1,121 research outputs found

    Back to software "profitable piracy": the role of information diffusion

    Get PDF
    Can software piracy be profitable for a software editor? We tackle this issue in a simple model where software is an experience good and where the potential users can choose to adopt or pirate software or to delay their adoption. In that context, we show that a moderate piracy can be profitable for a software editor to foster users' adoption.

    Back to software "profitable piracy": the role of information diffusion

    Get PDF
    Can software piracy be profitable for a software editor? We tackle this issue in a simple model where software is an experience good and where the potential users can choose to adopt or pirate software or to delay their adoption. In that context, we show that a moderate piracy can be profitable for a software editor to foster users' adoption.

    UPAYA MENINGKATKAN PENGUASAAN MATERI LOGARITMA MELALUI MODEL PEMBELAJARAN KOOPERATIF TIPE THINK PAIR SHARE PADA SISWA KELAS X SMA NEGERI 1 SUNGAI RAYA

    Get PDF
    Efforts to improve themastery of logarithm through cooperative learning model think pair shareatclass X students of SMA Negeri 1 Sungai Raya . The purpose of this study was to describe the effort to improve the mastery of logarithm through cooperative learning model think pair share in class X SMA Negeri 1 Sungai Raya . The method used was Classroom Action Research conducted by 2 cycles with a purpose to get good study planning, implementation and up can improve result learn student in comprehending logarithm items at study of mathematics. With the descriptive method of data collector that is used is a matter of observation and test sheets . Result of from this research is from condition of early to condition of first cycle  its improvement equal to 19,8 %, and from condition of first cycle to condition of second mount equal to 13,3%. Becoming from condition of early to condition of second mount equal to 35,7 %. This means that there has been a increasedthe mastery of logarithm through cooperative learning model think pair shareatclass X students of SMA Negeri 1 Sungai Raya. Keywords: Improve math skills,material logarithm, cooperative learning model think pair share

    Thermo-mechanical process parameters effect on a 9 % Cr-2 % W steel

    Get PDF
    In this paper the effect of thermo-mechanical parameters on the mechanical behavior of a 9 % Cr-2 % W steel is investigated by hot rolling and heat treatment on pilot scale. Results show a strong effect of reheating temperature before rolling on the material hardness, due to an increase of hardenability following the austenite grain growth. A poor effect of the hot reduction and of the following tempering temperature is detected in the total investigated deformation range. A loss of impact energy is found coupled with the hardness increase. The tensile properties values are strongly depending upon the tempering temperature and an increase of tensile yield stress (Rp0,2) and ultimate stress (Rm) have been recorded in tensile test carried on at T = 550°C and T = 650°C

    Publisher's Announcements and Piracy-Monitoring Devices in Software Adoption

    Get PDF
    à paraître dans les Annales d'Economie et de StatistiqueInternational audienceIn this paper, we investigate the distribution strategy of a software publisher. The user adoption context is characterized by uncertainty about quality (experience good) and heterogeneous piracy costs. Users can purchase or get unauthorized/illegal copies (digital piracy) of the software during two periods (or not adopt at all). Between these two periods, users can acquire information through word-of-mouth. To maximize profit, the publisher needs to decide about price, quality and level of monitoring of piracy. We show that the software publisher can profit from accommodation a certain level of piracy of the product. We add to the literature by explicitly considering the opportunity for the publisher to cheat about future price and monitoring levels (misleading announcements). This strategy that is falsely permissive towards piracy, can sometimes appear more profitable. However, when the degree of sophistication of user expectations about the publisher's strategy increases, only a strategy that is permissive (with respect to piracy) with non misleading announcements remains robust

    Nutrient availability links mitochondria, apoptosis, and obesity

    Get PDF
    Mitochondria are the dominant source of the cellular energy requirements through oxidative phosphorylation, but they are also central players in apoptosis. Nutrient availability may have been the main evolutionary driving force behind these opposite mitochondrial functions: production of energy to sustain life and release of apoptotic proteins to trigger cell death. Here, we explore the link between nutrients, mitochondria and apoptosis with known and potential implications for age‐related decline and metabolic syndromes

    LENDING ROBOTS AND HUMAN CROWDS: INTEREST RATE DETERMINATION ON A REVERSE AUCTION PLATFORM

    Get PDF
    We analyze the determinants of the level of interest rates related to business loans traded on digital crowdlending platforms. We consider one of the leading platforms in France and collect-ed original data on all the projects financed via this platform. On that platform, interest rates are set by the crowd of investors through a reverse auction process. We show that the loan characteristics and the scoring provided by the platform significantly influences the interest rate. However, though financial ratios are used traditionally to estimate credit risk, those ratios do not exhibit significant influence. Besides, we analyze the impact of the recent implementation of an automated auction mechanism. This implementation seems to have a large impact on both auction duration and on the determinants of interest rate. This suggests that use of a robot im-pacts on price and saving allocation on this platform-based credit market

    MODELLING PLASTIC DEFORMATION OF STAINLESS STEEL PIPES

    Get PDF
    Plastic deformation is the most common technique adopted to manufacture complex shape pieces in the most efficient way. Even higher requirements need to be faced in the different applications. In order to target such requirement quality and compliance tests are carried out aimed to guarantee that these standards are faced; this often means a waste of material and economic resources. A far as concerns welded stainless steel pipes many criticises affecting the general trend of subsequent machining need to be considered. In this paper the effects of different process parameters and geometrical constrains on austenitic stainless steel pipe forming are studied by Finite Elements Method (FEM) simulations. The model sensitivity to input parameters is reported. The feasibility of the simulated process is evaluated through the use of Forming Limit Diagrams (FLD). </p

    Bandwidth measurements and capacity exploitation in Gigabit Passive Optical Networks2014 Fotonica AEIT Italian Conference on Photonics Technologies

    Get PDF
    We report an experimental investigation on the measurement of the available bandwidth for users in Gigabit Passive Optical Networks (GPON) and the limitations caused by the Internet protocols. We point out that the huge capacity offered by the GPON highlights the enormous differences that can be showed among the available and actually exploitable bandwidth in the case of TCP. In this ultrabroadband environment we also investigated on use of the UDP and of the multisession TCP. A correlation in terms of QoE is also reported

    Multilevel bandwidth measurements and capacity exploitation in gigabit passive optical networks

    Get PDF
    The authors report an experimental investigation on the measurement of the available bandwidth for the users in gigabit passive optical networks (GPON) and the limitations caused by the Internet protocols, and transfer control protocol (TCP) in particular. We point out that the huge capacity offered by the GPON highlights the enormous differences that can be showed among the available and actually exploitable bandwidth. In fact, while the physical layer capacity can reach value of 100 Mb/s and more, the bandwidth at disposal of the user (i.e. either throughput at transport layer or goodput at application layer) can be much lower when applications and services based on TCP protocol are considered. In the context of service level agreements (SLA) verification, we show how to simultaneously measure throughput and line capacity by offering a method to verify multilayer SLA. We also show how it is possible to better exploit the physical layer capacity by adopting multiple TCP connections avoiding the bottleneck of a single connection
    corecore