Zobrazeno 1 - 10
of 61
pro vyhledávání: '"James Pita"'
Publikováno v:
Improving Homeland Security Decisions
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bf98d89dc839c1ddf1f9210fda9b67b
https://doi.org/10.1017/9781316676714.024
https://doi.org/10.1017/9781316676714.024
Publikováno v:
User's Guide for the Total Force Blue-Line (TFBL) Model
This user's guide describes the nature of the manned pilot management problem, the analytic capabilities the U.S. Air Force has to cope with it, and how the Total Force Blue-Line model helps the Air Force manage all rated personnel across the Total F
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b4477fda5cac0d43f19ae374940ea43a
https://doi.org/10.7249/tl233
https://doi.org/10.7249/tl233
Publikováno v:
Revista Cubana de Estomatología, Vol 50, Iss 1, Pp 119-124 (2013)
El papel de la mujer en la Cirugía Maxilofacial es valioso, y más aún el de la doctora Ana Larralde Pineda, primera cirujana maxilofacial de Cuba. Con este trabajo nos hemos propuesto resaltar la figura de esta ejemplar profesional y transmitir, s
Autor:
Mark A. Lorell, James Pita
Publikováno v:
A Review of Selected International Aircraft Spares Pooling Programs: Lessons Learned for F-35 Spares Pooling
The F-35 Joint Strike Fighter (JSF) is a fifth-generation stealth fighter whose system development was shared by nine countries: the United States (for which the F-35 is being jointly procured by the U.S. Air Force [USAF], U.S. Navy [USN], and U.S. M
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::226e169ee30560ce038c40fa31679388
https://doi.org/10.7249/rr999
https://doi.org/10.7249/rr999
Publikováno v:
ACM SIGecom Exchanges. 10:31-34
We provide an overview of two recent applications of security games. We describe new features and challenges introduced in the new applications.
Autor:
Jason Tsai, James Pita, Fernando Ordóòez, Milind Tambe, Christopher Kiekintveld, Manish Jain, Shyamsunder Rathi
Publikováno v:
INTERFACES
Artículos CONICYT
CONICYT Chile
instacron:CONICYT
Artículos CONICYT
CONICYT Chile
instacron:CONICYT
The increasing threat of terrorism makes security at major locations of economic or political importance a major concern. Limited security resources prevent complete security coverage, allowing adversaries to observe and exploit patterns in patrollin
Autor:
Jason Tsai, Manish Jain, James Pita, Harish Bellamane, Milind Tambe, Fernando Ordóñez, Christopher Kiekintveld
Publikováno v:
ACM SIGecom Exchanges. 8:1-4
Game theory has played an important role in security decisions. Recent work using Stackelberg games [Fudenberg and Tirole 1991] to model security domains has been particularly influential [Basilico et al. 2009; Kiekintveld et al. 2009; Paruchuri et a
Publikováno v:
Revista Cubana de Estomatología, Vol 46, Iss 3, Pp 62-69 (2009)
El mixoma odontogénico se considera una neoplasia benigna, poco frecuente, de consistencia firme y gelatinosa, de crecimiento lento con potencial infiltrativo que produce expansión de la cortical con extensa destrucción ósea y alto índice de rec
Publikováno v:
Revista Cubana de Estomatología, Vol 50, Iss 1, Pp 137-139 (2013)