3 resultados para security engineering

em BORIS: Bern Open Repository and Information System - Berna - Suiça


Relevância:

30.00% 30.00%

Publicador:

Resumo:

While the WTO agreements do not regulate the use of biotechnology per se, their rules can have a profound impact on the use of the technology for both commercial and non-commercial purposes. This book seeks to identify the challenges to international trade regulation that arise from biotechnology. The contributions examine whether existing international obligations of WTO Members are appropriate to deal with the issues arising for the use of biotechnology and whether there is a need for new international legal instruments, including a potential WTO Agreement on Biotechnology. They combine various perspectives on and topics relating to genetic engineering and trade, including human rights and gender; intellectual property rights; traditional knowledge and access and benefit sharing; food security, trade and agricultural production and food safety; and medical research, cloning and international trade.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present a real-world problem that arises in security threat detection applications. The problem consists of deploying mobile detectors on moving units that follow predefined routes. Examples of such units are buses, coaches, and trolleys. Due to a limited budget not all available units can be equipped with a detector. The goal is to equip a subset of units such that the utility of the resulting coverage is maximized. Existing methods for detector deployment are designed to place detectors in fixed locations and are therefore not applicable to the problem considered here. We formulate the planning problem as a binary linear program and present a coverage heuristic for generating effective deployments in short CPU time. The heuristic has theoretical performance guarantees for important special cases of the problem. The effectiveness of the coverage heuristic is demonstrated in a computational analysis based on 28 instances that we derived from real-world data.