85,271 research outputs found

    Capabilities, Confusion, and the Costs of Coordination On Some Problems in Recent Research On Inter-Firm Relations

    Get PDF
    The arguably dominant approaches to the study of interfirm relations are the capabilities and organizational economics perspectives. This paper discusses their merits and weaknesses, concentrating on the capabilities perspective, which is argued to rest on rather weak foundations, particularly as a theory of economic organization (including interfirm relations). However, it is suggested that both perspectives may be seen as part of an overarching bargaining approach to economic organization (yet to be developed). Both perspectives have identified impediments to efficient bargaining.Interfirm relations, capabilities, organizational economics, research methodology

    Video Game Development in a Rush: A Survey of the Global Game Jam Participants

    Full text link
    Video game development is a complex endeavor, often involving complex software, large organizations, and aggressive release deadlines. Several studies have reported that periods of "crunch time" are prevalent in the video game industry, but there are few studies on the effects of time pressure. We conducted a survey with participants of the Global Game Jam (GGJ), a 48-hour hackathon. Based on 198 responses, the results suggest that: (1) iterative brainstorming is the most popular method for conceptualizing initial requirements; (2) continuous integration, minimum viable product, scope management, version control, and stand-up meetings are frequently applied development practices; (3) regular communication, internal playtesting, and dynamic and proactive planning are the most common quality assurance activities; and (4) familiarity with agile development has a weak correlation with perception of success in GGJ. We conclude that GGJ teams rely on ad hoc approaches to development and face-to-face communication, and recommend some complementary practices with limited overhead. Furthermore, as our findings are similar to recommendations for software startups, we posit that game jams and the startup scene share contextual similarities. Finally, we discuss the drawbacks of systemic "crunch time" and argue that game jam organizers are in a good position to problematize the phenomenon.Comment: Accepted for publication in IEEE Transactions on Game

    The Self-Organization of Speech Sounds

    Get PDF
    The speech code is a vehicle of language: it defines a set of forms used by a community to carry information. Such a code is necessary to support the linguistic interactions that allow humans to communicate. How then may a speech code be formed prior to the existence of linguistic interactions? Moreover, the human speech code is discrete and compositional, shared by all the individuals of a community but different across communities, and phoneme inventories are characterized by statistical regularities. How can a speech code with these properties form? We try to approach these questions in the paper, using the ``methodology of the artificial''. We build a society of artificial agents, and detail a mechanism that shows the formation of a discrete speech code without pre-supposing the existence of linguistic capacities or of coordinated interactions. The mechanism is based on a low-level model of sensory-motor interactions. We show that the integration of certain very simple and non language-specific neural devices leads to the formation of a speech code that has properties similar to the human speech code. This result relies on the self-organizing properties of a generic coupling between perception and production within agents, and on the interactions between agents. The artificial system helps us to develop better intuitions on how speech might have appeared, by showing how self-organization might have helped natural selection to find speech

    The evolution of morality and the end of economic man

    Get PDF
    1871 saw the publication of two major treatises in economics, with self-seeking economic man at their center. In the same year Darwin published The Descent of Man, which emphasized sympathy and cooperation as well as self-interest, and contained a powerful argument that morality has evolved in humans by natural selection. Essentially this stance is supported by modern research. This paper considers the nature of morality and how it has evolved. It reconciles Darwin's notion that a developed morality requires language and deliberation (and is thus unique to humans), with his other view that moral feelings have a long-evolved and biologically-inherited basis. The social role of morality and its difference with altruism is illustrated by an agent-based simulation. The fact that humans combine both moral and selfish dispositions has major implications for the social sciences and obliges us to abandon the pre-eminent notion of selfish economic man. Economic policy must take account of our moral nature.Peer reviewedFinal Accepted Versio

    Emergence of Zipf's Law in the Evolution of Communication

    Get PDF
    Zipf's law seems to be ubiquitous in human languages and appears to be a universal property of complex communicating systems. Following the early proposal made by Zipf concerning the presence of a tension between the efforts of speaker and hearer in a communication system, we introduce evolution by means of a variational approach to the problem based on Kullback's Minimum Discrimination of Information Principle. Therefore, using a formalism fully embedded in the framework of information theory, we demonstrate that Zipf's law is the only expected outcome of an evolving, communicative system under a rigorous definition of the communicative tension described by Zipf.Comment: 7 pages, 2 figure

    To reciprocate or not to reciprocate: Exploring temporal qualities in reciprocal exchanges in networks

    Get PDF
    In this article, we sought to draw theoretical explanations of reciprocal exchanges in networks and how reciprocity is seen as the building block of network sustainability through employing a temporal perspective. The article’s main contribution was to provide fresh insights into how temporality, drawn upon Bergson’s philosophy, advanced the way we look at reciprocity and consequently provided three perspectives of time, namely; emergent networks, discursive practices, and possible times. The practical implications of such perspectives inform organisation on how to select networks and predict their benefits. The research method included 28 interviews and casual observation of network sessions

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201
    • 

    corecore