Results 111 to 120 of about 194,259 (259)

Resource reallocation across successive systemic innovations: How Rolls‐Royce shaped the evolution of the turbojet, turboprop, and turbofan

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary Despite the importance of resource reallocation in shaping a variety of strategic outcomes, strategy scholars have paid only limited attention to the processes by which firms reallocate their resources across successive systemic innovations.
Gino Cattani   +2 more
wiley   +1 more source

Shaping expectations, losing flexibility: A study of CEO promises as strategic communication tools

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary CEO promises are powerful but understudied communication tools. We develop a dual‐mechanism framework theorizing that while CEO promises elevate stakeholder expectations, they simultaneously constrain strategic flexibility. We argue that CEO promise‐making is shaped by two competing pressures: making more promises when the ...
Majid Majzoubi   +2 more
wiley   +1 more source

Limited Feedback Designs for Machine-Type Communications Exploiting User Cooperation

open access: yesIEEE Access, 2019
Multiuser multiple-input-multiple-output (MIMO) systems are a prime candidate for use in massive connection density in machine-type communication (MTC) networks.
Jiho Song   +3 more
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab

open access: yesSymbolic Interaction, EarlyView.
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz   +2 more
wiley   +1 more source

Independent Time Transfer in 5G Technology Over IP Core Networks Using PTN Overlay and Comparison With GPS/GNSS-Based Synchronization

open access: yesIEEE Access
Time synchronization is critical for 5G networks, enabling ultra-reliable low-latency communications (URLLC) and massive machine-type communications (mMTC).
Mustafa Serdar Osmanca   +3 more
doaj   +1 more source

A Statistical Priority-Based Scheduling Metric for M2M Communications in LTE Networks

open access: yesIEEE Access, 2017
Resource allocation, or scheduling, is one of the main challenges that face supporting machine-to-machine (M2M) communications on long term evolution networks. M2M traffic has unique characteristics.
Ahmed Elhamy Mostafa, Yasser Gadallah
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy