Search
Now showing items 1-2 of 2
Validating android permission requests by analyzing APP descriptions
(2016-07)
Android applications can access sensitive user data if they are granted certain permissions. Android security model gives users the responsibility to approve permission requests of applications. For this, a user needs to ...
A healthcare inventory problem with both reliable and unreliable supply channels
(2016-05)
In this study, we investigate the inventory review policy for a healthcare facility to minimize the impact of inevitable drug shortages when an alternative reliable supplier is present. A continuous-time stochastic process ...
Share this page