3,278 research outputs found

    Yang-Baxter equation in spin chains with long range interactions

    Get PDF
    We consider the su(n) su(n) spin chains with long range interactions and the spin generalization of the Calogero-Sutherland models. We show that their properties derive from a transfer matrix obeying the Yang-Baxter equation. We obtain the expression of the conserved quantities and we diagonalize them.Comment: Saclay-t93/00

    Signe et signification des discours de marketing : analyse critique des contributions sémiotiques en marketing

    Get PDF
    Alors que la sémiotique et ses propositions méthodologiques d'analyse des discours sont bien répandues dans les milieux scientifiques, son utilisation sur des signes issus du monde des entreprises reste pourtant très limitée par rapport à sa contribution potentielle à la description et à l'explication de problèmes de marketing. Il est dès lors intéressant de montrer - indépendamment des orientations prises par la sémiotique - quel est l'objet de sa recherche ? Quels sont les outils qu'elle a développés ? Et quels sont les discours de marketing sur lesquels ces outils ont été appliqués? Enfin, on se penchera sur les problèmes qui limitent un usage plus étendu des outils sémiotiques en marketing tout en précisant les perspectives de recherche

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    Peut-on faire confiance à l'administration ? Une analyse du concept de confiance, appliqué au secteur public

    Get PDF
    D'une manière générale, la confiance est un « lubrifiant » (Arrow, 1974) facilitant les relations sociales (eg Luhmann, 1968, Giddens, 1984, Zucker, 1986). D'un point de vue économique, un environnement institutionnel bénéficiant d'une confiance élevée serait corrélé avec la performance de l'économie nationale (eg Dyer and Chu, 2003). La confiance, en tant que capital social, permettrait et engendrerait des comportements altruistes et coopératifs impactant et soutenant la prospérité économique d'une communauté (Fukuyama, 1995). Dans un cadre organisationnel, la confiance engendre une communication plus ouverte et facilite l'échange d'information (eg Smith and Barclay, 1997, Currall and Judge, 1995), facilite la gestion des conflits (eg Blomqvist, 2002), l'apprentissage commun (eg Bijlsma-Frankema, 2004) ou diminue les coûts d'intégration (eg Bidault and Jarillo, 1995), par exemple

    Das Image der Schweiz in den USA 2009

    Get PDF

    Can the administration be trusted? An analysis of the concept of trust, applied to the public sector

    Get PDF
    In the first part of this paper, we present the various academic debates and, where applicable, questions that remain open in the literature, particularly regarding the nature of trust, the distinction between trust and trustworthiness, its role in specific relationships and its relationship to control. We then propose a way of demarcating and operationalizing the concepts of trust and trustworthiness. In the second part, on the basis of the conceptual clarifications we present, we put forward a number of "anchor points" regarding how trust is apprehended in the public sector with regard to the various relations hips that can be studied. Schematically, we distinguish between two types of relations hips in the conceptual approach to trust: on one hand, the trust that citizens, or third parties, place in the State or in various public sector authorities or entities, and on the other hand, trust within the State or the public sector, between its various authorities, entities, and actors. While studies have traditionally focused on citizens' trust in their institutions, the findings, limitations and problems observed in public - sector coordination following the reforms associated with New Public Management have also elicited growing interest in the study of trust in the relationships between the various actors within the public sector. Both the theoretical debates we present and our propositions have been extracted and adapted from an empirical comparative study of coordination between various Swiss public - service organizations and their politico - administrative authority. Using the analysis model developed for this specific relationship, between various actors within the public service, and in the light of theoretical elements on which development of this model was based, we propose some avenues for further study - questions that remain open - regarding the consideration and understanding of citizens' trust in the public sector
    corecore