962 resultados para Open network


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A small group of companies including Intel, Microsoft, and Cisco have used "platform leadership" with great effect as a means for driving innovation and accelerating market growth within their respective industries. Prior research in this area emphasizes that trust plays a critical role in the success of this strategy. However, many of the categorizations of trust discussed in the literature tend to ignore or undervalue the fact that trust and power are often functionally equivalent, and that the coercion of weaker partners is sometimes misdiagnosed as collaboration. In this paper, I use case study data focusing on Intel's shift from ceramic/wire-bonded packaging to organic/C4 packaging to characterize the relationships between Intel and its suppliers, and to determine if these links are based on power in addition to trust. The case study shows that Intel's platform leadership strategy is built on a balance of both trust and a relatively benevolent form of power that is exemplified by the company's "open kimono" principle, through which Intel insists that suppliers share detailed financial data and highly proprietary technical information to achieve mutually advantageous objectives. By explaining more completely the nature of these inter-firm linkages, this paper usefully extends our understanding of how platform leadership is maintained by Intel, and contributes to the literature by showing how trust and power can be used simultaneously within an inter-firm relationship in a way that benefits all of the stakeholders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research on social networking sites like Facebook is emerging but sparse. This exploratory study investigates the value users derive from self-described ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend applications to their friends. The concepts of value and cool are explored in a social networking context. Our qualitative data reveals consumers derive a combination of functional value along with either social or emotional value from the applications. Female Facebook users indicate self-expression as important motivators, while males tend to use Facebook applications to socially compete. Three broad categories emerged for application features; symmetrical features can both encourage or discourage recommendation, polar features where different levels of the same feature encourage or discourage, and uni-directional features only encourage or discourage but not both. Recommending or not recommending an application tends to be the result of a combination of features and context, rather than one feature in isolation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The endeavour to obtain estimates of durability of components for use in lifecycle assessment or costing and infrastructure and maintenance planning systems is large. The factor method and the reference service life concept provide a very valuable structure, but do not resolve the central dilemma of the need to derive an extensive database of service life. Traditional methods of estimating service life, such as dose functions or degradation models, can play a role in developing this database, however the scale of the problem clearly indicates that individual dose functions cannot be derived for each component in each different local and geographic setting. Thus, a wider range of techniques is required in order to devise reference service life. This paper outlines the approaches being taken in the Cooperative Research Centre for Construction Innovation project to predict reference service life. Approaches include the development of fundamental degradation and microclimate models, the development of a situation-based reasoning ‘engine’ to vary the ‘estimator’ of service life, and the development of a database on expert performance (Delphi study). These methods should be viewed as complementary rather than as discrete alternatives. As discussed in the paper, the situation-based reasoning approach in fact has the possibility of encompassing all other methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Forensic analysis requires the acquisition and management of many different types of evidence, including individual disk drives, RAID sets, network packets, memory images, and extracted files. Often the same evidence is reviewed by several different tools or examiners in different locations. We propose a backwards-compatible redesign of the Advanced Forensic Formatdan open, extensible file format for storing and sharing of evidence, arbitrary case related information and analysis results among different tools. The new specification, termed AFF4, is designed to be simple to implement, built upon the well supported ZIP file format specification. Furthermore, the AFF4 implementation has downward comparability with existing AFF files.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discrete event-driven simulations of digital communication networks have been used widely. However, it is difficult to use a network simulator to simulate a hybrid system in which some objects are not discrete event-driven but are continuous time-driven. A networked control system (NCS) is such an application, in which physical process dynamics are continuous by nature. We have designed and implemented a hybrid simulation environment which effectively integrates models of continuous-time plant processes and discrete-event communication networks by extending the open source network simulator NS-2. To do this a synchronisation mechanism was developed to connect a continuous plant simulation with a discrete network simulation. Furthermore, for evaluating co-design approaches in an NCS environment, a piggybacking method was adopted to allow the control period to be adjusted during simulations. The effectiveness of the technique is demonstrated through case studies which simulate a networked control scenario in which the communication and control system properties are defined explicitly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The management of main material prices of provincial highway project quota has problems of lag and blindness. Framework of provincial highway project quota data MIS and main material price data warehouse were established based on WEB firstly. Then concrete processes of provincial highway project main material prices were brought forward based on BP neural network algorithmic. After that standard BP algorithmic, additional momentum modify BP network algorithmic, self-adaptive study speed improved BP network algorithmic were compared in predicting highway project main prices. The result indicated that it is feasible to predict highway main material prices using BP NN, and using self-adaptive study speed improved BP network algorithmic is the relatively best one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study employs BP neural network to simulate the development of Chinese private passenger cars. Considering the uncertain and complex environment for the development of private passenger cars, indicators of economy, population, price, infrastructure, income, energy and some other fields which have major impacts on it are selected at first. The network is proved to be operable to simulate the progress of chinese private passenger cars after modeling, training and generalization test. Based on the BP neural network model, sensitivity analysis of each indicator is carried on and shows that the sensitivity coefficients of fuel price change suddenly. This special phenomenon reveals that the development of Chinese private passenger cars may be seriously affected by the recent high fuel price. This finding is also consistent with facts and figures

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most forms of tissue healing depend critically on revascularisation. In soft tissues and in vitro, mechanical stimuli have been shown to promote vessel-forming activity. However, in bone defects, increased interfragmentary motion impairs vascular regeneration. Because these effects seem contradictory, we aimed to determine whether a range of mechanical stimuli exists in which angiogenesis is favoured. A series of cyclic strain magnitudes were applied to a Matrigel-based “tube formation” assay and the total lengths of networks formed by human microvascular endothelial cells measured at 24 h. Network lengths were reduced at all strain levels, compared to unstretched controls. However, the levels of pro-angiogenic matrix metalloproteases-2 and -9 in the corresponding conditioned media were unchanged by strain, and vascular endothelial growth factor was uniformly elevated in stretched conditions. By repeating the assay with the addition of conditioned media from mesenchymal stem cells cultivated in similar conditions, paracrine stimuli were shown to increase network lengths, but not to alter the negative effect of cyclic stretching. Together, these results demonstrate that directly applied periodic strains can inhibit endothelial organisation in vitro, and suggest that this may be due to physical disruption rather than biochemical modulation. Most importantly, the results indicate that the straining of endothelial cells and their assembly into vascular-like structures must be studied simultaneously to adequately characterise the mechanical influence on vessel formation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

From the perspective of network, a project team’s social capital consists of conduits network, and resource exchange network. Prior research intensively studies the effect of the structure of conduits network on the team’s performance, assuming knowledge transfer is the causal mechanism linking conduits network to performance. This paper attempts to explore the interrelations between conduits network and knowledge network, and further distinguish the different influence between various conduit networks, and hypothesizes that a project team’s knowledge network mediates the effect of various conduit networks on the team’s performance. This research can enrich our knowledge of disparate influence of the various conduit networks on knowledge transfer, and imply some management practices to enhance the organization’s social capital, and hence improve the organization’s performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information and Communications Technologies globally are moving towards Service Oriented Architectures and Web Services. The healthcare environment is rapidly moving to the use of Service Oriented Architecture/Web Services systems interconnected via this global open Internet. Such moves present major challenges where these structures are not based on highly trusted operating systems. This paper argues the need of a radical re-think of access control in the contemporary healthcare environment in light of modern information system structures, legislative and regulatory requirements, and security operation demands in Health Information Systems. This paper proposes the Open and Trusted Health Information Systems (OTHIS), a viable solution including override capability to the provision of appropriate levels of secure access control for the protection of sensitive health data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the rise of ubiquitous computing in recent years, concepts of spatiality have become a significant topic of discussion in design and development of multimedia systems. This article investigates spatial practices at the intersection of youth, technology, and urban space in Seoul, and examines what the author calls ‘transyouth’: in the South Korean context, these people are between the ages of 18 and 24, situated on the delicate border between digital natives and immigrants in Prensky’s (2001) terms. In the first section, the article sets out the technosocial environment of contemporary Seoul. This is followed by a discussion of social networking processes derived from semi-structured interviews conducted in 2007-8 with Seoul transyouth about their ‘lived experiences of the city.’ Interviewees reported how they interact to play, work, and live with and within the city’s unique environment. The article develops a theme of how technosocial convergence (re)creates urban environments and argues for a need to consider such user-driven spatial recreation in designing cities as (ubiquitous) urban networks in recognition of its changing technosocial contours of connections. This is explored in three spaces of different scales: Cyworld as an online social networking space; cocoon housing – a form of individual residential space which is growing rapidly in many Korean cities – as a private living space; and u-City (ubiquitous City) as the future macro-space of Seoul.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network RTK (Real-Time Kinematic) is a technology that is based on GPS (Global Positioning System) or more generally on GNSS (Global Navigation Satellite System) measurements to achieve centimeter-level accuracy positioning in real-time. Reference station placement is an important problem in the design and deployment of network RTK systems as it directly affects the quality of the positioning service and the cost of the network RTK systems. This paper identifies a new reference station placement for network RTK, namely QoS-aware regional network RTK reference station placement problem, and proposes an algorithm for the new reference station placement problem. The algorithm can always produce a reference station placement solution that completely covers the region of network RTK.