Now showing items 1-4 of 4
Workflow pattern mining using e-mail communications
The objective of this work is to utilize the abundant "unstructured" information and convert it into a logical and structured representation. This not only results in useful data representation to discover hidden patterns ...
Network-based risk mitigation and resource evaluation in the transportation of hazardous materials and terrorist threat
The expanse of U.S. transportation systems has helped to facilitate persistent national economic growth, its ease of access and reliability vital to the plethora of users who utilize daily the established infrastructure. ...
Location-covering models: Nodal and path demand, multiple-type facilities, unavailability of servers
The dissertation develops location-covering models considering nodal and path demand, multiple-type facilities, and unavailability of servers. The first part concentrates on the systems with demand originating from nodes ...
Optimization and resource allocation models in an aviation security system
The dissertation concentrates on some key optimization and resource allocation models in an aviation security system. It consists of four parts. The first part discusses a model for security in the area prior to the ...