141 research outputs found
Open innovation and firm performance in small-sized R&D active companies in the chemical industry:the case of Belgium
This paper relates the practice of open innovation in small R&D active chemical companies to firm performance in terms of employment and financial position. This relationship is examined during a period of economic downturn and applied to the Belgian situation. The Belgian case is interesting since it is characterised by a high economic importance of the chemical industry and a strongly developed national (eco-) innovation system in the sector. According to their different evolution over the last decade, a distinction is made between basic chemicals and pharmaceuticals. In terms of open innovation strategy, a distinction is made between companies innovating completely internally (closed innovators), firms engaged in R&D outsourcing, firms engaged in research cooperation, and firms integrating outsourcing and cooperation in their knowledge sourcing strategy. After controlling for a broad range of R&D characteristics, we found that firms engaged in outsourcing or having an integrated open innovation approach performed better in terms of the evolution of employment during the period 2005-2010. Also, the analysis revealed firms having a formal R&D manager and a long-term research vision more often combine average to strong employment growth with a prosperous financial position.<br
Steiner t-designs for large t
One of the most central and long-standing open questions in combinatorial
design theory concerns the existence of Steiner t-designs for large values of
t. Although in his classical 1987 paper, L. Teirlinck has shown that
non-trivial t-designs exist for all values of t, no non-trivial Steiner
t-design with t > 5 has been constructed until now. Understandingly, the case t
= 6 has received considerable attention. There has been recent progress
concerning the existence of highly symmetric Steiner 6-designs: It is shown in
[M. Huber, J. Algebr. Comb. 26 (2007), pp. 453-476] that no non-trivial
flag-transitive Steiner 6-design can exist. In this paper, we announce that
essentially also no block-transitive Steiner 6-design can exist.Comment: 9 pages; to appear in: Mathematical Methods in Computer Science 2008,
ed. by J.Calmet, W.Geiselmann, J.Mueller-Quade, Springer Lecture Notes in
Computer Scienc
There are no non-trivially uniformly (t,r)-regular graphs for t \u3e 2.
A finite simple graph is uniformly (t, r)-regular if it has at least t vertices and the open neighbor set of each set of t of its vertices is of cardinality r. If t \u3e 1, such a graph is trivially uniformly (t, r)-regular if either it is a matching (t = r) or r is the number of non-isolated vertices in the graph. We prove the result stated in the title
Immune mechanisms in malaria: new insights in vaccine development.
Early data emerging from the first phase 3 trial of a malaria vaccine are raising hopes that a licensed vaccine will soon be available for use in endemic countries, but given the relatively low efficacy of the vaccine, this needs to be seen as a major step forward on the road to a malaria vaccine rather than as arrival at the final destination. The focus for vaccine developers now moves to the next generation of malaria vaccines, but it is not yet clear what characteristics these new vaccines should have or how they can be evaluated. Here we briefly review the epidemiological and immunological requirements for malaria vaccines and the recent history of malaria vaccine development and then put forward a manifesto for future research in this area. We argue that rational design of more effective malaria vaccines will be accelerated by a better understanding of the immune effector mechanisms involved in parasite regulation, control and elimination
Corporate decision-making in R&D outsourcing and the impact on internal R&D employment intensity
Expression profile of human Fc receptors in mucosal tissue: implications for antibody-dependent cellular effector functions targeting HIV-1 transmission
The majority of new Human Immunodeficiency Virus (HIV)-1 infections are acquired via sexual transmission at mucosal surfaces. Partial efficacy (31.2%) of the Thai RV144 HIV-1 vaccine trial has been correlated with Antibody-dependent Cellular Cytotoxicity (ADCC) mediated by non-neutralizing antibodies targeting the V1V2 region of the HIV-1 envelope. This has led to speculation that ADCC and other antibody-dependent cellular effector functions might provide an important defense against mucosal acquisition of HIV-1 infection. However, the ability of antibody-dependent cellular effector mechanisms to impact on early mucosal transmission events will depend on a variety of parameters including effector cell type, frequency, the class of Fc-Receptor (FcR) expressed, the number of FcR per cell and the glycoslyation pattern of the induced antibodies. In this study, we characterize and compare the frequency and phenotype of IgG (CD16 [FcγRIII], CD32 [FcγRII] and CD64 [FcγRI]) and IgA (CD89 [FcαR]) receptor expression on effector cells within male and female genital mucosal tissue, colorectal tissue and red blood cell-lysed whole blood. The frequency of FcR expression on CD14+ monocytic cells, myeloid dendritic cells and natural killer cells were similar across the three mucosal tissue compartments, but significantly lower when compared to the FcR expression profile of effector cells isolated from whole blood, with many cells negative for all FcRs. Of the three tissues tested, penile tissue had the highest percentage of FcR positive effector cells. Immunofluorescent staining was used to determine the location of CD14+, CD11c+ and CD56+ cells within the three mucosal tissues. We show that the majority of effector cells across the different mucosal locations reside within the subepithelial lamina propria. The potential implication of the observed FcR expression patterns on the effectiveness of FcR-dependent cellular effector functions to impact on the initial events in mucosal transmission and dissemination warrants further mechanistic studies
Embracing open innovation to acquire external ideas and technologies and to transfer internal ideas and technologies outside
The objective of this dissertation is to increase understanding of how organizations can embrace open innovation in order to acquire external ideas and technologies from outside the organization, and to transfer internal ideas and technologies to outside the organization. The objective encompasses six sub-objectives, each addressed in one or more substudies. Altogether, the dissertation consists of nine substudies and a compendium summarizing the substudies.
An extensive literature review was conducted on open innovation and crowdsourcing literature (substudies 1–4). In the subsequent empirical substudies, both qualitative research methods (substudies 5–7) and quantitative research methods (substudies 8–9) were applied. The four literature review substudies provided insights on the body of knowledge on open innovation and crowdsourcing. These substudies unveiled most of the influential articles, authors, and journals of open innovation and crowdsourcing disciplines. Moreover, they identified research gaps in the current literature.
The empirical substudies offer several insightful findings. Substudy 5 shows how non-core ideas and technologies of a large firm can become valuable, especially for small firms. Intermediary platforms can find solutions to many pressing problems of large organizations by engaging renowned scientists from all over world (substudy 6). Intermediary platforms can also bring breakthrough innovations with novel mechanisms (substudy 7). Large firms are not only able to garner ideas by engaging their customers through crowdsourcing but they can also build long-lasting relations with their customers (substudies 8 and 9). Embracing open innovation brings challenges for firms too.
Firms need to change their organizational structures in order to be able to fully benefit from open innovation. When crowdsourcing is successful, it produces a very large number of new ideas. This has the consequence that firms need to allocate a significant amount of resources in order to identify the most promising ideas. In an idea contest, customarily, only one or a few best ideas are rewarded (substudy 7). Sometimes, no reward is provided for the selected idea (substudies 8 and 9). Most of the ideas that are received are not implemented in practice
Standard decomposition of expansive ergodically supported dynamics
In this work we introduce the notion of weak quasigroups, that are quasigroup
operations defined almost everywhere on some set. Then we prove that the
topological entropy and the ergodic period of an invertible expansive
ergodically supported dynamical system with the shadowing property
establishes a sufficient criterion for the existence of quasigroup operations
defined almost everywhere outside of universally null sets and for which is
an automorphism. Furthermore, we find a decomposition of the dynamics of in
terms of -invariant weak topological subquasigroups.Comment: 18 pages, the conditions on the entropy in Theorem 3.5 was improved.
Some small changes in the text, by adding more explanation
Perfect Secrecy Systems Immune to Spoofing Attacks
We present novel perfect secrecy systems that provide immunity to spoofing
attacks under equiprobable source probability distributions. On the theoretical
side, relying on an existence result for -designs by Teirlinck, our
construction method constructively generates systems that can reach an
arbitrary high level of security. On the practical side, we obtain, via cyclic
difference families, very efficient constructions of new optimal systems that
are onefold secure against spoofing. Moreover, we construct, by means of
-designs for large values of , the first near-optimal systems that are 5-
and 6-fold secure as well as further systems with a feasible number of keys
that are 7-fold secure against spoofing. We apply our results furthermore to a
recently extended authentication model, where the opponent has access to a
verification oracle. We obtain this way novel perfect secrecy systems with
immunity to spoofing in the verification oracle model.Comment: 10 pages (double-column); to appear in "International Journal of
Information Security
- …
