12,853 research outputs found
Discovering the dynamics of smart business networks
Earlier research discussed the necessary evolution from smart business networks, as based on process need satisfaction and governance, into business genetics [1] based on strategic bonds or decay and opportunistic complementarities. This paper will describe an approach and diffusion algorithms whereby to discover the dynamics of emergent smart business network structures and their performance in view of collaboration patterns over time. Some real life early analyses of dynamics are discussed based on cases and date from the high tech sector. Lessons learnt from such cases are also given on overall smart network dynamics with respect to local interaction strategies, as modelled like in business genetics by individual partner profiles, goals and constraints. It shows the weakness of static “business operating systems”, as well as the possibly destabilizing clustering effects amongst nodes linked to filtering, evaluation and own preferences.smart business networks; business genetics; network performance; SBN; dynamics
How and why communications industry suppliers get “squeezed out” by outsourcing: cases, impact and the next phases
The communications systems,terminals,and service, industries, have undergone over the past ten years a significant technological internal evolution and external revolution at customer end (such as shifting to IP, wireless 3G and LTE evolutions, new terminals, broadband...). Very little management research has studied their survivability irrespective of changes in demand volumes, due to technological sourcing and outsourcing practices driven by other global industries serving as predators in view of the huge business potential of communications products and services. These other industries include computing software, semiconductor and contract manufacturing industries, many of with roots in emerging countries. This paper analyzes the implications of using in-sourced genuine non-proprietary open communications standards , of the wider use of in-sourced /purchased technologies ,and of outsourced contract manufacturing . The methodology used is equilibrium analyses from case analysis data. They show a trend towards active or passive knowledge leakage. Three specific areas will be mentioned as examples .The paper also shows the processes how eventually those industries in a later cycle bounce back.Communications industry; Communications industry suppliers; Business processes; Intellectual property; Technical competence; Customer bases
Privacy metrics and boundaries
This paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are : -to allow to assess and compare different user scenarios and their differences ;for examples of scenarios see [4]; -to define a notion of privacy boundary, and design it to encompass the set of information , behaviours , actions and processes which the privacy protector can accept to expose to an information gathering under an agreement with said party ; everything outside the boundary is not acceptable and justifies not entering into the agreement ; -to characterize the contribution of privacy enhancing technologies (PET). A full case is given with the qualitative and quantitative privacy metrics determination and envelope, i.e. a Cisco Inc. privacy agreement.Privacy; Metrics; Set theory; Economics; Privacy enhancing technologies
Business and social evaluation of denial of service attacks in view of scaling economic counter-measures
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection methodologies are categorized by classes of targets. The use of the method is explained in the context of legal or policy driven dissuasive, retaliation or compensation/ restoration actions. A concrete set of deployment cases in the communications service and transport industries is discussed. The conclusion includes policy recommendations as well as information exchange requirements.Cyberwar; Denial of service; Business implications; Social implications; Mobile communications; Insurance
The enumeration of generalized Tamari intervals
Let be a grid path made of north and east steps. The lattice
, based on all grid paths weakly above and
sharing the same endpoints as , was introduced by Pr\'eville-Ratelle and
Viennot (2014) and corresponds to the usual Tamari lattice in the case
. Our main contribution is that the enumeration of intervals in
, over all of length , is given by . This formula was first obtained by Tutte(1963) for
the enumeration of non-separable planar maps. Moreover, we give an explicit
bijection from these intervals in to non-separable
planar maps.Comment: 19 pages, 11 figures. Title changed, originally titled "From
generalized Tamari intervals to non-separable planar maps (extended
abstract)", submitte
An extension of Tamari lattices
For any finite path on the square grid consisting of north and east unit
steps, starting at (0,0), we construct a poset Tam that consists of all
the paths weakly above with the same number of north and east steps as .
For particular choices of , we recover the traditional Tamari lattice and
the -Tamari lattice.
Let be the path obtained from by reading the unit
steps of in reverse order, replacing the east steps by north steps and vice
versa. We show that the poset Tam is isomorphic to the dual of the poset
Tam. We do so by showing bijectively that the poset
Tam is isomorphic to the poset based on rotation of full binary trees with
the fixed canopy , from which the duality follows easily. This also shows
that Tam is a lattice for any path . We also obtain as a corollary of
this bijection that the usual Tamari lattice, based on Dyck paths of height
, is a partition of the (smaller) lattices Tam, where the are all
the paths on the square grid that consist of unit steps.
We explain possible connections between the poset Tam and (the
combinatorics of) the generalized diagonal coinvariant spaces of the symmetric
group.Comment: 18 page
Matched direction detectors
In this paper, we address the problem of detecting a signal whose associated spatial signature is subject to uncertainties, in the presence of subspace interference and broadband noise, and using multiple snapshots from an array of sensors. To account for steering vector uncertainties, we assume that the spatial signature of interest lies in a given linear subspace H while its coordinates in this subspace are unknown. The generalized likelihood ratio test (GLRT) for the problem at hand is formulated. We show that the GLRT amounts to searching for the best direction in the subspace H after projecting out the interferences. The distribution of the GRLT under both hypotheses is derived and numerical simulations illustrate its performance
- …