Sciweavers

84 search results - page 4 / 17
» assets 2010
Sort
View
ATAL
2010
Springer
13 years 7 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
JOT
2010
142views more  JOT 2010»
13 years 4 months ago
Attached Processes
Many software engineers try very hard not to use the word “reuse” because many methods and tools intended to promote reuse have failed to meet expectations. As soon as they le...
John McGregor
MANSCI
2010
80views more  MANSCI 2010»
13 years 4 months ago
Impossible Frontiers
A key result of the Capital Asset Pricing Model (CAPM) is that the market portfolio— the portfolio of all assets in which each asset’s weight is proportional to its total mark...
Thomas J. Brennan, Andrew W. Lo
ASSETS
2010
ACM
13 years 6 months ago
What can the 'ash cloud' tell us about older adults' technology adoption
Older adults are often encouraged to try new technology by a specific motivator or ,,trigger. Recently, a surprising ,,trigger has emerged - the ,,ash cloud which caused large sca...
Lorna Gibson, Paula Forbes, Vicki L. Hanson
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 6 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar