938 resultados para computer network


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este trabajo analiza cómo se puede crear valor a través del uso de las TIC. Para ello se utiliza el Modelo de creación de valor en e-business desarrollado por Amit y Zott (2001) y se aplica a una tipología de nuevos intermediarios que opera en el sector de los contenidos digitales: gregadores de noticias. Para lograr este objetivo, se ha realizado un estudio exploratorio y un estudio de casos a través de entrevistas personales con informadores estratégicos y un análisis del contenido de las páginas web de 56 empresas relacionadas con el sector y cuestionarios, principalmenteSe han analizado empresas de EEUU, Canadá, España, Francia, Alemania, Reino Unido y Suiza

Relevância:

60.00% 60.00%

Publicador:

Resumo:

En los últimos años se ha producido un incremento del uso de la telefonía móvil e Internet con fines intimidatorios o simplemente para amenazar a los iguales en los centros escolares de nuestro país. Con la voluntad de aportar datos que puedan ayudar a su prevención, se ha realizado un estudio de encuesta en el que se ha obtenido información relativa a las amenazas recibidas a través de los nuevos medios de comunicación, es decir, Internet y la telefonía móvil. Los resultados indican que un 23.3% de los estudiantes de los centros públicos de Enseñanza Secundaria Obligatoria de la ciudad de Girona (Cataluña), durante el curso escolar, han recibido vía Internet o telefonía móvil algún mensaje que, por su contenido, ha supuesto una amenaza para su bienestar. Se analizan las consecuenciasemocionales y las estrategias de afrontamiento utilizadas por parte de estos adolescentes

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Cyber Warfare held at the Department of Military Technology of the National Defence University in the fall of 2012. This book is a collection of some of talks that were presented in the seminar. The papers address computer network defence in military cognitive networks, computer network exploitation, non-state actors in cyberspace operations, offensive cyber-capabilities against critical infrastructure and adapting the current national defence doctrine to cyber domain. This set of papers tries to give some insight to current issues of the cyber warfare. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer. By the end of the 20th century technological advances had made it feasible to distribute media content over a computer network instead of on physical objects, thus enabling the concept of digital media distribution. Many digital media distribution systems already exist, and their continued, and in many cases increasing, usage is an indicator for the high interest in their future enhancements and enriching. By looking at these digital media distribution systems, we have identified three main areas of possible improvement: network structure and coordination, transport of content over the network, and the encoding used for the content. In this thesis, our aim is to show that improvements in performance, efficiency and availability can be done in conjunction with improvements in software quality and reliability through the use of formal methods: mathematical approaches to reasoning about software so that we can prove its correctness, together with the desirable properties. We envision a complete media distribution system based on a distributed architecture, such as peer-to-peer networking, in which different parts of the system have been formally modelled and verified. Starting with the network itself, we show how it can be formally constructed and modularised in the Event-B formalism, such that we can separate the modelling of one node from the modelling of the network itself. We also show how the piece selection algorithm in the BitTorrent peer-to-peer transfer protocol can be adapted for on-demand media streaming, and how this can be modelled in Event-B. Furthermore, we show how modelling one peer in Event-B can give results similar to simulating an entire network of peers. Going further, we introduce a formal specification language for content transfer algorithms, and show that having such a language can make these algorithms easier to understand. We also show how generating Event-B code from this language can result in less complexity compared to creating the models from written specifications. We also consider the decoding part of a media distribution system by showing how video decoding can be done in parallel. This is based on formally defined dependencies between frames and blocks in a video sequence; we have shown that also this step can be performed in a way that is mathematically proven correct. Our modelling and proving in this thesis is, in its majority, tool-based. This provides a demonstration of the advance of formal methods as well as their increased reliability, and thus, advocates for their more wide-spread usage in the future.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A number of frameworks have been suggested for online retailing, but still there exists little consensus among researchers and practitioners regarding the appropriate amount of information critical and essential to the improvement of customers' satisfaction and their purchase intention. Against this backdrop, this study contributes to the current practical and theoretical discussions and conversations about how information search and perceived risk theories can be applied to the management of online retailer website features. This paper examines the moderating role of website personalization in studying the relationship between information content provided on the top US retailers' websites, and customer satisfaction and purchase intention. The study also explores the role played by customer satisfaction and purchase intention in studying the relationship between information that is personalized to the needs of individual customers and online retailers' sales performance. Results indicate that the extent of information content features presented to online customers alone is not enough for companies looking to satisfy and motivate customers to purchase. However, information that is targeted to an individual customer influences customer satisfaction and purchase intention, and customer satisfaction in tum serves as a driver to the retailer's online sales performance.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study examines the efficiency of search engine advertising strategies employed by firms. The research setting is the online retailing industry, which is characterized by extensive use of Web technologies and high competition for market share and profitability. For Internet retailers, search engines are increasingly serving as an information gateway for many decision-making tasks. In particular, Search engine advertising (SEA) has opened a new marketing channel for retailers to attract new customers and improve their performance. In addition to natural (organic) search marketing strategies, search engine advertisers compete for top advertisement slots provided by search brokers such as Google and Yahoo! through keyword auctions. The rationale being that greater visibility on a search engine during a keyword search will capture customers' interest in a business and its product or service offerings. Search engines account for most online activities today. Compared with the slow growth of traditional marketing channels, online search volumes continue to grow at a steady rate. According to the Search Engine Marketing Professional Organization, spending on search engine marketing by North American firms in 2008 was estimated at $13.5 billion. Despite the significant role SEA plays in Web retailing, scholarly research on the topic is limited. Prior studies in SEA have focused on search engine auction mechanism design. In contrast, research on the business value of SEA has been limited by the lack of empirical data on search advertising practices. Recent advances in search and retail technologies have created datarich environments that enable new research opportunities at the interface of marketing and information technology. This research uses extensive data from Web retailing and Google-based search advertising and evaluates Web retailers' use of resources, search advertising techniques, and other relevant factors that contribute to business performance across different metrics. The methods used include Data Envelopment Analysis (DEA), data mining, and multivariate statistics. This research contributes to empirical research by analyzing several Web retail firms in different industry sectors and product categories. One of the key findings is that the dynamics of sponsored search advertising vary between multi-channel and Web-only retailers. While the key performance metrics for multi-channel retailers include measures such as online sales, conversion rate (CR), c1ick-through-rate (CTR), and impressions, the key performance metrics for Web-only retailers focus on organic and sponsored ad ranks. These results provide a useful contribution to our organizational level understanding of search engine advertising strategies, both for multi-channel and Web-only retailers. These results also contribute to current knowledge in technology-driven marketing strategies and provide managers with a better understanding of sponsored search advertising and its impact on various performance metrics in Web retailing.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This work consists of a theoretical part and an experimental one. The first part provides a simple treatment of the celebrated von Neumann minimax theorem as formulated by Nikaid6 and Sion. It also discusses its relationships with fundamental theorems of convex analysis. The second part is about externality in sponsored search auctions. It shows that in these auctions, advertisers have externality effects on each other which influence their bidding behavior. It proposes Hal R.Varian model and shows how adding externality to this model will affect its properties. In order to have a better understanding of the interaction among advertisers in on-line auctions, it studies the structure of the Google advertisements networ.k and shows that it is a small-world scale-free network.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Disseny i creació d'una nova pàgina web per a l'Escola Universitària d'Hostalaria i Turisme de Sant Pol de Mar

Relevância:

60.00% 60.00%

Publicador:

Resumo:

En el contexto universitario estamos asistiendo a un proceso de cambio a diferentes niveles. Los nuevos grados nos inclinan hacia una enseñanza-aprendizaje por competencias y a la evaluación continua en la que el alumno debe ser el protagonista y sujeto activo de su aprendizaje. Ante esta situación nos preguntamos, ¿conoce el profesor cómo acceden a la información los jóvenes de hoy? ¿Sabe cuáles son sus estrategias y recursos? Si el alumno es el protagonista de su aprendizaje, es propio que el docente conozca los nuevos modos del estudiante tanto de acceder a la información como a gestarla. Si enseñar es un acto de empatía, cabe pensar cómo podemos conectar con los estudiantes ante sus nuevas formas de buscar, procesar y sintetizar la información. En este trabajo presentamos una experiencia que realizamos en la Facultat de Formació del Professorat de la Universitat de Barcelona en la asignatura de Didáctica de la educación visual y plástica. La particularidad estriba en que utilizamos una herramienta muy popular en el entorno cotidiano de los jóvenes de hoy: el fotolog. Adecuamos los contenidos a las nuevas formas de recepción e interacción de los estudiantes en un proceso de descubrimiento, exploración y creación donde el fotolog fue el medio para desarrollar los contenidos. Contenidos, por otra parte, también creados de acuerdo a los intereses que se iban presentando en el día a día

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Aquest projecte final de carrera pretén investigar i experimentar una nova línia de desenvolupament d’algorismes dinàmics. A partir de l’algorisme AntNet-QoS [2] s’ incorporen noves mesures a l’algorisme (mesura de l’amplada de banda disponible i jitter), les quals combinant amb la mesura de retard ja feta servir, permet adaptar-se millor a les condicions actuals del trànsit en la xarxa i als requeriments específics de qualitat (QoS) per part del trànsit

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este trabajo analiza cómo se puede crear valor a través del uso de las TIC. Para ello se utiliza el Modelo de creación de valor en e-business desarrollado por Amit y Zott (2001) y se aplica a una tipología de nuevos intermediarios que opera en el sector de los contenidos digitales: gregadores de noticias. Para lograr este objetivo, se ha realizado un estudio exploratorio y un estudio de casos a través de entrevistas personales con informadores estratégicos y un análisis del contenido de las páginas web de 56 empresas relacionadas con el sector y cuestionarios, principalmente Se han analizado empresas de EEUU, Canadá, España, Francia, Alemania, Reino Unido y Suiza

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper a novel methodology aimed at minimizing the probability of network failure and the failure impact (in terms of QoS degradation) while optimizing the resource consumption is introduced. A detailed study of MPLS recovery techniques and their GMPLS extensions are also presented. In this scenario, some features for reducing the failure impact and offering minimum failure probabilities at the same time are also analyzed. Novel two-step routing algorithms using this methodology are proposed. Results show that these methods offer high protection levels with optimal resource consumption

Relevância:

60.00% 60.00%

Publicador:

Resumo:

TCP flows from applications such as the web or ftp are well supported by a Guaranteed Minimum Throughput Service (GMTS), which provides a minimum network throughput to the flow and, if possible, an extra throughput. We propose a scheme for a GMTS using Admission Control (AC) that is able to provide different minimum throughput to different users and that is suitable for "standard" TCP flows. Moreover, we consider a multidomain scenario where the scheme is used in one of the domains, and we propose some mechanisms for the interconnection with neighbor domains. The whole scheme uses a small set of packet classes in a core-stateless network where each class has a different discarding priority in queues assigned to it. The AC method involves only edge nodes and uses a special probing packet flow (marked as the highest discarding priority class) that is sent continuously from ingress to egress through a path. The available throughput in the path is obtained at the egress using measurements of flow aggregates, and then it is sent back to the ingress. At the ingress each flow is detected using an implicit way and then it is admission controlled. If it is accepted, it receives the GMTS and its packets are marked as the lowest discarding priority classes; otherwise, it receives a best-effort service. The scheme is evaluated through simulation in a simple "bottleneck" topology using different traffic loads consisting of "standard" TCP flows that carry files of varying sizes

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed