1,416 research outputs found

    A Bargaining Power Theory of Gap-Filling

    Full text link

    Washington University Record, July 15, 2005

    Get PDF
    https://digitalcommons.wustl.edu/record/2041/thumbnail.jp

    The Accelerator, Volume 8 Issue 15, Summer 2015

    Get PDF

    Philadelphia\u27s Water Supply: How Human Capital and Collaboration Can Overcome Significant Man-Made Challenges

    Get PDF
    This paper focuses on the Philadelphia, Pennsylvania water supply – past, present, and future – and makes the case that stakeholder collaboration is essential to preserve and enhance this important resource. I argue that without proper planning and funding allocations, the water supply of Philadelphia could be compromised, and by 2050 Philadelphians could learn that an inexpensive, seemingly endless supply of water is substantially diminished. Public awareness is critical as Philadelphia and the United States are both likely to move into an era of water scarcity and onerous water pricing models. The more stakeholders work together to prepare for future strains on their key natural resource, the better the quality of life will be for people and for the other inhabitants of our natural world

    Handbook of Computational Intelligence in Manufacturing and Production Management

    Get PDF
    Artificial intelligence (AI) is simply a way of providing a computer or a machine to think intelligently like human beings. Since human intelligence is a complex abstraction, scientists have only recently began to understand and make certain assumptions on how people think and to apply these assumptions in order to design AI programs. It is a vast knowledge base discipline that covers reasoning, machine learning, planning, intelligent search, and perception building. Traditional AI had the limitations to meet the increasing demand of search, optimization, and machine learning in the areas of large, biological, and commercial database information systems and management of factory automation for different industries such as power, automobile, aerospace, and chemical plants. The drawbacks of classical AI became more pronounced due to successive failures of the decade long Japanese project on fifth generation computing machines. The limitation of traditional AI gave rise to development of new computational methods in various applications of engineering and management problems. As a result, these computational techniques emerged as a new discipline called computational intelligence (CI)

    Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences

    Full text link
    In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages. Listing abstract compressed from version appearing in repor
    • …
    corecore