Login / Signup
Cryptography Policy Update.
Stephen T. Walker
Joan D. Winston
Published in:
Cryptologia (1999)
Keyphrases
</>
cellular automata
optimal policy
update rules
information systems
information security
real world
website
reinforcement learning
information technology
dynamic programming
access control
total cost
policy making
allocation policy