نتایج جستجو برای: interdependent security

تعداد نتایج: 185170  

Journal: :پژوهش های فلسفی 0
سید علی کلانتری استادیار گروه فلسفه، دانشگاه اصفهان

the normativity of mental content thesis appears to have been the most influential in contemporary philosophy of mind. paul boghossian (2003, 2005) has developed an argument for the normativity of mental content on the basis of two premises, i.e. firstly, the normativity of the notion of belief and secondly, the priority of the notion of belief to the notion of desire. in his recent article ale...

2016
Shiwen Sun Yafang Wu Yilin Ma Li Wang Zhongke Gao Chengyi Xia

The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional ...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2016
Xueming Liu H Eugene Stanley Jianxi Gao

Increasing evidence shows that real-world systems interact with one another via dependency connectivities. Failing connectivities are the mechanism behind the breakdown of interacting complex systems, e.g., blackouts caused by the interdependence of power grids and communication networks. Previous research analyzing the robustness of interdependent networks has been limited to undirected networ...

1993
L. J. Hendren G. R. Gao E. R. Altman

menting other scheduling objectives, such as the minimization of buffering requirements, in a manner that is guaranteed not to interfere with code compaction goals. We have defined a class of SDF graphs called tightly interdependent graphs. Schedules for arbitrary SDF graphs can be constructed such that each block that is not contained in a tightly interdependent subgraph appears only once, and...

2008
Jean-Chrysostome Bolot Marc Lelarge

Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion detection and prevention, etc) reduce but do not eliminate risk, and the question remains on how to handle the residual risk. In this paper, we consider the problem of whether buying insurance to protect the Internet and its ...

Journal: :American Economic Journal: Economic Policy 2013

Journal: :Journal of Physics: Conference Series 2021

2012
John Chuang

German sociologist Ulrich Beck declared two decades ago, in 1992, that we are living in a "risk society" [2]. Not only do we face risks from natural hazards that are beyond human control, such as earthquakes and tsunamis, we also make conscious decisions to create, negotiate, and accept risks from man-made hazards, including radiation from nuclear power plants, chest x-rays, flying in an airpla...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید