Search results for "store"
showing 10 items of 128 documents
Gestión Pública (2010/11)
2010
La gestión pública es la culminación del proceso político – administrativo, ya que es a través de ella como las decisiones, elecciones y las políticas públicas se convierten en productos que se ponen a disposición bien de la propia Administración, bien de los ciudadanos.En el momento presente nos hallamos en una situación en la que la manera tradicional de gestionar las estructuras de gestión, los asuntos públicos y los propios productos públicos están siendo fuertemente cuestionadas, al tiempo que se lanzan una serie de propuestas para su reforma que todavía no han llegado a cristalizar en un modelo alternativo al burocrático convencional, y que se agolpan bajo la etiqueta general de la Nu…
Latvian Army’s Quartermaster Services in 1919 - 1940.
2014
Elektroniskā versija nesatur pielikumus
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing
2009
Many data storage schemes have been proposed in the past for keeping dependable data storage, but they are not designed for Unattended Wireless Sensor Networks (UWSNs). When applying these schemes to UWSNs, most of them have limitations such as high storage requirement, transmission cost, and not resilient to a large number of node compromises. To address the problem of data storage, transmission cost, and resilience of node compromise in UWSNs, we propose a novel Homomorphic Encryption and Homomorphic Secret Sharing based scheme (HEHSS) to accomplish the goals of confidentiality, resilience to node compromises, reliability, and efficiency of storage and transmission. Our scheme exploits th…
Expression of genes encoding the calcium signalosome in cellular and transgenic models of Huntington's disease
2013
Huntington's disease (HD) is a hereditary neurodegenerative disease caused by the expansion of a polyglutamine stretch in the huntingtin (HTT) protein and characterized by dysregulated calcium homeostasis. We investigated whether these disturbances are correlated with changes in the mRNA level of the genes that encode proteins involved in calcium homeostasis and signaling (i.e., the calciosome). Using custom-made TaqMan low-density arrays containing probes for 96 genes, we quantified mRNA in the striatum in YAC128 mice, a model of HD, and wildtype mice. HTT mutation caused the increased expression of some components of the calcium signalosome, including calretinin, presenilin 2, and calmyri…
How store design contributes to the evolution of retail brand positioning : a longitudinal case study
2014
One of the innovative ways favoured by retailers to drive change in their value proposition is to review the design of their stores. Academic contributions to the in-store experience have mostly focused on consumer perspective and identifying relevant managerial practices. The core of this research studies how repositioning a retail brand translates into the experiential design of retail spaces. To this end, the research follows the repositioning process from a managerial perspective and updates the mechanisms that underlie it. The longitudinal study of embedded cases reveals the importance of an holistic design that takes into account the desired interactions between the shopper and the st…
The role of the distribution platform in price formation of paid apps
2015
In this paper we study the role of the distribution platform as an important determinant of price of paid apps. We also examine how the distribution platform influences the price implications of important developers' app-level decisions. To these purposes, we construct a hierarchical model of price formation by using an ad-hoc panel dataset consisting of top paid apps from the two major app stores, namely Apple's App Store and Google Play. Our findings show that prices of paid apps strongly depend on the platform where the apps are marketed. Specifically, the App Store is associated with lower prices for paid apps than Google Play. We find evidence that this is because the impact of cross-s…
IPM-recommended insecticides harm beneficial insects through contaminated honeydew
2020
The use of some systemic insecticides has been banned in Europe because they are toxic to beneficial insects when these feed on nectar. A recent study shows that systemic insecticides can also kill beneficial insects when they feed on honeydew. Honeydew is the sugar-rich excretion of hemipterans and is the most abundant carbohydrate source for beneficial insects such as pollinators and biological control agents in agroecosystems. Here, we investigated whether the toxicity of contaminated honeydew depends on i) the hemipteran species that excretes the honeydew; ii) the active ingredient, and iii) the beneficial insect that feeds on it. HPLC-MS/MS analyses demonstrated that the systemic insec…
Out-of-Plane Behavior of URM Infill: Accuracy of Available Capacity Models
2022
The aim of this paper is to check the accuracy of analytical capacity models available for the prediction of out-of-plane strength of unreinforced masonry (URM) infill walls. The accuracy of the available models is checked by detailed comparison with the existing experimental results. In doing so, both types of capacity models are evaluated: Type I for the prediction of the strength in the undamaged state, and Type II for the prediction of strength reduction in the in-plane damaged state. Results from the calculations are discussed, and the best among the available models are recommended. Furthermore, the influence of orthotropy of the infill masonry in the out-of-plane capacity predicted b…
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
2013
Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…
El valor del establecimiento y su relación con la imagen de marca privada: efecto moderador del conocimiento de la marca privada como oferta propia d…
2013
ResumenEl presente trabajo plantea como objetivo conocer cómo afecta la imagen de marca privada a la formación del valor de marca del establecimiento; en el estudio de esta relación cobra especial consideración la posible influencia del conocimiento de la marca privada como oferta propia del establecimiento. Desde una perspectiva empírica, se analizan los establecimientos Decathlon, a partir de la opinión de 300 consumidores. Los resultados obtenidos en la investigación muestran la importancia de fortalecer una imagen de marca privada positiva y favorable, como medio para la construcción de una sólida imagen de la tienda que, a su vez, también repercute en la creación del valor del establec…