Search results for "General Computer Science"

showing 5 items of 895 documents

Processus d'évaluation de l'extension de marque par le consommateur : conception et validation d'un modèle de décomposition

2004

International audience; L'objectif de cet article est de montrer qu'il existe, au-delà du transfert de valeur de la marque, un transfert de valeur dû au produit en extension dans l'évaluation de l'extension de marque. Sur la base de la confrontation de trois champs de recherche rarement associés et complémentaires, nous proposerons le recours à deux déterminants de l'évaluation de l'extension de marque : le fit association et le fit contexte. Dans le cadre d'une étude empirique dans le domaine alimentaire, nous mettrons en évidence la supériorité du pouvoir explicatif de ces indices par rapport à la typicalité ainsi que le rôle modérateur de l'expertise. Les implications de l'étude sur l'ex…

typicalitéExtension de marquefit contexteGeneral Computer Science0502 economics and business05 social sciences[SHS.GESTION]Humanities and Social Sciences/Business administration050211 marketingfit associationcontexte de consommation050203 business & managementassociations valorisées
researchProduct

L'interaction lieu - objet comme conceptualisation de l'expérience vécue : test d'un modèle intégrateur

2008

L'expérience vécue par le consommateur fait l'objet de conceptualisations réductrices et normatives en marketing. Cet article défend une conceptualisation plus étoffée de l'expérience vécue fondée sur une interaction lieu-objet et s'appuyant sur le concept de valeur. Une analyse empirique dans le domaine du spectacle vivant est menée en vue de comparer des modélisations concurrentes de l'expérience vécue. Les résultats mettent en avant l'importance du rôle joué par le lieu de consommation comme cadre de l'expérience vécue et confirment son influence indirecte sur la valeur globale perçue. Enfin, ils permettent une validation des différents outils destinés à opérationnaliser ce modèle.

valeur de consommationGeneral Computer ScienceExpérience vécuespectacle vivantéchelle de mesurevaleur globale perçue[SHS.GESTION]Humanities and Social Sciences/Business administration[SHS.GESTION] Humanities and Social Sciences/Business administration[ SHS.GESTION ] Humanities and Social Sciences/Business administrationenvironnement physique
researchProduct

Working the fields of big data : Using big-data-augmented online ethnography to study candidate–candidate interaction at election time

2017

The paper proposes big-data-augmented ethnography as a novel mixed-methods approach to studying political discussions in a hybrid media system. Using such empirical setup, the authors examined candidate–candidate online interaction during election campaigning. Candidate–candidate interaction crossing party boundaries is scarce and occurs in the form of negative campaigning via social media, with the shaming of rival candidates and engaging in battles with them. The authors posit that ethnographic observations can be used to contextualize the computational analysis of large data sets, while computational analysis can be applied to validate and generalize the findings made through ethnography…

vuorovaikutusPublic AdministrationSociology and Political ScienceGeneral Computer Sciencecomputational social sciencessocial mediaeducationBig data518 Media and communicationssosiaalinen mediainteraction050801 communication & media studiescomputational social scienceethnographyWorld Wide WebPolitics0508 media and communicationsbig dataEthnography050602 political science & public administrationta517Social mediaelection campaigningpolitical discussionComputational analysisSociologyta518data science: electionsta113etnografiabusiness.industry517 Political science05 social sciencesnegative campaigning16. Peace & justice113 Computer and information sciencesData science0506 political scienceNegative campaigningComputational sociologyelections [data science]business
researchProduct

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct

Underwater Multirobot Cooperative Intervention MAC Protocol

2020

This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…

wireless networksaccess protocolsGeneral Computer ScienceComputer scienceUnderwater communicationsEnd-to-end delayTime division multiple accessThroughput02 engineering and technologyteleroboticsTelecomunicació0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceJitterbusiness.industryNetwork packetWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsApplication layerunderwater communicationslcsh:Electrical engineering. Electronics. Nuclear engineeringremotely operated vehiclesbusinessCommunications protocolRobotsProtocols de xarxes d'ordinadorslcsh:TK1-9971Underwater acoustic communicationComputer networkCommunication channelIEEE Access
researchProduct