992 resultados para Wimberley, Texas


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We define a semantic model for purpose, based on which purpose-based privacy policies can be meaningfully expressed and enforced in a business system. The model is based on the intuition that the purpose of an action is determined by its situation among other inter-related actions. Actions and their relationships can be modeled in the form of an action graph which is based on the business processes in a system. Accordingly, a modal logic and the corresponding model checking algorithm are developed for formal expression of purpose-based policies and verifying whether a particular system complies with them. It is also shown through various examples, how various typical purpose-based policies as well as some new policy types can be expressed and checked using our model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Comparison are required to understand transport benefits of Transit Oriented Developments (TODs). Mode shares of TOD users need to be understood. Accurate travel demand models for TODs are needed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Texas Transportation Commission (“the Commission”) is responsible for planning and making policies for the location, construction, and maintenance of a comprehensive system of highways and public roads in Texas. In order for the Commission to carry out its legislative mandate, the Texas Constitution requires that most revenue generated by motor vehicle registration fees and motor fuel taxes be used for constructing and maintaining public roadways and other designated purposes. The Texas Department of Transportation (TxDOT) assists the Commission in executing state transportation policy. It is the responsibility of the legislature to appropriate money for TxDOT’s operation and maintenance expenses. All money authorized to be appropriated for TxDOT’s operations must come from the State Highway Fund (also known as Fund 6, Fund 006, or Fund 0006). The Commission can then use the balance in the fund to fulfill its responsibilities. However, the value of the revenue received in Fund 6 is not keeping pace with growing demand for transportation infrastructure in Texas. Additionally, diversion of revenue to nontransportation uses now exceeds $600 million per year. As shown in Figure 1.1, revenues and expenditures of the State Highway Fund per vehicle mile traveled (VMT) in Texas have remained almost flat since 1993. In the meantime, construction cost inflation has gone up more than 100%, effectively halving the value of expenditure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research report documents work conducted by the Center for Transportation (CTR) at The University of Texas at Austin in analyzing the Joint Analysis using the Combined Knowledge (J.A.C.K.) program. This program was developed by the Texas Department of Transportation (TxDOT) to make projections of revenues and expenditures. This research effort was to span from September 2008 to August 2009, but the bulk of the work was completed and presented by December 2008. J.A.C.K. was subsequently renamed TRENDS, but for consistency with the scope of work, the original name is used throughout this report.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driving under the influence (DUI) remains a serious concern. Most of the data on characteristics of DUI offenders come from driving records, with little data on the levels of impairment of DUI arrestees. This paper examines data on 103,181DUI offenders admitted to Texas treatment programs between 1988 and 2008. They reported past-year DUI arrests or came to treatment on DUI probation. The changes in the characteristics of DUI offenders over time are examined, along with the factors associated with treatment completion and abstinence 90 days after program discharge. Incorporation of substance abuse treatment with effective DUI education and intervention can improve road safety and reduce the burden of substance-related illness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The performance of automatic speech recognition systems deteriorates in the presence of noise. One known solution is to incorporate video information with an existing acoustic speech recognition system. We investigate the performance of the individual acoustic and visual sub-systems and then examine different ways in which the integration of the two systems may be performed. The system is to be implemented in real time on a Texas Instruments' TMS320C80 DSP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evidence suggests that both start-up and young firms (henceforth: new firms) – despite typically being resource-constrained – are sometimes able to innovate (Katila & Shane 2005). Such firms are seldom able to invest in expensive innovation processes, which suggests that they may rely on other pathways to innovation. In this paper, we test arguments that “bricolage,” defined as making do by applying combinations of the resources at hand to new problems and opportunities, provides a pathway to innovation for new firms. Our results suggest that variations in bricolage behaviors can provide an explanation of innovation under resource constraints by new firms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Successful organizational transformation relies on being able to achieve paradigm or collective schema change, and more particularly, the ability to manage the interplay between pre-existing schemas and alternative schemas required for new environments. This conceptual paper presents an analysis and critique of collective schema change dynamics. Two schema change pathways are reflected in the literature: frame-juxtapose-transition and frame-disengage-learning. Research findings in each pathway are limited and/or contradictory. Moreover, research on schema change focuses primarily on social dynamics and less on the relationship between social schema change dynamics and individual schema change dynamics. One implication of this lack of focus on individual schema change dynamics is the masking of the high level of cognitive processing and cognitive effort required by individuals to effect schema change. The capacity to achieve organizational transformation requires that more attention is given to managing these dynamics, which, in turn, requires significant investment in developing the change leadership capabilities of managers and the organizations they manage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Entrepreneurial Orientation (EO) has a 30 year history as one of the most used concepts in entrepreneurship research. “Recent attention in formal sessions at the Academy of Management conference programs confirm Entrepreneurial Orientation as a primary construct with a majority of Entrepreneurship Division sponsored sessions devoted to studies using EO related measures”, as reported by the 2010 division program chair, Per Davidson (Roberts, 2010: 9). However, questions continue to be raised concerning over-dependence on parts of one strategic scale, possible inappropriate or under-theorized adaptations, and the lack of theoretical development on application and performance variance in emergent, organizational, and socioeconomic settings. One recent area of investigation in analysis, methods, theory and application concerns an “EO gestalt”, focusing on the family of EO-related measures and theory, rather than on one or more dimensions, in order to explore the theory and process of the Entrepreneurial Orientation phenomenon. The goals of the 4th Annual EO3 PDW are to enlighten researchers on the development of Entrepreneurial Orientation theory and related scales, balance the use of Entrepreneurial Orientation current knowledge with new research frontiers suggested by EO3 scholars’ questions, and transcend boundaries in the discoveries undertaken in the shared interdisciplinary and cross-cultural research agenda currently developing for Entrepreneurial Orientation concepts. Going into its forth year, the EO3 PDW has been pivotal in formalizing discussion, pushing research forward, and gaining insights from experienced and cutting edge scholars, as it provides a point of reference for coalescing research questions and findings surrounding this important concept.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The importance of innovation to the long-term survival and growth of an organization has been well recognized and acknowledged, and HRM practitioners face a critical challenge to design and implement practices that ensure the behaviors and attitudes necessary for sustained innovation. In this paper, we present the findings from an exploratory study that establish initial indications of links between work design, training and dcvelopment, employee engagement, and innovative work behaviors, setting the agenda for lurther investigation of how spccific HR practices of work design and training and development can supp0l1 employee engagement, and facilitate sustained innovation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The nursing profession in Australia and other OECD countries such as the USA and the UK, have focused on ways to recruit and retain nurses (e.g., Bartram, Joiner, & Stanton, 2004). Research has shown that the most common factors impacting negatively on retention include sources of nursing stress such as workload and work environment. While the literature has shown that nursing staff encounter these stressors, studies do not examine the effects of stress caused by an increasing degree of administrative demand placed on nurses, caused by the new public management (NPM) reform in public and nonprofit (PNP) health care organizations. At best, some studies have alluded to some aspects of administrative related stressors (vis-a-vis nursing related stressors such as death, sickness, etc), but they have not been examined in any detail. Similarly, extant research has not examined how nurses cope with these administrative stressors. These will be the main aims of the present study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Corporate reputation is viewed as fundamental to firm performance, growth and survival and the maintenance and enhancement of that reputation is a key responsibility of senior executives. However, relatively little is known about the main dimensions of corporate reputation and the amount of attention given to them by senior executives. Based on the corporate reputation and intangible resources literatures, thirteen reputational elements were identified and the amount of attention given to those elements in a large, longitudinal sample of annual reports from Australian firms was measured using computer aided text analysis. This identified five, main reputational dimensions that were both stable over time and related to firms’ future financial performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In an effort to evaluate and improve their practices to ensure the future excellence of the Texas highway system, the Texas Department of Transportation (TxDOT) sought a forum in which experts from other state departments of transportation could share their expertise. Thus, the Peer State Review of TxDOT Maintenance Practices project was organized and conducted for TxDOT by the Center for Transportation Research (CTR) at The University of Texas at Austin. The goal of the project was to conduct a workshop at CTR and in the Austin District that would educate the visiting peers on TxDOT’s maintenance practices and invite their feedback. CTR and TxDOT arranged the participation of the following directors of maintenance: Steve Takigawa, CA; Roy Rissky, KS; Eric Pitts, GA; Jim Carney, MO; Jennifer Brandenburg, NC; and David Bierschbach, WA. One of the means used to capture the peer reviewers’ opinions was a carefully designed booklet of 15 questions. The peers provided TxDOT with written responses to these questions, and the oral comments made during the workshop were also captured. This information was then compiled and summarized in the following report. An examination of the peers’ comments suggests that TxDOT should use a more holistic, statewide approach to funding and planning rather than funding and planning for each district separately. Additionally, the peers stressed the importance of allocating funds based on the actual conditions of the roadways instead of on inventory. The visiting directors of maintenance also recommended continuing and proliferating programs that enhance communication, such as peer review workshops.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A new method for the detection of abnormal vehicle trajectories is proposed. It couples optical flow extraction of vehicle velocities with a neural network classifier. Abnormal trajectories are indicative of drunk or sleepy drivers. A single feature of the vehicle, eg., a tail light, is isolated and the optical flow computed only around this feature rather than at each pixel in the image.