Search results for "Cryptography"

showing 10 items of 657 documents

New Innovation Identification Approach Development Matrix

2018

Innovations have become one of the contemporary economics key driving forces behind competitive advantages and have become socioeconomic category of their own. Diffusion of innovations, which is an integral part of the scientific and technological base of national economies, promotes structural changes in economy. Companies have to pay close attention to market trends and have to be able to identify and create new innovations, thus increasing their competitiveness and meeting consumer demands and expectations. The objective of this research is to evaluate the concept of different innovations in organizations and propose a complex approach to identifying innovations in the form of a matrix t…

Process (engineering)05 social sciencesMatrix (music)Innovation processScientific literature010501 environmental sciences01 natural sciencesCompetitive advantageDiffusion of innovationsComputingMilieux_GENERALIdentification (information)0502 economics and businessKey (cryptography)Business050203 business & managementIndustrial organization0105 earth and related environmental sciences
researchProduct

The role of negative and positive forms of power in supporting CSR alignment and commitment between large firms and SMEs

2018

Do large firms exert power to shape the CSR behavior of their SME partners?” We answer this question by proposing a model built on the stakeholder theory and the shareholder theory, and go on to explain how this impact influences the commitment of the SME towards their large partner. The model highlights the central role that different forms of power exercised by the large firm play in the process. A survey of 291 SMEs confirms the key hypotheses, including the mediating role of reward power. The effects of coercive power are noteworthy and they illustrate the complex and competing forces at play in influencing CSR behavioral change in SMEs. The research makes a novel contribution to practi…

Process (engineering)vallankäyttöCoercionCSR orientationPower (social and political)Shareholderkumppanuusyritysvastuuvaikuttaminen0502 economics and businesssuuryrityksetta512Stakeholder theorynormative commitmentIndustrial organizationMarketing05 social sciencessitoutuminenaffective commitmentCoercive powercontinuance commitmentreward powerKey (cryptography)Corporate social responsibility050211 marketingBusinesscoercive powerpienet ja keskisuuret yritykset050203 business & management
researchProduct

Applying Dynamic Performance Management to Public Emergency Management: An Analysis of the Wenchuan Earthquake

2020

Previous studies in public emergency management confirm that collaboration assumes a relevant role in strengthening society’s capacity to cope with complex phenomena, such as disasters. However, empirical researches on emergency management show problems in performance measurement, mainly in employing narrow measures focusing on the results of single organisations rather than the entire system. Starting from a Chinese earthquake (Wenchuan) case, as an example, we use the dynamic performance management approach to develop a performance framework. This framework aims at investigating the interrelationships of different actors involved in emergency management and designing appropriate public em…

Process managementDynamic performance managementPerformance managementEmergency managementComputer sciencebusiness.industryFrame (networking)Outcome measuresDisaster managementEmergency managementOutcome measureSettore SECS-P/07 - Economia AziendaleKey (cryptography)Network governancePerformance measurementbusinessNetwork governance
researchProduct

Holonic Handling the Unexpected in Project Management

2017

Abstract Risk assessment is one the key activities of any project. The unexpected situations can have catastrophic consequences. Risk assessment tries to estimate to potential known unknowns, but there is no guarantee to foresee all circumstances around a project. In this situation the project team must be adaptive and find solutions by cooperation, creativity and abductive reasoning. In the paper we tried to analyse on what extent a project and a project team can be handled as a complex adaptive system. More precisely, how the scientific and practical achievements of the theory of complex adaptive systems (CAS) can be used in project management. More exactly, we analyse the applicability o…

Process managementbusiness.industryComputer scienceComplex systemKey (cryptography)Project managementbusinessRisk assessmentComplex adaptive systemProject teamAbductive reasoningRisk managementBalkan Region Conference on Engineering and Business Education
researchProduct

Adaptation of Risk Sharing Partnerships (RSP) to New Industries

2020

The aerospace industry has since the 1990s used a partnership model called Risk Sharing Partnerships (RSP) to handle certain challenges faced in the development of new aircrafts. The RSP model allows the client to include key suppliers in the development of a new product, and hence sharing the burden of investment, risk mitigation, as well as the future sales income. This makes it easier to acquire funding for the development of new products and technologies, in addition to accelerating the development process by including key competencies earlier (Buzacott and Peng in Eur J Oper Res 218:656–666, 2012). RSP have raised interest in other industries, which calls for increased knowledge of con…

Process managementbusiness.industryProcess (engineering)New product developmentKey (cryptography)Investment (macroeconomics)businessAdaptation (computer science)AerospaceContingencyRisk management
researchProduct

Sustainability Theory: A Review of Key Ideas for Sustainability and green procurement context

2020

Sustainability and sustainable development have become important concepts and goals across science and society. Sustainability, connected to desirable long-term conditions, is an inherently applied in public sector, public procurements. Every year the European Union (EU) Member States collectively spend around 14% of Gross Domestic Product (GDP) on public procurement. In Latvia, public procurement accounts for 17% of GDP. The review of the new public procurement directives and their transposition process in Latvia plans to show new opportunities for green public procurement (GPP) application: the contracting authority will be able to reject, for example, an abnormally low bid, include envir…

ProcurementProcess managementSustainabilityKey (cryptography)Context (language use)Business11th GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES
researchProduct

From Requirements to Code in a Model Driven Way

2010

Though there is a lot of support for model driven development the support for complete model driven path from requirements to code is limited. The approach proposed in this paper offers such a path which is fully supported by model transformations. The starting point is semiformal requirements containing behaviour description in a controlled natural language. A chain of models is proposed including analysis, platform independent and platform specific models. A particular architecture style is chosen by means of selecting a set of appropriate design patterns for these models. It is shown how to define informally and then implement in model transformation language MOLA the required transforma…

Programming languageComputer sciencecomputer.software_genrelanguage.human_languageSet (abstract data type)Controlled natural languageUnified Modeling LanguagePath (graph theory)Software design patternCode (cryptography)languagePoint (geometry)computerAlgorithmModel transformation languagecomputer.programming_language
researchProduct

Statechart-based design controllers for FPGA partial reconfiguration

2015

Statechart diagram and UML technique can be a vital part of early conceptual modeling. At the present time there is no much support in hardware design methodologies for reconfiguration features of reprogrammable devices. Authors try to bridge the gap between imprecise UML model and formal HDL description. The key concept in author's proposal is to describe the behavior of the digital controller by statechart diagrams and to map some parts of the behavior into reprogrammable logic by means of group of states which forms sequential automaton. The whole process is illustrated by the example with experimental results.

Programming languageProcess (engineering)Computer scienceControl reconfigurationcomputer.software_genreAutomatonLogic synthesisUnified Modeling LanguageComputer architectureKey (cryptography)Digital controlField-programmable gate arraycomputercomputer.programming_languagePhotonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2015
researchProduct

Quantum Security Proofs Using Semi-classical Oracles

2019

We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.

Provable securityFlexibility (engineering)Post-quantum cryptographyTheoretical computer scienceComputer sciencebusiness.industry0102 computer and information sciences02 engineering and technologyMathematical proofEncryption01 natural sciencesPublic-key cryptographyUnruh effect010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringParallelism (grammar)020201 artificial intelligence & image processingbusiness
researchProduct

On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators

2018

International audience; There is not a proper mathematical definition of chaos, we have instead a quite big amount of definitions, each of one describes chaos in a more or less general context. Taking in account this, it is clear why it is hard to design an algorithm that produce random numbers, a kind of algorithm that could have plenty of concrete appliceautifat (anul)d bions. However we must use a finite state machine (e.g. a laptop) to produce such a sequence of random numbers, thus it is convenient, for obvious reasons, to redefine those aimed sequences as pseudorandom; also problems arise with floating point arithmetic if one wants to recover some real chaotic property (i.e. propertie…

Pseudorandom number generator020203 distributed computingSequenceFinite-state machineDynamical systems theoryComputer science010102 general mathematicsChaotic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]0101 mathematicsBoolean functionAlgorithmRandomnessGenerator (mathematics)2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct