10,897 research outputs found
Recommended from our members
Collaboration Networks, Structural Holes, And Innovation: A Longitudinal Study
To assess the effects of a firm's network of relations on innovation, this paper elaborates a theoretical framework that relates three aspects of a firm's ego network-direct ties, indirect ties, and structural holes (disconnections between a firm's partners)-to the firm's subsequent innovation output. It posits that direct and indirect ties both have a positive impact on innovation but that the impact of indirect ties is moderated by the number of a firm's direct ties. Structural holes are proposed to have both positive and negative influences on subsequent innovation. Results from a longitudinal study of firms in the international chemicals industry indicate support for the predictions on direct and indirect ties, but in the interfirm collaboration network, increasing structural holes has a negative effect on innovation. Among the implications for interorganizational network theory is that the optimal structure of interfirm networks depends on the objectives of the network members.Managemen
Computational coarse graining of a randomly forced 1-D Burgers equation
We explore a computational approach to coarse graining the evolution of the
large-scale features of a randomly forced Burgers equation in one spatial
dimension. The long term evolution of the solution energy spectrum appears
self-similar in time. We demonstrate coarse projective integration and coarse
dynamic renormalization as tools that accelerate the extraction of macroscopic
information (integration in time, self-similar shapes, and nontrivial dynamic
exponents) from short bursts of appropriately initialized direct simulation.
These procedures solve numerically an effective evolution equation for the
energy spectrum without ever deriving this equation in closed form.Comment: 21 pages, 7 figure
Cumulene Molecular Wire Conductance from First Principles
We present first principles calculations of current-voltage characteristics
(IVC) and conductance of Au(111):S2-cumulene-S2:Au(111) molecular wire
junctions with realistic contacts. The transport properties are calculated
using full self-consistent ab initio NEGF-DFT methods under external bias. The
conductance of the cumulene wires shows oscillatory behavior depending on the
number of carbon atoms (double bonds). Among all conjugated oligomers, we find
that cumulene wires with odd number of carbon atoms yield the highest
conductance with metallic-like ballistic transport behavior. The reason is the
high density of states in broad LUMO levels spanning the Fermi level of the
electrodes. The transmission spectrum and the conductance depend only weakly on
applied bias, and the IVC is nearly linear over a bias region from +1 to -1 V.
Cumulene wires are therefore potential candidates for metallic connections in
nanoelectronic applications.Comment: Accepted in Phys. Rev. B; 5 pages and 6 figure
Top quark pair production via collision in the littlest Higgs model with T-parity at the ILC
In the littlest Higgs model with T-parity, we studied the contributions of
the new particles to the top-quark pair production via collision
at the International Linear Collider. We calculated the top-quark pair
production cross section and found this process can generate significantly
relative correction. The result may be a sensitive probe of the littlest Higgs
model with T-parity
Avoiding unnecessary demerging and remerging of multiâcommodity integer flows
Resource flows may merge and demerge at a network node. Sometimes several demerged flows may be immediately merged again, but in different combinations compared to before they were demerged. However, the demerging is unnecessary in the first place if the total resources at each of the network nodes involved remains unchanged. We describe this situation as âunnecessary demerging and remerging (UDR)â of flows, which would incur unnecessary operations and costs in practice. Multiâcommodity integer flows in particular will be considered in this paper. This deficiency could be theoretically overcome by means of fixedâcharge variables, but the practicality of this approach is restricted by the difficulty in solving the corresponding integer linear program (ILP). Moreover, in a problem where the objective function has many cost elements, it would be helpful if such operational costs are optimized implicitly. This paper presents a heuristic branching method within an ILP solver for removing UDR without the use of fixedâcharge variables. We use the concept of âflow potentialsâ (different from âflow residuesâ for maxâflows) guided by which underutilized arcs are heuristically banned, thus reducing occurrences of UDR. Flow connection bigraphs and flow connection groups (FCGs) are introduced. We prove that if certain conditions are met, fully utilizing an arc will guarantee an improvement within an FCG. Moreover, a location subâmodel is given when the former cannot guarantee an improvement. More importantly, the heuristic approach can significantly enhance the full fixedâcharge model by warmâstarting. Computational experiments based on realâworld instances have shown the usefulness of the proposed methods
Relativity and the lead-acid battery
The energies of the solid reactants in the lead-acid battery are calculated
ab initio using two different basis sets at non-relativistic, scalar
relativistic, and fully relativistic levels, and using several
exchange-correlation potentials. The average calculated standard voltage is
2.13 V, compared with the experimental value of 2.11 V. All calculations agree
in that 1.7-1.8 V of this standard voltage arise from relativistic effects,
mainly from PbO2 but also from PbSO4
Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud: A Review
Cloud Computing has been accepted as the next generation architecture of IT Enterprise. The Cloud computing idea offers dynamically scalable resources provisioned as a service over and the Internet Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data and in use. various alternatives available for storage services, while data confidentiality is the solutions for the database as a service pattern are still undeveloped This architecture is supporting purely distributed clients to connect directly to an encrypted cloud database, and to execute simultaneous and independent operations including those modifying the database structure. The Access control policy is set out in which only authorised users are able to decrypt the stored information. This scheme prevents from replay attacks and supports formation, modification, and reading data stored in the cloud. This unique attribute, however, creates many new security challenges which have not been well understood. Security is to protect data from danger and vulnerability. There are various dangers and vulnerabilities to be handle. Various security issues and some of their solution are explained and are concentrating mainly on public cloud security issues and their solutions. Data should always be encrypted in a time when stored and transmitted
On Approximating Restricted Cycle Covers
A cycle cover of a graph is a set of cycles such that every vertex is part of
exactly one cycle. An L-cycle cover is a cycle cover in which the length of
every cycle is in the set L. The weight of a cycle cover of an edge-weighted
graph is the sum of the weights of its edges.
We come close to settling the complexity and approximability of computing
L-cycle covers. On the one hand, we show that for almost all L, computing
L-cycle covers of maximum weight in directed and undirected graphs is APX-hard
and NP-hard. Most of our hardness results hold even if the edge weights are
restricted to zero and one.
On the other hand, we show that the problem of computing L-cycle covers of
maximum weight can be approximated within a factor of 2 for undirected graphs
and within a factor of 8/3 in the case of directed graphs. This holds for
arbitrary sets L.Comment: To appear in SIAM Journal on Computing. Minor change
- âŠ