Sciweavers

451 search results - page 25 / 91
» What Is a Conversation Policy
Sort
View
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 5 months ago
Using Systems Dynamics to Explore Effects of Counterterrorism Policy
This paper suggests that the effects of counterterrorism policy on Violent Non-State Actors can be explored via systems dynamics. Specifically, we create a descriptive model of th...
Tara Leweling, Otto Sieber
ICANN
2010
Springer
14 years 7 days ago
Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems an...
Frank Sehnke, Christian Osendorfer, Jan Sölte...
WSC
2007
14 years 1 months ago
Agent-based simulations of service policy decisions
During service engagements, project managers frequently encounter resource constraint issues. For each resource shortfall encountered, a project manager must decide among a narrow...
Richard B. Lam
DAGSTUHL
2003
14 years 16 days ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec
IMCS
2010
76views more  IMCS 2010»
13 years 9 months ago
Human-Related Problems of Information Security in East African Cross-Cultural Environments
Purpose – The purposes of this paper are to find what kinds of problems, while implementing information security policy, may take place in foreign companies in the East African ...
Tatsuo Asai, Ms. Aline Uwera Hakizabera