Search
Search Results
-
Correct and Efficient Policy Monitoring, a Retrospective
The MonPoly project started over a decade ago to build effective tools for monitoring trace properties, including functional correctness, security,... -
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
Early attack detection is essential to ensure the security of complex networks, especially those in critical infrastructures. This is particularly...
-
Monitoring
The previous two chapters have been concerned principally with what happens to Azure Data Factory resources after you have finished develo** them –... -
TFPsocialmedia: a public dataset for studying Turkish foreign policy
ObjectivesThis data note introduces the TFPsocialmedia dataset, designed to aid social media researchers investigating Turkish Foreign Policy (TFP)....
-
Algorithmic governance and AI: balancing innovation and oversight in Indonesian policy analyst
The objective of this study is to examine the effects of generative artificial intelligence (AI) tools, with a specific focus on ChatGPT, on the...
-
Security Monitoring
Security monitoring utilizes components that allow you to monitor, control, and manage your Snowflake estate. They are the internal and external... -
Policy advice and best practices on bias and fairness in AI
The literature addressing bias and fairness in AI models ( fair-AI ) is growing at a fast pace, making it difficult for novel researchers and...
-
Artificial intelligence unlocks ecological environment governance —smart statistical monitoring based on meteorology
In recent years, the issue of governance of the ecological environment has been a subject of high of social concern, and the challenges in the...
-
Policy Guidelines for Smart Sanitation Technology as a Public Health Tool
Smart sanitation technology, or SST, refers to digital technologies applied to the sanitation industry. The breadth of applications can be wide, and...
-
Automated Security Monitoring
Security monitoring is the automated process of collecting and analyzing potential security threats and taking appropriate actions to create secure... -
Monitoring the Internet Computer
The Internet Computer (IC) is a distributed platform for Web3 applications, spanning over 1,200 nodes worldwide. We present results on applying... -
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches
Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding,...
-
A comprehensive AI policy education framework for university teaching and learning
This study aims to develop an AI education policy for higher education by examining the perceptions and implications of text generative AI...
-
Electronic Monitoring Systems As Tools for Managing Implementation of Framework CIS Documents
AbstractThis work presents the main provisions for studying systems of monitoring the implementation of framework CIS international documents in the...
-
Regenerating Networked Systems’ Monitoring Traces Using Neural Networks
Monitoring main entities in distributed systems is important for research, development, and innovation activities involving those systems (offline...
-
Policy Issues
The application of Artificial Intelligence Cyber defense Agents (or AICA) poses policy challenges to civil and military doctrine- and policy-makers.... -
Security Policy Learning
Security Policies define rules aiming to protect the infrastructure from insider and outsider threats. A key component to achieving this goal is... -
Re-attentive experience replay in off-policy reinforcement learning
Experience replay, which stores past samples for reuse, has become a fundamental component of off-policy reinforcement learning. Some pioneering...
-
Optimizing air quality monitoring device deployment: a strategy to enhance distribution efficiency
Precise and efficient air quality monitoring is a pivotal step in combating the harmful effects of pollution. Our research addresses the challenges...
-
A home energy management approach using decoupling value and policy in reinforcement learning
Considering the popularity of electric vehicles and the flexibility of household appliances, it is feasible to dispatch energy in home energy systems...