Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment
暂无分享,去创建一个
[1] Jennifer E. Lake,et al. Border Security: Inspections Practices, Policies, and Issues , 2004 .
[2] Sam Chiu,et al. Detecting Nuclear Material in International Container Shipping : Criteria for Secure Systems , 2004 .
[3] Ingram Olkin,et al. A General Approach to Some Screening and Classification Problems , 1968 .
[4] Stefan Voß,et al. Container terminal operation and operations research - a classification and literature review , 2004, OR Spectr..
[5] James L. McClelland. On the time relations of mental processes: An examination of systems of processes in cascade. , 1979 .
[6] Susan E. Martonosi,et al. How Effective Is Security Screening of Airline Passengers? , 2006, Interfaces.
[7] Richard Lugar,et al. Lugar Survey on Proliferation Threats and Responses , 2005 .
[8] Stephen L. Caldwell. Maritime Security: Observations on Selected Aspects of the SAFE Port Act, Statement of Stephen L. Caldwell, Director Homeland Security and Justice, Testimony before the Subcommittee on Border, Maritime, and Global Counterterrorism; Committee on Homeland Security; House of Representatives , 2007 .
[9] Noah Gans,et al. Estimating the Operational Impact of Container Inspections at International Ports , 2010, Manag. Sci..
[10] Wallace J. Hopp,et al. Operations Systems with Discretionary Task Completion , 2006, Manag. Sci..
[11] Christopher Conrad,et al. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices , 2008 .
[12] Jun Zhuang,et al. Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..
[13] Lawrence M Wein,et al. Preventing the importation of illicit nuclear materials in shipping containers. , 2006, Risk analysis : an official publication of the Society for Risk Analysis.
[14] Hau L. Lee,et al. Higher supply chain security with lower cost: Lessons from total quality management , 2005 .
[16] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[17] Wayne A. Wickelgren,et al. Speed-accuracy tradeoff and information processing dynamics , 1977 .
[18] Jon M. Huntsman,et al. Wharton Risk Management and Decision Processes Center , 2002 .
[19] Leigh B Boske,et al. Port and Supply-Chain Security Initiatives in the United States and Abroad , 2006 .
[20] Право. SAFE Port Act , 2010 .
[21] W. Whitt. Uniform conditional stochastic order , 1980 .
[22] Zheng Cao,et al. The Optimal Spatiotemporal Deployment of Radiation Portal Monitors Can Improve Nuclear Detection at Overseas Ports , 2007 .
[23] Susan E. Martonosi,et al. Evaluating the Viability of 100 Per Cent Container Inspection at America's Ports , 2005 .
[24] Michael D. Greenberg,et al. Maritime Terrorism: Risk and Liability , 2006 .
[25] Edieal J. Pinker. An Analysis of Short-Term Responses to Threats of Terrorism , 2007, Manag. Sci..
[26] Edieal J. Pinker,et al. Gatekeepers and Referrals in Services , 2003, Manag. Sci..
[27] Brian Tomlin,et al. On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks , 2006, Manag. Sci..
[28] Germaine H. Saad,et al. Managing Disruption Risks in Supply Chains , 2005 .
[29] K. M. Ghylina,et al. Two-component model of security inspection : application and findings , 2006 .
[30] H. Kunreuther,et al. Third‐Party Inspection as an Alternative to Command and Control Regulation , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[31] Richard M. Stana. Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection Statement of , 2004 .
[32] Robin,et al. World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism , 2008 .
[33] Eitan Altman,et al. A survey on networking games in telecommunications , 2006, Comput. Oper. Res..
[34] Angela Greiling Keane. Where's the incentive? , 2005 .
[35] Moshe Shaked,et al. Stochastic orders and their applications , 1994 .
[36] U. Beck. WORLD AT RISK , 2008 .
[37] Ronald W. Wolff,et al. Stochastic Modeling and the Theory of Queues , 1989 .