نتایج جستجو برای: threat
تعداد نتایج: 52909 فیلتر نتایج به سال:
............................................................................................................................. ii
The paper assesses the market conditions and dynamics, the architectures and the different approaches for deployment of 3G Mobile Virtual Network Operators (MVNOs), in an attempt to address specific advantages and pitfalls. Following the definition of appropriate service sets and tariff structures, and taking into account demand scenarios, a techno-economic model has been developed, in order to...
INTRODUCTION .................................................................................................115 I. Implicit Racial Bias ...........................................................................................120 A. In General ....................................................................................................120 B. Implicit Dehumanization ......................
Considerable debate in recent years among researchers and policymakers has focused on the growing potential of terrorist groups to acquire and use chemical, biological, radiological, and nuclear (CBRN) materials in attacks. The reliability of analyses of CBRN events is an important concern at two levels: the data on which analyses are based, and the quantitative modeling of those data. At each ...
Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. The scope of this paper is to publish these vulnerabilities towards the enhancement...
In recent years there has been much interest in the conservation and tourism value of the Quirimbas Archipelago, Mozambique. Historically, biological and conservation work has been focused on the more accessible southern part of the Quirimbas. This paper is a contribution to the knowledge on the resources in the north of the Quirimbas following survey work conducted around Vamizi Island in 2001...
This paper details our experience designing a privacy preserving medical marijuana registry. In this paper, we make four key contributions. First, through direct and indirect interaction with multiple stakeholders like the ACLU of Washington, law enforcement, the Cannabis Defense Coalition, state legislators, lawyers, and many others, we describe a number of intersting technical and socially-im...
Debate over the nature of mindreading proceeds on the assumption that theory and simulation offer distinct characterizations of this ability. The threat of collapse objection questions this assumption, suggesting that simulation collapses into theory because both are committed to mindreading as tacit knowledge. Although both sides dismiss this objection, I argue that the threat is real. Theory ...
D the smuggling of nuclear weapons in container freight is critical. Previous work has suggested that such deterrence could be achieved by retaliation threats and partial inspection. However, pre-event declared retaliation threats may not be credible, causing the desired deterrence not to be achieved. In this paper, we extend and complement the work of Haphuriwat et al. (2011) to model credible...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید