27 resultados para KEY ISSUES

em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Paper presented at the 2000 seminar of the International Chair in Olympism. Key issues of the seminar included references to the concern for legacy in terms of tourism, benefits and challenges of the Olympic Games and strategic needs, among others.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ponència presentada al seminari de la Càtedra Internacional d'Olimpisme l'any 2000 que se centra, entre altres temes, en el llegat dels Jocs en termes de turisme, els beneficis i reptes dels Jocs i les necessitats estratègiques.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper I review a series of theoretical concepts that are relevant for the integrated assessment of agricultural sustainability but that are not generally included in the curriculum of the various scientific disciplines dealing with quantitative analysis of agriculture. I first illustrate with plain narratives and concrete examples that sustainability is an extremely complex issue requiring the simultaneous consideration of several aspects, which cannot be reduced into a single indicator of performance. Following, I justify this obvious need for multi-criteria analysis with theoretical concepts dealing with the epistemological predicament of complexity, starting from classic philosophical lessons to arrive to recent developments in complex system theory, in particular Rosen´s theory of modelling relation which is essential to analyze the quality of any quantitative representation. The implications of these theoretical concepts are then illustrated with applications of multi-criteria analysis to the sustainability of agriculture. I wrap up by pointing out the crucial difference between "integrated assessment" and "integrated analysis". An integrated analysis is a set of indicators and analytical models generating an analytical output. An integrated assessment is much more than that. It is about finding an effective way to deal with three key issues: (i) legitimacy – how to handle the unavoidable existence of legitimate but contrasting points of view about different meanings given by social actors to the word "development"; (ii) pertinence – how to handle in a coherent way scientific analyses referring to different scales and dimensions; and (iii) credibility – how to handle the unavoidable existence of uncertainty and genuine ignorance, when dealing with the analysis of future scenarios.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Aquest document de treball mira d'establir un nou camp d'investigació a la cruïlla entre els fluxos de migració i d'informació i comunicació. Hi ha diversos factors que fan que valgui la pena adoptar aquesta perspectiva. El punt central és que la migració internacional contemporània és incrustada en la dinàmica de la societat de la informació, seguint models comuns i dinàmiques interconnectades. Per consegüent, s'està començant a identificar els fluxos d'informació com a qüestions clau en les polítiques de migració. A més, hi ha una manca de coneixement empíric en el disseny de xarxes d'informació i l'ús de les tecnologies d'informació i comunicació en contextos migratoris. Aquest document de treball també mira de ser una font d'hipòtesis per a investigacions posteriors.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A blind speech watermarking scheme that meets hard real-time deadlines is presented and implemented. In addition, one of the key issues in these block-oriented watermarking techniques is to preserve the synchronization. Namely, to recover the exact position of each block in the mark extract process. In fact, the presented scheme can be split up into two distinguished parts, the synchronization and the information mark methods. The former is embedded into the time domain and it is fast enough to be run meeting real-time requirements. The latter contains the authentication information and it is embedded into the wavelet domain. The synchronization and information mark techniques are both tunable in order to allow a con gurable method. Thus, capacity, transparency and robustness can be con gured depending on the needs. It makes the scheme useful for professional applications, such telephony authentication or even sending information throw radio applications.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The presentation will focus on the reasons for deploying an e-reader loan service at a virtual university library as a part of an e-learning support system to aid user mobility, concentration of documentary and electronic resources, and ICT skills acquisition, using the example of the UOC pilot project and its subsequent consolidation. E-reader devices at the UOC are an extension of the Virtual Campus. They are offered as a tool to aid user mobility, access to documentary and electronic resources, and development of information and IT skills. The e-reader loan service began as a pilot project in 2009 and was consolidated in 2010. The UOC Library piloted the e-reader loan service from October to December 2009. The pilot project was carried out with 15 devices and involved 37 loans. The project was extended into 2010 with the same number of devices and 218 loans (October 2010). In 2011 the e-reader loan service is to involve 190 devices, thus offering an improved service. The reasons for deploying an e-reader loan service at the UOC are the following: a) to offer library users access to the many kinds of learning materials available at the UOC through a single device that facilitates student study and learning; b) to enhance access to and use of the e-book collections subscribed to by the UOC Library; c) to align with UOC strategy on the development of learning materials in multiple formats, and promote e-devices as an extension of the UOC Virtual Campus, and d) to increase UOC Library visibility within and beyond the institution. The presentation will conclude with an analysis of the key issues to be taken into account at a university library: the e-reader market, the unclear business and license model for e-book contents, and the library's role in promoting new reading formats to increase use of e-collections.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This working – paper will be focused on three key issues: • How will affect the enlargement to the Justice and Home Affairs Cooperation. Especially, the absortion of Schenguen Agreements and the overall JHA by the candidate countries. • The enlargement impact over the European Immigraton Policy and the specific policies carried out by the EU Member States. The main question is the free movement of persons safeguard, in order to protect external borders of European Union. • An analysis of September, 11 attacks against U.S.A might be necessary to understand the future changes on JHA policy.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Next Generation Access Networks (NGAN) are the new step forward to deliver broadband services and to facilitate the integration of different technologies. It is plausible to assume that, from a technological standpoint, the Future Internet will be composed of long-range high-speed optical networks; a number of wireless networks at the edge; and, in between, several access technologies, among which, the Passive Optical Networks (xPON) are very likely to succeed, due to their simplicity, low-cost, and increased bandwidth. Among the different PON technologies, the Ethernet-PON (EPON) is the most promising alternative to satisfy operator and user needs, due to its cost, flexibility and interoperability with other technologies. One of the most interesting challenges in such technologies relates to the scheduling and allocation of resources in the upstream (shared) channel. The aim of this research project is to study and evaluate current contributions and propose new efficient solutions to address the resource allocation issues in Next Generation EPON (NG-EPON). Key issues in this context are future end-user needs, integrated quality of service (QoS) support and optimized service provisioning for real time and elastic flows. This project will unveil research opportunities, issue recommendations and propose novel mechanisms associated with the convergence within heterogeneous access networks and will thus serve as a basis for long-term research projects in this direction. The project has served as a platform for the generation of new concepts and solutions that were published in national and international conferences, scientific journals and also in book chapter. We expect some more research publications in addition to the ones mentioned to be generated in a few months.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Customer satisfaction and retention are key issues for organizations in today’s competitive market place. As such, much research and revenue has been invested in developing accurate ways of assessing consumer satisfaction at both the macro (national) and micro (organizational) level, facilitating comparisons in performance both within and between industries. Since the instigation of the national customer satisfaction indices (CSI), partial least squares (PLS) has been used to estimate the CSI models in preference to structural equation models (SEM) because they do not rely on strict assumptions about the data. However, this choice was based upon some misconceptions about the use of SEM’s and does not take into consideration more recent advances in SEM, including estimation methods that are robust to non-normality and missing data. In this paper, both SEM and PLS approaches were compared by evaluating perceptions of the Isle of Man Post Office Products and Customer service using a CSI format. The new robust SEM procedures were found to be advantageous over PLS. Product quality was found to be the only driver of customer satisfaction, while image and satisfaction were the only predictors of loyalty, thus arguing for the specificity of postal services

Relevância:

60.00% 60.00%

Publicador:

Resumo:

[spa]La tutoría entre iguales ha adquirido un interés creciente en la institución universitaria dentro de la reforma de la educación superior impulsada en las dos últimas décadas. En este contexto, están siendo exploradas las relacio-nes posibles entre el aprendizaje formal y otros tipos diferentes de aprendizaje que se habían mantenido ajenos a la tradición universitaria. Es con la consideración del aprendizaje informal, y en relación con las teorías de las co-munidades de práctica y del aprendizaje situado, que cobra especial relieve la tutoría entre iguales. Este artículo es un estudio teórico sobre dicho recurso didáctico que se centra en dos asuntos fundamentales. Por un lado, el dilu-cidar el complejo problema terminológico que la afecta. Por otro, el subrayar la importancia de sus aportaciones específicas al aprendizaje de los estudiantes. Los dos son esenciales para reivindicar su singularidad y la relevan-cia de sus resultados y, acto seguido, para impulsar su meditada integración en la enseñanza universitaria.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

[spa] Este documento de trabajo aborda tres temáticas con relación a los estudios de caso. En primer lugar, define el concepto "estudios de caso" desde los autores y fuentes más relevantes. En esta conceptualización se incluyen sus rasgos más importantes y se describen diferentes modalidades (intrínsecos, instrumentales y colectivos). En segundo lugar, se introduce la estructura conceptual del caso, es decir, la construcción de "issues" o cuestiones problemáticas, que son objeto de estudio. Por último, se reflexiona acerca de la dimensión ética en los estudios de caso y se describen los criterios éticos fundamentales para la investigación interpretativa.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the Discrete Fourier Transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With the evolution of the P2P research eld, new problems, such as those related with information security, have arisen. It is important to provide security mechanisms to P2P systems, since it has already become one of the key issues when evaluating them. However, even though many P2P systems have been adapted to provide a security baseline to their underlying applications, more advanced capabilities are becoming necessary. Speci cally, privacy preservation and anonymity are deemed essential to make the information society sustainable. Unfortunately, sometimes, it may be di cult to attain anonymity unless it is included into the system's initial design. The JXTA open protocols speci cation is a good example of this kind of scenario. This work studies how to provide anonymity to JXTA's architecture in a feasible manner and proposes an extension which allows deployed services to process two-way messaging without disclosing the endpoints'identities to third parties.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important proporcionar mecanismes de seguretat per a sistemes P2P. El projecte JXTAOverlay fa un esforç per utilitzar la tecnologia JXTA per proporcionar un conjunt genèric de funcions que poden ser utilitzades pels desenvolupadors per desplegar aplicacions P2P. No obstant això, encara que el seu disseny es va centrar en qüestions com ara l'escalabilitat o el rendiment general, no va tenir en compte la seguretat. Aquest treball proposa un marc de seguretat, adaptat específicament a la idiosincràsia del JXTAOverlay.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Aquest document de treball mira d'establir un nou camp d'investigació a la cruïlla entre els fluxos de migració i d'informació i comunicació. Hi ha diversos factors que fan que valgui la pena adoptar aquesta perspectiva. El punt central és que la migració internacional contemporània és incrustada en la dinàmica de la societat de la informació, seguint models comuns i dinàmiques interconnectades. Per consegüent, s'està començant a identificar els fluxos d'informació com a qüestions clau en les polítiques de migració. A més, hi ha una manca de coneixement empíric en el disseny de xarxes d'informació i l'ús de les tecnologies d'informació i comunicació en contextos migratoris. Aquest document de treball també mira de ser una font d'hipòtesis per a investigacions posteriors.