Search results
-
-
Title
-
PRICING STRATEGIES FOR ONLINE MULTIPLAYER GAMES
-
Author
-
Parker, Neal
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology, Business
-
Description
-
This dissertation examines the different pricing strategies available to online multiplayer game publishers. We develop mathematical models of the pricing decision that the publisher engages in and conduct a numerical experiment to identify critic...
-
-
Title
-
Development of a multi-layered botmaster based analysis framework
-
Author
-
Paxton, Napoleon
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Botnets are networks of compromised machines called bots that come together to form the tool of choice for hackers in the exploitation and destruction of computer networks. Most malicious botnets have the ability to be rented out to a broad range ...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Assured Information Sharing for Ad-hoc Collaboration
-
Author
-
Jin, Jing
-
Date Created
-
2009
-
Subjects--Topical
-
Computer engineering, Information technology
-
Description
-
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping wi...
-
-
Title
-
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
-
Author
-
Rauf, Usman
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Information science
-
Description
-
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...
-
-
Title
-
FLEXIBLE PLANNING METHODS AND PROCEDURES WITH FLEXIBILITY REQUIREMENTS PROFILE
-
Author
-
Demirel, Edil
-
Date Created
-
2014
-
Subjects--Topical
-
Industrial engineering, Operations research
-
Description
-
Uncertainties in supply and/or demand combined with rolling horizon planning necessitate flexibility in a dynamic production planning process. In rolling horizon planning, production plans are revised when new information becomes available after t...
-
-
Title
-
Essays on Exploitation and Exploration in Software Development
-
Author
-
Temizkan, Orcun
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology, Business, Information science
-
Description
-
Software development includes two types of activities: software improvement activities by correcting faults and software enhancement activities by adding new features. Based on organizational theory, we propose that these activities can be classif...
-
-
Title
-
Optimal purchasing strategy for bandwidth: A buyer's perspective
-
Author
-
Vergara, Frances
-
Date Created
-
2009
-
Subjects--Topical
-
Computer science, Business
-
Description
-
In today's burgeoning business environments, data frenetically pulses through massive interconnected networks as firms create, compile, and disseminate vast amounts of information. Organizations need to acquire the bandwidth that allows them to ef...
-
-
Title
-
Stochastic and fuzzy flexible aggregate production planning to manage plan stability
-
Author
-
Torabzadeh, Setareh
-
Date Created
-
2020
-
Subjects--Topical
-
Operations research
-
Description
-
Aggregate production planning generally deals with configuration of an aggregate plan in advance of 6 to 18 periods (e.g. months) to give the organizations an idea about the amount of invested money, utilized capacity, required inventory and any o...
-
-
Title
-
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
-
Author
-
Xu, Wenjuan
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
Determining whether a given policy meets a site's high-level security goals has been a challenging task, due to the low-level nature and complexity of the policy language, various security requirements and the multiple policy violation patterns. I...
-
-
Title
-
The Incentives and Effects of Unnecessary Emergency Ambulance Transport
-
Author
-
Deziel, Jackson
-
Date Created
-
2015
-
Subjects--Topical
-
Economics, Medical sciences
-
Description
-
In the EMS field, the problem of low-acuity, non-emergency individuals who summon an emergency ambulance for simple transport to a local hospital is ever-present. Any person may summon an emergency ambulance and receive transport for the most mino...
-
-
Title
-
THE DESIGN AND IMPLEMENTATION OF FUZZY QUERY PROCESSING ON SENSOR NETWORKS
-
Author
-
Doman, Marguerite
-
Date Created
-
2009
-
Subjects--Topical
-
Computer science
-
Description
-
Sensor nodes and Wireless Sensor Networks (WSN) enable observation of the physical world in unprecedented levels of granularity. A growing number of environmental monitoring applications are being designed to leverage data collection features of W...
-
-
Title
-
User Centric Policy Management
-
Author
-
Cheek, Gorrell
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect...