Search results for "sharing"

showing 10 items of 388 documents

Relationship between employee involvement and lean manufacturing and its effect on performance in a rigid continuous process industry

2015

Relationship between employee involvement and lean manufacturing and its effect on performance in a rigid continuous process industry DOI: 10.1080/00207543.2014.975852 Juan A. Marin-Garciaa* & Tomas Bonaviab Received: 1 Aug 2013 Accepted: 30 Sep 2014 Published online: 04 Nov 2014 This research aims to empirically test the effect of employee involvement on lean manufacturing (LM), and the effect of LM on production outcomes. Employee involvement is operationalised through four related variables: empowerment, training, contingent remuneration and communication. The effects are tested by recording management perceptions in a different industrial sector from those usually studied in previous re…

Engineeringparticipation in decision-makingbusiness.industryStrategy and Managementmedia_common.quotation_subjectInformation sharinglean productionManagement Science and Operations ResearchLean manufacturingIndustrial and Manufacturing Engineeringcompensationhuman resource managementSecondary sector of the economyHuman resource managementinformation sharingPartial least squares regressionRemunerationORGANIZACION DE EMPRESASProduction (economics)MarketingEmpowermentbusinesshigh-performance work practicesIndustrial organizationmedia_common
researchProduct

Entrepreneurship of an institutional field: the emergence of coworking spaces for digital business model

2020

AbstractCoworking spaces have been proliferating world-wide in urban and rural areas while facilitating entrepreneurship and new, especially digital business models. Our research analyzes the worldwide expansion by drawing upon mechanisms from institutional theory. We argue that the sense of community, emotional activation, the local communities together with the digital linkages and the open office allowed coworking spaces to evolve as a real space for entrepreneurship. The common lifestyle and the high digital identity of the users further explain the emergence of this entrepreneurship field that shows high convergent forms of coworking spaces. The key divergence comes with different owne…

EntrepreneurshipDivergence (linguistics)Field (Bourdieu)05 social sciencesSense of communitySpace (commercial competition)EconomiaManagement Information SystemsDigital identitySharing economyManagement of Technology and Innovation0502 economics and businessComputingMilieux_COMPUTERSANDSOCIETY050211 marketingSociologyEconomic geographyInstitutional theory050203 business & management
researchProduct

OPENNESS AND KNOWLEDGE AS LEADING TENDENCIES IN DEVELOPMENT OF MICRO ENTERPRISES

2012

Small and micro businesses are the key elements of market economy and most dynamic, flexible business sales form. Establishment and development of micro enterprises are a necessary condition for forming normal economic environment, what promotes manufacturing goods and competition between service companies. Micro enterprises are important source of work-places, create spirit of entrepreneurship and innovation in European Union and therefor are essential for strenghtening empoyment and competition. Lately there are heard a lot of speeches in media about importance of small and medium enterprises in the European Union and national level, but rarely are mentioned that most of these enterprises…

EntrepreneurshipService (economics)media_common.quotation_subjectGeneral partnershipOpenness to experienceEconomicsmedia_common.cataloged_instanceSmall and medium-sized enterprisesMarketingEuropean unionMicro-enterpriseKnowledge sharingmedia_commonECONOMICS AND MANAGEMENT
researchProduct

The environmental benefits of carsharing: The case study of Palermo

2020

Abstract The problems related to traffic emissions are becoming increasingly pressing and serious, especially in big cities where the private car plays the main role in the mobility of people, being excessively used, while walking, cycling and the use of public transport are often seen as secondary options and are hampered by a poorly urban environment. Therefore, solutions must be found to reduce the number of cars circulating in the city and to support the most sustainable modes of transport at the same time, in order to reduce emissions of greenhouse gases and harmful substances. A modal alternative which is of undoubted interest could be represented by carsharing, which is a mode comple…

Estimation050210 logistics & transportationPollutant emissionsbusiness.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies02 engineering and technologyEnvironmental economicsCar Ownership Carsharing Copert Emissions Urban mobilitySettore ICAR/05 - TrasportiOrder (exchange)KilometerService (economics)Greenhouse gasPublic transport021105 building & construction0502 economics and businessBusinessUrban environmentmedia_common
researchProduct

Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks

2005

Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…

Evolving networksFile sharingComputer sciencebusiness.industryInterdependent networksDistributed computingOverlay networkHierarchical control systemHierarchical network modelbusinessNetwork topologyWireless sensor networkComputer networkJoint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)
researchProduct

Notice of Violation of IEEE Publication Principles: Distributed Multimedia Digital Libraries on Peer-to-Peer Networks

2007

This paper presents an original approach to image sharing in large, distributed digital libraries, in which a user is able to interactively search interesting resources by means of content-based image retrieval techniques. The approach described here addresses the issues arising when the content is managed through a peer-to-peer architecture. In this case, the retrieval facilities are likely to be limited to queries based on unique identifiers or small sets of keywords, which may be quite inadequate, so we propose a novel algorithm for routing user queries that exploits compact representations of multimedia resources shared by each peer in order to dynamically adapt the network topology to …

ExploitMultimediabusiness.industryComputer scienceImage sharingPeer-to-peercomputer.software_genreDigital libraryNetwork topologyUnique identifierWorld Wide WebbusinesscomputerImage retrievalContent management14th International Conference of Image Analysis and Processing - Workshops (ICIAPW 2007)
researchProduct

Performance of LoRa for Bike-Sharing Systems

2019

Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer science020209 energy020208 electrical & electronic engineeringAutomotive industry02 engineering and technologyScalabilityLow data rate0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemBike sharingbusinessInternet of ThingsLoRa LoRaWAN Low Power Wide Area Net-works (LPWAN) Automotive Vehicular Network (VANET) bikebike-sharing tracker IoTComputer network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

Finite state verifiers with constant randomness

2014

We give a new characterization of $\mathsf{NL}$ as the class of languages whose members have certificates that can be verified with small error in polynomial time by finite state machines that use a constant number of random bits, as opposed to its conventional description in terms of deterministic logarithmic-space verifiers. It turns out that allowing two-way interaction with the prover does not change the class of verifiable languages, and that no polynomially bounded amount of randomness is useful for constant-memory computers when used as language recognizers, or public-coin verifiers. A corollary of our main result is that the class of outcome problems corresponding to O(log n)-space …

FOS: Computer and information sciencesDiscrete mathematicsClass (set theory)Computer Science - Logic in Computer ScienceFinite-state machineGeneral Computer ScienceComputational Complexity (cs.CC)Binary logarithmLogic in Computer Science (cs.LO)Theoretical Computer ScienceComputer Science - Computational ComplexityBounded functionVerifiable secret sharingConstant (mathematics)Time complexityRandomnessMathematics
researchProduct

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

2020

Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…

FOS: Computer and information sciencesKey generationComputer Science - Cryptography and Security020205 medical informaticsbusiness.industryComputer science020206 networking & telecommunicationsAccess controlCloud computing02 engineering and technologyMutual authenticationEncryptionPublic-key cryptographyData sharingComputer Science - Computers and SocietyComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSession keybusinessCryptography and Security (cs.CR)Computer network2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct