6,646 research outputs found

    Self-Stabilizing TDMA Algorithms for Dynamic Wireless Ad-hoc Networks

    Get PDF
    In dynamic wireless ad-hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust as well as have high bandwidth utilization, high predictability degree of bandwidth allocation, and low communication delay in the presence of frequent topological changes to the communication network. Recent studies have shown that existing implementations cannot guarantee the necessary satisfaction of these timing requirements. We propose a self-stabilizing MAC algorithm for DynWANs that guarantees a short convergence period, and by that, it can facilitate the satisfaction of severe timing requirements, such as the above. Besides the contribution in the algorithmic front of research, we expect that our proposal can enable quicker adoption by practitioners and faster deployment of DynWANs that are subject changes in the network topology

    What Strategies do Companies use to Transform Employees into Social Media Advocates?

    Get PDF
    There is an overwhelming consensus among researchers that employees have the potential to become excellent social ambassadors for their company. Readers of social media sites believe employees to be credible representatives of their organization, and therefore positive employee social media posts can create the image of a gratifying work environment and attract valuable talent to a particular organization. To capitalize on that recruitment advantage, an organization must initiate a process that enables and encourages employees to speak about the positive aspects of their work environment on social media platforms

    What Methods can an Organization Utilize to Spur Employees into Exploring New and Innovative Solutions to Organizational Challenges?

    Get PDF
    There is an overwhelming consensus among researchers that employee innovation can be generated through an organized process. Such a process involves the development of innovation leaders, widening employee access to challenge-pertinent information, and providing employees with adequate resources for experimentation. By implementing each of these steps, an organization can develop an employee innovation engine that will consistently produce innovative solutions to organizational challenges

    Approximate Convex Optimization by Online Game Playing

    Full text link
    Lagrangian relaxation and approximate optimization algorithms have received much attention in the last two decades. Typically, the running time of these methods to obtain a ϵ\epsilon approximate solution is proportional to 1ϵ2\frac{1}{\epsilon^2}. Recently, Bienstock and Iyengar, following Nesterov, gave an algorithm for fractional packing linear programs which runs in 1ϵ\frac{1}{\epsilon} iterations. The latter algorithm requires to solve a convex quadratic program every iteration - an optimization subroutine which dominates the theoretical running time. We give an algorithm for convex programs with strictly convex constraints which runs in time proportional to 1ϵ\frac{1}{\epsilon}. The algorithm does NOT require to solve any quadratic program, but uses gradient steps and elementary operations only. Problems which have strictly convex constraints include maximum entropy frequency estimation, portfolio optimization with loss risk constraints, and various computational problems in signal processing. As a side product, we also obtain a simpler version of Bienstock and Iyengar's result for general linear programming, with similar running time. We derive these algorithms using a new framework for deriving convex optimization algorithms from online game playing algorithms, which may be of independent interest

    Institutional Choice and Targeted Killing: A Comparative Perspective

    Get PDF
    For over a decade, the use of targeted killing has been one of the most controversial issues in counterterrorism policy and law. One longstanding debate over this tactic concerns the allocation of decision-making and oversight authority among the branches of government. As attempts to settle this debate through textual and historical sources yield indeterminant answers, scholars tend to examine them through a functionalist prism, asking what institutional structures best serve the interests of national security while ensuring adequate accountability and preventing unnecessary force. This article, retaining that functionalist framing of that issue, will approach the question through a comparative law analysis. Three of the countries most heavily engaged in global counterterrorism—the U.S., the U.K., and Israel—have adopted substantially different approaches for regulating counterterrorism targeting, each according a primary supervisory role to a different governmental actor: the Executive in the U.S., Parliament in the U.K., and the Judiciary in Israel. This article describes, compares, and critically analyzes these approaches. Drawing on comparative institutional analysis theory, it then examines the findings and reaches three main conclusions. First, that in light of the judiciary’s unique structural perspective and expertise, some judicial involvement in developing the legal standard that guides and constrains government action is desirable. Second, that suboptimal decision-making and illegality due to executive bias are more likely to occur where the executive is accountable only to its own internal oversight mechanisms. And third, that in both presidential and parliamentarian systems, legislators do not have and are unlikely to have any sort of meaningful influence on executive behavior in this domain. The article concludes by suggesting a few possible institutional reforms

    The Diffusion and Adoption of Advanced Technologies in Canada: An Overview of the Issues

    Get PDF
    The adoption of advanced technologies is a means of fostering productivity improvement. Many theories seek to explain the process of advanced technology diffusion and adoption. Canadian firms generally trail their U.S. counterparts in the adoption of advanced technology. There are many critical gaps in our knowledge and understanding of technological diffusion in Canada. Key gaps include the identification of leading and lagging industries in terms of adoption; key barriers to technological diffusion in Canada including economic-policy-related barriers; appropriate direct policy interventions to overcome specific barriers; the impact of increasing globalization and the economic ascendancy of the large developing countries on diffusion in Canada; and specific challenges small and medium enterprises face in adopting technology. Another issue requiring more research is whether strong R&D performance is a prerequisite for the broad diffusion of technologies. Possible tradeoffs between supporting R&D and supporting diffusion in the presence of limited public funds to promote innovation merit discussion.Diffusion, Adoption, Technologies, Technological diffusion, Innovation, Research and Development, R&D, Advanced technology, Technological competitiveness
    • …
    corecore