Sciweavers

914 search results - page 20 / 183
» Effective vaccination policies
Sort
View
DSN
2004
IEEE
13 years 11 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
HICSS
2003
IEEE
260views Biometrics» more  HICSS 2003»
14 years 19 days ago
Automating Land Management: An Interpretive Analysis of Information Technology Management within the Bureau of Land Management
Given societies’ massive investment in information technology and the potentially catastrophic consequences of IT failures, it is becoming increasingly critical to understand ho...
John C. Beachboard
IOR
2008
137views more  IOR 2008»
13 years 7 months ago
Optimal Joint Inventory and Transshipment Control Under Uncertain Capacity
In this paper, we address the optimal joint control of inventory and transshipment for a firm that produces in two locations and faces capacity uncertainty. Capacity uncertainty (...
Xinxin Hu, Izak Duenyas, Roman Kapuscinski
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
14 years 2 months ago
Analysis of Marginal Carbon Intensities in Constrained Power Networks
Jurisdictions across the globe are implementing CO2 emissions reduction policies. These policies typically ignore most locational issues, probably because the consequences of gree...
Pablo A. Ruiz, Aleksandr Rudkevich
ASM
2010
ASM
13 years 7 months ago
Matelas: A Predicate Calculus Common Formal Definition for Social Networking
This paper presents Matelas, a B predicate calculus definition for social networking, modelling social-network content, privacy policies, social-networks friendship relations, and ...
Néstor Cataño, Camilo Rueda