Elsevier

Displaying 1-40 of 58 results

  • White Papers // May 2013

    Efficient Software Attack to Multimodal Biometric Systems and its Application to Face and Iris Fusion

    In certain applications based on multimodal interaction it may be crucial to determine not only what the user is doing (commands), but who is doing it, in order to prevent fraudulent use of the system. The biometric technology, and particularly the multimodal biometric systems, represents a highly efficient automatic recognition...

    Provided By Elsevier

  • White Papers // May 2013

    VeSense: High-Performance and Energy-Efficient Vehicular Sensing Platform

    Although vehicular sensing where mobile users in vehicles continuously gather, process, and share location-sensitive and context-sensitive sensor data (e.g., street images, road condition and traffic flow) is emerging, little effort has been investigated in a model-based energy-efficient network paradigm of sensor information sharing in vehicular environments. Upon these optimization frameworks,...

    Provided By Elsevier

  • White Papers // Apr 2013

    Dynamic Capabilities and Performance: Strategy, Structure and Environment

    Dynamic capabilities are widely considered to incorporate those processes that enable organizations to sustain superior performance over time. In this paper, the authors argue theoretically and demonstrate empirically that these effects are contingent on the organizational structure of the firm and the competitive intensity the firm faces. Results from Partial...

    Provided By Elsevier

  • White Papers // Oct 2012

    The Internet of Multimedia Nano-Things

    Nanotechnology is enabling the development of novel devices which are able to generate process and transmit multimedia content at the nanoscale. The interconnection of pervasively deployed multimedia nano-devices with existing communication networks and ultimately the Internet defines a novel communication paradigm that is further referred to as the Internet of...

    Provided By Elsevier

  • White Papers // Oct 2012

    Adding Preciseness to BPMN Models

    BPMN is becoming the de facto standard for process description, analysis and simulation, in IT and many other business domains. BPMN supports different levels of abstraction, from high-level process models, to detailed models capable of being executed. Several tools now support, at least partly, OMG's BPMN metamodel specification. However, while...

    Provided By Elsevier

  • White Papers // Aug 2012

    Modeling Security in Cyber-Physical Systems

    This paper describes a framework for modeling the security of a cyber-physical system in which the behavior of the adversary is controlled by a threat model that captures in a unified manner the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber-physical system. In...

    Provided By Elsevier

  • White Papers // Jul 2012

    Managing Large Collections of Business Process Models - Current Techniques and Challenges

    Now-a-days, business process management is an important approach for managing organizations from an operational perspective. As a consequence, it is common to see organizations develop collections of hundreds or even thousands of business process models. Such large collections of process models bring new challenges and provide new opportunities, as the...

    Provided By Elsevier

  • White Papers // Jun 2012

    Preventing Automatic User Profiling in Web 2.0 Applications

    The rise of the internet and web 2.0 platforms have brought very accessible publishing techniques that have transformed users' role from mere content consumers to fully content consumers-producers. Previous papers have shown that user-generated content can be automatically analyzed to extract useful information for the society. Nevertheless, researchers have also...

    Provided By Elsevier

  • White Papers // May 2012

    Provably Secure Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts

    Threshold public-key encryption is a cryptographic primitive allowing decryption control in group-oriented encryption applications. Existing TPKE schemes suffer from long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security, which is too weak to capture the capacity of the attackers in the real...

    Provided By Elsevier

  • White Papers // Apr 2012

    Microaggregation- and Permutation-Based Anonymization of Mobility Data

    Movement data, that is, trajectories of mobile objects, are automatically collected in huge quantities by technologies such as GPS, GSM or RFID, among others. Publishing and exploiting such data is essential to improve transportation, to understand the dynamics of the economy in a region, etc. However, there are obvious threats...

    Provided By Elsevier

  • White Papers // Oct 2011

    Using Formal Methods to Develop WS-BPEL Applications

    In recent years, WS-BPEL has become a de facto standard language for orchestration of Web Services. However, there are still some well-known difficulties that make programming in WS-BPEL a tricky task. In this paper, the authors firstly point out major loose points of the WS-BPEL specification by means of many...

    Provided By Elsevier

  • White Papers // Mar 2011

    Comparative Analysis of Link Quality Metrics and Routing Protocols for Optimal Route Construction in Wireless Mesh Networks

    The authors provide a comparative analysis of various routing strategies that affect the end-to-end performance in wireless mesh networks. They first improve well-known link quality metrics and routing algorithms to enhance performance in wireless mesh environments. They then investigate the route optimality, i.e., whether the best end-to-end route with respect...

    Provided By Elsevier

  • White Papers // Mar 2011

    From Wireless Sensor Networks Towards Cyber Physical Systems

    In the past two decades, a lot of research activities have been dedicated to the fields of Mobile Ad hoc NETwork (MANET) and Wireless Sensor Networks (WSN). More recently, the Cyber Physical System (CPS) has emerged as a promising direction to enrich the interactions between physical and virtual worlds. In...

    Provided By Elsevier

  • White Papers // Mar 2011

    Exploiting Social Networks to Provide Privacy in Personalized Web Search

    Web Search Engines (WSE) has become an essential tool for searching information on the internet. In order to provide personalized search results for the users, WSEs store all the queries which have been submitted by the users and the search results which they have selected. The AOL scandal proved that...

    Provided By Elsevier

  • White Papers // Mar 2011

    Edge-Colored Graphs with Applications to Homogeneous Faults

    In this paper, the authors use the concept of edge-colored graphs to model homogeneous faults in networks. They then use this model to study the minimum connectivity (and design) requirements of networks for being robust against homogeneous faults within certain thresholds. In particular, necessary and sufficient conditions for most interesting...

    Provided By Elsevier

  • White Papers // Mar 2011

    A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems

    Traditionally, the development of computing systems has been focused on performance improvements driven by the demand of applications from consumer, scientific, and business domains. However, the ever-increasing energy consumption of computing systems has started to limit further performance growth due to overwhelming electricity bills and carbon dioxide footprints. Therefore, the...

    Provided By Elsevier

  • White Papers // Feb 2011

    A Dynamic Hybrid Model Based On Wavelets And Fuzzy Regression For Time Series Estimation

    In the present paper, a fuzzy logic based method is combined with wavelet decomposition to develop a step-by-step dynamic hybrid model for the estimation of financial time series. Empirical tests on fuzzy regression, wavelet decomposition as well as the new hybrid model are conducted on the well known SP500 index...

    Provided By Elsevier

  • White Papers // Dec 2010

    Knowledge Management Competence for Enterprise System Success

    This paper conceptualizes, operationalises and validates the concept of Knowledge Management Competence as a four-phase multidimensional formative index. Employing survey data from 310 respondents representing 27 organizations using the SAP Enterprise System Financial module, the study results demonstrate a large, significant, positive relationship between Knowledge Management Competence and Enterprise Systems...

    Provided By Elsevier

  • White Papers // Dec 2010

    Bacteria-based Communication in Nanonetworks

    This paper describes a Bacteria-based Nanonetwork for communication between eukaryotic cell sized nano devices. The communication is achieved by the exchange of DNA molecules which are transported by bacteria guided by chemotaxis. First, the modules of the network are described and all the biological phenomena that support the basic communication...

    Provided By Elsevier

  • White Papers // Nov 2010

    The Domestic Content Of Imports And The Foreign Content Of Exports

    When a country imports goods that have been assembled abroad, some amount of the labor and capital services embodied in those goods may originally be from the country that is now importing them. Similarly, some of the value added of a country's exports may be foreign in origin. For the...

    Provided By Elsevier

  • White Papers // Aug 2010

    Semantic Web-Based Social Network Access Control

    The existence of online social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, security and privacy concerns need to be addressed for creating such applications. Improving social network access control systems appears as the first step...

    Provided By Elsevier

  • White Papers // Aug 2010

    Enhanced Crankback Signaling for Multi-Domain IP/MPLS Networks

    Multi-domain traffic engineering is a very challenging problem area and crankback signaling offers a very promising solutions framework herein. Although some initial crankback studies have been done, there is still significant latitude for improving multi-domain crankback performance. Along these lines, this paper studies realistic IP/MPLS multi-domain networks and proposes a...

    Provided By Elsevier

  • White Papers // Jul 2010

    The Empirics Of Inflation In China

    A model to explain inflation in China was first estimated in 1985 and is updated using annual data from 1952 to 2008. The rate of inflation is well explained by its own lag, the growth rate of the ratio of money supply to output and an error correction term. The...

    Provided By Elsevier

  • White Papers // Jun 2010

    Collision-Aware Rate Adaptation in multi-rate WLANs: Design and implementation

    Many rate adaptation algorithms have been proposed for IEEE 802.11 Wireless LAN devices and most of them operate in an open-loop manner, i.e., the transmitter adapts its transmission rate without using the feedback from the receiver. A key problem with such transmitter-based rate adaptation schemes is that they do not...

    Provided By Elsevier

  • White Papers // May 2010

    Business Model Innovation: Opportunities and Barriers

    Companies commercialize new ideas and technologies through their business models. While companies may have extensive investments and processes for exploring new ideas and technologies, they often have little if any ability to innovate the business models through which these inputs will pass. These papers - the same idea or technology...

    Provided By Elsevier

  • White Papers // May 2010

    From Strategy to Business Models and Onto Tactics

    Strategy scholars have used the notion of the Business Model to refer to the 'Logic of the firm' e how it operates and creates value for its stakeholders. On the surface, this notion appears to be similar to that of strategy. The authors present a conceptual framework to separate and...

    Provided By Elsevier

  • White Papers // May 2010

    Business Models, Business Strategy and Innovation

    Whenever a business enterprise is established, it either explicitly or implicitly employs a particular business model that describes the design or architecture of the value creation, delivery, and capture mechanisms it employs. The essence of a business model is in defining the manner by which the enterprise delivers value to...

    Provided By Elsevier

  • White Papers // May 2010

    Business Models: A Discovery Driven Approach

    The business model concept offers strategists a fresh way to consider their options in uncertain, fast-moving and unpredictable environments. In contrast to conventional assumptions, recognizing that more new business models are both feasible and actionable than ever before is creating unprecedented opportunities for today's organizations. However, unlike conventional strategies that...

    Provided By Elsevier

  • White Papers // Apr 2010

    The Role Of Reference Groups In International Investment Decisions By Firms From Emerging Economies

    Investments in China by firms from emerging economies were studied to determine how various reference groups affect their foreign market entry behavior. Imitation was shown to be an important factor, but the mechanism seems to vary depending on the institutional environments in the host and the home market. Firms from...

    Provided By Elsevier

  • White Papers // Mar 2010

    Predicting A Recovery Date From The Economic Crisis Of 2008

    Predicting a recovery from a crisis is always difficult, but it is particularly so with the 2008 crisis in the United States. How could a small segment of the financial markets known as subprime credit bring down the world's largest economy into the worst recession since WWII? The resulting conflicts...

    Provided By Elsevier

  • White Papers // Feb 2010

    Strategic Development of Business Models: Implications of the Web 2.0 for Creating Value on the Internet

    There is virtually a consensus that, to remain competitive, firms must continuously develop and adapt their business models. However, relatively little is known about how managers can go about achieving this transformation, and how, and to what extent, different types of business models should be adapted. To illustrate the differential...

    Provided By Elsevier

  • White Papers // Jan 2010

    How Leadership Matters: The Effects Of Leaders' Alignment On Strategy Implementation

    Research has confirmed that leader behavior influences group and organizational behavior, but the authors know less about how senior leaders ensure that group and organizational members implement their decisions. Most organizations have multiple layers of leaders, implying that any single leader does not lead in isolation. They focused on how...

    Provided By Elsevier

  • White Papers // Nov 2009

    Simulatable Certificateless Two-Party Authenticated Key Agreement Protocol

    Key Agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated Key Agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a Public Key Infrastructure (PKI) or identity-based cryptography. However, the former suffers...

    Provided By Elsevier

  • White Papers // Oct 2009

    Corporate Fraud And The Audit Expectations Gap: A Study Among Business Managers

    This paper presents the findings of an empirical study on the audit expectations gap concerning the role of the auditor in corporate fraud cases. The purpose of the paper is to assess the significance of a reasonableness gap, a deficient performance gap and a deficient standards gap in the specific...

    Provided By Elsevier

  • White Papers // Sep 2009

    How Believing In Affirmative Action Quotas Affects White Women's Self-Image

    Believing that affirmative action entails quotas may both help and hurt White women's self-image - contingent on whether they perceive themselves as beneficiaries of affirmative action. Consistent with research on the affirmative action ''Stigma of incompetence" (Heilman, Block, & Lucas, 1992), White women who think of themselves as affirmative action...

    Provided By Elsevier

  • White Papers // Aug 2009

    Cloud Computing: A New Business Paradigm For Biomedical Information Sharing

    The author examines how the Biomedical Informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called ''cloud computing". Clouds generally offer resources on demand. In most clouds, charges are pay per use, based on large farms of inexpensive, dedicated servers, sometimes supporting...

    Provided By Elsevier

  • White Papers // Aug 2009

    Design and Evaluation of C++ Open Multi-Methods

    Multiple dispatch - the selection of a function to be invoked based on the dynamic type of two or more arguments - is a solution to several classical problems in object-oriented programming. Open multi-methods generalize multiple dispatch towards open-class extensions, which improve separation of concerns and provisions for retroactive design....

    Provided By Elsevier

  • White Papers // Aug 2009

    Acting Globally But Thinking Locally? The Enduring Influence Of Local Communities On Organizations

    The authors develop an institutionally oriented theory of how and why local communities continue to matter for organizations in a global age. Since globalization has taken center stage in both practitioner and academic circles, research has shifted away from understanding effects of local factors. The approach runs counter to the...

    Provided By Elsevier

  • White Papers // Jul 2009

    Formal Anonymity Models for Efficient Privacy-Preserving Joins

    Organizations, such as federally-funded medical research centers, must share de-identified data on their consumers to publicly accessible repositories to adhere to regulatory requirements. Many repositories are managed by third-parties and it is often unknown if records received from disparate organizations correspond to the same individual. Failure to resolve this issue...

    Provided By Elsevier

  • White Papers // Jul 2009

    A Hybrid Biometric Cryptosystem for Securing Fingerprint Minutiae Templates

    Security concerns regarding the stored biometric data is impeding the widespread public acceptance of biometric technology. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability due to the trade-off between recognition performance and security of the template. In this paper, the authors improve the recognition...

    Provided By Elsevier

  • White Papers // Nov 2008

    Organizational Commitment -A Missing Link Between Leadership Behavior And Organizational Performance?

    This paper investigates the effect of executive leadership behaviors on the Organizational Commitment (OC) of subordinate managers and the influence of the latter on measures of company performance. Based on pertinent research and the main leadership dimensions identified in the GLOBE project, the authors formulate hypotheses concerning the relationship between...

    Provided By Elsevier

  • White Papers // Sep 2009

    How Believing In Affirmative Action Quotas Affects White Women's Self-Image

    Believing that affirmative action entails quotas may both help and hurt White women's self-image - contingent on whether they perceive themselves as beneficiaries of affirmative action. Consistent with research on the affirmative action ''Stigma of incompetence" (Heilman, Block, & Lucas, 1992), White women who think of themselves as affirmative action...

    Provided By Elsevier

  • White Papers // Aug 2009

    Cloud Computing: A New Business Paradigm For Biomedical Information Sharing

    The author examines how the Biomedical Informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called ''cloud computing". Clouds generally offer resources on demand. In most clouds, charges are pay per use, based on large farms of inexpensive, dedicated servers, sometimes supporting...

    Provided By Elsevier

  • White Papers // Feb 2009

    Clustering Of Unhealthy Outdoor Advertisements Around Child-Serving Institutions: A Comparison Of Three Cities

    Using GPS devices and digital cameras, the authors surveyed outdoor advertisements in Austin, Los Angeles and Philadelphia. GIS and hot spot analysis revealed that unhealthy ads were clustered around child-serving institutions in Los Angeles and Philadelphia but not in Austin. Multivariate generalized least square (GLS) regression models showed that percent...

    Provided By Elsevier

  • White Papers // Aug 2010

    Enhanced Crankback Signaling for Multi-Domain IP/MPLS Networks

    Multi-domain traffic engineering is a very challenging problem area and crankback signaling offers a very promising solutions framework herein. Although some initial crankback studies have been done, there is still significant latitude for improving multi-domain crankback performance. Along these lines, this paper studies realistic IP/MPLS multi-domain networks and proposes a...

    Provided By Elsevier

  • White Papers // Jun 2010

    Collision-Aware Rate Adaptation in multi-rate WLANs: Design and implementation

    Many rate adaptation algorithms have been proposed for IEEE 802.11 Wireless LAN devices and most of them operate in an open-loop manner, i.e., the transmitter adapts its transmission rate without using the feedback from the receiver. A key problem with such transmitter-based rate adaptation schemes is that they do not...

    Provided By Elsevier

  • White Papers // Jul 2009

    A Hybrid Biometric Cryptosystem for Securing Fingerprint Minutiae Templates

    Security concerns regarding the stored biometric data is impeding the widespread public acceptance of biometric technology. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability due to the trade-off between recognition performance and security of the template. In this paper, the authors improve the recognition...

    Provided By Elsevier

  • White Papers // May 2009

    Does Leadership Need Emotional Intelligence?

    Interest in emotional intelligence has bloomed over the last few years. That it has become a standard concept in general and applied psychology, as well as in applied business settings, is indubitable. Is this popularity warranted? Casting a shadow over the concept of emotional intelligence are concerns about its meaningfulness...

    Provided By Elsevier

  • White Papers // Mar 2009

    Quality-Driven Architecture Development Using Architectural Tactics

    This paper presents a quality-driven approach to embodying Non-Functional Requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architectural building blocks, providing general architectural solutions for common issues pertaining to quality attributes. In this approach, architectural tactics are represented as feature models, and their semantics is defined...

    Provided By Elsevier

  • White Papers // Aug 2009

    Design and Evaluation of C++ Open Multi-Methods

    Multiple dispatch - the selection of a function to be invoked based on the dynamic type of two or more arguments - is a solution to several classical problems in object-oriented programming. Open multi-methods generalize multiple dispatch towards open-class extensions, which improve separation of concerns and provisions for retroactive design....

    Provided By Elsevier

  • White Papers // Oct 2009

    Corporate Fraud And The Audit Expectations Gap: A Study Among Business Managers

    This paper presents the findings of an empirical study on the audit expectations gap concerning the role of the auditor in corporate fraud cases. The purpose of the paper is to assess the significance of a reasonableness gap, a deficient performance gap and a deficient standards gap in the specific...

    Provided By Elsevier

  • White Papers // Feb 2009

    Innovation Studies - The Emerging Structure Of A New Scientific Field

    The scholarly literature on innovation was for a long time not very voluminous. But as shown in the paper, this is now rapidly changing. New journals, professional associations and organizational units within universities focusing on innovation have also been formed. This paper explores the cognitive and organizational characteristics of this...

    Provided By Elsevier

  • White Papers // Dec 2010

    Bacteria-based Communication in Nanonetworks

    This paper describes a Bacteria-based Nanonetwork for communication between eukaryotic cell sized nano devices. The communication is achieved by the exchange of DNA molecules which are transported by bacteria guided by chemotaxis. First, the modules of the network are described and all the biological phenomena that support the basic communication...

    Provided By Elsevier

  • White Papers // Oct 2012

    The Internet of Multimedia Nano-Things

    Nanotechnology is enabling the development of novel devices which are able to generate process and transmit multimedia content at the nanoscale. The interconnection of pervasively deployed multimedia nano-devices with existing communication networks and ultimately the Internet defines a novel communication paradigm that is further referred to as the Internet of...

    Provided By Elsevier

  • White Papers // Mar 2011

    Comparative Analysis of Link Quality Metrics and Routing Protocols for Optimal Route Construction in Wireless Mesh Networks

    The authors provide a comparative analysis of various routing strategies that affect the end-to-end performance in wireless mesh networks. They first improve well-known link quality metrics and routing algorithms to enhance performance in wireless mesh environments. They then investigate the route optimality, i.e., whether the best end-to-end route with respect...

    Provided By Elsevier

  • White Papers // Mar 2011

    From Wireless Sensor Networks Towards Cyber Physical Systems

    In the past two decades, a lot of research activities have been dedicated to the fields of Mobile Ad hoc NETwork (MANET) and Wireless Sensor Networks (WSN). More recently, the Cyber Physical System (CPS) has emerged as a promising direction to enrich the interactions between physical and virtual worlds. In...

    Provided By Elsevier

  • White Papers // Apr 2010

    The Role Of Reference Groups In International Investment Decisions By Firms From Emerging Economies

    Investments in China by firms from emerging economies were studied to determine how various reference groups affect their foreign market entry behavior. Imitation was shown to be an important factor, but the mechanism seems to vary depending on the institutional environments in the host and the home market. Firms from...

    Provided By Elsevier

  • White Papers // Nov 2008

    A Constraint-Guided Method With Evolutionary Algorithms For Economic Problems

    This paper presents an evolutionary algorithms based Constrain-Guided Method (CGM) that is capable of handling both hard and soft constraints in optimization problems. While searching for constraint satisfied solutions, the method differentiates candidate solutions by assigning them with different fitness values, enabling favorite solutions to be distinguished more likely and...

    Provided By Elsevier

  • White Papers // Mar 2010

    Predicting A Recovery Date From The Economic Crisis Of 2008

    Predicting a recovery from a crisis is always difficult, but it is particularly so with the 2008 crisis in the United States. How could a small segment of the financial markets known as subprime credit bring down the world's largest economy into the worst recession since WWII? The resulting conflicts...

    Provided By Elsevier

  • White Papers // Mar 2011

    A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems

    Traditionally, the development of computing systems has been focused on performance improvements driven by the demand of applications from consumer, scientific, and business domains. However, the ever-increasing energy consumption of computing systems has started to limit further performance growth due to overwhelming electricity bills and carbon dioxide footprints. Therefore, the...

    Provided By Elsevier

  • White Papers // Mar 2009

    Fundamental Calculus on Generalized Stochastically Bounded Bursty Traffic for Communication Networks

    Since many applications and networks do not require or provide deterministic service guarantees, stochastic service guarantee analysis is becoming increasingly important and has attracted a lot of research attention in recent years. For this, several stochastic versions of deterministic traffic models have been proposed in the paper. Unlike previous stochastic...

    Provided By Elsevier

  • White Papers // Feb 2011

    A Dynamic Hybrid Model Based On Wavelets And Fuzzy Regression For Time Series Estimation

    In the present paper, a fuzzy logic based method is combined with wavelet decomposition to develop a step-by-step dynamic hybrid model for the estimation of financial time series. Empirical tests on fuzzy regression, wavelet decomposition as well as the new hybrid model are conducted on the well known SP500 index...

    Provided By Elsevier

  • White Papers // Dec 2008

    How Integrated Are Environmental, Quality And Other Standardized Management Systems? An Empirical Study

    The aim of this paper is to analyze the extent to which environmental management systems are really integrated with the quality and other standardized management systems implemented in organizations. To this end, an empirical study was carried out on 435 companies that were registered to multiple management system standards, including...

    Provided By Elsevier

  • White Papers // Nov 2010

    The Domestic Content Of Imports And The Foreign Content Of Exports

    When a country imports goods that have been assembled abroad, some amount of the labor and capital services embodied in those goods may originally be from the country that is now importing them. Similarly, some of the value added of a country's exports may be foreign in origin. For the...

    Provided By Elsevier

  • White Papers // Aug 2009

    Acting Globally But Thinking Locally? The Enduring Influence Of Local Communities On Organizations

    The authors develop an institutionally oriented theory of how and why local communities continue to matter for organizations in a global age. Since globalization has taken center stage in both practitioner and academic circles, research has shifted away from understanding effects of local factors. The approach runs counter to the...

    Provided By Elsevier

  • White Papers // Feb 2009

    Linking Marketing Capabilities With Profit Growth

    Profit growth is one of the primary drivers of a firm's stock price and therefore is a clear priority for managers. Yet little is known about how a firm's marketing capabilities may be linked with its profit growth. In this paper, the authors use data from a cross-industry sample of...

    Provided By Elsevier

  • White Papers // Jan 2009

    Globalization And Formal Sector Migration In Brazil

    Comprehensive linked employer - employee data allow one to study the relationship between domestic formal sector migration in Brazil and globalization. Considerable worker flows in the formal labor market during 1997 - 2001 are directed toward lower income regions - the reverse flows of those often posited for informal labor...

    Provided By Elsevier

  • White Papers // Jul 2010

    The Empirics Of Inflation In China

    A model to explain inflation in China was first estimated in 1985 and is updated using annual data from 1952 to 2008. The rate of inflation is well explained by its own lag, the growth rate of the ratio of money supply to output and an error correction term. The...

    Provided By Elsevier

  • White Papers // Oct 2007

    Thermal-Mechanical Modeling Of Cooling History And Fracture Development In Inflationary Basalt Lava Flows

    Thermal-mechanical analyses of isotherms in low-volume basalt flows having a range of aspect ratios agree with inferred isotherm patterns deduced from cooling fracture patterns in field examples on the eastern Snake River Plain, Idaho, and highlight the caveats of analytical models of sheet flow cooling when considering low-volume flows. The...

    Provided By Elsevier

  • White Papers // Jan 2010

    How Leadership Matters: The Effects Of Leaders' Alignment On Strategy Implementation

    Research has confirmed that leader behavior influences group and organizational behavior, but the authors know less about how senior leaders ensure that group and organizational members implement their decisions. Most organizations have multiple layers of leaders, implying that any single leader does not lead in isolation. They focused on how...

    Provided By Elsevier

  • White Papers // Jan 2008

    A TTP-Free Protocol for Location Privacy in Location-Based Services

    Location-Based Services (LBS) will be a keystone of the new information society that is founded on the Information and Communications Technologies (ICTs). Mobile devices such as cell phones or laptops have become ubiquitous. They are equipped with a variety of localization systems that make them proper for making use of...

    Provided By Elsevier

  • White Papers // Aug 2008

    A Measure of Variance for Hierarchical Nominal Attributes

    The need for measuring the dispersion of nominal categorical attributes appears in several applications, like clustering or data anonymization. For a nominal attribute whose categories can be hierarchically classified, a measure of the variance of a sample drawn from that attribute is proposed which takes the attribute's hierarchy into account....

    Provided By Elsevier

  • White Papers // Jul 2009

    User-Private Information Retrieval Based on a Peer-To-Peer Community

    Private Information Retrieval (PIR) is normally modeled as a game between two players: a user and a database. The user wants to retrieve some item from the database without the latter learning which item is retrieved. Most current PIR protocols are ill-suited to provide PIR from a search engine or...

    Provided By Elsevier

  • White Papers // Nov 2009

    Simulatable Certificateless Two-Party Authenticated Key Agreement Protocol

    Key Agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated Key Agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a Public Key Infrastructure (PKI) or identity-based cryptography. However, the former suffers...

    Provided By Elsevier

  • White Papers // Aug 2008

    Privacy Homomorphisms for Social Networks with Private Relationships

    Enabling private relationships in social networks is an important issue recently raised in the literature. The authors describe in this paper a new protocol which offers private relationships allowing resource access through indirect relationships without requiring a mediating trusted third party (although an optimistic trusted third party is used which...

    Provided By Elsevier

  • White Papers // Apr 2007

    A Polynomial-Time Approximation to Optimal Multivariate Microaggregation

    Microaggregation is a family of methods for Statistical Disclosure Control (SDC) of microdata (records on individuals and/or companies), that is, for masking microdata so that they can be released without disclosing private information on the underlying individuals. Microaggregation techniques are currently being used by many statistical agencies. The principle of...

    Provided By Elsevier

  • White Papers // May 2009

    Preserving User's Privacy in Web Search Engines

    Web search engines (e.g. Google, Yahoo, Microsoft Live Search...) are widely used to find certain data among a huge amount of information in a minimal amount of time. However, these useful tools also pose a privacy threat to the users: web search engines profile their users by storing and analyzing...

    Provided By Elsevier

  • White Papers // Jun 2012

    Preventing Automatic User Profiling in Web 2.0 Applications

    The rise of the internet and web 2.0 platforms have brought very accessible publishing techniques that have transformed users' role from mere content consumers to fully content consumers-producers. Previous papers have shown that user-generated content can be automatically analyzed to extract useful information for the society. Nevertheless, researchers have also...

    Provided By Elsevier

  • White Papers // May 2012

    Provably Secure Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts

    Threshold public-key encryption is a cryptographic primitive allowing decryption control in group-oriented encryption applications. Existing TPKE schemes suffer from long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security, which is too weak to capture the capacity of the attackers in the real...

    Provided By Elsevier

  • White Papers // Apr 2012

    Microaggregation- and Permutation-Based Anonymization of Mobility Data

    Movement data, that is, trajectories of mobile objects, are automatically collected in huge quantities by technologies such as GPS, GSM or RFID, among others. Publishing and exploiting such data is essential to improve transportation, to understand the dynamics of the economy in a region, etc. However, there are obvious threats...

    Provided By Elsevier