نتایج جستجو برای: policy process
تعداد نتایج: 1539561 فیلتر نتایج به سال:
In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof ob...
Equipped with powerful machines and complex softwares, web servers providing services are widely used all over the Internet. But, how to specify their behaviors are interesting and meaningful. However, process algebras nowadays cannot specify the behaviors of web servers with time limitations and different groups of clients who are belong to different groups/priorities. The behaviors of web ser...
We propose a method to optimise the parameters of a policy which will be used to safely perform a given task in a data-efficient manner. We train a Gaussian process model to capture the system dynamics, based on the PILCO framework. Our model has useful analytic properties, which allow closed form computation of error gradients and estimating the probability of violating given state space const...
a r t i c l e i n f o For the 'under maintained' and 'over maintained' problems of traditional preventive maintenance, a new predictive maintenance policy is developed based on process data in this article to overcome these disadvantages. This predictive maintenance method utilizes results of probabilistic fault prediction, which reveals evolvement of the system's degradation for a gradually de...
We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is...
This paper investigates the appropriateness of formal dialectics as a basis for non-monotonic and defeasible reasoning that takes computational limits seriously. Rules that can come into conflict should be regarded as policies, which are inputs to deliberative processes. Dialectical protocols are appropriate for such deliberations when resources are bounded and search is serial. AI, it is claim...
Policy process theories have advanced significantly theoretically and methodologically in the past decades, featuring multiple theoretical frameworks that engage diverse communities of policy scholars (Weible, 2018). The study theory calls for both a comparative perspective (Tosun & Workman, 2018) generalization While most modern originated from Western contexts, empirical tests further advance...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید