Search results for "listing"
showing 6 items of 36 documents
Identifying motives underlying wine purchase decisions: Results from an exploratory free listing task with Burgundy wine consumers
2014
Abstract To better understand consumer decision making processes while purchasing wine it is important to identify which attributes consumers actually rely on and how they perceive and weight them in order to reach a final decision. The aims of the present work were to identify motives underlying wine purchase decisions and to identify consumer segments with different drivers of wine purchase. One hundred and twenty seven Burgundy wine consumers were asked to complete a free listing task. Relevance of each category of elicited terms was estimated by Smith's and Cognitive saliency indices. Hierarchical cluster analysis was performed on individual Smith's saliency indices. In the free listing…
El papel de la liquidez en el efecto de la nueva información. El caso de Latibex
2017
En 1999 se creó en España el mercado Latibex destinado a la contratación en euros de valores de las principales empresas latinoamericanas. Desde su creación este mercado se ha caracterizado por tener una menor actividad negociadora y menor liquidez que la existente en los mercados latinoamericanos de origen. El objetivo del trabajo es analizar si el efecto de la información trasmitida por el anuncio de ganancias trimestrales es diferente en ambos mercados, considerando los diferentes niveles de liquidez y actividad negociadora que presentan ambos mercados.Los resultados obtenidos confirman que el anuncio de ganancias es una información relevante para el valor de la empresa. Sin embargo, es …
Preventing Execution of Unauthorized Native-Code Software
2017
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. Thi…
Significant impact of new oral therapies against HCV on the waiting list for liver transplantation in Spain.
2018
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Enforcing trust for execution-protection in modern environments
2016
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. Modern processors contain hardware virtualization capabilities that support implementation of hypervisors for the purpose of managing multiple Virtual-Machines (VMs) on a single computer platform. The facilities provided by hardware virtualization grant the hypervisor control of the hardware platform at an effective privil…