نتایج جستجو برای: incident

تعداد نتایج: 47330  

2010
Christoph Endres Andreas Wurz Marcus Hoffmann Alexander Behring

A central part of the work in Incident Commands (ICs) deals with handling messages that contain relevant information. Classification schemes for messages can be exploited by command staff and assisting tools to support this work, given that a common understanding of the scheme is shared among participants. We present user studies on two such classifications, which imply some disagreement among ...

2012
Matt Thompson

24 A cornerstone of effective institutional learning and accountability is the development, tracking, and analysis of informative performance measures. In a previous issue of Fire Management Today (“A New Look at Risk Management,” Winter 2011), a series of articles highlighted the importance of organizational safety and risk management and the challenges of balancing safety, efficiency, and eff...

2003
Cristine Hoepers Klaus Steding-Jessen

A honeynet is a research tool consisting of a network specifically designed for the purpose of being compromised, with control mechanisms that prevent this network from being used as a base for launching attacks against other networks. Once compromised, the honeynet can be used to observe the intruders’ activities, collect tools and determine new trends in network attacks. In this paper we disc...

2011
SO Ameh Liu Yan - pu Zhao Jin - long Wang Zhao - ling Lei De - lin

A mass casualty incident (MCI) is that which requires a response beyond standard deployment. These can result from natural or artificial events. Casualties can present in peacetime or be evacuated from battle fields. Mass casualty management in most military health facilities in developing countries is not optimal. There are challenges occasioned by dearth of trained, specialized manpower, lack...

2012
WOON KIM MARK FRANZ GANG-LEN CHANG Woon Kim Mark Franz Gang-Len Chang

The contents of this report reflect the views of the author who is responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views or policies of the Maryland State Highway Administration. This report does not constitute a standard, specification, or regulation. To improve traffic conditions on major highways plagued by non-rec...

2007
Michael Carl Tschantz Jeannette M. Wing

We examine a well known confidentiality requirement called noninterference and argue that manysystems do not meet this requirement despite maintaining the privacy of its users. We discussa weaker requirement called incident-insensitive noninterference that captures why these systemsmaintain the privacy of its users while possibly not satisfying noninterference. We extend thisreq...

Journal: :Annals OR 2013
Kaan Özbay Cem Iyigun Melike Baykal-Gursoy Weihua Xiao

This paper proposes mathematical programming models with probabilistic constraints in order to address incident response and resource allocation problems for the planning of traffic incident management operations. For the incident response planning, we introduce the concept of quality of service during a potential incident to give the decision-maker the flexibility to determine the optimal poli...

2011
Marko Jäntti

The adoption of IT Infrastructure Library (ITIL) framework is a challenging task for many IT service provider organizations. Many government organizations in Finland have also started to use ITIL and need help in configuring tools and defining processes. The research problem of this study is: What types of challenges exist in the IT service provider’s customer support? The main contribution of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید