Login / Signup
Debugging a Firewall Policy with Policy Mapping.
Robert M. Marmorstein
Phil Kearns
Published in:
login Usenix Mag. (2007)
Keyphrases
</>
optimal policy
allocation policy
information retrieval
case study
asymptotically optimal
database
databases
data mining
machine learning
artificial intelligence
database systems
multi agent
mobile robot
state dependent