搜索结果: 1-8 共查到“管理科学与工程 security”相关记录8条 . 查询时间(0.121 秒)
Security Constrained Optimal Power Flow via Proximal Message Passing
Constrained Optimal Power Flow Proximal Message Passing
2015/7/9
In this paper, we propose a distributed algorithm to solve the Security Constrained Optimal Power Flow (SC-OPF) Problem. We consider a network of devices, each with its own dynamic constraints and obj...
Efficient Monte Carlo Simulation of Security Prices
Efficient Monte Carlo Simulation Security Prices
2015/7/8
This paper provides an asymptotically efficient algorithm for the allocation of computing resources to the problem of Monte Carlo integration of continuous-time security prices. The tradeoff between i...
Managing Social Security Data in the Web 2.0 Era
Human Resource Management Social Security Data Management Information System
2013/2/23
Social security data management is an important topic both in application of information management and in social security management. In the Web 2.0 era, more and more human information and healthcar...
Privacy Accountability Model and Policy for Security Organizations
Privacy Data Protection Accountability Regulation Self-Regulation Privacy by Design PATS Project
2013/2/23
This paper describes a new model of privacy accountability and associates its dimensions with elements of the proposed European Commission regulation on the protection of individuals with regard to th...
USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT
Information security Sarbanes-Oxley Act security risk management user participation
2011/10/15
This paper examines user participation in information systems security risk management and its influence in the context of regulatory compliance via a multi-method study at the organizational level. F...
Safe Contexts for Interorganizational Collaborations Among Homeland Security Professionals
dual process theories geographic proximity knowledge protection personal networks safe contexts
2011/10/6
In many domains of increased turbulence and volatility, interorganizational ad hoc collaborations are common. One such domain is homeland security in which security professionals collaborate virtually...
National Institute of Standards and Technology Issues Guidelines for Ensuring RFID Security
radio frequency logistics
2007/4/29
National Institute of Standands and Technology Issues Guidelines for Ensuring RFID Security
logistics pharmaceutical
2007/4/27