11 resultados para Recruitment message

em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain


Relevância:

20.00% 20.00%

Publicador:

Resumo:

An analysis is carried out in a sample of 738 industrial plants of the determining factors in the use of internal promotion of blue-collar workers to middle managers and skilled technicians as against their external recruitment. The use of internal promotion is positively correlated with variables indicative of the efforts made by plants to measure employees' skills, and to a lesser extent, with the level of specificity of investments in human capital made by blue-collar workers. Contrary to what was expected, variables related with the use and efficiency of other incentive systems have no significant influence on the increased or decreased use of internal promotion. These results are initial evidence that internal promotions are used to protect and favour specific investments, especially those made by firms in order to discover their workers' skills.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted not to affect overall labor market behavior, while with social preferences the prediction is that when bilaterally negotiated: (i) wages will be higher and (ii) that workers in jobs with incomplete contracts will respond with higher effort. Our experimental results are consistent with the social preferences view, both for the case of excess demand and excess supply of labor. In particular, the presence of information networks leads to more efficient allocations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fault tolerance has become a major issue for computer and software engineers because the occurrence of faults increases the cost of using a parallel computer. RADIC is the fault tolerance architecture for message passing systems which is transparent, decentralized, flexible and scalable. This master thesis presents the methodology used to implement the RADIC architecture over Open MPI, a well-know large-used message passing library. This implementation kept the RADIC architecture characteristics. In order to validate the implementation we have executed a synthetic ping program, besides, to evaluate the implementation performance we have used the NAS Parallel Benchmarks. The results prove that the RADIC architecture performance depends on the communication pattern of the parallel application which is running. Furthermore, our implementation proves that the RADIC architecture could be implemented over an existent message passing library.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to examine the determinants of use internal or external labour market to fill a firm vacancy in SME’s taking into account the differences existing among blue and white collar jobs. Following different theories we can identify three main reasons for use internal candidates rather than external ones‐ firm specific knowledge, adverse selection problems and motivation‐. However, there are others factors that might affect this choice but the last theories don’t take into account. In this paper we try to shed some light on what are these other factors that may affect firm decision to use internal or external labour market. Particularly we analyses the relationship among new technologies, innovation activity and firm location on the staffing strategy. The results shows difference behaviour on the decision to fill a vacancy using internal or external labour markets between manufacturing and service firms, and this decision depends not only on firm internal characteristics, like technological complexity or innovation activity, but also on firm location. The results also support the hypothesis of ports of entry especially in the manufacturing sector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El proyecto Internal Message consiste en el desarrollo de un sistema de mensajería interna que comunique de forma fiable y segura a los usuarios de cualquier sistema de gestión de contenidos Joomla.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Removal of introns during pre-mRNA splicing is a critical process in gene expression, and understanding its control at both single-gene and genomic levels is one of the great challenges in Biology. Splicing takes place in a dynamic, large ribonucleoprotein complex known as the spliceosome. Combining Genetics and Biochemistry, Saccharomyces cerevisiae provides insights into its mechanisms, including its regulation by RNA-protein interactions. Recent genome-wide analyses indicate that regulated splicing is broad and biologically relevant even in organisms with a relatively simple intronic structure, such as yeast. Furthermore, the possibility of coordination in splicing regulation at genomic level is becoming clear in this model organism. This should provide a valuable system to approach the complex problem of the role of regulated splicing in genomic expression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extended abstract.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study uses event-related brain potentials (ERPs) to investigate the electrophysiological correlates of numeric conflict monitoring in math-anxious individuals, by analyzing whether math anxiety is related to abnormal processing in early conflict detection (as shown by the N450 component) and/or in a later, response-related stage of processing (as shown by the conflict sustained potential; Conflict-SP). Conflict adaptation effects were also studied by analyzing the effect of the previous trial"s congruence in current interference. To this end, 17 low math-anxious (LMA)and 17 high math-anxious (HMA) individuals were presented with a numerical Stroop task. Groups were extreme in math anxiety but did not differ in trait or state anxiety or in simple math ability. The interference effect of the current trial (incongruent-congruent) and the interference effect preceded by congruence and by incongruity were analyzed both for behavioral measures and for ERPs. A greater interference effect was found for response times in the HMA group than in the LMA one. Regarding ERPs, the LMA group showed a greater N450 component for the interference effect preceded by congruence than when preceded by incongruity, while the HMA group showed greater Conflict-SP amplitude for the interference effect preceded by congruence than when preceded by incongruity. Our study showed that the electrophysiological correlates of numeric interference in HMA individuals comprise the absence of a conflict adaptation effect in the first stage of conflict processing (N450) and an abnormal subsequent up-regulation of cognitive control in order to overcome the conflict (Conflict-SP). More concretely, our study shows that math anxiety is related to a reactive and compensatory recruitment of control resources that is implemented only when previously exposed to a stimuli presenting conflicting information

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXTA is a mature set of open protocols, with morethan 10 years of history, that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner. Throughout its lifecycle, ithas slowly evolved in order to appeal a broad set of different applications. Part of this evolution includes providing basic security capabilities in its protocols in order to achieve some degree of message privacy and authentication. However, undersome contexts, more advanced security requirements should be met, such as anonymity. There are several methods to attain anonymity in generic P2P networks. In this paper, we proposehow to adapt a replicated message-based approach to JXTA, by taking advantage of its idiosyncracies and capabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXTA is an open peer-to-peer (P2P) protocols specification that, in its about 10 years of history, has slowly evolved to appeal to a broad set of applications. As part of this process,some long awaited security improvements have been included in the latest versions. However, under some contexts, even more advanced security requirements should be met, such as anonymity. Several approaches exist to deploy anonymity in P2P networks, but no perfect solution exists. Even though path-based approaches are quite popular, it is considered that, in dynamicgroups, using a split message-based one is better. In this work, we propose an anonymity service for JXTA using such approach. The proposal takes advantage JXTA's core services, in a manner so that it can be easily integrated to existing end applications and services.