59 resultados para limited resource
Resumo:
Evidence of sustainability, or the potential to achieve this, is increasingly a pre-requisite for OER activity, whether imposed by funders, by institutions requiring a 'business case' for OER, or practitioners themselves - academics, educational technologists and librarians, concerned about how to justify engagement with a unfamiliar, and unproven practices, in today's climate of limited resource. However, it is not clear what is meant by 'sustainability' in relation to OER, what will be needed to achieve or demonstrate this, nor who the expectation of sustainability relates to. This paper draws on experiences of UK OER projects to identify aspirations that those involved in delivering OER activity have for OER sustainability ¿ what a 'manifesto' for OER sustainability beyond project funding, based on OER use, might look like.
Resumo:
RESUM L’aigua és un recurs limitat necessari per a l’establiment de qualsevol forma de vida sobre la Terra. Aquest recurs, es veu regit pel cicle hidrològic i durant les diferents fases del seu cicle, l’aigua pot ser captada per ser aprofitada per l’ésser humà. En els darrers anys, la necessitat d’aigua per a la població ha estat incrementada provocant un impacte negatiu sobre aquest recurs. Per aquest motiu sorgeix la necessitat de crear polítiques globals per protegir l’aigua que vagin encaminades a minimitzar l’efecte negatiu provocat per l’home. Tota captació d’aigua destinada al consum humà ha de garantir uns paràmetres de qualitat i per tal de poder aconseguir aquest objectiu amb eficàcia és imprescindible l’aplicació d’una eina legal molt important: els perímetres de protecció. A l’article 6 de la Llei de policia i protecció de les aigües del 31 de juliol del 1985, s’estableix que tota captació d’aigua potable haurà de quedar aïllada mitjançant un perímetre de protecció, a l’interior del qual no podrà dur-se a terme cap activitat sense prèvia autorització de Govern. Els objectius principals d’aquest estudi son recopilar la informació existent en referència a les captacions d’aigua i els seus respectius perímetres de protecció, elaborar una base de dades que pugui contenir tota la informació existent i elaborar cartografia especifica amb la finalitat de realitzar una diagnosi de la situació actual de les captacions i perímetres associats i identificar els principals riscos potencials existents en aquestes àrees. Entre les conclusions mes rellevants obtingudes amb aquest treball, cal destacar que s’ha constatat que algunes activitats antròpiques potencialment contaminants es troben situades en zones properes a les captacions destinades a consum humà, inclòs dins dels seus perímetres de protecció, amb el conseqüent risc que aquesta situació comporta.
Resumo:
RESUM L’aigua és un recurs limitat necessari per a l’establiment de qualsevol forma de vida sobre la Terra. Aquest recurs, es veu regit pel cicle hidrològic i durant les diferents fases del seu cicle, l’aigua pot ser captada per ser aprofitada per l’ésser humà. En els darrers anys, la necessitat d’aigua per a la població ha estat incrementada provocant un impacte negatiu sobre aquest recurs. Per aquest motiu sorgeix la necessitat de crear polítiques globals per protegir l’aigua que vagin encaminades a minimitzar l’efecte negatiu provocat per l’home. Tota captació d’aigua destinada al consum humà ha de garantir uns paràmetres de qualitat i per tal de poder aconseguir aquest objectiu amb eficàcia és imprescindible l’aplicació d’una eina legal molt important: els perímetres de protecció. A l’article 6 de la Llei de policia i protecció de les aigües del 31 de juliol del 1985, s’estableix que tota captació d’aigua potable haurà de quedar aïllada mitjançant un perímetre de protecció, a l’interior del qual no podrà dur-se a terme cap activitat sense prèvia autorització de Govern. Els objectius principals d’aquest estudi son recopilar la informació existent en referència a les captacions d’aigua i els seus respectius perímetres de protecció, elaborar una base de dades que pugui contenir tota la informació existent i elaborar cartografia especifica amb la finalitat de realitzar una diagnosi de la situació actual de les captacions i perímetres associats i identificar els principals riscos potencials existents en aquestes àrees. Entre les conclusions mes rellevants obtingudes amb aquest treball, cal destacar que s’ha constatat que algunes activitats antròpiques potencialment contaminants es troben situades en zones properes a les captacions destinades a consum humà, inclòs dins dels seus perímetres de protecció, amb el conseqüent risc que aquesta situació comporta.
Resumo:
Nowadays, service providers in the Cloud offer complex services ready to be used as it was a commodity like water or electricity to their customers with any other extra effort for them. However, providing these services implies a high management effort which requires a lot of human interaction. Furthermore, an efficient resource management mechanism considering only provider's resources is, though necessary, not enough, because the provider's profit is limited by the amount of resources it owns. Dynamically outsourcing resources to other providers in response to demand variation avoids this problem and makes the provider to get more profit. A key technology for achieving these goals is virtualization which facilitates provider's management and provides on-demand virtual environments, which are isolated and consolidated in order to achieve a better utilization of the provider's resources. Nevertheless, dealing with some virtualization capabilities implies an effort for the user in order to take benefit from them. In order to avoid this problem, we are contributing the research community with a virtualized environment manager which aims to provide virtual machines that fulfils with the user requirements. Another challenge is sharing resources among different federated Cloud providers while exploiting the features of virtualization in a new approach for facilitating providers' management. This project aims for reducing provider's costs and at the same time fulfilling the quality of service agreed with the customers while maximizing the provider's revenue. It considers resource management at several layers, namely locally to each node in the provider, among different nodes in the provider, and among different federated providers. This latter layer supports the novel capabilities of outsourcing when the local resources are not enough to fulfil the users demand, and offering resources to other providers when the local resources are underused.
Resumo:
This paper analyzes the employment relationship on the basis of the notion of access. We argue that the degree of access provided by a job is an incentive to activate the employee’s self-actualization needs. We investigate the effect of access on the workers’ performance through an agency model and provide a number of propositions with practical implications for personnel policies. Our results are consistent with the intuition emerged from the real business practice as well as with many of the arguments on the substitutive role between monetary and non-monetary incentives frequently reported in the literature.
Resumo:
We study a simple model of assigning indivisible objects (e.g., houses, jobs, offices, etc.) to agents. Each agent receives at most one object and monetary compensations are not possible. We completely describe all rules satisfying efficiency and resource-monotonicity. The characterized rules assign the objects in a sequence of steps such that at each step there is either a dictator or two agents "trade" objects from their hierarchically specified "endowments."
Resumo:
It is common to find in experimental data persistent oscillations in the aggregate outcomes and high levels of heterogeneity in individual behavior. Furthermore, it is not unusual to find significant deviations from aggregate Nash equilibrium predictions. In this paper, we employ an evolutionary model with boundedly rational agents to explain these findings. We use data from common property resource experiments (Casari and Plott, 2003). Instead of positing individual-specific utility functions, we model decision makers as selfish and identical. Agent interaction is simulated using an individual learning genetic algorithm, where agents have constraints in their working memory, a limited ability to maximize, and experiment with new strategies. We show that the model replicates most of the patterns that can be found in common property resource experiments.
Resumo:
In this article we investigate the reforms of human resource management in the European Commission and the OECD by analyzing comparatively to what extent both organizations have adjusted their respective structures towards the ideal type of the so-called New Public Management (NPM). The empirical findings show that reforms towards NPM are more pronounced in the Commission than in the OECD. These findings are surprising for two reasons: First, it seems rather paradoxical that the OECD as central promoter of NPM at the international level lags behind the global trend when it comes to reforming its own structures. Second, this result is in contradiction with theoretical expectations, as they can be derived from theories of institutional isomorphism. To nevertheless account for the surprising results, it is necessary to modify and complement existing theories especially with regard to the scope conditions of their causal mechanisms.
Resumo:
The following paper presents an overview of the Ph.D Thesis1 presented in [1], which compiles all the research done during the period of time between 2004-2007. In that dissertation the relay-assisted transmission with half-duplex relays is analyzed from different points of view. This study is motivated by the necessity of finding innovative solutions to cope with the requirements of next generation wireless services, and with current radio technology. The use of relayed communications represents a change of paradigm of conventional communications, and requires the definition and evaluation of protocols to be applied to single or multiple-user relay communication. With the two fold goal of enhancing spectral efficiency and homogenize service in cellular communications, system design is investigated at physical (type of transmissions of the relay, decoding mode, ..) and upper layers (resource allocation, dynamic link control).
Resumo:
In the presence of cost uncertainty, limited liability introduces the possibility of default in procurement with its associated bank-ruptcy costs. When financial soundness is not perfectly observable, we show that incentive compatibility implies that financially less sound contractors are selected with higher probability in any feasible mechanism. Informational rents are associated with unsound financial situations. By selecting the financially weakest contractor, stronger price competition (auctions) may not only increase the probability of default but also expected rents. Thus, weak conditions are suffcient for auctions to be suboptimal. In particular, we show that pooling firms with higher assets may reduce the cost of procurement even when default is costless for the sponsor.
Resumo:
I model the link between political regime and level of diversification following a windfall of natural resource revenues. The explanatory variables I make use of are the political support functions embedded within each type of regime and the disparate levels of discretion, openness, transparency, and accountability of government. I show that a democratic government seeks to maximize the long-term consumption path of the representative consumer, in order to maximize its chances of re-election, while an authoritarian government, in the absence of any electoral mechanism of accountability, seeks to buy off and entrench a group of special interests loyal to the government and potent enough to ensure its short-term survival. Essentially the contrast in the approaches towards resource rent distribution comes down to a variation in political weights on aggregate welfare and rentierist special interests endogenized by distinct political support functions.
Resumo:
Es tracta d’una sessió introductòria que se centra en els aspectes més generals de la nova normativa: el marc conceptual en el qual es fonamenta la RDA (els models FRBR i FRAD), els objectius, l’organització de les normes, el nou vocabulari, la continuïtat amb les AACR2 i els punts de divergència, els beneficis que s’espera obtenir del nou codi, etc. El seu objectiu principal és fer una primera introducció de les regles per sensibilitzar els catalogadors dels canvis que tindran lloc a mig termini.
Resumo:
In this paper we study the existence and qualitative properties of travelling waves associated to a nonlinear flux limited partial differential equation coupled to a Fisher-Kolmogorov-Petrovskii-Piskunov type reaction term. We prove the existence and uniqueness of finite speed moving fronts of C2 classical regularity, but also the existence of discontinuous entropy travelling wave solutions.
Resumo:
In this paper, we consider the ATM networks in which the virtual path concept is implemented. The question of how to multiplex two or more diverse traffic classes while providing different quality of service requirements is a very complicated open problem. Two distinct options are available: integration and segregation. In an integration approach all the traffic from different connections are multiplexed onto one VP. This implies that the most restrictive QOS requirements must be applied to all services. Therefore, link utilization will be decreased because unnecessarily stringent QOS is provided to all connections. With the segregation approach the problem can be much simplified if different types of traffic are separated by assigning a VP with dedicated resources (buffers and links). Therefore, resources may not be efficiently utilized because no sharing of bandwidth can take place across the VP. The probability that the bandwidth required by the accepted connections exceeds the capacity of the link is evaluated with the probability of congestion (PC). Since the PC can be expressed as the CLP, we shall simply carry out bandwidth allocation using the PC. We first focus on the influence of some parameters (CLP, bit rate and burstiness) on the capacity required by a VP supporting a single traffic class using the new convolution approach. Numerical results are presented both to compare the required capacity and to observe which conditions under each approach are preferred
Resumo:
This paper studies cooperation in a political system dominated by two opportunistic parties competing in a resource-based economy. Since a binding agreement as an external solution might be difficult to enforce due to the close association between the incumbent party and the government, the paper explores the extent to which co-operation between political parties that alternate in office can rely on self-enforcing strategies to provide an internal solution. We show that, for appropriate values of the probability of re-election and the discount factor cooperation in maintaining the value of a state variable is possible, but fragile. Another result is that, in such political framework, debt decisions contain an externality element linked to electoral incentives that creates a bias towards excessive borrowing.