نتایج جستجو برای: مدل network analyst
تعداد نتایج: 796221 فیلتر نتایج به سال:
Stuart McClure is the lead author of the best-selling security book Hacking Exposed: Network Security Secrets and Solutions (Osborne/McGraw-Hill), and since 1998 has been co-authoring the weekly “Security Watch” column in InfoWorld. Previously, as Security Analyst for the InfoWorld Test Center, he evaluated almost 100 network and security products in the area of firewalls, security auditing, in...
This study addressed barriers associated with the use of Safety Analyst, a state-of-the-art tool that has been developed to assist during the entire Traffic Safety Management process but that is not widely used due to a number of challenges as described in this paper. As part of this study, a comprehensive database system and tools to provide data to multiple traffic safety applications, with a...
For any stream of time-stamped edges that form a dynamic network, an important choice is the aggregation granularity that an analyst uses to bin the data. Picking such a windowing of the data is often done by hand, or left up to the technology that is collecting the data. However, the choice can make a big difference in the properties of the dynamic network. This is the time scale detection pro...
A uscr friendly. personal computer-based system designed to help solve cash management problems is discussed. The system is a "smart" system that enables the cash manager to use analytic techniques that otherwise would not be as accessible to anyone other than a technical analyst. The system formulates a cash management problem as a network problem, solves that network problem. ensures feasibil...
جمع آوری پسماند یکی از فعالیت های مدیریت پسماند است که 90-60 درصد از کل هزینه ها را به خود اختصاص می دهد. اهمیت این موضوع از آن جهت است که بهبود اندکی در عملیات جمع آوری می تواند تاثیر قابل ملاحظه ای در صرفه جویی هزینه های کل داشته باشد. بنابراین موضوع مسیریابی وسیله نقلیه جهت رسیدن به این هدف مورد توجه قرار می گیرد. مسئله مسیریابی وسیله نقلیه مسئله ای است که هر روز هزاران کارخانه و سازمان که د...
The paper investigates strategic interactions between an independent analyst and an a¢ liated analyst when the analystsinformation acquisition and the timing of their recommendations are endogenous. Compared to the independent analyst, the a¢ liated analyst has superior information but faces a conict of interest. I show that the independent analysts recommendation, albeit endogenously less i...
Elfriede Dustin currently works as a test manager at BNA Software (www.bnasoftware.com) in Washington, DC. She is a SQA Certified test engineer and has supported test efforts for a multitude of applications. In support of software test efforts, Elfriede has been responsible for implementing automated test, or has performed as the lead consultant guiding the implementation of automated software ...
Intrusion detection analysts are often swamped by multitudes of alerts originating from installed intrusion detection systems (IDS) as well as logs from routers and firewalls on the networks. Properly managing these alerts and correlating them to previously seen threats is critical in the ability to effectively protect a network from attacks. Manually correlating events can be a slow tedious ta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید