a preferential treatment. We estimate the effectiveness of this social procurement policy on a firm’s training participation, train...

2008
Kuo-Hsiung Wang Ching-Chang Kuo W. L. Pearn

This paper deals with the optimal control of a finite capacity G/M/1 queueing system combined the F-policy and an exponential startup time before start allowing customers in the system. The F-policy queueing problem investigates the most common issue of controlling arrival to a queueing system. We provide a recursive method, using the supplementary variable technique and treating the supplement...

2006
Dean C. Wardell

Reinforcement learning is one of the more attractive machine learning technologies, due to its unsupervised learning structure and ability to continually learn even as the environment it is operating in changes. This ability to learn in an unsupervised manner in a changing environment is applicable in complex domains through the use of function approximation of the domain’s policy. The function...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید