Policy

View this topic in
A policy is typically described as a principle or rule to guide decisions and achieve rational outcome(s). The term is not normally used to denote what is actually done, this is normally referred to as either procedure or protocol. (Wikipedia.org)






Conferences related to Policy

Back to Top

2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2019 IEEE 15th International Conference on Automation Science and Engineering (CASE)

The conference is the primary forum for cross-industry and multidisciplinary research in automation. Its goal is to provide a broad coverage and dissemination of foundational research in automation among researchers, academics, and practitioners.


2019 IEEE 58th Conference on Decision and Control (CDC)

The CDC is recognized as the premier scientific and engineering conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, systems and control, and related areas.The 58th CDC will feature contributed and invited papers, as well as workshops and may include tutorial sessions.The IEEE CDC is hosted by the IEEE Control Systems Society (CSS) in cooperation with the Society for Industrial and Applied Mathematics (SIAM), the Institute for Operations Research and the Management Sciences (INFORMS), the Japanese Society for Instrument and Control Engineers (SICE), and the European Union Control Association (EUCA).


2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)

2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize state­of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.


2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

robotics, intelligent systems, automation, mechatronics, micro/nano technologies, AI,


More Conferences

Periodicals related to Policy

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Biomedical Engineering, IEEE Transactions on

Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals


Xplore Articles related to Policy

Back to Top

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment

2008 IEEE Workshop on Policies for Distributed Systems and Networks, 2008

We are investigating computing platform-independent policy frameworks to specify, analyze, and deploy security and networking policies. The goal is to provide easy to use mechanisms for refining high-level user-specified goals into low-level controls. This scenario-based demo of a Coalition Policy Management Portal prototype uses the context of a hostage rescue situation to demonstrate usable and effective policy authoring through either ...


RFID: The State of Radio Frequency Identification (RFID) Implementation and Policy Implications

RFID: The State of Radio Frequency Identification (RFID) Implementation and Policy Implications, None

RFID is rapidly becoming the enabling technology of the 21st Century. This eBook, based on a white paper by the IEEE-USA Committee on Communications and Information Policy, dated 21 November 2005, provides a basic introduction to RFID technology and surveys the current state of its implementation.


A policy-based management system with automatic policy selection and creation capabilities by using a singular value decomposition technique

Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), 2006

On demand and autonomic computing will benefit from policy-based management systems which are responsive to new and ambiguous situations and learn from them. In a typical data center, there are thousands of different events reporting system faults, status, and performance information. Their occurrences are unpredictable. In addition, new events and conditions can occur as operating environment changes. Traditional approaches of ...


KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement

Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003

We describe our initial implementation of the KAoS policy and domain services. While primarily oriented to the dynamic and complex requirements of software agent applications, the services are also being adapted to general-purpose grid computing and Web services environments as well. The KAoS services rely on a DAML description-logic-based ontology of the computational environment, application context, and the policies themselves ...


Inferring access-control policy properties via machine learning

Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), 2006

To ease the burden of implementing and maintaining access-control aspects in a system, a growing trend among developers is to write access-control policies in a specification language such as XACML and integrate the policies with applications through the use of a policy decision point (PDP). To assure that the specified polices reflect the expected ones, recent research has developed policy ...


More Xplore Articles

Educational Resources on Policy

Back to Top

IEEE-USA E-Books

  • The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment

    We are investigating computing platform-independent policy frameworks to specify, analyze, and deploy security and networking policies. The goal is to provide easy to use mechanisms for refining high-level user-specified goals into low-level controls. This scenario-based demo of a Coalition Policy Management Portal prototype uses the context of a hostage rescue situation to demonstrate usable and effective policy authoring through either natural language or structured lists that create natural language policy rules; policy visualization; analysis of policies for conflict, dominance, and coverage, and methods to resolve the issues identified; policy transformation from natural language to XML or ACPL SPL for automated enforcement, and deployment of policies onto mission equipment. The prototype builds on the SPARCLE and PONDER2 research projects.

  • RFID: The State of Radio Frequency Identification (RFID) Implementation and Policy Implications

    RFID is rapidly becoming the enabling technology of the 21st Century. This eBook, based on a white paper by the IEEE-USA Committee on Communications and Information Policy, dated 21 November 2005, provides a basic introduction to RFID technology and surveys the current state of its implementation.

  • A policy-based management system with automatic policy selection and creation capabilities by using a singular value decomposition technique

    On demand and autonomic computing will benefit from policy-based management systems which are responsive to new and ambiguous situations and learn from them. In a typical data center, there are thousands of different events reporting system faults, status, and performance information. Their occurrences are unpredictable. In addition, new events and conditions can occur as operating environment changes. Traditional approaches of authoring policies and techniques of implementing policy-based management systems, such as relying entirely on static authoring of simple "if [condition] then [actions]" rules, become insufficient. Hence, new approaches, such as goal policy, utility function etc., to the design and implementation of policy- based management systems have emerged. However, none of these approaches provides a systematic way to enable policies in a policy-based management system to be responsive to new and ambiguous situations. In this paper, we describe a novel method by which policies can be selected or created automatically based on events observed and knowledge learned. This new approach treats the observed event-policy relationship represented by an event-policy matrix as a statistical problem. Using singular value decomposition (SVD) technique, implicit higher order correlations among policies and their associated events are used to estimate the selection or creation of recommended policies based on events found in the observed event set. Initial results have indicated that this approach to policy-based management system is very promising

  • KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement

    We describe our initial implementation of the KAoS policy and domain services. While primarily oriented to the dynamic and complex requirements of software agent applications, the services are also being adapted to general-purpose grid computing and Web services environments as well. The KAoS services rely on a DAML description-logic-based ontology of the computational environment, application context, and the policies themselves that enables runtime extensibility and adaptability of the system, as well as the ability to analyze policies relating to entities described at different levels of abstraction.

  • Inferring access-control policy properties via machine learning

    To ease the burden of implementing and maintaining access-control aspects in a system, a growing trend among developers is to write access-control policies in a specification language such as XACML and integrate the policies with applications through the use of a policy decision point (PDP). To assure that the specified polices reflect the expected ones, recent research has developed policy verification tools; however, their applications in practice are still limited, being constrained by the limited set of supported policy language features and the unavailability of policy properties. This paper presents a data-mining approach to the problem of verifying that expressed access-control policies reflect the true desires of the policy author. We developed a tool to investigate this approach by automatically generating requests, evaluating those requests to get responses, and applying machine learning on the request- response pairs to infer policy properties. These inferred properties facilitate the inspection of the policy behavior. We applied our tool on an access-control policy of a central grades repository system for a university. Our results show that machine learning algorithms can provide valuable insight into basic policy properties and help identify specific bug-exposing requests

  • A toolkit-based approach to policy-managed storage

    The goal of policy-based storage management is to allow storage resources in an IT complex to be managed by setting comparatively high-level policies, rather than by doing low-level manual configuration. We describe the policy management and rule execution architecture in a prototype autonomic storage manager being developed in IBM Research. The prototype uses generic communication, a policy repository, and policy translation and execution services provided by an autonomic manager toolkit. The prototype supports a set of policy templates developed from a policy-based storage management framework.

  • Policy control model: a key factor for the success of policy in telecom applications

    The application of policy in telecommunications networks is still in its initial stages. Since network elements lack native policy mechanisms, the impact of using policy, instead of SNMP or CLI based configuration, is not clearly understood. This work presents a "policy control model" and self- organising capabilities that network elements must exhibit to realise the policy potential for making service management simpler and more efficient. In this context, we discuss the importance of roles, propose a separation of functionality that makes policy solutions adaptable to diverse operational environments, and study the benefits of self-organising network elements obtaining their policy configurations through a stateless pull mechanism.

  • A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language

    This paper presents a new policy language, known as functionality-based application confinement policy language (FBAC-PL). FBAC-PL takes a unique approach to expressing application-oriented access control policies. Policies for restricting applications are defined in terms of the features applications provide, by means of parameterised and hierarchical policy abstractions known as functionalities. Policies also include metadata for management and the automation of policy specification. The result is a novel scheme for application confinement policy that reuses, encapsulates and abstracts policy details, and facilitates a priori policy specification: that is, without having to rely solely on learning modes for creating policies to restrict applications. This paper presents the policy language, and illustrates its use with examples. A Linux-based implementation, which uses FBAC-PL, has demonstrated that this approach can overcome policy complexity and usability issues of previous schemes.

  • Implementation of the CIM Policy Model using PONDER

    New work on the Distributed Management Task Force's CIM Policy Model emphasizes the definition of general event-condition-action semantics. These semantics are conveyed in an abstracted fashion, independent of any policy language or implementation. This approach allows vendor flexibility in designing policy writing tools and in choosing policy languages and implementations. Also, it allows products to communicate their policy rules in an interoperable and semantically rich manner. This short paper overviews the CIM Policy Model's approach and how it maps, via an example, onto the PONDER policy language, developed at Imperial College, London.

  • Analysis of Policy and Standards for Joint C4ISR Network Technologies

    The focus of this poster is on an analysis of the relationships between U.S. Department of Defense (DoD) networks and policy, including policy about technology acquisition and usage. Policy affects technology research, development, test, evaluation, transition and refresh. Specific network- related technology areas support military command, control, and communications (C<sup>3</sup>). Some of these technologies are described with a view toward assessing the status of policy in specific areas. The relationship between policy and network technology is explored with questions such as, "What is policy doing for technology and vice versa?" and "How should we set policy priorities?" Network policy can be divided into at least two categories. The first is policy that governs acquisition and life cycle support, such as research, development, test, evaluation, fielding, funding, and upgrading existing network technology. The other category of network policy pertains to how networks are used, user requirements for protocol, training, and rules to prevent user-created problems of all kinds. Factors that affect military network policy include the following. a. Policy has a cascading affect that is similar to the inheritance property in object-oriented design. b. Changes in user requirements and funding levels affect policy and vice versa. c. An increase in the number of deployed networks and their use has increased the number, frequency, and level of detail of policy changes and refinements. d. Policy should support new ways to use network technology. New and recently available network technologies necessitate policy updates. e. A trend is developing toward an increase in the need for training of network administrators. More training is required to include network policy and its interpretation in the context of heightened threats and greater reliance on networks for distributed, secure communications. f. Technology that enables multi-level security usage and development needs to rely on sound technologically sensible policy for its implementation. g. Policy relies on modern, dependable technology for communication, refinement, and enforcement, h. When policy changes, technology must be designed to accommodate that change without degrading every other aspect of the system, i. Systems must be change compliant and change tolerant. Policy must reflect this, j. Policy must meet the need for constant usage of critical, mission-essential technology (such C<sup>3</sup>). k. Policy must address how new networks and network types will be funded, tested, certified, fielded, and maintained. Policy should promote design and implementation of an open-network architecture with "plug-and- play" modularity, m. Scientists, technology developers, and users need to suggest policy changes that affect all aspects of science and technology. The defense community needs to improve methods of selecting priorities with regard to military network policy, its formulation, enforcement, and modification. As the joint military is becoming more net centric, policy makers and technology developers need to become more aware of how these priorities affect readiness and the ability of operational personnel to respond. Policy should be more responsive and flexible to include changes and upgrades according to feedback from end users so that networks can provide better, more efficient and dependable service to the war fighter. Most DoD policy was formulated with robust, persistent, and working networks in mind. Policy, standards, and technology need to be expanded to cover discontinuous and frail networks. Fault tolerance in joint combat-system networks must be upgraded. Ideally, policy development should parallel closely the development of technology and not lag far behind it.



Standards related to Policy

Back to Top

No standards are currently tagged "Policy"


Jobs related to Policy

Back to Top