Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Technologies of InSecurity examines how general social and political concerns about terrorism, crime, migration and globalisation are translated into concrete practices of surveillance and securitisation of everyday life. The book is based on contributions from an international panel of leading criminologists, lawyers and surveillance scholars and provides new insights about how broader political issues are translated into concrete and local practices of social control and exclusion.
Internal security --- Security systems --- Security (Psychology) --- Security measures --- Burglary protection --- Emotional insecurity --- Emotional security --- Insecurity (Psychology) --- Psychology, Applied --- Security, Internal --- Insurgency --- Subversive activities
Choose an application
National security. --- Security systems industry --- Security systems industry. --- Security systems. --- Security, International. --- National security --- Security, International --- Security systems --- Service industries --- Security measures --- Burglary protection --- Collective security --- International security --- International relations --- Disarmament --- International organization --- Peace --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- Military policy --- Government policy --- Sécurité --- Sécurité publique --- Sécurité privée --- Aspects criminologiques
Choose an application
Scheduled transportation networks give rise to very complex and large-scale networkoptimization problems requiring innovative solution techniques and ideas from mathematical optimization and theoretical computer science. Examples of scheduled transportation include bus, ferry, airline, and railway networks, with the latter being a prime application domain that provides a fair amount of the most complex and largest instances of such optimization problems. Scheduled transport optimization deals with planning and scheduling problems over several time horizons, and substantial progress has been made for strategic planning and scheduling problems in all transportation domains. This state-of-the-art survey presents the outcome of an open call for contributions asking for either research papers or state-of-the-art survey articles. We received 24 submissions that underwent two rounds of the standard peer-review process, out of which 18 were finally accepted for publication. The volume is organized in four parts: Robustness and Recoverability, Robust Timetabling and Route Planning, Robust Planning Under Scarce Resources, and Online Planning: Delay and Disruption Management.
Robust optimization --- Transportation --- Computer scheduling --- Computer Science --- Telecommunications --- Operations Research --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Civil & Environmental Engineering --- Computer simulation --- Planning --- Mathematical optimization. --- Planning. --- Transportation planning --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Computer science. --- Computer software --- Special purpose computers. --- Computer system failures. --- Computer simulation. --- Combinatorics. --- Quality control. --- Reliability. --- Industrial safety. --- Computer Science. --- Performance and Reliability. --- System Performance and Evaluation. --- Special Purpose and Application-Based Systems. --- Simulation and Modeling. --- Quality Control, Reliability, Safety and Risk. --- Reusability. --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- Accidents --- System safety --- Dependability --- Trustworthiness --- Conduct of life --- Factory management --- Industrial engineering --- Reliability (Engineering) --- Sampling (Statistics) --- Standardization --- Quality assurance --- Quality of products --- Combinatorics --- Algebra --- Mathematical analysis --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Special purpose computers --- Computers --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Software reengineering --- Generic programming (Computer science) --- Informatics --- Science --- Prevention --- Failures --- Maxima and minima --- Operations research --- System analysis --- Operating systems (Computers). --- Computer system performance. --- Software engineering. --- System safety. --- Safety, System --- Safety of systems --- Systems safety --- Industrial safety --- Systems engineering --- Computer software engineering --- Engineering --- Computer operating systems --- Disk operating systems --- Systems software --- Operating systems --- Computer software—Reusability. --- Computers. --- Electronic digital computers—Evaluation. --- Computers, Special purpose. --- Security systems. --- Discrete mathematics. --- Hardware Performance and Reliability. --- Computer Modelling. --- Security Science and Technology. --- Discrete Mathematics. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Security measures --- Burglary protection --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Listing 1 - 3 of 3 |
Sort by
|