نتایج جستجو برای: safe

تعداد نتایج: 125597  

2011
Matthew Tolan

In this article, I seek to find whether the type of government in a country affects the amount of education provided. To do this, I propose a model where political power is distributed throughout the population, and their choice to support a government is based on an observable factor; whether the government provides access to education. Using the results from this model, I propose 3 hypotheses...

2006

Executive Summary Ensuring safety requires reducing the risk of incidents, faults and failures that can disrupt normal operations. This effort goes far beyond simply installing fail-safe controllers or a safety instrumented system. In fact, to mitigate the risk of serious incidents that can cause injury to personnel, equipment and the environment, it is important to consider safety from all asp...

2002
Kathleen L. Kitto Barbara Sylvester

1 Kathleen L. Kitto, Western Washington University, Engineering Technology, Bellingham, WA 98225, [email protected] 2 Dr. Barbara Sylvester, Western Washington University, University Writing Program, Bellingham, WA 98225, [email protected] Abstract -In teaching the Engineering Technology Department’s new ethics course, instructors from Western Washington University’s Writing Program and ...

2008

Abstract: In this project we will explore the properties of stochastic matrices in both the real and the finite fields. We first explore what properties 2  2 stochastic matrices in the real field have and then exam if they hold in the finite fields. We will prove how, given the conditions of a finite field, properties hold or fail to hold. We will extend our scope to 3  3 stochastic matrices ...

2010
Mike Mitchell

The long-term goal of this program is to develop a technology to allow EOD technicians to interrogate an electronically safe and armed munition and determine the electrical status of these devices. Determining the electrical status of the mechanism will provide EOD technicians additional options to consider when determining the appropriate render safe procedure to use against these threat devices.

2002
John L. Bresina Richard Dearden Nicolas Meuleau Sailesh Ramakrishnan David E. Smith Richard Washington

There has been considerable work in AI on decisiontheoretic planning and planning under uncertainty. Unfortunately, all of this work suffers from one or more of the following limitations: 1) it relies on very simple models of actions and time, 2) it assumes that uncertainty is manifested in discrete action outcomes, and 3) it is only practical for very small problems. For many real world proble...

Journal: :Management Science 2013
Muriel Niederle Carmit Segal Lise Vesterlund

A action is often criticized for causing reverse discrimination and lowering the qualifications of those hired under the policy. However, the magnitude of such adverse effects depends on whether the best suited candidate is hired absent the policy. Indeed affirmative action may compensate for the distortion discrimination imposes on the selection of candidates. This paper asks whether affirmati...

2002
Victor H. L. Cheng David C. Foyle

In view of the ever-increasing air traffic, much attention in air-traffic-management research has been given to improving arrival and departure efficiency. As air traffic begins and ends at the airport, the issues of taxi delays and ground-operation incursions become more pressing. This paper considers the surface-traffic problem at major airports and envisions a collaborative traffic and aircr...

2004
Adam Cataldo

In this paper I describe a implementation procedure for generating controllers to guarantee safety constraints for controllable discrete-time linear systems. The first two sections are a summary of the work of [6]. The contribution of this paper is the discussion of the limitations of this method and future research directions. We omit any discussion of complexity and focus instead on functiona...

Journal: :Datenschutz und Datensicherheit 2003
Sönke Maseberg

Public-Key-Infrastrukturen sind von zentraler Bedeutung für eine sichere elektronische Kommunikation in offenen Netzen. PublicKey-Infrastrukturen bergen aber für die auf ihnen basierenden Anwendungen auch Risiken, weil die Verfahren der PKIs zu Grunde liegenden Public-Key-Kryptografie nicht beweisbar sicher sind. Zur Lösung der möglichen Probleme – Verlust der Verfügbarkeit von PKIAnwendungen, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید