نتایج جستجو برای: policy control
تعداد نتایج: 1561601 فیلتر نتایج به سال:
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
Objective: In this study, implement-criminal policy discourses to control drug abuse were analyzed. Method: The present research was descriptive-analytical and the data were collected in the form of a library research from books, dissertations and articles. Results: This study showed that due to the transfer of enforcement to various executive agents, the implement-criminal policy governing dru...
We consider a stochastic control model in which an economic unit has productive capital and also liabilities in the form of debt. The worth of capital changes over time through investment, and also through random Brownian fluctuations in the unit price of capital. Income from production is also subject to random Brownian fluctuations. The goal is to choose investment and consumption controls wh...
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based Access Control) model proposed by the NIST. The framework is based on the provisioning strategy defined by IETF, i.e., the RBAC information is represented in terms of a PIB (Policy Information Base) and distributed to...
The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N = 103) in which respondents were asked to specif...
“ Market and Process Risks in Production Opportunities: Demand and Yield Uncertainty ” Bardia Kamrad
By adopting a real options framework, we develop and analyze a production based valuation model that jointly incorporates process and market risks. Given this setting, techniques of contingent claims analysis and stochastic control theory are employed to obtain value maximizing operating policies in a constrained capacity environment. In our analysis, adjustments to operating policies are analo...
We offer a new perspective on games of irreversible investment under uncertainty in continuous time. The basis is a particular approach to solve the involved stochastic optimal control problems which allows to establish existence and uniqueness of an oligopolistic open loop equilibrium in a very general framework without reliance on any Markovian property. It simultaneously induces quite natura...
As more and more information becomes centralized, controlling and managing access to sensitive data becomes increasingly challenging. Attribute-based access control (ABAC), which represents the latest milestone in the evolution of logical access control methods, is designed to address these challenges. It provides an attribute-based approach to accommodate a wide breadth of access control polic...
foreign policy takes root from complicated matters. however, this issue may be more truth about armenia. although the new government of armenia is less than 20 years, people of this territory are the first ones who officially accepted christianity. in very past times, these people were a part of great emperors like iran, rome, and byzantium.armenia is regarded as a nation with a privileged hist...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید