Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Minimum-Cost First-Push-Then-Pull Gossip Algorithm

Publication
November 01, 2011
… Minimum-Cost First-Push-Then-Pull Gossip Algorithm Ali Saidi Mojdeh Mohtashemi In this paper, we study the communication overhead of gossip-based information dissemination … becomes more efficient in the later rounds. Therefore, a cost-efficient gossip algorithm needs to combine the advantages of push and pull algorithms. One possible approach is to begin with … Gossip Algorithm Ali Saidi Advanced Infrastructure Design Hamilton, NJ, USA asaidi@aidpe.com Mojdeh Mohtashemi MITRE Corp., McLean, VA, USA MIT CSAIL, Cambridge, MA, USA mojdeh@mitre.org …

Why Use a Safety Management System?

Publication
April 29, 2022
… with significant public safety responsibilities have adopted formal risk management approaches to continually improve safety. The Safety Management System (SMS), a proven systematic approach … is foundational to SMS. It features accountability for one’s actions and offers an environment in which individuals report errors or close calls without fear of reprimand. Real-world benefits … makers and distributors to product manufacturers, operators, and regulators. To learn more, contact safetymanagement@mitre.org. Who benefits from SMS? • Transportation • Healthcare • …

System of Systems Engineering

Fact Sheet
January 09, 2024
… System of Systems Engineering MITRE works with sponsors to research, design, and deploy complex systems of systems for the 21 st century. In today’s heavily networked world, many systems must function as part of larger systems of … uncertainty, and complexity. For information about MITRE’s work in Systems Engineering, contact systemsengineering@mitre.org. For more information about MITRE, visit www.mitre.org. …

Epidemiology

Fact Sheet
June 13, 2024
… when, and how of disease and health-related factors. They apply their epidemiologic expertise in the fields of infectious and chronic diseases, behavioral and environmental health, public health policy and informatics, and emergency preparedness and response to solve the most complex population and public health problems. The special relationship MITRE … across and within populations. For more information about MITRE’s work in Epidemiology, contact the Public Health Division publichealth@mitre.org. © 2024 MITRE #19-1242 5-21-2024 … …

MITRE’s Horizon Strategy: Innovation for Science & Technology

Fact Sheet
September 05, 2024
… Innovation for Science & Technology MITRE’s Horizon Strategy Framework provides a structure to help shape public-private cooperation and improve technology governance across the U.S. innovation market’s stakeholders. The nation’s current innovation model falls short in the face of today’s technology needs and global market competition. The U.S. research and … For more information about partnering with MITRE on these and other areas of interest, contact labs@mitre.org. mitre.org http://www.mitre.org …

How Do You Assess Your Organization's Cyber Threat Level?

Publication
August 01, 2010
… organization calibrates its cyber security measures, as well as its cyber security governance, to its cyber threat. Cyber Prep characterizes the cyber threat in terms of an adversary's level … and Emergency Management: Vol. 7, Issue 1, Article 22, 2010, available at http://www.bepress.com/jhsem/vol7/iss1/22 [13] Verizon Business RISK Team, 2009 Data Breach Investigations Report, … world with limited cyber presence b. Group which primarily engages in criminal activity online 4. Nation-state a. Nation-state with moderate ability to act within a geographic area , …

An Integration Framework for Airport Automation Systems

Publication
July 01, 2001
… them. However, those systems were often developed by different vendors and were not designed to be interoperable. When an airport embarks on systems integration to automate the information … and low cost operators, together with airport privatization and acquisition, is resulting in a far more competitive environment between airports. Operational efficiency needs to be taken …

Digital Silk Road Peace: Subsea Cable Connections to the ICT

Publication
May 02, 2024
… Digital Silk Road Peace: Subsea Cable Connections to the ICT Nancy Ross Maggie Vencill Subsea cables along the Digital Silk Road advance the … CLS vs. City PoP 4MAY 2024 DIGITAL SILK ROAD PEACE: SUBSEA CABLE CONNECTIONS TO THE ICT users online. Global connectivity, driven by OTTs, requires multiple terrestrial options to connect to … TO THE ICT Additional Undersea Cable Resources Submarine Networks: www.submarinenetworks.com Submarine Cable Maps: www.submarinecablemap.com Infrapedia Global Internet Infrastructure …

Cyber Security Governance

Publication
November 01, 2010
… is a conceptual framework, together with a practical methodology, which an organization uses to define and implement its strategy for addressing adversarial threats related to its dependence … security staff in ICT supplier organizations. (Identify ICT supplier organizations, points of contact, and any organizational policies or procedures for sharing security information.) Allied … 2007 http://www.mitre.org/work/tech_papers/2010/09_4656/09_4656.pdf http://skillport.books24x7.com/viewer.asp?bkid=30867&destid=0#0 http://www.itgi.org/ …

Person-Centric Identity Management: Rapidly Assimilating Data About a Person of Interest

Publication
January 27, 2017
… Management: Rapidly Assimilating Data About a Person of Interest Recent terrorist attacks in the United States and around the world clearly illustrate the need for the rapid assimilation … illustrate the need for the rapid assimilation of data surrounding the perpetrators, both to verify and confirm the identities of perpetrators as well as potentially to expand the … For further ideas about applying the guidance in this paper to your agency’s particular needs, contact federaltransition@ mitre.org. … Recent terrorist attacks in the United States and around …
  • First page
  • Previous page
  • …
  • Page 105
  • Page 106
  • Page 107
  • Page 108
  • Current page 109
  • Page 110
  • Page 111
  • Page 112
  • Page 113
  • …
  • Next page
  • Last page
Displaying 1081 - 1090 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links