You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
By exploring manifestations of normative and non-normative thinking in the geopolitical and cultural contexts of Early Modern Italy, Spain, and the American colonies, this volume hopes to encourage interdisciplinary discussions on the early modern notions of reason and unreason, good and evil, justice and injustice, center and periphery, freedom and containment, self and other.
Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world.
Essays in this volume deal with the historical, linguistic, and ideological legacy of the Spanish Empire and its language in the New World.
None
How maturing digital media and network technologies are transforming place, culture, politics, and infrastructure in our everyday life. Digital media and network technologies are now part of everyday life. The Internet has become the backbone of communication, commerce, and media; the ubiquitous mobile phone connects us with others as it removes us from any stable sense of location. Networked Publics examines the ways that the social and cultural shifts created by these technologies have transformed our relationships to (and definitions of) place, culture, politics, and infrastructure. Four chapters—each by an interdisciplinary team of scholars using collaborative software—provide a syno...
In a world with highly competitive markets and economic instability due to capitalization, industrial competition has increasingly intensified. In order for many industries to survive and succeed, they need to develop highly effective coordination between supply chain partners, dynamic collaborative and strategic alliance relationships, and efficient logistics and supply chain network designs. Consequently, in the past decade, there has been an explosion of interest among academic researchers and industrial practitioners in innovative supply chain and logistics models, algorithms, and coordination policies. Mathematically distinct from classical supply chain management, this emerging research area has been proven to be useful and applicable to a wide variety of industries. This book brings together recent advances in supply chain and logistics research and computational optimization that apply to a collaborative environment in the enterprise.
What are the risks of terrorism and what are their consequences and economic impacts? Are we safer from terrorism today than before 9/11? Does the government spend our homeland security funds well? These questions motivated a twelve-year research program of the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California, funded by the Department of Homeland Security. This book showcases some of the most important results of this research and offers key insights on how to address the most important security problems of our time. Written for homeland security researchers and practitioners, this book covers a wide range of methodologies and real-world examples of how to reduce terrorism risks, increase the efficient use of homeland security resources, and thereby make better decisions overall.
GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities o...
This book provides a straightforward overview for every researcher interested in stochastic dynamic vehicle routing problems (SDVRPs). The book is written for both the applied researcher looking for suitable solution approaches for particular problems as well as for the theoretical researcher looking for effective and efficient methods of stochastic dynamic optimization and approximate dynamic programming (ADP). To this end, the book contains two parts. In the first part, the general methodology required for modeling and approaching SDVRPs is presented. It presents adapted and new, general anticipatory methods of ADP tailored to the needs of dynamic vehicle routing. Since stochastic dynamic ...
This book deals with an often-neglected feature of location problems, namely uncertainty, by combining two related fields: location theory and optimization. Written by leading researchers and practitioners in these fields, each chapter examines one aspect of the location process in different contexts, such as supply chains; location decisions under congestion; disaster management; design of resilient facilities; uncertainty in the health sector; and facility location in the retail sector under uncertainty. The book also addresses methodological aspects, such as chance-constrained approaches, heuristic algorithms, scenario approaches, and simulation. As such, it provides decision-makers with essential methods, tools and approaches to help them deal with these uncertainties. It is mainly intended for graduate students in the fields of operations research and logistics, as well as professionals in logistics and supply chain management.