نتایج جستجو برای: airport security
تعداد نتایج: 184356 فیلتر نتایج به سال:
This paper uses cluster analysis to assess whether it might be a useful tool to select airport groups for comparative financial and economic performance studies. The research uses a sample of 73 airports, or airport operators, from all over the world. Nine key performance indicators (KPIs) are used to determine the clusters and the relationship between these clusters and possible explanatory va...
We consider optimal pricing to consumers who are privately informed about both their valuations for the product and when they learn their valuations. Initially, consumers have private information about the distribution of their valuations and when they will learn their valuations, and over time, consumers privately learn their valuations. Because of its importance in many revenue management pro...
Security analyser tools provide a means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks. Although such tools are useful to system administrators, in order to highlight and overcome weaknesses in protection, they are also of assistance to hackers looking for ways to break in. The paper highlights the range of tools that are currently...
Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now increasingly expedited by computers, the problems of physical and social security are becoming t...
Arguably the fundamental problem faced by employers is how to elicit effort from employees. Most models suggest that employers meet this challenge by monitoring employees carefully to prevent shirking. But there is another option that relies on heterogeneity across employees, and that is to screen job candidates to find workers with a stronger work ethic who require less monitoring. This should...
The rising challenges in the field of iris recognition, concerning the development of accurate recognition algorithms using images acquired under an unconstrained set of conditions, is leading to the a renewed interest in the area. Although several works already report excellent recognition rates, these values are obtained by acquiring images in very controlled environments. The use of such sys...
The growing interest in chemogenomics approaches over the last years has led to a vast amount of data regarding chemical and the corresponding biological activity space. The discovery of new chemical entities is not suitable to a fully automated analysis, but can greatly benefit from tools that allow exploring this chemical and biological space. We present a new version of Scaffold Hunter [1,2]...
We examine the role of security design when lenders make inefficient accept or reject decisions after screening projects. Lenders may be either “too conservative,” in which case they reject positive-NPV projects, or “too aggressive,” in which case they accept negative-NPV projects. In the first case, the uniquely optimal security is debt. In the second case, it is levered equity. In equilibrium...
The EDEMOI project aims to model standards that regulate airport security. It involves the production of a UML model, to support the validation activity, and a formal model for verification purposes. This paper discusses the use of the RoZ tool to establish a strong link between both models and lists the problems faced during this translation.
It is shown that the future SNO and Super-Kamiokande experiments, in which high energy 8 B neutrinos will be detected through the observation of CC, NC and ν–e elastic scattering processes, could allow to reveal in a model independent way the presence of sterile neutrinos in the flux of solar neutrinos on the earth.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید