Policy

View this topic in
A policy is typically described as a principle or rule to guide decisions and achieve rational outcome(s). The term is not normally used to denote what is actually done, this is normally referred to as either procedure or protocol. (Wikipedia.org)






Conferences related to Policy

Back to Top

2013 International Conference on Management Science and Engineering (ICMSE)

Management science and engineering, including operations research, organizational systems and behavior, economics and finance, and public administration.


2012 IEEE 19th International Conference on Web Services (ICWS)

ICWS 2012 is the flagship theme-topic conference for Web-based services, featuring Web services modeling, development, publishing, discovery, composition, testing, adaptation, and delivery, and Web services technologies as well as standards.


2012 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN)

a unique symposium that gathers technology, policy and regulatory communities together with contributions dealing with policy and regulation issues on dynamic spectrum access, theoretical studies, algorithm and protocol design for cognitive radios and networks, as well as application-oriented contributions dealing with architectures, platforms, signaling and multiple access schemes

  • 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN)

    The International Dynamic Spectrum Access Networks (DySPAN) symposium has emerged as the preeminent event to gather international economists, engineers, network architects, researchers and academic scholars together to share cutting edge research on and demonstrations of emerging wireless technology.

  • 2010 IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (IEEE DySPAN)

    The International Dynamic Spectrum Access Networks (DySPAN) symposium has emerged as the preeminent event to gather international economists, engineers, network architects, researchers and academic scholars together to share cutting edge research on and demonstrations of emerging wireless technology. Since the original DySPAN symposium in 2005, the DySPAN community has had a major influence on policy and technology research and development in the United States, Europe and Asia. The symposium excels in th


2012 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY

The symposium brings together researchers and practitioners working on policy-based systems across a wide range of application domains including policy-based networking, privacy, trust and security management, autonomic computing, pervasive systems and enterprise systems. POLICY 2012 is the 13th in a series of successful events, which have provided a forum for discussion and collaboration between researchers, developers and users of policy-based systems.


MILCOM 2012 - 2012 IEEE Military Communications Conference

MILCOM 2012 gives industry the opportunity to promote communications technologies and services to commanders from all branches of the armed forces, Department of Defense, federal government, and the heads of multi-national forces from around the globe.


More Conferences

Periodicals related to Policy

Back to Top

Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Network and Service Management, IEEE Transactions on

The online-only IEEE Transactions on Network and Service Management (TNSM) will be committed to the timely publication of archival-quality papers that advance the state-of-the-art and practical applications of network and service management. Both theoretical research contributions (presenting new concepts and techniques) and applied contributions (reporting on experiences and experiments with actual systems) will be encouraged. This Transactions will focus on ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Software Engineering, IEEE Transactions on

Specification, development, management, test, maintenance, and documentation of computer software.


Technology and Society Magazine, IEEE

The impact of technology (as embodied by the fields of interest in IEEE) on society, the impact of society on the engineering profession, the history of the societal aspects of electrotechnology, and professional, social, and economic responsibility in the practice of engineering and its related technology.




Xplore Articles related to Policy

Back to Top

Formal Specification and Verification of an Extended Security Policy Model for Database Systems

Zhu Hong; Zhu Yi; Li Chenyang; Shi Jie; Fu Ge; Wang Yuanzhen 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

In order to develop highly secure database systems to meet the requirements for class B2, an extended formal security policy model based on the BLP model is presented in this paper. A method for verifying security model for database systems is proposed. According to this method, the development of a formal specification and verification to ensure the security of the ...


Introduction session: the DTI perspective on wireless broadband policy

M. Swarbick The IEE WiMax and Mesh Networks Forum 2005 (Ref. No. 2005/11019), 2005

First Page of the Article ![](/xploreAssets/images/absImages/01514739.png)


A disciplinary comparison of trajectories of U.S.A. engineering students

Susan M. Lord; Richard A. Layton; Matthew W. Ohland 2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 2014

We are conducting a longitudinal, multi-institutional, and multivariate study of the trajectories of students in specific engineering disciplines in the U.S.A. to an extent never before possible. Focusing on the eleven partner institutions of the Multiple-Institution Database for Investigating Engineering Longitudinal Development (MIDFIELD), we examine trajectories of engineering students in five engineering disciplines by race/ethnicity and gender. This work-in-progress focuses ...


Adaptive Data Replicas Management Based on Active Data-centric Framework in Cloud Environment

Lingfeng Chen; Doan B. Hoang 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Cloud data protection is increasingly attracting researchers' attention. Cryptographic-based schemes, trust third party technologies, policy-driven frameworks, and data-policy binding mechanisms have been proposed to address data security and privacy issues from many aspects of data protection requirement. However, due to the inevitability of bugs, crashes, operator errors, hardware failure, or server misconfiguration, data availability and reliability might be still compromised. ...


Receiver-Based Flow Control for Networks in Overload

Chih-ping Li; Eytan Modiano IEEE/ACM Transactions on Networking, 2015

We consider utility maximization in networks where the sources do not employ flow control and may consequently overload the network. In the absence of flow control at the sources, some packets will inevitably have to be dropped when the network is in overload. To that end, we first develop a distributed, threshold-based packet-dropping policy that maximizes the weighted sum throughput. ...


More Xplore Articles

Educational Resources on Policy

Back to Top

eLearning

Formal Specification and Verification of an Extended Security Policy Model for Database Systems

Zhu Hong; Zhu Yi; Li Chenyang; Shi Jie; Fu Ge; Wang Yuanzhen 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 2008

In order to develop highly secure database systems to meet the requirements for class B2, an extended formal security policy model based on the BLP model is presented in this paper. A method for verifying security model for database systems is proposed. According to this method, the development of a formal specification and verification to ensure the security of the ...


Introduction session: the DTI perspective on wireless broadband policy

M. Swarbick The IEE WiMax and Mesh Networks Forum 2005 (Ref. No. 2005/11019), 2005

First Page of the Article ![](/xploreAssets/images/absImages/01514739.png)


A disciplinary comparison of trajectories of U.S.A. engineering students

Susan M. Lord; Richard A. Layton; Matthew W. Ohland 2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 2014

We are conducting a longitudinal, multi-institutional, and multivariate study of the trajectories of students in specific engineering disciplines in the U.S.A. to an extent never before possible. Focusing on the eleven partner institutions of the Multiple-Institution Database for Investigating Engineering Longitudinal Development (MIDFIELD), we examine trajectories of engineering students in five engineering disciplines by race/ethnicity and gender. This work-in-progress focuses ...


Adaptive Data Replicas Management Based on Active Data-centric Framework in Cloud Environment

Lingfeng Chen; Doan B. Hoang 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Cloud data protection is increasingly attracting researchers' attention. Cryptographic-based schemes, trust third party technologies, policy-driven frameworks, and data-policy binding mechanisms have been proposed to address data security and privacy issues from many aspects of data protection requirement. However, due to the inevitability of bugs, crashes, operator errors, hardware failure, or server misconfiguration, data availability and reliability might be still compromised. ...


Receiver-Based Flow Control for Networks in Overload

Chih-ping Li; Eytan Modiano IEEE/ACM Transactions on Networking, 2015

We consider utility maximization in networks where the sources do not employ flow control and may consequently overload the network. In the absence of flow control at the sources, some packets will inevitably have to be dropped when the network is in overload. To that end, we first develop a distributed, threshold-based packet-dropping policy that maximizes the weighted sum throughput. ...


More eLearning Resources

IEEE-USA E-Books

  • Front Matter

    This chapter contains sections titled: Half Title, Information Policy Series, Title, Copyright, Contents, Acknowledgments, Series Editor's Introduction

  • Introduction: Computing's Infrastructural Moment

    This chapter contains sections titled: The Historical Genesis of the Cloud, Tackling the Mystery, References

  • A Place to Learn, a Place to Play, a Place to Dream, a Place to Fall from Grace

    Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology. Public access venues -- most often Internet caf??s in cities and state-run telecenters in rural areas -- are places for learning, sharing, working, empowerment and finding opportunities. The book documents the impact of public access on individuals, on society and networks, and on women. Chapters report findings and examine policy implications of research on such topics as users' perceptions of the benefits of Interne caf?? use in Jordan; ICT job training in Rwanda; understanding user motivations and risk factors for overuse and Internet addiction in China; the effect of technology use on social inclusion among low-income urban youth in Argentina; productive uses of technologies by grassroots organizations in Peru; use of technology by migrant ethnic minority Burmese women in Thailand to maintain ties with their culture and their family and friends; and women's limited access to the most ubiquitous type of venue, cybercaf??s, in practically all countries studied -- and quite severely in some places, e.g. Uttar Pradesh, India. **Contributing Editors **Erwin A. Alampay, Roxana Barrantes C??ceres, Hernan Galperin, Abiodun Jagun, George Sciadas, Ramata Molo Thioune, Kentaro Toyama **Chapter authors**Ali Farhan AbuSeileek, Carolina Aguerre, Oluwasefunmi 'Tale Arogundade, Nor Aziah Alias, Sebasti??n Ben??tez Larghi, Jorge Bossio, Juan Fernando Bossio, Marina Laura Calamari, Nikos Da anay, Jean Damasc??ne Mazimpaka, Laurent Aristide Eyinga Eyinga, Mary Luz Feranil, Ariel Fontecoba, Omar Fraihat, Martin S. Hagger, Jianbin Hao, Sulaiman Hashim, Izaham Shah Ismail, Haziah Jamaludin, Xuemei Jiang, Laura Le??n, Guoxin Li, Balwant Singh Mehta, Nidhi Mehta, Marina Moguillansky, Marhaini Mohd Noor, Avis Momeni, Th??odomir Mugiraneza, Jimena Orchuela, Patricia Pe??a Miranda, Alejandra Phillippi, Jimena Ponce de Le??n, Ghaleb Rabab'ah, Saif Addeen AlRababah, Wei Shang, Ryan V. Silverio, Sylvie Siyam Siwe, Efenita M. Taqueban, Olga Balbine Tsafack Nguekeng, Xiaoguang Yang

  • Alternative Economic Criteria and Proactive Planning for Transmission Investment in Deregulated Power Systems

    This chapter contains sections titled: Introduction Conflict Optimization Objectives for Network Expansions Policy Implications Proactive Transmission Planning Illustrative Example Conclusions and Future Work Bibliography Appendix

  • Learning Omnidirectional Path Following Using Dimensionality Reduction

    We consider the task of omnidirectional path following for a quadruped robot: moving a four-legged robot along any arbitrary path while turning in any arbitrary manner. Learning a controller capable of such motion requires learning the parameters of a very high-dimensional policy class, which requires a prohibitively large amount of data to be collected on the real robot. Although learning such a policy can be much easier in a model (or "simulator") of the system, it can be extremely difficult to build a sufficiently accurate simulator. In this paper we propose a method that uses a (possibly inaccurate) simulator to identify a low-dimensional subspace of policies that is robust to variations in model dynamics. Because this policy class is low-dimensional, we can learn an instance from this class on the real system using much less data than would be required to learn a policy in the original class. In our approach, we sample several models from a distribution over the kinematic and dynamics parameters of the simulator, then use the Reduced Rank Regression (RRR) algorithm to identify a low-dimensional class of policies that spans the space of controllers across all sampled models. We present a successful application of this technique to the task of omnidirectional path following, and demonstrate improvement over a number of alternative methods, including a hand-tuned controller. We present, to the best of our knowledge, the first controller capable of omnidirectional path following with parameters optimized simultaneously for all directions of motion and turning rates.

  • Cloud Strategy and Economics

    This chapter contains sections titled: Defining the Cloud, Abstractly, The Value of Common Resources, The Value of Pay per Use, The Value of Location Independence, The Value of On Demand, Use Cases for the Cloud, Behavioral Economic Factors, Summary, Notes, References

  • Conclusion

    This chapter contains sections titled: The End-to-End Arguments, The End-to- End Arguments and the Original Architecture of the Internet, The Broad Version of the End-to-End Arguments and Innovation in the Original Architecture of the Internet, End-to-End Arguments in the Current Internet, Policy Implications

  • Public Access Impact and Policy Implications

    This chapter summarizes the findings of previous chapters and, for completeness, also draws on significant findings from prior studies in search of patterns of use and impact that apply across countries and inform public access policy. Three themes emerge. First, public access enables most users to achieve personal objectives such as learning, communicating with family and friends, enhancing work skills and job prospects (Rwanda), and entertaining themselves (China). Not all impacts are positive: overuse can adversely affect school performance (Cameroon) and personal life spheres (China). Second, public access enables users to expand their social networks and build up social capital (Malaysia, Jordan), facilitates social inclusion (Argentina), and makes it easier for rural grassroots organizations to develop specific capacities, such as interacting with external agents (Peru). Third, although women and underprivileged groups can benefit significantly, their access to the most ubiquitous type of venue, cybercafes, is frequently limited, in some countries severely. This major obstacle must be overcome if public access benefits are to be widespread and equitable. The chapter ends with a discussion of policy design considerations regarding mobiles and public access, information and communication technology (ICT) skills training, telecenter establishment, cybercafe regulation, and options for redressing cybercafe gender imbalance.

  • The Problem of Internet Governance

    For years, the world saw the Internet as a creature of theU.S. Department of Defense. Now some claim that the Internet is aself-governing organism controlled by no one and needing nooversight. Although the National Science Foundation and othergovernment agencies continue to support and oversee criticaladministrative and coordinating functions, the Internet is remarkablydecentralized and uninstitutionalized. As it grows in scope,bandwidth, and functionality, the Internet will require greatercoordination, but it is not yet clear what kind of coordinatingmechanisms will evolve.The essays in this volume clarify these issues and suggest possiblemodels for governing the Internet. The topics addressed range fromsettlements and statistics collection to the sprawling problem ofdomain names, which affects the commercial interests of millions ofcompanies around the world. One recurrent theme is the inseparabilityof technical and policy issues in any discussion involving theInternet.Contributors:Guy Almes, Ashley Andeen, Joseph P. Bailey, Steven M. Bellovin, ScottBradner, Richard Cawley, Che-Hoo Cheng, Bilal Chinoy, K Claffy, MariaFarnon, William Foster, Alexander Gigante, Sharon Eisner Gillett, MarkGould, Eric Hoffman, Scott Huddle, Joseph Y. Hui, David R. Johnson,Mitchell Kapor, John Lesley King, Lee W. McKnight, Don Mitchell,Tracie Monk, Milton Mueller, Carl Oppedahl, David G.Post, YakovRekhter, Paul Resnick, A. M. Rutkowski, Timothy J. Salo, PhilipL. Sbarbaro, Robert Shaw.A publication of the Harvard Information Infrastructure Project

  • Finding Security in the Clouds

    This chapter contains sections titled: Cloud Security in Context, (Inter)dependence, Industrial Anxieties, Scaling Up: Just a Matter of Time?, Conclusion, Notes, References



Standards related to Policy

Back to Top

No standards are currently tagged "Policy"