Search results for "Exploit"

showing 10 items of 284 documents

Ecological role and exploitation of Posidonia oceanica in the Mediterranean area

2018

The paleoendemic seagrass Posidonia oceanica (L.) Delile (Posidoniaceae) represents a key species of the most important and productive ecosystem in subtidal habitats of the Mediterranean Sea. This species is the most common seagrass in Sicily where it forms dense and extensive beds, which are characterized by high coverage and primary production values, along the Western coasts. According to phenological processes, the beaching of P. oceanica residues (banquette) represents a great environmental, economic, social and, hygienic problem, conflicting with a number of activities (tourism, bathing establishments, etc.). Even though seagrasses play a fundamental ecological role in limiting coasta…

Posidonia oceanica ecology exploitation Mediterranean AreaSettore BIO/03 - Botanica Ambientale E Applicata
researchProduct

Experimenting lean dynamic performance management systems design in SMEs

2018

Purpose The purpose of this paper is to frame the potential benefits of lean dynamic performance management (PM) systems for small and micro-enterprises. Such systems may exploit the entrepreneur’s tacit knowledge and build on managerial competencies, by incorporating individual attributes into organisational routines. Design/methodology/approach The paper suggests the use of insight models based on the combination of lean PM tools and system dynamics (SD) modelling. Based on a number of exemplary cases, the paper discusses the potential benefits of these models, in respect to four specific contexts: artisan, new company start-up, established firm and micro-giant company. Related to such c…

Process managementExploitPerformance managementComputer scienceCase studieStrategy and Management05 social sciencesFrame (networking)Insight modelSystem dynamicGeneral Business Management and AccountingSystem dynamicsSmall and micro-firmConceptual frameworkSettore SECS-P/07 - Economia AziendaleTacit knowledge0502 economics and businessSystems design050211 marketingLean dynamic performance managementSet (psychology)Entrepreneurial capabilitie050203 business & management
researchProduct

Secret des affaires : la loi ne chasse pas le contrat

2018

International audience

Protection[SHS.DROIT]Humanities and Social Sciences/Law[SHS.DROIT] Humanities and Social Sciences/LawClause de non-exploitationDROIT COMMUN DES CONTRATSSecret des affairesComputingMilieux_MISCELLANEOUSClause de confidentialité
researchProduct

The Evolution of Pulp and Paper Industries in Finland, Sweden, and Norway, 1800–2005

2012

In this chapter, we study Finland, Sweden and Norway as examples of countries with small firm populations without intense domestic competition. This has enabled firms to build certain organizational capabilities while neglecting others. The basic story-line in the Nordic paper industry evolution is that a few firms that emerged as industrial populations were (a) built on to exploit abundant raw materials (timber, water, labor); (b) focused to a large extent on exporting their products; and (c) relied on cooperation between competitors to success in competition with the large firms populations of Britain and Germany – the two main markets for Nordic paper industry products.

Pulp millExploitbusiness.industryPulp (paper)Paper millCompetitor analysisRaw materialengineering.materialPulp and paper industryCompetition (economics)engineeringBusinessIndustrial organizationSmall firm
researchProduct

An Ambient Intelligence System for Assisted Living

2017

Nowadays, the population's average age is constantly increasing, and thus the need for specialized home assistance is on the rise. Smart homes especially tailored to meet elderly and disabled people's needs can help them maintaining their autonomy, whilst ensuring their safety and well-being. This paper proposes a complete context-aware system for Ambient Assisted Living (AAL), which infers user's actions and context, analyzing its past and current behavior to detect anomalies and prevent possible emergencies. The proposed system exploits Dynamic Bayesian Networks to merge raw data coming from heterogeneous sensors and infer user's behavior and health conditions. A rule-based reasoner is ab…

QA75ExploitComputer sciencemedia_common.quotation_subjectPopulationAmbient Assisted Living02 engineering and technologyAmbient Assisted Living; Multi-sensor data fusion; Dynamic Bayesian Networks; Context awareness; Rule-based ReasoningDynamic Bayesian NetworkHome automationHuman–computer interaction0202 electrical engineering electronic engineering information engineeringeducationDynamic Bayesian networkmedia_commonSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studyAmbient intelligenceMulti-sensor data fusionbusiness.industryRule-based ReasoningContext awarene020206 networking & telecommunicationsSemantic reasoner020201 artificial intelligence & image processingbusinessRaw dataAutonomy
researchProduct

RabbitQC: high-speed scalable quality control for sequencing data

2019

Abstract Motivation Modern sequencing technologies continue to revolutionize many areas of biology and medicine. Since the generated datasets are error-prone, downstream applications usually require quality control methods to pre-process FASTQ files. However, existing tools for this task are currently not able to fully exploit the capabilities of computing platforms leading to slow runtimes. Results We present RabbitQC, an extremely fast integrated quality control tool for FASTQ files, which can take full advantage of modern hardware. It includes a variety of operations and supports different sequencing technologies (Illumina, Oxford Nanopore and PacBio). RabbitQC achieves speedups between …

Quality ControlStatistics and ProbabilityFASTQ formatDownstream (software development)Exploitmedia_common.quotation_subjectBiochemistryNanopores03 medical and health sciencesSoftwareQuality (business)Molecular Biology030304 developmental biologymedia_common0303 health sciencesbusiness.industry030302 biochemistry & molecular biologyHigh-Throughput Nucleotide SequencingSequence Analysis DNAComputer Science ApplicationsComputational MathematicsTask (computing)Computational Theory and MathematicsComputer architectureScalabilityNanopore sequencingbusinessSoftwareBioinformatics
researchProduct

Tuition fees and student effort at university

2018

Abstract This paper presents theoretical and empirical evidence that an increase in tuition fees may boost university students’ academic effort. We examine the tuition fee rise introduced in 2012 by Spanish universities, where students register and pay for their chosen modules and fees increase each time students retake a module until they pass it. Data refer to students of economics, business and medicine at the University of Valencia during 2010–2014. The fact that some students pay fees in full while others are exempt from payment provides an identifying source of variation that we exploit using a flexible difference-in-differences methodology.

Register (sociolinguistics)Economics and EconometricsExploitbusiness.industrymedia_common.quotation_subject05 social sciencesAccountingPaymentDifference in differencesEducationVariation (linguistics)0502 economics and businessBusiness050207 economicsEmpirical evidence050205 econometrics media_commonEconomics of Education Review
researchProduct

Vulnerability Black Markets: Empirical Evidence and Scenario Simulation

2009

This paper discusses the manifest characteristics of online Vulnerability Black Markets (VBM), insider actors, interactions and mechanisms, obtained from masked observation. Because VBM transactions are hidden from general view, we trace their precursors as secondary evidence of their development and activity. More general attributes of VBMs and the exploits they discuss are identified. Finally, we introduce a simulation model that captures how vulnerability discoveries may be placed in a dual legal-black market context. We perform simulations and find that if legal markets expose vulnerabilities that go unresolved, the security and quality of software may suffer more than in the absence of…

Responsible disclosureExploitComputer scienceSoftware security assuranceVulnerabilityContext (language use)Vulnerability managementEmpirical evidenceComputer securitycomputer.software_genrecomputerIndustrial organizationInsider2009 42nd Hawaii International Conference on System Sciences
researchProduct

Vulnerability, freedom of choice and structural global injustice: The “consent” to exploitation of migrant women workers

2019

This chapter analyzes the philosophical implications related to the “position of vulnerability” defined by the Directive 2011/36/EU on Preventing and Combating Trafficking in Human Beings and Protecting its Victims as “a situation in which the person concerned has no real or acceptable alternative but to submit to the abuse involved” (art. 2.2). In particular, the chapter focuses on the “choice” made by migrant women employed in care and domestic work and in the agricultural sector in Italy. The Italian labor market is marked by the exploitation of migrant women, especially women from Romania, due to social, economic and legal factors that will be considered from a gender perspective. Women…

RightSettore IUS/20 - Filosofia Del DirittoMigrant WomenAdaptive preferenceTrafficking and ExploitationVulnerabilityConsenteFreedom of Choice
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct