Results 81 to 90 of about 5,122 (261)

The Bazaar as a Model for Knowledge Work

open access: yesKnowledge and Process Management, EarlyView.
ABSTRACT This paper presents fieldwork that extends existing metaphors of knowledge work as a process shaped by hierarchical or market forces. A qualitative, ethnographic study of six knowledge‐intensive businesses in two countries identifies striking parallels with the Middle Eastern bazaar in contrast to Western impersonal markets and hierarchies. We
Reed Elliot Nelson   +2 more
wiley   +1 more source

Reconsidering Volume‐Based Drug Procurement Policy: The Consequences of Manufacturers' Optimal Production Planning and Breach Strategies

open access: yesNaval Research Logistics (NRL), EarlyView.
ABSTRACT This paper examines the impacts of Volume‐Based Procurement (VBP) policies on pharmaceutical supply chains, with a focus on the strategic behaviors of manufacturers. VBP aims to reduce costs and stabilize supplies by centralizing procurement through competition based on volumes and prices.
Nani Zhou, Tong Wang, Guohua Wan
wiley   +1 more source

Minimizing Power Consumption in Video Servers by the Combined Use of Solid-State Disks and Multi-Speed Disks

open access: yesIEEE Access, 2018
Disks use a considerable portion of the total energy consumed by a video server. Solid-state disks (SSDs) can be used as a cache to reduce disk speeds, thereby decreasing the power consumed by disks.
Minseok Song
doaj   +1 more source

Finding Maximum Weight 2‐Packing Sets on Arbitrary Graphs

open access: yesNetworks, EarlyView.
ABSTRACT A 2‐packing set for an undirected, weighted graph G=(V,E,w)$$ G=\left(V,\kern0.3em E,\kern0.3em w\right) $$ is a subset 𝒮⊆V such that any two vertices v1,v2∈𝒮 are not adjacent and have no common neighbors. The Maximum Weight 2‐Packing Set problem that asks for a 2‐packing set of maximum weight is NP$$ \mathbf{NP} $$‐hard. Next to 13 novel data
Jannick Borowitz   +2 more
wiley   +1 more source

An efficient routing and cache management algorithm based on interest-community for opportunity networks

open access: yesDianxin kexue, 2018
Aiming at the problem of control message redundancy existing in BEEINFO algorithm,unconsidered node multi-neighbor message forwarding problem and unreasonable management of message in cache,an efficient routing and cache management algorithm named ...
Zhi REN, Kunlong WANG, Xiufeng LI
doaj   +2 more sources

Predictive caching in API Management

open access: yes, 2021
Hoje em dia as arquiteturas de integração assumem um papel crucial nas organizações. Cada vezmais os clientes começam a ter arquiteturas híbridas com sistemas em cloud e nos seus própriosdatacenters. Uma arquitetura de integração faz a ponte entre todas as aplicações, criando padrõesde gestão de API's, monitorização, reforço de políticas de segurança ...
openaire   +2 more sources

Exact Solutions for the Moving Firefighter Problem on Trees

open access: yesNetworks, EarlyView.
ABSTRACT The moving firefighter problem (MFP) is a more realistic variant of the classic firefighter problem (FP), where firefighters require time for both travel and defense. Unfortunately, the only known exact solution for the MFP does not scale. In this paper, we establish that the MFP is NP‐complete on trees of maximum degree three and present four
Mauro A. Montenegro‐Meza   +4 more
wiley   +1 more source

‘Manure gets into your veins’: Navigating plural valuation among rural landowners upstream from a Tribe‐led restoration project

open access: yesPeople and Nature, EarlyView.
Abstract Ecological restoration projects with diverse interest groups face the continual challenge of engaging values, goals and cultures that may vary greatly among partners. As part of an eco‐cultural, riparian restoration project led by the Northwestern Band of the Shoshone Nation, our research examines the instrumental, relational and intrinsic ...
Sarah Woodbury   +3 more
wiley   +1 more source

Research and Achievement of Redundancy Elimination of Backbone Network

open access: yesDianxin kexue, 2013
Nowadays, WAN transmission process has a lot of duplicate data, these duplicate data make bandwidth of WAN to be serious wasted. In order to solve this problem, a redundant data elimination strategy based on application layer protocol identification(PI ...
Baojian Liu   +3 more
doaj  

Exploiting Caching for Millimeter-Wave TCP Networks: Gain Analysis and Practical Design

open access: yesIEEE Access, 2018
Millimeter-wave (mmWave) communications are a key enabler of gigabit access using large spectrum resources. Most relevant works focus on the design of radio access networks (RANs), but a transport layer design tends to be overlooked despite its ...
Minho Kim   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy