نتایج جستجو برای: policy control

تعداد نتایج: 1561601  

2000
Claus Munk

This paper examines the continuous time optimal consumption and portfolio choice of an investor having an initial wealth endowment and an uncertain stream of income from non-traded assets. The income stream is not spanned by traded assets and the investor is not allowed to borrow against future income, so the "nancial market is incomplete. We solve the corresponding stochastic control problem n...

2009

Alcohol policies and public opinion: Five case studies on recent developments in Europe and North America Recent developments in many parts of the world suggest that the journey ahead for those wishing to foster effective harm reduction alcohol policies will be neither smooth nor uneventful. There is a striking contrast between, on the one hand, high and rising rates of damage from alcohol and,...

2006
JYH-HAW YEH

Without proposing a new key assignment scheme, this paper presents a graph translation procedure that can be used to enforce non-hierarchical access control policies, in addition to those in a strict hierarchy. An interesting application is also given in this paper to show the importance of non-hierarchical access control. Key-Words: Key assignment, Multilevel security, Access control, Cryptogr...

2005
Paul J. Goulart Eric C. Kerrigan

This paper is concerned with the analysis of a recently-proposed robust control policy for linear discrete-time systems subject to bounded state disturbances with mixed constraints on the states and inputs, which parameterizes the input as an affine function of the past disturbance sequence. The paper shows that this disturbance feedback policy is equivalent to the class of affine state feedbac...

1997
C. FAIR

The purpose of this paper is to examine within the context of a patieular U.S. exammetric model the sensitivity of fiscal policy effects to alternative assumptions about the behavior of the Federal Reserve. Five cases are considered, four in which Fed behavior is exogenous and one in which Fed behavior is endogenous. In each of the four exogenous cases the Fed is assumed to control a particular...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...

2006

Social networking sites, blogs, photo and video galleries, and other content publishing tools are enabling Internet users to share their experiences and opinions with larger audiences more easily than ever before. With this increased sharing comes a pressing need for access-control policies and mechanisms to protect users’ privacy and safety. Traditional access-control mechanisms, however, are ...

ژورنال: مدیریت سلامت 2015

Introduction: Successful reduction in the gap between applied knowledge and pure knowledge, depends on the identification of factors affecting it .The objective of the study was to identify the barriers and facilitators to the development of evidence-based papers from the perspective of their producers at the Ministry of Health Care and Medical Education headquarter office. Methods: Qualitativ...

2013
Fred B. Schneider

With discretionary access control (DAC) policies, authorization to perform operations on an object is controlled by the object’s owner or by principals whose authority can be traced back to that owner. The goals of an institution, however, might not align with those of any individual. So for systems intended to support institutions, a more natural basis for authorization is rules set by the ins...

1998
Naftaly H. Minsky Victoria Ungureanu

Modern distributed systems tend to be conglomer-ates of heterogeneous subsystems, which have been designed separately, by diierent people, with little, if any, knowledge of each other | and which may be governed by diierent security policies. A single software agent operating within such a system may nd itself interacting with, or even belonging to, several subsystems, and thus be subject to se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید