12,853 research outputs found

    Discovering the dynamics of smart business networks

    Get PDF
    Earlier research discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static “business operating systems”, as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences.smart business networks; business genetics; network performance; SBN; dynamics

    How and why communications industry suppliers get “squeezed out” by outsourcing: cases, impact and the next phases

    Get PDF
    The communications systems,terminals,and service, industries, have undergone over the past ten years a significant technological internal evolution and external revolution at customer end (such as shifting to IP, wireless 3G and LTE evolutions, new terminals, broadband...). Very little management research has studied their survivability irrespective of changes in demand volumes, due to technological sourcing and outsourcing practices driven by other global industries serving as predators in view of the huge business potential of communications products and services. These other industries include computing software, semiconductor and contract manufacturing industries, many of with roots in emerging countries. This paper analyzes the implications of using in-sourced genuine non-proprietary open communications standards , of the wider use of in-sourced /purchased technologies ,and of outsourced contract manufacturing . The methodology used is equilibrium analyses from case analysis data. They show a trend towards active or passive knowledge leakage. Three specific areas will be mentioned as examples .The paper also shows the processes how eventually those industries in a later cycle bounce back.Communications industry; Communications industry suppliers; Business processes; Intellectual property; Technical competence; Customer bases

    Privacy metrics and boundaries

    Get PDF
    This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are : -to allow to assess and compare different user scenarios and their differences ;for examples of scenarios see [4]; -to define a notion of privacy boundary, and design it to encompass the set of information , behaviours , actions and processes which the privacy protector can accept to expose to an information gathering under an agreement with said party ; everything outside the boundary is not acceptable and justifies not entering into the agreement ; -to characterize the contribution of privacy enhancing technologies (PET). A full case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy agreement.Privacy; Metrics; Set theory; Economics; Privacy enhancing technologies

    Business and social evaluation of denial of service attacks in view of scaling economic counter-measures

    Get PDF
    This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection methodologies are categorized by classes of targets. The use of the method is explained in the context of legal or policy driven dissuasive, retaliation or compensation/ restoration actions. A concrete set of deployment cases in the communications service and transport industries is discussed. The conclusion includes policy recommendations as well as information exchange requirements.Cyberwar; Denial of service; Business implications; Social implications; Mobile communications; Insurance

    The enumeration of generalized Tamari intervals

    Full text link
    Let vv be a grid path made of north and east steps. The lattice TAM(v)\rm{T{\scriptsize AM}}(v), based on all grid paths weakly above vv and sharing the same endpoints as vv, was introduced by Pr\'eville-Ratelle and Viennot (2014) and corresponds to the usual Tamari lattice in the case v=(NE)nv=(NE)^n. Our main contribution is that the enumeration of intervals in TAM(v)\rm{T{\scriptsize AM}}(v), over all vv of length nn, is given by 2(3n+3)!(n+2)!(2n+3)!\frac{2 (3n+3)!}{(n+2)! (2n+3)!}. This formula was first obtained by Tutte(1963) for the enumeration of non-separable planar maps. Moreover, we give an explicit bijection from these intervals in TAM(v)\rm{T{\scriptsize AM}}(v) to non-separable planar maps.Comment: 19 pages, 11 figures. Title changed, originally titled "From generalized Tamari intervals to non-separable planar maps (extended abstract)", submitte

    An extension of Tamari lattices

    Get PDF
    For any finite path vv on the square grid consisting of north and east unit steps, starting at (0,0), we construct a poset Tam(v)(v) that consists of all the paths weakly above vv with the same number of north and east steps as vv. For particular choices of vv, we recover the traditional Tamari lattice and the mm-Tamari lattice. Let v\overleftarrow{v} be the path obtained from vv by reading the unit steps of vv in reverse order, replacing the east steps by north steps and vice versa. We show that the poset Tam(v)(v) is isomorphic to the dual of the poset Tam(v)(\overleftarrow{v}). We do so by showing bijectively that the poset Tam(v)(v) is isomorphic to the poset based on rotation of full binary trees with the fixed canopy vv, from which the duality follows easily. This also shows that Tam(v)(v) is a lattice for any path vv. We also obtain as a corollary of this bijection that the usual Tamari lattice, based on Dyck paths of height nn, is a partition of the (smaller) lattices Tam(v)(v), where the vv are all the paths on the square grid that consist of n1n-1 unit steps. We explain possible connections between the poset Tam(v)(v) and (the combinatorics of) the generalized diagonal coinvariant spaces of the symmetric group.Comment: 18 page

    Matched direction detectors

    Get PDF
    In this paper, we address the problem of detecting a signal whose associated spatial signature is subject to uncertainties, in the presence of subspace interference and broadband noise, and using multiple snapshots from an array of sensors. To account for steering vector uncertainties, we assume that the spatial signature of interest lies in a given linear subspace H while its coordinates in this subspace are unknown. The generalized likelihood ratio test (GLRT) for the problem at hand is formulated. We show that the GLRT amounts to searching for the best direction in the subspace H after projecting out the interferences. The distribution of the GRLT under both hypotheses is derived and numerical simulations illustrate its performance
    corecore