890 resultados para tactical voting
Resumo:
[ES] El proyecto consiste en establecer la comunicación entre dos portales web a través de servicios web Restful implementados en PHP. Ambos portales están relacionados con el mundo del cine. El segundo de estos es, a grandes rasgos, una interfaz simplificada del anterior. El primer portal web está construido sobre Drupal 7, en este instalamos una serie de módulos que nos permiten gestionar el contenido que se quiere mostrar a los usuarios. Un usuario que no se identifica podrá navegar por todas las páginas del portal, identificarse y registrarse. Los privilegios que se le conceden a un usuario cuando se identifica son los de participar en el sistema de votación de las películas e interactuar con otros usuarios identificados a través de un sistema de comentarios. El usuario administrador, además, puede gestionar el contenido y a los usuarios identificados. El segundo portal está orientado al disfrute de la página a través de dispositivos móviles. Un usuario que no se ha identificado puede navegar por todas las áreas de éste del mismo modo que un usuario identificado. En este portal, a diferencia del anterior, no es posible registrarse para este tipo de actores. La diferencia entre el usuario no identificado y el identificado, en este caso, es que este último al visualizar el catálogo observará un descuento sobre cada película. Los servicios web, a través de peticiones GET y POST, proporcionarán a los usuarios una rica experiencia de navegación. Gracias a estos, en el segundo portal, podrán identificarse, obtener el catálogo de películas (además de ordenarlo y establecer filtros de búsqueda por género), y visualizar la ficha de las películas y directores. Todo esto sin necesidad de crear otra base de datos, tan solo intercambiando datos con el servidor.
Resumo:
Nowadays licensing practices have increased in importance and relevance driving the widespread diffusion of markets for technologies. Firms are shifting from a tactical to a strategic attitude towards licensing, addressing both business and corporate level objectives. The Open Innovation Paradigm has been embraced. Firms rely more and more on collaboration and external sourcing of knowledge. This new model of innovation requires firms to leverage on external technologies to unlock the potential of firms’ internal innovative efforts. In this context, firms’ competitive advantage depends both on their ability to recognize available opportunities inside and outside their boundaries and on their readiness to exploit them in order to fuel their innovation process dynamically. Licensing is one of the ways available to firm to ripe the advantages associated to an open attitude in technology strategy. From the licensee’s point view this implies challenging the so-called not-invented-here syndrome, affecting the more traditional firms that emphasize the myth of internal research and development supremacy. This also entails understanding the so-called cognitive constraints affecting the perfect functioning of markets for technologies that are associated to the costs for the assimilation, integration and exploitation of external knowledge by recipient firms. My thesis aimed at shedding light on new interesting issues associated to in-licensing activities that have been neglected by the literature on licensing and markets for technologies. The reason for this gap is associated to the “perspective bias” affecting the works within this stream of research. With very few notable exceptions, they have been generally concerned with the investigation of the so-called licensing dilemma of the licensor – whether to license out or to internally exploit the in-house developed technologies, while neglecting the licensee’s perspective. In my opinion, this has left rooms for improving the understanding of the determinants and conditions affecting licensing-in practices. From the licensee’s viewpoint, the licensing strategy deals with the search, integration, assimilation, exploitation of external technologies. As such it lies at the very hearth of firm’s technology strategy. Improving our understanding of this strategy is thus required to assess the full implications of in-licensing decisions as they shape firms’ innovation patterns and technological capabilities evolution. It also allow for understanding the so-called cognitive constraints associated to the not-invented-here syndrome. In recognition of that, the aim of my work is to contribute to the theoretical and empirical literature explaining the determinants of the licensee’s behavior, by providing a comprehensive theoretical framework as well as ad-hoc conceptual tools to understand and overcome frictions and to ease the achievement of satisfactory technology transfer agreements in the marketplace. Aiming at this, I investigate licensing-in in three different fashions developed in three research papers. In the first work, I investigate the links between licensing and the patterns of firms’ technological search diversification according to the framework of references of the Search literature, Resource-based Theory and the theory of general purpose technologies. In the second paper - that continues where the first one left off – I analyze the new concept of learning-bylicensing, in terms of development of new knowledge inside the licensee firms (e.g. new patents) some years after the acquisition of the license, according to the Dynamic Capabilities perspective. Finally, in the third study, Ideal with the determinants of the remuneration structure of patent licenses (form and amount), and in particular on the role of the upfront fee from the licensee’s perspective. Aiming at this, I combine the insights of two theoretical approaches: agency and real options theory.
Resumo:
In this thesis we study three combinatorial optimization problems belonging to the classes of Network Design and Vehicle Routing problems that are strongly linked in the context of the design and management of transportation networks: the Non-Bifurcated Capacitated Network Design Problem (NBP), the Period Vehicle Routing Problem (PVRP) and the Pickup and Delivery Problem with Time Windows (PDPTW). These problems are NP-hard and contain as special cases some well known difficult problems such as the Traveling Salesman Problem and the Steiner Tree Problem. Moreover, they model the core structure of many practical problems arising in logistics and telecommunications. The NBP is the problem of designing the optimum network to satisfy a given set of traffic demands. Given a set of nodes, a set of potential links and a set of point-to-point demands called commodities, the objective is to select the links to install and dimension their capacities so that all the demands can be routed between their respective endpoints, and the sum of link fixed costs and commodity routing costs is minimized. The problem is called non- bifurcated because the solution network must allow each demand to follow a single path, i.e., the flow of each demand cannot be splitted. Although this is the case in many real applications, the NBP has received significantly less attention in the literature than other capacitated network design problems that allow bifurcation. We describe an exact algorithm for the NBP that is based on solving by an integer programming solver a formulation of the problem strengthened by simple valid inequalities and four new heuristic algorithms. One of these heuristics is an adaptive memory metaheuristic, based on partial enumeration, that could be applied to a wider class of structured combinatorial optimization problems. In the PVRP a fleet of vehicles of identical capacity must be used to service a set of customers over a planning period of several days. Each customer specifies a service frequency, a set of allowable day-combinations and a quantity of product that the customer must receive every time he is visited. For example, a customer may require to be visited twice during a 5-day period imposing that these visits take place on Monday-Thursday or Monday-Friday or Tuesday-Friday. The problem consists in simultaneously assigning a day- combination to each customer and in designing the vehicle routes for each day so that each customer is visited the required number of times, the number of routes on each day does not exceed the number of vehicles available, and the total cost of the routes over the period is minimized. We also consider a tactical variant of this problem, called Tactical Planning Vehicle Routing Problem, where customers require to be visited on a specific day of the period but a penalty cost, called service cost, can be paid to postpone the visit to a later day than that required. At our knowledge all the algorithms proposed in the literature for the PVRP are heuristics. In this thesis we present for the first time an exact algorithm for the PVRP that is based on different relaxations of a set partitioning-like formulation. The effectiveness of the proposed algorithm is tested on a set of instances from the literature and on a new set of instances. Finally, the PDPTW is to service a set of transportation requests using a fleet of identical vehicles of limited capacity located at a central depot. Each request specifies a pickup location and a delivery location and requires that a given quantity of load is transported from the pickup location to the delivery location. Moreover, each location can be visited only within an associated time window. Each vehicle can perform at most one route and the problem is to satisfy all the requests using the available vehicles so that each request is serviced by a single vehicle, the load on each vehicle does not exceed the capacity, and all locations are visited according to their time window. We formulate the PDPTW as a set partitioning-like problem with additional cuts and we propose an exact algorithm based on different relaxations of the mathematical formulation and a branch-and-cut-and-price algorithm. The new algorithm is tested on two classes of problems from the literature and compared with a recent branch-and-cut-and-price algorithm from the literature.
Resumo:
The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. Security testing methodologies are the first step towards standardized security evaluation processes and understanding of how the security threats evolve over time. This dissertation analyzes some of the most used identifying differences and commonalities, useful to compare them and assess their quality. The dissertation then proposes a new enhanced methodology built by keeping the best of every analyzed methodology. The designed methodology is tested over different systems with very effective results, which is the main evidence that it could really be applied in practical cases. Most of the dissertation discusses and proves how the presented testing methodology could be applied to such different systems and even to evade security measures by inverting goals and scopes. Real cases are often hard to find in methodology' documents, in contrary this dissertation wants to show real and practical cases offering technical details about how to apply it. Electronic voting systems are the first field test considered, and Pvote and Scantegrity are the two tested electronic voting systems. The usability and effectiveness of the designed methodology for electronic voting systems is proved thanks to this field cases analysis. Furthermore reputation and anti virus engines have also be analyzed with similar results. The dissertation concludes by presenting some general guidelines to build a coordination-based approach of electronic voting systems to improve the security without decreasing the system modularity.
Resumo:
Nell’ambito della ricerca scientifica nel campo dello sport, la Performance Analysis si sta ritagliando un crescente spazio di interesse. Per Performance Analysis si intende l’analisi della prestazione agonistica sia dal punto di vista biomeccanico che dal punto di vista dell’analisi notazionale. In questa tesi è stata analizzata la prestazione agonistica nel tennistavolo attraverso lo strumento dell’analisi notazionale, partendo dallo studio degli indicatori di prestazione più importanti dal punto di vista tecnico-tattico e dalla loro selezione attraverso uno studio sull’attendibilità nella raccolta dati. L’attenzione è stata posta quindi su un aspetto tecnico originale, il collegamento spostamenti e colpi, ricordando che una buona tecnica di spostamento permette di muoversi rapidamente nella direzione della pallina per effettuare il colpo migliore. Infine, l’obbiettivo principale della tesi è stato quello di confrontare le tre categorie di atleti selezionate: alto livello mondiale maschile (M), alto livello junior europeo (J) ed alto livello mondiale femminile (F). La maggior parte delle azioni cominciano con un servizio corto al centro del tavolo, proseguono con una risposta in push (M) o in flik di rovescio (J). Il colpo che segue è principalmente il top spin di dritto dopo un passo pivot o un top di rovescio senza spostamento. Gli alteti M e J contrattaccano maggiormente con top c. top di dritto e le atlete F prediligono colpi meno spregiudicati, bloccando di rovescio e proseguendo con drive di rovescio. Attraverso lo studio della prestazione di atleti di categorie e generi diversi è possibile migliorare le scelte strategiche prima e durante gli incontri. Le analisi statistiche multivariate (modelli log-lineari) hanno permesso di validare con metodo scientifico sia le procedure già utilizzate in letteratura che quelle innovative messe a punto per la prima volta in occasione di questo studio.
Resumo:
L’oggetto della nostra ricerca è l’opinione pubblica e il comportamento dell’elettore in una prospettiva comparata. L’obiettivo della ricerca è stato analizzare la relevanza degli approcci psicologici per una migliore comprensiore della partecipazione politica, delle opinioni e delle scelte elettorali degli studenti Italiani e Bielorussi. Nella parte teorica, noi discutiamo i modelli dell'approccio cognitivo al comportamento di voto. Discutiamo inoltre il concetto dello stile cognitivo e le sue cinque categorie: stile sintetico, idealistico, pragmatico, analitico o realistico, come descritti da A.Harrison and R.M. Branson e adattati da A. Alexeev and L. Gromova. Nonostante il fatto che la ricerca tratta il caso degli studenti, noi crediamo che i risultati siano pertinenti per un’ulteriore ricerca dell’auditorio più vasto e variegato.
Resumo:
Scopo di questo lavoro è quello di analizzare le componenti tattiche, strategiche e sociali della guerriglia antiromana in Britannia e in Giudea, in un periodo che va dal I secolo a. C. al III secolo d. C., con l'obiettivo di mettere in luce la differente efficacia delle tattiche non ortodosse rispetto a quelle convenzionali; e di analizzare le risposte teoriche ed empiriche concepite dai Romani per affrontare questa forma di lotta. La tesi è stata articolata nel modo seguente: una prima parte analizza gli aspetti tattici, strategici e sociali della guerriglia e della controguerriglia, anche attraverso il metodo comparativo, mettendo cioè a confronto alcuni dei principali testi sulla guerra non convenzionale redatti in epoche e contesti diversi, dai quali si è cercato di delle costanti potenzialmente applicabili a qualsiasi periodo storico e a qualsiasi area geografica. Nella seconda parte si cerca di applicare tali costanti alla realtà storico – sociale dell'impero romano. Particolare attenzione è stata riservata al rapporto tra la mentalità romana, basata sul concetto di bellum iustum, e le tattiche non ortodosse. La terza e la quarta parte analizzano la resistenza antiromana in Britannia e in Giudea, mettendone in luce tutti gli aspetti, in particolare quelli legati alla guerriglia rurale, a quella urbana, al terrorismo, all'evoluzione della guerriglia da guerra per bande a guerra convenzionale e alla controguerriglia. La scelta di queste due province non è casuale. In province così lontane e diverse tra loro, Roma inviò spesso gli stessi generali esperti di controguerriglia. Questo particolare permette di notare la presenza, a Roma, di una grand strategy che, consapevole del fenomeno della guerriglia, ne affidò la repressione agli stessi generali, specialisti della controguerriglia, non esitando a spostarli, in caso di necessità, da un capo all'altro dell'impero.
Resumo:
Le scelte di asset allocation costituiscono un problema ricorrente per ogni investitore. Quest’ultimo è continuamente impegnato a combinare diverse asset class per giungere ad un investimento coerente con le proprie preferenze. L’esigenza di supportare gli asset manager nello svolgimento delle proprie mansioni ha alimentato nel tempo una vasta letteratura che ha proposto numerose strategie e modelli di portfolio construction. Questa tesi tenta di fornire una rassegna di alcuni modelli innovativi di previsione e di alcune strategie nell’ambito dell’asset allocation tattica, per poi valutarne i risvolti pratici. In primis verificheremo la sussistenza di eventuali relazioni tra la dinamica di alcune variabili macroeconomiche ed i mercati finanziari. Lo scopo è quello di individuare un modello econometrico capace di orientare le strategie dei gestori nella costruzione dei propri portafogli di investimento. L’analisi prende in considerazione il mercato americano, durante un periodo caratterizzato da rapide trasformazioni economiche e da un’elevata volatilità dei prezzi azionari. In secondo luogo verrà esaminata la validità delle strategie di trading momentum e contrarian nei mercati futures, in particolare quelli dell’Eurozona, che ben si prestano all’implementazione delle stesse, grazie all’assenza di vincoli sulle operazioni di shorting ed ai ridotti costi di transazione. Dall’indagine emerge che entrambe le anomalie si presentano con carattere di stabilità. I rendimenti anomali permangono anche qualora vengano utilizzati i tradizionali modelli di asset pricing, quali il CAPM, il modello di Fama e French e quello di Carhart. Infine, utilizzando l’approccio EGARCH-M, verranno formulate previsioni sulla volatilità dei rendimenti dei titoli appartenenti al Dow Jones. Quest’ultime saranno poi utilizzate come input per determinare le views da inserire nel modello di Black e Litterman. I risultati ottenuti, evidenziano, per diversi valori dello scalare tau, extra rendimenti medi del new combined vector superiori al vettore degli extra rendimenti di equilibrio di mercato, seppur con livelli più elevati di rischio.
Resumo:
In den konsultativen Referenden von 1972 und 1994 stimmte eine knappe Mehrheit der norwegischen Wählerschaft gegen einen Beitritt in die europäische Staatengemeinschaft. Regierung und Parlament zogen daraufhin ihr Aufnahmegesuch zurück. Ein erneuter Antrag auf Mitgliedschaft in der EU wird seither vermieden, da sich die Parteien des Konfliktpotenzials bewusst sind. Von der politischen Agenda ist diese Streitfrage jedoch nicht verschwunden. Die vorliegende Magisterarbeit greift den gängigen Erklärungsansatz der politikwissenschaftlichen Forschung auf: Das Scheitern der Referenden ist demnach auf die Aktualisierung traditioneller politischer Konfliktlinien zurückzuführen. Inwieweit diese Cleavages die Einstellungen norwegischer Staatsbürger zur Europäischen Integration bestimmen, wird anhand eines komplexen Konfliktlinienmodells und mittels aktueller Daten untersucht. Aufbauend auf dem klassischen Cleavage-Konzept von Seymour Lipset und Stein Rokkan (Zentrum/Peripherie, Staat/Kirche, Stadt/Land, Kapital/Arbeit), findet eine Konkretisierung von Stefano Bartolini und Peter Mair Anwendung, die jede der vier Konfliktlinien als dreidimensional (empirisch, normativ und organisatorisch) begreift. In einem historischen Überblick zeigt sich die Relevanz der tradierten Konfliktlinien für Norwegen, die sich sowohl im nationalen Parteiensystem als auch in den Standpunkten der Parteien zu einem EU-Beitritt widerspiegeln. Datengrundlage für die folgenden empirischen Analysen (Kreuztabellen, Mittelwert- und Korrelationsvergleiche, multiple lineare Regressionen) stellt die norwegische Teilstudie der zweiten Welle des European Social Survey von 2004/2005 dar. Europäische Integration wird von den meisten norwegischen Staatsbürgern, die sich empirisch, normativ und organisatorisch auf den Konfliktlinienpolen Peripherie, Kirche, Land oder Arbeit verorten lassen, negativ bewertet. Im Gegensatz dazu geht die recht häufig vertretene Kombination der empirischen Konfliktlinienpole Zentrum-Staat-Stadt-Kapital mit einer überdurchschnittlich positiven Einstellung einher. Insgesamt erweist sich der Zusammenhang mit der Zentrum/Peripherie-Konfliktlinie als am höchsten.
Resumo:
The Treaty of Lisbon has brought remarkable changes and innovations to the European Union. As far as the Council of Ministers of the European Union (“the Council” hereinafter) is concerned, there are two significant innovations: double qualified majority voting and new rotating Presidency scheme, which are considered to make the working of the Council more efficiently, stably and consistently. With the modification relating to other key institutions, the Commission and the European Parliament, and with certain procedures being re-codified, the power of the Council varies accordingly, where the inter-institutional balance counts for more research. As the Council is one of the co-legislatures of the Union, the legislative function of it would be probably influenced, positively or negatively, by the internal innovations and the inter-institutional re-balance. Has the legislative function of the Council been reinforced or not? How could the Council better reach its functional goal designed by the Treaties’ drafter? How to evaluate the Council’s evolution after Lisbon Treaty in the light of European integration? This thesis is attempting to find the answers by analyzing two main internal innovations and inter-institutional re-balance thereinafter.
Resumo:
In this thesis we focus on optimization and simulation techniques applied to solve strategic, tactical and operational problems rising in the healthcare sector. At first we present three applications to Emilia-Romagna Public Health System (SSR) developed in collaboration with Agenzia Sanitaria e Sociale dell'Emilia-Romagna (ASSR), a regional center for innovation and improvement in health. Agenzia launched a strategic campaign aimed at introducing Operations Research techniques as decision making tools to support technological and organizational innovations. The three applications focus on forecast and fund allocation of medical specialty positions, breast screening program extension and operating theater planning. The case studies exploit the potential of combinatorial optimization, discrete event simulation and system dynamics techniques to solve resource constrained problem arising within Emilia-Romagna territory. We then present an application in collaboration with Dipartimento di Epidemiologia del Lazio that focuses on population demand of service allocation to regional emergency departments. Finally, a simulation-optimization approach, developed in collaboration with INESC TECH center of Porto, to evaluate matching policies for the kidney exchange problem is discussed.
Resumo:
A fronte dal recepimento del direttiva SHR nel nostro ordinamento, realizzato dal d.lgs. 27/2010, il presente lavoro si propone anzitutto di analizzare l'attuale ruolo della delega di voto - sollecitata e non - per poi verificare quale sia l'interesse concretamente sotteso a un voto così esercitato, con particolare attenzione alla sollecitazione di deleghe di voto, oggi destinata espressamente (per la prevalente dottrina) a consentire al promotore il perseguimento di interessi propri. Le considerazioni riguardo all'interesse concretamente sotteso al voto esercitato per delega portano a vagliarne la rilevanza ai fini della nozione di controllo, ex art. 2359 c.c., la quale esclude espressamente dai voti rilevanti esclusivamente quelli esercitati "per conto terzi", e non, dunque, anche quelli esercitati nell'interesse proprio da un soggetto non titolare della partecipazione. Viene quindi affrontata la principale critica ad un controllo raggiunto per tale via e, più in generale, attraverso una delle varie forme di dissociazione tra titolarità della partecipazione e legittimazione all'esercizio del voto ad essa relativo, ovvero la apparente mancanza di stabilità. Considerando tuttavia che ogni ipotesi di controllo c.d. di fatto per definizione non gode di stabilità se non si scelga di ammettere una valutazione di tale requisito necessariamente prognostica ed ex ante, si giunge alla conclusione che la fattispecie di un controllo acquisito tramite sollecitazione di deleghe si distingue da altre ipotesi di controllo di fatto esclusivamente per la maggiore difficoltà dell'accertamento in fatto del requisito della stabilità. Si affronta infine la possibilità di garantire il diritto di exit (ovvero una tutela risarcitoria) del socio di minoranza che veda modificate le condizioni di rischio del proprio investimento a causa di una modifica del soggetto controllante derivante da sollecitazione di deleghe, tramite applicazione diretta della disciplina OPA ovvero riconducendo la fattispecie all'art. 2497quater, lett. d, ove ne ricorrano i presupposti.
Resumo:
Die meisten Studien der empirischen Wahlforschung führen das Wählverhalten bei deutschen Bundestagswahlen gemäß den bewährten Erklärungsansätzen (Columbia School, Cleavage-Theorie, Michigan School, …) auf Faktoren der Individualebene zurück. Nur wenige analysieren darüber hinaus den Einfluss räumlicher Kontextmerkmale. Diese Beiträge gelangen zudem zu widersprüchlichen Befunden, z.B. darüber, welcher Anteil der Gesamtvarianz überhaupt durch Kontextfaktoren erklärt werden kann. Daher will die vorliegende Arbeit klären, inwiefern die soziale Komposition des räumlichen Kontexts über individuelle Merkmale der Wähler hinaus ihre individuelle Wahlentscheidung bei der Bundestagswahl 2009 beeinflusst hat. Dazu wird zunächst ein räumliches Mehrebenen-Modell des individuellen Wahlverhaltens entwickelt, das den Einfluss von Kontextmerkmalen u.a. auf soziale Interaktionsmechanismen innerhalb der Kontexteinheiten zurückführt. Zudem werden die zentralen individuellen Erklärungsfaktoren der oben genannten Theorien (Parteiidentifikation, Kandidaten-, Sachfragen-Orientierung, soziale Gruppenzugehörigkeit) in das Modell integriert. Auf Grundlage von Daten der German Longitudinal Election Study werden anschließend logistische Mehrebenen-Modelle für die alten und erstmals auch für die neuen Bundesländer und Deutschland geschätzt. Erstmals werden zudem Wahlkreise als relevante Kontexteinheiten untersucht. Es zeigt sich, dass ein kleiner Teil der Varianz der individuellen Wahlentscheidung allein auf Merkmale des Wahlkreises zurückgeführt werden kann. Es treten sowohl direkte Kontexteffekte als auch Mehrebenen-Interaktionseffekte auf, die sich jedoch in ihrer Wirkung zwischen den Regionen und auch zwischen den Parteien erheblich unterscheiden.
Resumo:
This thesis consists of three self-contained papers. In the first paper I analyze the labor supply behavior of Bologna Pizza Delivery Vendors. Recent influential papers analyze labor supply behavior of taxi drivers (Camerer et al., 1997; and Crawford and Meng, 2011) and suggest that reference-dependence preferences have an important influence on drivers’ labor-supply decisions. Unlike previous papers, I am able to identify an exogenous and transitory change in labor demand. Using high frequency data on orders and rainfall as an exogenous demand shifter, I invariably find that reference-dependent preferences play no role in their labor’ supply decisions and the behavior of pizza vendors is perfectly consistent with the predictions of the standard model of labor’ supply. In the second paper, I investigate how the voting behavior of Members of Parliament is influenced by the Members seating nearby. By exploiting the random seating arrangements in the Icelandic Parliament, I show that being seated next to Members of a different party increases the probability of not being aligned with one’s own party. Using the exact spatial orientation of the peers, I provide evidence that supports the hypothesis that interaction is the main channel that explain these results. In the third paper, I provide an estimate of the trade flows that there would have been between the UK and Europe if the UK had joined the Euro. As an alternative approach to the standard log-linear gravity equation I employ the synthetic control method. I show that the aggregate trade flows between Britain and Europe would have been 13% higher if the UK had adopted the Euro.