نتایج جستجو برای: control threshold policy
تعداد نتایج: 1666635 فیلتر نتایج به سال:
We consider a stochastic control model in which an economic unit has productive capital and also liabilities in the form of debt. The worth of capital changes over time through investment, and also through random Brownian fluctuations in the unit price of capital. Income from production is also subject to random Brownian fluctuations. The goal is to choose investment and consumption controls wh...
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based Access Control) model proposed by the NIST. The framework is based on the provisioning strategy defined by IETF, i.e., the RBAC information is represented in terms of a PIB (Policy Information Base) and distributed to...
The increasing inclusion of location and other contextual information in social media applications requires users to be more aware of what their location disclosures reveal. As such, it is important to consider whether existing access-control mechanisms for managing location sharing meet the needs of today’s users. We report on a questionnaire (N = 103) in which respondents were asked to specif...
“ Market and Process Risks in Production Opportunities: Demand and Yield Uncertainty ” Bardia Kamrad
By adopting a real options framework, we develop and analyze a production based valuation model that jointly incorporates process and market risks. Given this setting, techniques of contingent claims analysis and stochastic control theory are employed to obtain value maximizing operating policies in a constrained capacity environment. In our analysis, adjustments to operating policies are analo...
Background and Aim: It seems that diabetes mellitus affects hearing system by several mechanisms including microangiopathy ,sorbitol deposition and glycosilation ,dealing to progressive bilateral sensorineural hearing loss which is related duration of diabetes. Materials and Methods: This is a descriptive cross-sectional study performed on 300 patients with type 2 diabetes mellitus aged 30 to 5...
In a group-oriented threshold cryptosystem, each group, instead of each individual member within the group, publishes a single group public key. An outsider can use this group public key to send encrypted messages to the group. However, the received encrypted messages can only be decrypted properly when the number of participating members is larger than or equal to the threshold value. All earl...
We offer a new perspective on games of irreversible investment under uncertainty in continuous time. The basis is a particular approach to solve the involved stochastic optimal control problems which allows to establish existence and uniqueness of an oligopolistic open loop equilibrium in a very general framework without reliance on any Markovian property. It simultaneously induces quite natura...
As more and more information becomes centralized, controlling and managing access to sensitive data becomes increasingly challenging. Attribute-based access control (ABAC), which represents the latest milestone in the evolution of logical access control methods, is designed to address these challenges. It provides an attribute-based approach to accommodate a wide breadth of access control polic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید