841 resultados para Lending multimedia.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we give an overview of current investigations into the incorporation of cutting edge technologies within the Higher Education teaching domain. In particular, the role of audio is discussed through a number of case studies. The paper then concludes with a discussion of the authors' plans to incorporate audio and video content as supplementary course material for a technical undergraduate module

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mutual fund managers increasingly lend their holdings and/or use short sales to generate higher returns for their funds. This project presents a first look into the impact these practices on performance using the performance measures: i) Characteristic Selectivity (CS), the ability of the fund's managers to choose stocks that outperform their benchmarks; ii) Characteristic Timing (CT), the ability of the manager to time the market; iii) and Average Style (AS), the returns from funds systematically holding stocks with certain characteristics. These returns are computed through the DGTW benchmarks. The effect of other variables that have also been shown to impact fund’s returns – total net assets under management, investment styles, turnover and expense ratios – will also be analyzed. I find that managers who use short-sales do not exhibit better stock picking abilities than those who do not, while mutual funds that lend do present higher CS returns. In addition, while lending is not significant for the total performance of a fund, the employment of short-sales and of both short-sales and lending has a negative impact on the fund’s performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the present case – and accompanying Teaching Notes – is to better understand the spin-off of PT Multimédia, by Portugal Telecom, after receiving a Public Takeover Offer from Sonaecom, in 2006. The Government and the Competition Authority had never looked in a serious way at PT’s dominant position and the lack of room for competition in the TMT sector – PT was the owner of both the cable and copper networks, having access to privileged information from its competitors with control over the wholesale and retail businesses. In 2006, the company received a takeover offer from Sonaecom, the TMT subsidiary from the Portuguese conglomerate Sonae. The offer was voted and rejected by a majority of PT shareholders, but the whole process triggered several recommendations from the regulatory bodies. As a result, PT divested its cable business with the spin-off of PT Multimédia, giving birth to a new competitor and a totally different landscape in the telecommunications sector in Portugal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tesis (Maestría en Ciencias de la Administración con Especialidad en Sistemas) UANL

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tesis (Maestro en Ciencias de la Ingeniería con Especialidad en Telecomunicaciones) - Universidad Autónoma de Nuevo León, 2002

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PériCulture est le nom d'un projet de recherche à l'Université de Montréal qui fait partie d'un projet plus vaste basé à l'Université de Sherbrooke. Ce dernier visait à former un réseau de recherche pour la gestion du contenu culturel numérique canadien. L'objectif général de la recherche de PériCulture était d'étudier les méthodes d'indexation de contenus culturels non textuels sur le Web, plus spécifiquement des images. Les résultats de la recherche présentés ici s'appuient sur des travaux précédents en indexation d'images et en indexation automatique (de texte), par l'étude des propriétés du texte associé à des images dans un environnement réseau. Le but était de comprendre la façon dont le texte associé à des images sur des pages Web (appelé péritexte) peut être exploité pour indexer les images correspondantes. Nous avons étudié cette question dans le contexte de pages Web sélectionnées, c'est à dire : des pages de contenu culturel canadien contenant des objets multimédia auxquels était associé du texte (plus que simplement les noms de fichiers et les légendes) et qui étaient bilingues (anglais et français). Nous avons identifié les mots-clés utiles à l'indexation situés à proximité de l'objet décrit. Les termes d'indexation potentiels ont été identifiés dans diverses balises HTML et dans le texte intégral (chacun étant considéré comme une source différente de péritexte). Notre étude a révélé qu'un grand nombre de termes d'indexation utiles sont disponibles dans le péritexte de nombreux sites Web ayant un contenu culturel, et ce péritexte de différentes sources a une utilité variable dans la recherche d’information. Nos résultats suggèrent que ces termes peuvent être exploités de différentes manières dans les systèmes de recherche d’information pour améliorer les résultats de recherche.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Microcredit, a non-profit lending approach that is often championed as a source of women’s inclusion and empowerment, has in the past decade been followed by microfinance, a forprofit sibling of a different temperament. Microfinance in India is now in turmoil, precipitated by legislation in the state of Andhra Pradesh, which has encouraged withholding of payment, which in turn has frozen the market. This paper considers one precipitating condition of the crisis: the remarkable, new, and developing burden of formal economic debt that poor women in the state have only recently come to hold – debt that now surpasses one year’s family income, on average. The development of this lending sector follows upon innovation in lending to the poor of the global north over the past two decades, and the practices show noteworthy parallels. Both lending schemes have produced similar disproportionate burdens upon some low-status individuals within their respective economic orders, and both may exploit a vulnerability that is born of aspiration and produces great dysfunction for borrowers. This paper introduces the two lending schemes, sketches the parallels, and introduces the claim that ethical finance arrangements for the poor require attention to vulnerability, an under-utilized category in both liberal ethical theory and in finance.