A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES
|
|
|
- Penelope Malone
- 10 years ago
- Views:
Transcription
1 A MUTI-CRITERIA EVAUATION OF INFORMATION SECURITY CONTROS USING BOOEAN FEATURES Angel R. Otero 1, Carlos E. Otero 2 an Abrar Qureshi 2 1 Grauate School of Computer an Information Sciences, Nova Southeastern Universit, Fort auerale, F, USA [email protected] 2 Department of Mathematics & Computer Science, Universit of Virginia s College at Wise, Wise, VA, USA [email protected]; [email protected] ABSTRACT For organizations, the protection of information is of utmost importance. Throughout the ears, organizations have experience numerous sstem losses which have ha a irect impact on their most valuable asset, information. Organizations must therefore fin was to make sure that the appropriate an most effective information securit controls are implemente in orer to protect their critical or most sensitive classifie information. Existing information securit control selection methos have been emploe in the past, incluing risk analsis an management, baseline manuals, or ranom approaches. However, these methos o not take into consieration organization specific constraints such as costs of implementation, scheuling, an availabilit of resources when etermining the best set of controls. In aition, these existing methos ma not ensure the inclusion of require/necessar controls or the exclusion of unnecessar controls. This paper proposes a novel approach for evaluating information securit controls to help ecision-makers select the most effective ones in resource-constraine environments. The propose approach uses Desirabilit Functions to quantif the esirabilit of each information securit control taking into account benefits an penalties (restrictions) associate with implementing the control. This provies Management with a measurement that is representative of the overall qualit of each information securit control base on organizational goals. Through a case stu, the approach is proven successful in proviing a wa for measuring the qualit of information securit controls (base on multiple application-specific criteria) for specific organizations. KEYWORDS Information securit; information securit controls; risk analsis an management; baseline manuals; best practice frameworks; esirabilit functions 1. INTRODUCTION For organizations, the protection of information is of utmost importance. Throughout the ears, organizations have experience numerous sstem losses which have ha a irect impact on their most valuable asset, information. Accoring to [1], losses relate to information securit will continue to happen an their effect will be evastate to organizations. In 2006, the CSI/FBI Computer Crime an Securit Surve state that total losses in the Unite States attributable to computer securit breaches reache $52,494,290. Further, eight former emploees of Bank of America, Wachovia, an other major banks were arreste for illegall stealing an selling account information of approximatel 500,000 customers [2]. These alarming figures point to an inaequac in toa's information securit practices an serves as motivation for fining new was to help organizations improve their capabilities for securing valuable information. DOI : /nsa
2 In toa's organizational culture, most information securit challenges are aresse through the use of securit tools an technologies, such as, encrption, firewalls, access management, etc. [3], [4]. Although tools an technologies are an integral part of organizations information securit plans [5], [6], it is argue that the alone are not sufficient to aress information securit problems [7]. To improve overall information securit, organizations must evaluate (an thus implement) appropriate information securit controls (ISC) that satisf their specific securit requirements [8], [9], [10]. However, ue to a variet of organizational-specific constraints (e.g., cost, scheule, resources availabilit), organizations o not have the luxur of selecting an implementing all require ISC. Therefore, the selection, aoption, an implementation of ISC within organizations' business constraints become a non-trivial task. This paper proposes a novel approach for evaluating an ientifing the most appropriate ISC base on organization specific criteria. The propose approach uses Desirabilit Functions to quantif the esirabilit of each ISC taking into account benefits an penalties (restrictions) associate with implementing the ISC. This provies Management with a measurement that is representative of the overall qualit of each ISC base on organizational goals. The erive qualit measurement can be use as the main metric for selecting ISC. The remainer of the paper is organize as follows. Section 2 provies a summar of previous work on ISC selection. Section 3 briefl escribes the propose solution approach. Section 4 provies etaile explanations of the Desirabilit Functions technique. Section 5 presents the results of a case stu. astl, Section 6 provies summarize conclusions an highlights of the propose approach. 2. BACKGROUND WORK Various reasons have been put forth for explaining the lack of effectiveness in the evaluation, selection, an implementation process of ISC. Base on [11], the implementation of ISC in organizations ma constitute a barrier to progress. For instance, participants from the ICIS 1993 conference panel inicate that the implementation of ISC ma slow own prouction thereb turning the emploees work ineffective [12]. Emploees ma view ISC as interrupting their a-to-a tasks [13] an ma, therefore, ten to ignore implementing them in orer to be effective an efficient with their ail job tasks. Accoring to [14], organizations are require to ientif an implement appropriate controls to ensure aequate information securit. In [15], the authors place emphasis on the fact that ifferent organizations have ifferent securit nees, an thus ifferent securit requirements an objectives. In aition, [16] stress that there is no single information securit solution that can fit all organizations. As a result, ISC must be carefull selecte to fit the specific nees of the organization. Ientification an implementation of the most effective ISC is a major step towars proviing an aequate level of securit in organizations [8] Previous Approaches in the Selection of ISC in Organizations Base on [8], the process of ientifing (an selecting) the most effective ISC in organizations has been a challenge in the past, an plent of attempts have been mae to come up with the most effective wa possible. Risk analsis an management (RAM) is just one example. RAM has been recognize in the literature as an effective approach to ientif ISC [8]. RAM consists of performing business analses as well as risk assessments, resulting in the ientification of information securit requirements [8]. RAM woul then list the information securit requirements as well as the propose ISC to be implemente to mitigate the risks resulting from the analses an assessments performe. RAM, however, has been escribe as a subjective, bottom-up approach [17], not taking into account organizations specific constraints. For example, through performing RAM, organizations ma ientif 50 information securit risks. Nonetheless, Management ma not be 2
3 able to select an implement all necessar ISC to aress the previousl ientifie 50 risks ue to costs an scheuling constraints. Moreover, there ma not be enough resources within the organization to implement these ISC. In this case, Management shoul lists all those risks ientifie an etermine how critical each iniviual risk is to the organization, while consiering cost versus benefit analses. Management must, therefore, explore new was to etermine/measure the relevanc of these ISC consiering the constraints just presente. Baseline manuals or best practice frameworks is another approach wiel use b organizations to introuce minimum securit controls in organizations [8]. Per [14], best practice frameworks assist organizations in ientifing appropriate ISC. Some best practices inclue: Control Objectives for Information an relate Technolog (COBIT), Information Technolog Infrastructure ibrar (ITI), an Operationall Critical Threat, Asset an Vulnerabilit Evaluation (OCTAVE). Aitionall, [9] have mentione other best practice frameworks which have assiste in the ientification an selection of ISC. These are: International Organization for Stanarization (ISO) / International Electrotechnical Commission (IEC) an ISO/IEC 27001, PROTECT, Capabilit Maturit Moel (CMM), an Information Securit Architecture (ISA). The process of selecting the most effective ISC from these best practice frameworks can be challenging [17]. Accoring to [17], best practice frameworks leave the choosing of controls to the user, while offering little guiance in terms of etermining the best controls to provie aequate securit for the particular business situation. Aitionall, frameworks o not take into consieration organization specific constraints, such as, costs of implementation, scheuling, an resource constraints. Other less formal methos use in the past, such as, a hoc or ranom approaches, coul lea to the inclusion of unnecessar controls an/or exclusion of require/necessar controls [8]. Ientifing an selecting ISC base on the above ma result in organizations not being able to protect the overall confientialit, integrit, an availabilit of their information [14]. In orer to increase the effectiveness of the selection an prioritization process for ISC, new methos nee to be evelope that save time while consiering major factors (e.g., constraints, restrictions, etc.) that unoubtel affect the selection of ISC. From the reviewe literature, it is evient that the selection of ISC is mostl riven b cost, scheuling, an resource availabilit. In other wors, ISC at organizations will be selecte b Management when the benefits of implementing them surpass the costs of establishing the control. Equall important, scheuling issues ma affect whether ISC shoul be selecte. Implementation of ISC ma require specific scheule times, not necessaril planne b the organization. Finall, availabilit of personnel often etermines whether ISC can be selecte or not. Effective information sstem securit implementation requires the ientification an aoption of the most appropriate an effective set of ISC [17] taking into account the issues presente above. 3. SOUTION APPROACH To properl evaluate the qualit, importance, an priorit of ISC in organizations, Management must follow a methoolog that takes into consieration the qualit attributes of the ISC that are consiere relevant. The methoolog must provie capabilities to etermine the relative importance of each ientifie qualit attribute. This woul allow the methoolog to provie an ISC selection/prioritization scheme that represent how well these ISC meet qualit attributes an how important those qualit attributes are for the specific organization. To achieve this, the methoolog create in [18] is moifie an customize to solve the problem of prioritizing ISC in organizations. First, a set of qualit attributes are ientifie as evaluation criteria for all possible ISC. These attributes are efine in terms of ifferent features, where each feature is etermine to be either present or not. Once all features are ientifie, each iniviual ISC is evaluate against each feature using a simple binar (boolean) scale (i.e., 0 or 1). ISC that 3
4 satisf the highest number of features woul expose a higher level of qualit (or priorit) for that particular qualit attribute. Once all ISC are evaluate an measurements compute for all features, the propose approach uses Desirabilit Functions to fuse all measurements into one unifie value that is representative of the overall qualit of the ISC. This unifie value is compute b using a set of Desirabilit Functions that take into consieration the priorit of each qualit attribute. Therefore, the resulting priorit of each ISC is erive base on Management s goals an organization s specific nees. This results in an ISC evaluation/prioritization approach base on how well ISC meet qualit attributes an how important those qualit attributes are for the organization. 4. DESIRABIITY FUNCTIONS Desirabilit Functions are a popular approach for simultaneous optimization of multiple responses [19], [20]. The have been use extensivel in the literature for process optimization in inustrial settings, where fining a set of operating conitions that optimize all responses for a particular sstem is esire [18], [21]. Through Desirabilit Functions, each sstem response i is converte into an iniviual function i that varies over the range 0 i 1, where i = 1 when a goal is met, an i = 0 otherwise [20]. Once each response is transforme, the levels of each factor are tpicall chosen to maximize the overall esirabilit which is represente as the geometric mean of all m transforme responses [19]. Alternativel, when factors are uncontrollable, the overall esirabilit value can be use to characterize the sstem base on the multiple selecte criteria. Similar to the characterization of inustrial processes, the evaluation of the qualit an prioritization of each ISC in organizations can be approache b fining the set of criteria that provie the optimal benefit versus cost value for a particular organization. When formulate this wa, Desirabilit Functions can be use to provie a unifie measurement that characterizes the qualit of ISC base on a set of preefine evaluation criteria. Once the esirabilit of all ISC is compute, Management can use this information to etermine the relative priorit of ISC an select the best ones simpl b choosing the most esirable ones for a particular organization Computing Desirabilit The first step in the Desirabilit Functions approach involves ientifing all possible ISC that coul be implemente in an organization. These ISC can be obtaine from the best practice frameworks liste in Section 2. For instance, the ISO/IEC stanar has over 127 ISC available accoring to the organizations specific nees [14]. Once selecte, the results of these ISC are capture in the ISC vector, as presente in (1). n1 n2 X = M n n (1) Once the ISC vector is ientifie, each ISC can be evaluate against a set of qualit attributes QA 1, QA 2,.., QA n. The evaluation process takes place as follow. First, each qualit attribute is efine in terms of m features, where m > 1. The evaluation scale for each feature is binar; that is, the feature is evaluate as being present/true (i.e., 1) or missing/false (i.e., 0). For example, ISC can be prioritize base on their Scope. In other wors, ISC that provie securit of information in man sstems have a higher priorit than ISC that aress securit of information in a minimal number of sstems. In this case, the qualit attribute Scope can be efine with the following features: Sstem 1, Sstem 2,..., Sstem n. Therefore, the highest priorit ISC (base on the Scope qualit attribute) woul be one where Sstem 1 = 1, Sstem 2 = 1, an Sstem n = 1. Similarl, the lowest priorit ISC base on the Scope qualit attribute is 4
5 one where Sstem 1 = 0, Sstem 2 = 0, an Sstem n = 0. For qualit attributes where the presence of features affects the securit of information negativel (e.g., restrictions, penalties), the reverse is true. In these cases, ISC with all features present (i.e., 1) result in lower priorit an ISC with all features missing (i.e., 0) result in higher priorit. With this framework in place, a measurement of the importance of the j th ISC base on the i th qualit attribute (e.g., Scope) can be compute using (2), m m f x x= = 0 (2) where m is the number of features ientifie for the i th qualit attribute. This computation normalizes the evaluation criteria to a scale of 0 100, where 0 represents the lowest score an 100 the highest (or backwars for restrictions or penalties). The overall assessment of the ISC set base on all qualit attributes is capture using the qualit assessment matrix Q presente in (3). As seen, each value of the matrix represents the score of the j th ISC base on each iniviual i th qualit attribute. It is important to point out that the qualit assessment matrix can be extene to evaluate ISC base on an qualit attributes containing numerous features. Q = QA M n QA M 2 2n O QAm m 1 m2 M mn (3) Finall, to assess the importance of each qualit attribute, a weight vector W is create where r i represents the importance of the QA i qualit attribute using the scale 0 10, where 0 represents lowest importance an 10 represents highest importance. The weight vector W is presente in (4). r1 r2 W = M r m (4) Once the information from X, Q, an W is collecte, esirabilit values for each ISC can be compute using the esirabilit matrix presente in (5). As seen, each value of the matrix represents the esirabilit of the j th ISC base on each iniviual i th qualit attribute. 12 = M 1n M 2n Each iniviual esirabilit value for the ISC is compute accoring to Management base on the organization s specific nees an goals. For example, qualit attributes that are represente positivel b a higher value are transforme using the maximization function in (6) [20]. Alternativel, qualit attributes that are represente negativel b a higher value are transforme using the minimization function in (7) [20], O m1 m2 M mn (5) 5
6 0 = T 1 ri T > T (6) 1 U = U T 0 ri T < T U > U (7) where an U are the lower an upper limits, T is the target objective (e.g., 100 for maximization, 0 for minimization), an r i is the esirabilit weight for the i th qualit attribute. It is important to note that (6) an (7) are the normal equations for the Desirabilit Function approach. However, through experimentation, it was foun that the approach for ISC selection an prioritization performe better when > 0. Therefore, as heuristic, when is less than.0001, the value is set to A esirabilit weight of r = 1 results in a linear Desirabilit Function; however, when r > 1, curvature is expose b the Desirabilit Function to emphasize on being close to the target objective (T). When 0 < r < 1, being close to the target objective is less important. Once iniviual esirabilit values for each qualit attribute are compute, the overall ISC esirabilit value can be compute using (8). As seen, each overall esirabilit value is compute as the geometric mean of all m iniviual esirabilit values for ISC 1, 2,, n. After the overall esirabilit value is compute for all ISC, Management can use this value as a priorit measurement erive from the preefine qualit attributes an their relative importance for the particular organization. 5. CASE STUDY D = m i= 1 m i= 1 m i= 1 i1 i2 M in This section presents the results of an ISC evaluation/prioritization case stu using the propose approach. The case stu evaluates 10 ISC base on the following ientifie qualit attributes, some of which have been efine within the ISO/IEC stanar [9]. Restrictions there are restrictions that Management must take into account before selecting an implementing ISC. These ma inclue whether the costs involve in the selection an implementation of ISC are high, whether resources are not available, an whether there are scheuling constraints associate with implementing the ISC. The presence of an of the above will negativel affect the specific qualit attribute. That is, ISC with all features present will result in a lower priorit; conversel, ISC with all 1 m 1 m 1 m (8) 6
7 features missing will result in a higher priorit. A high priorit scenario will be one where the implementation cost of the specific ISC is consiere aequate an/or manageable (e.g., within buget), resources are available to implement the particular ISC, an there are no restrictions in terms of scheuling the ISC (i.e., the ISC can be scheule antime uring the ear). Restrictions is efine as: Costs (C), Availabilit of Resources (AoR), an Scheuling (T). Scope This qualit attribute assesses the impact of the ISC on the organization. ISC that provie securit of information in man sstems have a higher priorit than ISC that aress securit of information in a minimal number of sstems. Scope is efine as: Sstem 1 (S1), Sstem 2 (S2),, Sstem n (Sn). Organization s Objectives the number of information securit objectives the ISC satisfies. The higher the number of objectives the ISC satisfies, the higher the esirabilit of the ISC. Organization s objectives is efine with the following features: Objective 1 (O1), Objective 2 (O2),, Objective n (On). Phsical Access ISC will prevent an/or recor unauthorize access to the organization s builing facilities, incluing computer rooms where information processing takes place, the finance/accounting epartment, human resources epartment, etc. The higher the number of phsical locations aresse b the ISC, the higher the esirabilit of the ISC. Phsical access is efine as: ocation 1 (1), ocation 2 (2),, ocation n (n). Access Controls implementation of an ISC for this qualit attribute will promote appropriate levels of access controls to ensure protection of the organization s sstems/applications against unauthorize activities. Organizations ma implement network access controls (N), operating sstems access controls (O), an application controls (A) base on their specific nees. Human Resources implementation of an ISC supports reuctions of risk of theft, frau, or misuse of computer resources b promoting information securit awareness (Aw), training (Tn), an eucation of emploees (E) [22]. Depening on the particular situation, costs involve, an availabilit of personnel, organizations ma select which of these to emplo. Communications an Operations Management ISC will ensure the correct an secure operation of information processing facilities, which inclues aressing for aequate segregation of uties (SoD), change management (CM), an network securit (NS). Organizations ma select ISC to aress all of these or just some epening on their particular nees. Sstems Acquisition, Development, an Maintenance ISC will support securit relate to the organization s in-house an/or off-the-shelf sstems or applications (e.g., ensuring personnel with authorize access can move changes into prouction environments, etc.). The higher the number of sstems or applications aresse b the ISC, the higher the esirabilit of the ISC. Sstems Acquisition, Development, an Maintenance is efine as: Sstems or Applications 1 (SoA1), Sstems or Applications 2 (SoA2),, an Sstems or Applications n (SoAn). Incient Management ensures that securit-relate incients (e.g., attempts to change/manipulate financial ata, etc.) ientifie within the organization s processing of information are communicate in a timel manner an that corrective action is taken for an exceptions ientifie. Incient management ma appl to online processing 7
8 an/or batch processing. Incient Management is efine as Processing 1 (P1), Processing 2 (P2),, an Processing n (Pn). Using snthetic ata for the ientifie qualit attributes, a binar input evaluation (Table 1), an Desirabilit Functions parameters (Table 2), results were generate from the Desirabilit Functions an presente in Table 3. As seen in Table 2, all lower an upper bounaries are set to 0 an 100, respectivel. Also, all qualit attributes have been ientifie as having equal priorit. This is accomplishe b setting the weight r = 1 for all qualit attributes. Finall, ifferent target values have been ientifie for each qualit attribute. This means that the threshol for achieving 100% esirabilit is customize for each qualit attribute. For example, qualit attributes where T = 70 are consiere 100% esirable if the exhibit 70% (or more) of the features that efine them. Table 1. Binar Input Evaluation. Table 2. Desirabilit Functions Parameters. Table 3. Desirabilit Functions Results. 8
9 As evience, each ISC has been evaluate using the ientifie features for each qualit attribute. The binar input scale is use to etermine the presence of features. Using the propose approach, the most esirable ISC (base on the qualit attributes) is ISC 4 an ISC 7, followe b ISC 2 an ISC 10, an so on. It is important to notice that the evaluation of ISC using this approach is full epenent on the particular scenario at han. In this case stu, the results are base on the parameters configure in Table 2. However, if change to reflect more priorit on ifferent qualit attributes, the results woul var from the ones presente in Table 3. In aition, ifferent applications of the approach can contain numerous features, which make it full customizable for practical applications. These are perhaps the most meaningful contributions from this research; that is, the abilit to full customize an prioritize organization's goals when selecting ISC. This all can be one easil through simple spreasheet calculations. Similar to this case stu, man ifferent organizational-specific parameters can be specifie for the Desirabilit Functions to properl prioritize/evaluate ISC in inustr scenarios. 6. CONCUSION The research presente in this paper evelops an innovative approach for evaluating the qualit of ISC in organizations base on a multiple qualit evaluation criteria. Specificall, it presents a methoolog that uses Desirabilit Functions to create a unifie measurement that represents how well ISC meet qualit attributes an how important the qualit attributes are for the organization. Through a case stu, the approach is proven successful in proviing a wa for measuring the qualit of ISC for specific organizations. There are several important contributions from this research. First, the approach is simple an reail available for implementation using a simple spreasheet. This can promote usage in practical scenarios, where highl complex methoologies for ISC selection are impractical. Secon, the approach fuses multiple evaluation criteria an features to provie a holistic view of the overall ISC qualit. Thir, the approach is easil extene to inclue aitional qualit attributes not consiere within this research. Finall, the approach provies a mechanism to evaluate the qualit of ISC in various omains. B moifing the parameters of the Desirabilit Functions, qualit of ISC can be evaluate b taking consieration of prioritize qualit attributes that are necessar for ifferent organizations. This can be beneficial for cases such as [23], where the approach can be use to assess an help efine information sstems securit policies [23] an controls that are most effective. Overall, the approach presente in this research prove to be a feasible technique for efficientl evaluating the qualit of ISC in organizations. ACKNOWEDGEMENTS The authors woul like to thank the reviewers whose constructive critique greatl improve the qualit of the paper. REFERENCES [1] M. Schwartz, Computer securit: Planning to protect corporate assets, Journal of Business Strateg, vol. 11(1), pp , [2]. Yuan, Companies face sstem attacks from insie, too, Wall Street Journal, pp. B1 (2005, June 15). [3]. Volonino an S. R. Robinson, Principles an Practice of Information Securit. Pearson Prentice Hall, Inc., New Jerse, [4] E. Vaast, Danger is in the ee of the beholers: Social representations of information sstems securit in healthcare, Journal of Strategic Information Sstems, vol. 16(1), pp ,
10 [5] S. Ransbotham an S. Mitra, Choice an chance: A conceptual moel of paths to information securit compromise, Information Sstems Research, vol. 20(1), pp , [6] G. Rotvol, How to create a securit culture in our organization, Information Management Journal, vol. 42(6), pp , [7] T. Herath an H. R. Rao, Encouraging information securit behaviors in organizations: Role of penalties, pressures, an perceive effectiveness, Decision Support Sstems, vol. 47(2), pp , [8]. Barnar an R. Von Solms, A formalize approach to the effective selection an evaluation of information securit controls, Computers & Securit, vol. 19(2), pp , [9] A. Da Veiga an J. H. P. Eloff, An information securit governance framework, Information Sstems Management, vol. 24(4), pp , [10] M. Kara, E. Kiountouzis, an S. Kokolakis, Information sstems securit policies: A contextual perspective, Computer Securit, vol. 24(1), pp , [11] C. Woo, An unappreciate reason wh securit policies fail, Computer Frau an Securit, vol. 10(1), pp , [12] K. och, S. Conger, an E. Oz, Ownership, privac an monitoring in the workplace: A ebate on technolog an ethics, Journal of Business Ethics, vol. 17, pp , [13] G. V. Post an A. Kagan, Evaluating information securit traeoffs: Restricting access can interfere with user tasks, Computers & Securit, vol. 26(3), pp , [14] R. Saint-Germain, Information securit management best practice base on ISO/IEC 17799, The Information Management Journal, vol. August 2005, pp , [15] R. Baskerville an M. Siponen, An information securit meta-polic for emergent organizations, Journal of ogistics Information Management, vol. 15(1), pp , [16] M. E. Whitman, A. M. Towsen, an R. J. Aalberts, Information sstems securit an the nee for polic, in G. Dhillon, Es. Information securit management: Global challenges in the new millennium (pp 9-18). Hershe, PA: Iea Group Publishing (2001). [17] H. Van er Haar an R. Von Solms, A moel for eriving information securit controls attribute profiles, Computers & Securit, vol. 22(3), pp , [18] C. E. Otero, E. Dell, A. Qureshi, an. D. Otero, A qualit-base requirement prioritization framework using binar inputs, In 4th Asia International Conference on Mathematical/Analtical Moeling & Computer Simulation, pp , [19] G. Derringer an R. Suich, Simultaneous optimization of several response variables, Journal of Qualit Technolog, vol. 12(1), pp , [20] D. Montgomer, Design an Analsis of Experiments. John Wile & Sons, Inc., New York, [21] C. E. Otero,. D. Otero, I. Weissberger, an A. Qureshi, A multi-criteria ecision making approach for resource allocation in software engineering, In 12th International Conference on Computer Moeling an Simulation, pp , [22] J. D Arc, A. Hovav, an D. Galletta, User awareness of securit countermeasures an its impact on information sstems misuse: A eterrence approach, Information Sstems Research, vol. 20(1), pp , [23] Wilkinson, K., IT Securit Incients Prompt Nashville, Tenn., to Strengthen Polic, Hire IT Securit Chief, retrieve on August 24,
11 Authors Angel R. Otero was born in 1974 in Baamon, Puerto Rico. He receive his B.S. in Accounting from The Pennslvania State Universit an M.S. in Software Engineering from the Floria Institute of Technolog. Mr. Otero is currentl a Ph.D. stuent at Nova Southeastern Universit's Grauate School of Computer an Information Sciences. Mr. Otero is currentl a Manager in the Floria/Puerto Rico Enterprise Risk Services practice of Deloitte & Touche, P, base in Puerto Rico. He has over 13 ears of inustr experience in the areas of public accounting/auiting, information technolog consulting, an information sstems auiting. Mr. Otero is a Certifie Public Accountant, Certifie Information Sstems Auitor, Certifie Information Technolog Professional, an Certifie Internal Controls Auitor. He is also a member of the American Institute of Certifie Public Accountants, the Information Sstems Auit an Control Association, the Puerto Rico Societ of Certifie Public Accountants, an The Institute for Internal Controls. Dr. Carlos E. Otero was born in 1977 in Baamon, Puerto Rico. He receive his B.S. in Computer Science, M.S. in Software Engineering, M.S. in Sstems Engineering, an Ph.D. in Computer Engineering from the Floria Institute of Technolog, in Melbourne, F. His primar research interests inclue performance evaluation an optimization of sstems an processes in a wie variet of omains (incluing wireless sstems, software engineering, an sstems engineering). He is currentl Assistant Professor in the epartment of Mathematics an Computer Science at the Universit of Virginia s College at Wise, Wise, VA. Previousl, he was ajunct professor in the epartment of Electrical & Computer Engineering at Floria Institute of Technolog. He has over 10 ears of inustr experience in satellite communications sstems, comman & control sstems, wireless securit sstems, an unmanne aerial vehicle sstems. Dr. Otero is an active professional member of the ACM an active senior member of the IEEE. Dr. Abrar Qureshi receive a BS egree in Mathematics from the Universit of the Punjab, a BS in Electrical Engineering from Central Philippines Universit, an a MS an Ph.D. in Computer Engineering from Floria Institute of Technolog. He is currentl Assistant Professor in the epartment of Mathematics an Computer Science at the Universit of Virginia s College at Wise, Wise, VA. Before joining UVa-Wise, he worke in Inustr for more than thirteen ears where he worke on various software engineering projects, software evelopment, atabase esign, sstem/software test an automation, an qualit assurance. His research interests inclue software testing, qualit assurance, an software securit. 11
State of Louisiana Office of Information Technology. Change Management Plan
State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change
Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection
Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University [email protected] Abstract A number of Enterprise Frameworks
Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law
Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC
Data Center Power System Reliability Beyond the 9 s: A Practical Approach
Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical
10.2 Systems of Linear Equations: Matrices
SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix
Professional Level Options Module, Paper P4(SGP)
Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be
The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.
The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina
Achieving quality audio testing for mobile phones
Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing
USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS
Proceeings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, an M. Fu, es. USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Anthony
Rural Development Tools: What Are They and Where Do You Use Them?
Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist [email protected] Juith I. Stallmann
INCOME PROTECTION CLAIMS CLAIM FORM FOR THE SELF EMPLOYED
PENSIONS INvESTMENTS LIFE INSURANCE INCOME PROTECTION CLAIMS CLAIM FORM FOR THE SELF EMPLOYED If ou are an Emploe Person o not complete this form. Please ring our Insurance Broker or Irish Life irectl
! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6
! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,
Modelling and Resolving Software Dependencies
June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software
Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market
RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational
Stock Market Value Prediction Using Neural Networks
Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: [email protected] Hamireza Taremian Engineering
The one-year non-life insurance risk
The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the
y or f (x) to determine their nature.
Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic
How To Segmentate An Insurance Customer In An Insurance Business
International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah
Performance And Analysis Of Risk Assessment Methodologies In Information Security
International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala
Product Differentiation for Software-as-a-Service Providers
University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014
ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory
An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations
This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi
Chapter 9 AIRPORT SYSTEM PLANNING
Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................
DIFFRACTION AND INTERFERENCE
DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe
Firewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
Lecture L25-3D Rigid Body Kinematics
J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional
Differentiability of Exponential Functions
Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone ([email protected]) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an
Software Diversity for Information Security
for Information Security Pei-yu Chen, Gaurav Kataria an Ramayya Krishnan,3 Heinz School, Tepper School an 3 Cylab Carnegie Mellon University Abstract: In this paper we analyze a software iversification-base
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY
FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering
A New Evaluation Measure for Information Retrieval Systems
A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz [email protected] Christian Bauckhage Deutsche Telekom Laboratories [email protected] Jérôme Kunegis [email protected]
Enterprise Resource Planning
Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach
On Adaboost and Optimal Betting Strategies
On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore
A Data Placement Strategy in Scientific Cloud Workflows
A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,
Ch 10. Arithmetic Average Options and Asian Opitons
Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options
A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements
International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,
RUNESTONE, an International Student Collaboration Project
RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department
Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service
DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,
DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES
DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis
Option Pricing for Inventory Management and Control
Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories
This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.
WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the
Calibration of the broad band UV Radiometer
Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure
MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND
art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN
Gender Differences in Educational Attainment: The Case of University Students in England and Wales
Gener Differences in Eucational Attainment: The Case of University Stuents in Englan an Wales ROBERT MCNABB 1, SARMISTHA PAL 1, AND PETER SLOANE 2 ABSTRACT This paper examines the eterminants of gener
MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION
MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the
Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines
EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,
CALCULATION INSTRUCTIONS
Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices
Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)
Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently
INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES
1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical
Unbalanced Power Flow Analysis in a Micro Grid
International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung
Lagrangian and Hamiltonian Mechanics
Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying
Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability
www.corporate-env-strategy.com Sustainability Inex Dow Jones Sustainability Group Inex: A Global Benchmark for Corporate Sustainability Ivo Knoepfel Increasingly investors are iversifying their portfolios
Sustainability Through the Market: Making Markets Work for Everyone q
www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of
Risk Management for Derivatives
Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where
Improving Direct Marketing Profitability with Neural Networks
Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the
Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014
Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,
Search Advertising Based Promotion Strategies for Online Retailers
Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit [email protected] ABSTRACT Web site aresses of small on line retailers are often unknown
Cross-Over Analysis Using T-Tests
Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows
View Synthesis by Image Mapping and Interpolation
View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer
Minimizing Makespan in Flow Shop Scheduling Using a Network Approach
Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie
Digital barrier option contract with exponential random time
IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun
INTRODUCTION TO BEAMS
CHAPTER Structural Steel Design LRFD etho INTRODUCTION TO BEAS Thir Eition A. J. Clark School of Engineering Department of Civil an Environmental Engineering Part II Structural Steel Design an Analsis
Supporting Adaptive Workflows in Advanced Application Environments
Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms
ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters
ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,
Math 230.01, Fall 2012: HW 1 Solutions
Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The
Cost optimization of supply chain with multimodal transport
Proceeings of the Feerate Conference on Computer Science an Information Systems pp. 8 ISB 978-83-6080-5-4 Cost optimization of supply chain with multimoal transport Paweł Sitek Kielce University of Technology
Aon Retiree Health Exchange
2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie
Hybrid Model Predictive Control Applied to Production-Inventory Systems
Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control
An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it
An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the
Web Appendices of Selling to Overcon dent Consumers
Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the
The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management
The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an
Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar
Aalborg Universitet Heat-An-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Publishe in: International Journal of Heat an Mass Transfer
S&P Systematic Global Macro Index (S&P SGMI) Methodology
S&P Systematic Global Macro Inex (S&P SGMI) Methoology May 2014 S&P Dow Jones Inices: Inex Methoology Table of Contents Introuction 3 Overview 3 Highlights 4 The S&P SGMI Methoology 4 Inex Family 5 Inex
JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
Manure Spreader Calibration
Agronomy Facts 68 Manure Spreaer Calibration Manure spreaer calibration is an essential an valuable nutrient management tool for maximizing the efficient use of available manure nutrients. Planne manure
Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition
Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli
Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy
Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions
Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform
Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale
15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications
00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations
Bond Calculator. Spreads (G-spread, T-spread) References and Contact details
Cbons.Ru Lt. irogovskaya nab., 21, St. etersburg hone: +7 (812) 336-97-21 http://www.cbons-group.com Bon Calculator Bon calculator is esigne to calculate analytical parameters use in assessment of bons.
Wage Compression, Employment Restrictions, and Unemployment: The Case of Mauritius
WP/04/205 Wage Compression, Employment Restrictions, an Unemployment: The Case of Mauritius Nathan Porter 2004 International Monetary Fun WP/04/205 IMF Working Paper Finance Department Wage Compression,
A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment
Vol. 6, No., April, 01 A Stud on Intelligent Video Securit Surveillance Sstem with Active Tracking Technolog in Multiple Objects Environment Juhun Park 1, Jeonghun Choi 1, 1, Moungheum Park, Sukwon Hong
Cost Efficient Datacenter Selection for Cloud Services
Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, [email protected] Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services
Safety Stock or Excess Capacity: Trade-offs under Supply Risk
Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain [email protected]
Improving Emulation Throughput for Multi-Project SoC Designs
Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest
