Login / Signup
Cryptography Policy.
Lance J. Hoffman
Faraz A. Ali
Steven L. Heckler
Ann Huybrechts
Published in:
Commun. ACM (1994)
Keyphrases
</>
cellular automata
information security
information systems
optimal policy
artificial intelligence
database
data sets
decision making
multiscale
reinforcement learning
dynamic programming
expected cost
policy makers
policy making