121 research outputs found
How Do Personality Traits Affect Construction Dispute Negotiation? Study of Big Five Personality Model
This is an Accepted Manuscript of an article published by the American Society of Civil Engineers in the Journal of
Construction Engineering and Management. August 2010. This material may be downloaded for personal use only.
Any other use requires prior permission of the American Society of Civil Engineers. This material may be found at
https://doi.org/10.1061/(ASCE)CO.1943-7862.0000271Publishe
Behavioral transition: A framework for the construction conflict-tension relationship
“© 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”Publishe
Moderating Effect of Equity Sensitivity on Behavior-Outcome Relationships in Construction Dispute Negotiation
This material may be downloaded for personal use only. Any other use requires prior permission of the American Society of Civil Engineers. This material may be found at https://ascelibrary.org/doi/10.1061/%28ASCE%29CO.1943-7862.0000290Publishe
Exploring the influence of contract governance on construction dispute negotiation
This is an Accepted Manuscript of an article published by the American Society of Civil Engineers in the Journal
of Professional Issues in Engineering Education and Practice. October 2008. This material may be downloaded
for personal use only. Any other use requires prior permission of the American Society of Civil Engineers. This
material may be found at https://doi.org/10.1061/(ASCE)1052-3928(2008)134:4(391)Publishe
Application of Equity Sensitivity Theory to Problem-Solving Approaches in Construction Dispute Negotiation
This material may be downloaded for personal use only. Any other use requires prior permission of the American Society of Civil Engineers. This material may be found at https://ascelibrary.org/doi/10.1061/%28ASCE%29ME.1943-5479.0000031Publishe
Logistic regression modeling of construction negotiation outcomes
“© 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.”Publishe
Building Information Modeling Education for Quantity Surveyors in Hong Kong: Current States, Education Gaps, and Challenges
Rapid developments in building information modeling (BIM) are escalating the architecture, engineering, and construction (AEC) industry toward digital transformation. However, the lack of skilled BIM professionals is a critical issue slowing this transformation. Currently, few educational institutions include BIM topics in their curricula, especially those developed for quantity surveying (QS) programs. Moreover, the learning outcomes of BIM curricula may not meet the current industrial requirements. Thus, this study investigated the current states, gaps, and challenges of BIM education for QS practices in Hong Kong. This study conducted surveys to determine industrial requirements and a case study to examine the BIM curricula currently offered at Hong Kong educational institutions. The results suggest that the current BIM education for QS practices is in line with the pace of BIM development in the AEC industry. However, some advanced topics are not covered in BIM education. Additionally, the non-standardized BIM competencies to be attained by students lead to uncertainty and challenges in BIM education for quantity surveyors.Publishe
SPECS: Secure and privacy enhancing communications schemes for VANETs
This journal issue entitled: Advances in Ad Hoc Networks (I)Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement (with security analysis) and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques (through simulation study). We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles. © 2010 Elsevier B.V. All rights reserved.postprin
Privacy-preserving advance power reservation
Smart grid is considered to be the next generation power system. Integrating information and communication technology, power electronics, and power system technologies, smart grid reduces excess power generation by better matching power generation with customer demands, and facilitates renewable power generation by closely monitoring renewable energy source status. Such a large-scale network may be subject to various attacks. In particular, authentication and user privacy preservation are considered two major security concerns. In this article, we first highlight the importance of smart grid security. Next we introduce a new power request paradigm in which a customer is allowed to submit a power usage plan in advance. We then propose a secure and privacy-preserving power request scheme as a solution to this problem. To achieve the privacy-preserving property, our scheme employs two cryptographic techniques: anonymous credential and blind signature. We conclude this article by discussing the security and performance issues of our proposed scheme. © 1979-2012 IEEE.published_or_final_versio
- …