Search results for "TRUS"

showing 10 items of 1249 documents

Anatomy of Cartel Contracts

2013

We study cartel contracts using data on 18 contract clauses of 109 legal Finnish manufacturing cartels. One third of the clauses relate to raising profits; the others deal with instability through incentive compatibility, cartel organization, or external threats. Cartels use three main approaches to raise profits: Price, market allocation, and specialization. These appear to be substitutes. Choosing one has implications on how cartels deal with instability. Simplifying, we find that large cartels agree on prices, cartels in homogenous goods industries allocate markets, and small cartels avoid competition through specialization.

Competition (economics)Microeconomicsjel:K12antitrust; cartels; competition policy; contracts; industry heterogeneityIncentive compatibilitySpecialization (functional)CartelCartels; contracts; antitrust; competition policy; industry heterogeneity.Businessjel:L40jel:L41Competition policyIndustrial organization
researchProduct

Comparison of Different Processing Methods to Prepare Poly(lactid acid)–Hydrotalcite Composites

2013

The effect of the compounding method on the morphology and on the properties of poly(lactic acid) (PLA)-hydrotalcite (HT) composites was studied. Moreover, the influence of two different kinds of HT - organically modified (OM-HT) and unmodified (U-HT) - and their concentration was evaluated. The composites were prepared using either a single screw extruder (SSE), a counter rotating twin-screw compounder (TSC) or a corotating twin-screw extruder (TSE). The prepared materials were characterized by scanning electron microscopy, gel permeation chromatography (GPC) analysis, mechanical and rheological measurements. The results indicated that the best morphology, i.e., particles dimension and dis…

Composite materialMaterials scienceMorphology (linguistics)Polymers and PlasticsHydrotalciteScanning electron microscopeGeneral ChemistryGel permeation chromatographyViscosityextrusionRheologyCompoundinghydrotalcitePoly(lactic acid)Materials ChemistryPLAcompositeComposite materialElastic modulus
researchProduct

Slacking with the Bot: Programmable Social Bot in Virtual Team Interaction

2021

Nonhuman communicators are challenging the prevailing conceptualizations of technology-mediated team communication. Slackbot is a social bot that can be configured to respond to trigger words and, thus, take part in discussions on the platform. A set of 84 bot-related communication episodes were identified from a journalistic team's Slack messages (N=45,940) and analyzed utilizing both qualitative content analysis and interaction process analysis (IPA). This integrated mixed-methods analysis revealed novel insights into the micro-level dynamics of human-machine communication in organizational teams. In response to Slackbot's greetings, acclamations, work-related messages, and relational mes…

Computer Networks and Communications518 Media and communicationsSocial Bots050801 communication & media studiesCOMMUNICATIONchattibotityhteisöviestintäfasilitointi0508 media and communicationsMICROBIOLOGY PROCEDURES0502 economics and businessTECHNOLOGYVirtual TeamsSlackbotConceptualization05 social sciencesVirtual teamtiimityöTeam CommunicationComputer Science ApplicationsEngineering managementOrganizational CommunicationWork teamsInteraction Process AnalysisQualitative AnalysisTRUSTverkkoviestintäPsychology050203 business & managementJournal of Computer-Mediated Communication
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Location of navigation menus in websites: an experimental study with Arabic users

2015

Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…

Computer Networks and CommunicationsComputer scienceArabicFirst languagemedia_common.quotation_subjectWebsite designPopulation050105 experimental psychologyWorld Wide WebReading (process)0501 psychology and cognitive scienceseducationComputer communication networks050107 human factorsmedia_commoneducation.field_of_studybusiness.industry05 social sciencesUsabilitylanguage.human_languageHuman-Computer InteractionTrustworthinessArabic Internet userslanguageThe InternetbusinessMenu locationSoftwareInformation SystemsUniversal Access in the Information Society
researchProduct

Identifying relevant segments of AI applications adopters : Expanding the UTAUT2’s variables

2021

Artificial intelligence (AI) is a future-defining technology, and AI applications are becoming mainstream in the developed world. Many consumers are adopting and using AI-based apps, devices, and services in their everyday lives. However, research examining consumer behavior in using AI apps is scant. We examine critical factors in AI app adoption by extending and validating a well-established unified theory of adoption and use of technology, UTAUT2. We also explore the possibility of unobserved heterogeneity in consumers’ behavior, including potentially relevant segments of AI app adopters. To augment the knowledge of end users’ engagement and relevant segments, we have added two new antec…

Computer Networks and CommunicationsComputer scienceunified theory of adoption and use of technology050801 communication & media studiesconsumer trusttekoälysovellusohjelmatGeneralLiterature_MISCELLANEOUS0508 media and communications0502 economics and businessMainstreamSegmentationElectrical and Electronic EngineeringUTAUT2käyttöönottoConsumer behaviourEnd user05 social sciencesCritical factorssegmentationkuluttajakäyttäytyminenartificial intelligenceData scienceheterogeenisuusAntecedent (grammar)segmentointiluottamuskuluttajat050211 marketingSurvey instrumentApplications of artificial intelligencetechnology fearheterogeneity
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

A Cognitive Model of Trust for Biological and Artificial Humanoid Robots

2018

This paper presents a model of trust for biological and artificial humanoid robots and agents as antecedent condition of interaction. We discuss the cognitive engines of social perception that accounts for the units on which agents operate and the rules they follow when they bestow trust and assess trustworthiness. We propose that this structural information is the domain of the model. The model represents it in terms of modular cognitive structures connected by a parallel architecture. Finally we give a preliminary formalization of the model in the mathematical framework of the I/O automata for future computational and human-humanoid application.

Computer Science (all)TrustworthineAndroid RobotCognitive ArchitectureTrustHuman-Humanoid interaction
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Combining conjunctive rule extraction with diffusion maps for network intrusion detection

2013

Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…

Computer scienceAnomaly-based intrusion detection systemNetwork securityintrusion detectiontunkeutumisen havaitseminenFeature extractionDiffusion mapdiffusion mapIntrusion detection systemMachine learningcomputer.software_genrepoikkeavuuden havaitseminenBlack boxtiedon louhintan-grammiCluster analysista113Training setrule extractionbusiness.industryn-gramanomaly detectiondiffuusiokarttakoneoppiminensääntöjen erottaminenAnomaly detectionArtificial intelligenceData miningtiedonlouhintabusinesscomputer2013 IEEE Symposium on Computers and Communications (ISCC)
researchProduct