366 resultados para Boyd, Mike


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The new model of North Island Cenozoic palaeogeography developed by Kamp et al. has a range of important implications for the evolution of New Zealand terrestrial taxa over the past 30 Ma. Key aspects include the prolonged isolation of the biota on the North Island landmass from the larger and more diverse greater South Island, and the founding of North Island taxa from the potentially unusual ecosystem of a small island around Northland. The prolonged period of isolation is expected to have generated deep phylogenetic splits within taxa present on both islands, and an important current aim should be to identify such signals in surviving endemics to start building a picture of the historical phylogeography, and inferred ecology of both islands through the Cenozoic. Given the potential differences in founding terrestrial species and climatic conditions, it seems likely that the ecology may have been very diferent between the North and South Islands. New genetic data from the 10 or so species of extinct moa suggest that the radiation of moa was much more recent than previously suggested, and reveals a complex pattern that is inferred to result from the interplay of the Cenozoic biogeography, marine barriers, and glacial cycles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian women make decisions about return to paid work and care for their child within a policy environment that presents mixed messages about maternal employment and child care standards. Against this background an investigation of first-time mothers’ decision-making about workforce participation and child care was undertaken. Four women were studied from pregnancy through the first postnatal year using interview and diary methods. Inductive analyses identified three themes, all focused on dimensions of family security: financial security relating to family income, emotional security relating to child care quality, and pragmatic security relating to child care access. The current policy changes that aim to increase child care quality standards in Australia present a positive step toward alleviating family insecurities but are insufficient to alleviate the evidently high levels of tension between workforce participation and family life experienced by women transitioning back into the workforce in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We review the level of Activity Based Costing (ABC) in Fiji in this article. This exercise is important in furthering our understanding of the use of ABC in Fiji. ABC is a popular costing system and strategic tool for organizations in developed countries (Chenhall and Langfield-Smith 1998). However, little is known about the benefits and challenges of implementing ABC in developing countries. Such an understanding could stimulate discussion on the development or modification of ABC to suit developing country circumstances. The article also has a practical objective in informing and education organizations in Fiji regarding the benefits and challenges of ABC implementation in Fiji and also provides practical suggestions for improving and easing the implementation of ABC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Twitter is a social media service that has managed very successfully to embed itself deeply in the everyday lives of its users. Its short message length (140 characters), and one-way connections (‘following’ rather than ‘friending’) lend themselves effectively to random and regular updates on almost any form of personal or professional activity – and it has found uses from the interpersonal (e.g. boyd et al., 2010) through crisis communication (e.g. Bruns et al., 2012) to political debate (e.g. Burgess & Bruns, 2012). In such uses, Twitter does not necessarily replace existing media channels, such as the broadcast or online offerings of the mainstream media, but often complements them, providing its users with alternative opportunities to contribute more actively to the wider mediasphere. This is true especially where Twitter is used alongside television, as a simple backchannel to live programming or for more sophisticated uses. In this article, we outline four aspects – dimensions – of the way that the ‘old’ medium of television intersects and, in some cases, interacts, with the ‘new’ medium of Twitter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The skyrocketing trend for social media on the Internet greatly alters analytical Customer Relationship Management (CRM). Against this backdrop, the purpose of this paper is to advance the conceptual design of Business Intelligence (BI) systems with data identified from social networks. We develop an integrated social network data model, based on an in-depth analysis of Facebook. The data model can inform the design of data warehouses in order to offer new opportunities for CRM analyses, leading to a more consistent and richer picture of customers? characteristics, needs, wants, and demands. Four major contributions are offered. First, Social CRM and Social BI are introduced as emerging fields of research. Second, we develop a conceptual data model to identify and systematize the data available on online social networks. Third, based on the identified data, we design a multidimensional data model as an early contribution to the conceptual design of Social BI systems and demonstrate its application by developing management reports in a retail scenario. Fourth, intellectual challenges for advancing Social CRM and Social BI are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Timed-release cryptography addresses the problem of “sending messages into the future”: information is encrypted so that it can only be decrypted after a certain amount of time, either (a) with the help of a trusted third party time server, or (b) after a party performs the required number of sequential operations. We generalise the latter case to what we call effort-release public key encryption (ER-PKE), where only the party holding the private key corresponding to the public key can decrypt, and only after performing a certain amount of computation which may or may not be parallelisable. Effort-release PKE generalises both the sequential-operation-based timed-release encryption of Rivest, Shamir, and Wagner, and also the encapsulated key escrow techniques of Bellare and Goldwasser. We give a generic construction for ER-PKE based on the use of moderately hard computational problems called puzzles. Our approach extends the KEM/DEM framework for public key encryption by introducing a difficulty notion for KEMs which results in effort-release PKE. When the puzzle used in our generic construction is non-parallelisable, we recover timed-release cryptography, with the addition that only the designated receiver (in the public key setting) can decrypt.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Alternative fuels and injection technologies are a necessary component of particulate emission reduction strategies for compression ignition engines. Consequently, this study undertakes a physicochemical characterization of diesel particulate matter (DPM) for engines equipped with alternative injection technologies (direct injection and common rail) and alternative fuels (ultra low sulfur diesel, a 20% biodiesel blend, and a synthetic diesel). Particle physical properties were addressed by measuring particle number size distributions, and particle chemical properties were addressed by measuring polycyclic aromatic hydrocarbons (PAHs) and reactive oxygen species (ROS). Particle volatility was determined by passing the polydisperse size distribution through a thermodenuder set to 300 °C. The results from this study, conducted over a four point test cycle, showed that both fuel type and injection technology have an impact on particle emissions, but injection technology was the more important factor. Significant particle number emission (54%–84%) reductions were achieved at half load operation (1% increase–43% decrease at full load) with the common rail injection system; however, the particles had a significantly higher PAH fraction (by a factor of 2 to 4) and ROS concentrations (by a factor of 6 to 16) both expressed on a test-cycle averaged basis. The results of this study have significant implications for the health effects of DPM emissions from both direct injection and common rail engines utilizing various alternative fuels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

APPENDIX A : PAVEMENT QUALITY (Zhanmin Zhang, Michael R. Murphy, Robert Harrison), 7 pages -- APPENDIX B : BRIDGE QUALITY (Jose Weissmann, Angela J. Weissmann), 6 pages -- APPENDIX C : URBAN TRAFFIC CONGESTION (Tim Lomax, David Schrank), 32 pages -- APPENDIX D: RURAL CORRIDORS (Tim Lomax, David Schrank), 6 pages -- APPENDIX E: ADDITIONAL REVENUE SOURCE OPTIONS FOR PAVEMENT AND BRIDGE MAINTENANCE (Mike Murphy, Seokho Chi, Randy Machemehl, Khali Persad, Robert Harrison, Zhanmin Zhang), 81 pages -- APPENDIX F: FUNDING TRANSPORTATION IMPROVEMENTS (David Ellis, Brianne Glover, Nick Norboge, Wally Crittenden), 19 pages -- APPENDIX G: ESTIMATING VEHICLE OPERATING COSTS AND PAVEMENT DETERIORATION (by Robert Harrison), 4 pages

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research team recognized the value of network-level Falling Weight Deflectometer (FWD) testing to evaluate the structural condition trends of flexible pavements. However, practical limitations due to the cost of testing, traffic control and safety concerns and the ability to test a large network may discourage some agencies from conducting the network-level FWD testing. For this reason, the surrogate measure of the Structural Condition Index (SCI) is suggested for use. The main purpose of the research presented in this paper is to investigate data mining strategies and to develop a prediction method of the structural condition trends for network-level applications which does not require FWD testing. The research team first evaluated the existing and historical pavement condition, distress, ride, traffic and other data attributes in the Texas Department of Transportation (TxDOT) Pavement Maintenance Information System (PMIS), applied data mining strategies to the data, discovered useful patterns and knowledge for SCI value prediction, and finally provided a reasonable measure of pavement structural condition which is correlated to the SCI. To evaluate the performance of the developed prediction approach, a case study was conducted using the SCI data calculated from the FWD data collected on flexible pavements over a 5-year period (2005 – 09) from 354 PMIS sections representing 37 pavement sections on the Texas highway system. The preliminary study results showed that the proposed approach can be used as a supportive pavement structural index in the event when FWD deflection data is not available and help pavement managers identify the timing and appropriate treatment level of preventive maintenance activities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Previous research suggested that due to the uncertainties surrounding the venture creation process, planning activities may be more valuable for already operating firms than for emerging ventures (McGrath and MacMillan, 1995). Business planning may serve different purposes during the early stages of the venture development process. Early planning during the nascent stage may be used to marshal the resources toward the achievement of preliminary goals (Locke and Latham, 2000), to gain external legitimization and funding (Karlssson & Honig, 2009; Stinchcombe, 1965). Planning may reduce the risk of future failure by facilitating the decision making process of launching -or not- the venture (Chwolka & Raith, 2011) by analysing the opportunity and its market potential (Boyd, 1991; Delmar & Shane, 2003). In later stages, planning may have a more internal role and may act as a strategic implementation tool (Brews & Hunt, 1999). However, if the reasons why ventures should engage (Frese, 2009) –or not- (Honig, 2004) in business planning have been investigated quite extensively (Brinckmann et al., 2010), how business plans are actually used over time by new ventures at different stages of their development and how these uses impact the performance of the firms are still unclear.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to the regulations and laws that require data and operations to reside in specific geographic locations. Thus, data owners may need to ensure that their cloud providers do not compromise the SLA contract and move their data into another geographic location. This paper introduces an architecture for a new approach for geographic location assurance, which combines the proof of storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. This architecture aims to achieve better security and more flexible geographic assurance within the environment of cloud computing.