Siga este link para ver outros tipos de publicações sobre o tema: Business protocol.

Teses / dissertações sobre o tema "Business protocol"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 46 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Business protocol".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol". Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.

Texto completo da fonte
Resumo:
The goal of this Thesis is to uncover, characterize, analyze, describe and define selected contemporary rules of etiquette, international business and diplomatic protocol in international business and diplomatic practice and point out the greatest deficiencies witnessed in practice. The research subject of this Thesis is, thus, the formal aspect of international business and diplomatic cooperation. Its output consists of recommendation on how to correctly apply these rules in practice. I would also like my paper to significantly contribute to the general knowledge of this fascinating and commonly useful knowledge. The structure of the Thesis as it was drawn up in context of its goals consists of three main chapters, introduction and conclusion. The first part of the Thesis deals with Social Etiquette. This part is not conceived as general rules of social intercourse. Instead, it concentrates mainly on the elaboration of contemporary general rules of social intercourse and etiquette to in the context of business and entrepreneurial activities, i.e. Business Protocol. The Thesis would also like to provide answers to the following questions: What is the current standard of social intercourse in the Czech Republic? What are the contemporary rules of social intercourse in the Czech Republic and how do they differ from the etiquette abroad? Can we claim that these rules are being observed? What leads our managers, businessman, diplomats etc. to observing these rules? In my Thesis I strive to evaluate contemporary rules applicable to social, business and diplomatic events as well as in written communication and to draw attention the lack of their knowledge. Another partial goal of the Thesis consists of using carried out analyses, evaluations, inquiries via questionnaires and comparative analyses to point out the differences in the rules of social intercourse, conduct and negotiation in different territories. The working hypothesis of this part of the paper is to indicate on the basis of the above mentioned allegations the relationship between the behaviour and conduct of managers of different provenience and the fact that they have different cultural background. Culture is learned not inherited. It is derived from the social environment not from genes and it must be clearly distinguished from human character and the character of individual people. Significant attention is, therefore, paid to the study of international customs and conventions, especially those of the countries which the representatives of Czech firms, enterprises and institutions most come into contact with. The presented Thesis does not have the ambition to come up with a definitive cookbook as to how to conduct oneself in a given situation within a given territory; it merely strives to point out the pitfalls, misunderstandings and blunders in conduct and barriers in communication and in business or any other professional negotiations. Unlike legal acts the rules of Etiquette are not binding. Laws apply to all and the state prosecutes their infringement. Unlike laws, the rules of Etiquette are not enforceable. Their only form of enforcement is the social pressure which the society effectuates on the individual. Thus, the standards of social conduct only apply to those willing to abide by them. The presented paper is an aggregate of the rules and its author's views. Another author's standpoint may differ. The second part of the Thesis concentrates on the sphere of Diplomatic Protocol in international business and diplomatic practice. The presented paper aims at describing the existing system of Foreign Service and diplomatic activities, presenting the diplomatic representations, consulates, missions and other representatives abroad, their functioning as well as their immunities and privileges. Diplomatic Protocol concerns the formal, not the material, content of international relations. Formal rules of social conduct in intercourse with diplomatic representatives of other countries, the etiquette and the ceremonies applied to the intercourse with these representatives form an integral part of the Diplomatic Protocol. In the initial part I define the very term Diplomatic Protocol and I strive to specify is subject. Successively I address individual respective parts of Diplomatic Protocol and diplomatic practice, such as the methods of establishing diplomatic relationships, the roles of diplomatic missions, ranks of diplomatic representatives and their immunities and privileges, the procedure related to the conferment of agrément and the termination of activity of the head of a diplomatic mission, official visits of foreign guests, organisation of international conferences, diplomatic correspondence, consular activities etc. In the course of its elaboration the presented Thesis should also offer answers to the following questions: What is the current international form, role and significance of the Diplomatic Protocol? What leads states to observing signed conventions? Which diplomatic immunities and privileges are at the moment among the most abused or violated? For the accomplishment of the goals set out in this Thesis I shall strive to outline the scale of theoretic approaches and based on the effective layout and international practice express my own conclusions. Among others, the paper also aims at promoting the development of skills of the current diplomat and acquainting them with the norms of diplomatic correspondence. The aforementioned part of the Thesis also sets out another rather easily attained objective: due to the inexistence of comprehensive publications on this topic to become a handbook and reference manual not only for the young adepts of this profession but for all who for some reason take interest in Diplomacy. It was an ambition of the author to assemble and explain terms, which those interested in the practical aspects of Foreign Service, may be confronted with. The paper reflects current diplomatic practice and takes into account Czech circumstances. The author is endeavouring to mediate the information and knowledge she gained through years of practice at representative offices abroad gained during her practical experience at the Ministry of Foreign Affairs and through more than 20 years of practice in academic research and instruction of this area.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Eslamichalandar, Maryam. "Web Service Composition Compatibility : adaptation in the presence of Business Protocol Evolution". Thesis, Paris, CNAM, 2013. http://www.theses.fr/2013CNAM0998/document.

Texto completo da fonte
Resumo:
Avec l’utilisation croissante d’architectures logicielles indépendantes de la plate-forme et du langage dans le paradigme de l’architecture orientée services (SOA), la technologie de services web permet l’interopérabilité dynamique et flexible des processus métiers aussi bien au niveau intra qu’inter-organisationnel. Bien que la normalisation des services web permet de réduire l’hétérogénéité et rend plus facile leur interopérabilité, il y a toujours besoin de vérifier leur compatibilité en particulier dans le contexte inter-entreprises. Deux services sont compatibles si une collaboration entre eux est accomplie avec succès et que chacun puisse atteindre ses résultats attendus (états finaux). L’approche typique devant permettre à des services incompatibles d’interagir correctement est l’adaptation du service. L’adaptation consiste dans ce contexte à faire face principalement aux discordances relevées au niveau des interfaces de service (incompatibilités entre signatures de services) ainsi qu’aux discordances qui ont lieu au niveau des protocoles métiers (incompatibilité dans l’ordre des messages échangés entre services). On distingue deux principales techniques d’adaptation: modification de service ou synthèse d’un composant adaptateur. L’adaptation en termes de modification de service exige l’application de certaines mesures d’optimisation pour supporter les spécifications du service partenaire. Dans le cas où l’adaptation traite de la création d’un adaptateur, un composant autonome modère les interactions entre les deux services de sorte que l’interopérabilité soit obtenue. En d’autres termes, l’adaptateur compense les différences entre interfaces de services par conversion de données (c’est-à-dire par transformation de message) et celles entre protocoles métiers en réorganisant les échanges de messages ou en générant un message manquant.Nous nous concentrons ici sur le problème de la reconfiguration dynamique de l’adaptateur en presence d’évolution de protocols métiers. Après avoir traité de la vérification d’un adaptateur en exploitant des techniques structurelles existantes développées dans le cadre de la théorie des réseaux de Petri, nous établissons une identification des patrons de mise à jour d’adaptateurs ainsi que la mise en correspondance de ces patrons avec les différents types d’évolutions possibles au niveau des protocoles métiers des services web. Ce travail a abouti à la proposition d’un algorithme permettant, d’une part de détecter les patrons d’évolution adéquats suite à une évolution d’un des protocoles métier des services partenaires et, d’autre part et sous certaines conditions, la mise à jour à la volée de la specification du nouvel adaptateur obtenu ainsi que sa verification.Enfin, les expérimentations réalisées sur un prototype montrent les avantages en termes de temps et de coût de l'approche dynamique proposée par rapport aux méthodes statiques conduisant systématiquement à la regeneration complète de l’adaptateur
The advent of Web service technologies in the paradigm of Service oriented architecture (SOA) enables dynamic and flexible interoperation of distributed business processes within and across organization boundaries. One of the challenges in working with heterogeneous and autonomous Web services is the need to ensure their interoperability and compatibility. The typical approach for enabling incompatible services to interact is service adaptation. The need for adaptation in Web services comes from the heterogeneity at the levels of service interface and business protocol. The service interface incompatibilities include service signature mismatches (e.g., message and operation name, number; the type of input/output message parameters of operations; and the parameter value constraint). The mismatches at the business protocol (or service behavior) level arise from the order constraints that services impose on messages exchanges (e.g., deadlock where both partner services are mutually waiting to receive some message from the other, and unspecified reception in which one service sends a message while the partner is not expecting it). In service interaction through adaptation, an adapter mediates the interactions between two services with potentially different interfaces and business protocols such that the interoperability is achieved, i.e., adapter compensates for the differences between their interfaces by data mappings, and between their business protocols by rearranging the messages exchanges or generating a missing message. In this dissertation, we focus on how to cope with the dynamic evolution of business protocol P of a given service (i.e., P is changed to P') that is adapted by an adapter in the context of service interaction. Web service specifications constantly evolve. For variety of reasons, service providers may change their business protocols. Therefore, it is important to understand the potential impacts of the changes arising from the evolution of service business protocol on the adapter.We present an approach to automatically detect the effects of business protocols evolution on the adapter and, if possible, to suggest fixes to update the specification of adapter on-the-fly. Besides, we propose a technique to verify the correctness of new adapter which is dynamically re-configured. Finally, we describe a prototype tool where experimentations show the benefits of proposed approach in terms of time and cost compared to the static methods aiming for complete regeneration of adapter or manual inspection and adaption of the adapter with respect to changes in the business protocols
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Pelánová, Pavla. "Obchodní a diplomatický protokol Francie". Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193029.

Texto completo da fonte
Resumo:
The aim of my master thesis was to specify the business and diplomatic protocol in France and answer several questions that I defined. Are there any differences between the facts that we read in books and guides about French business and diplomatic protocol, and the reality? Can we generalize French business protocol and say that it is valid for all sectors and generations of managers? Can we claim that French diplomatic protocol is valid all the time and every single president sticks to it? The first chapter explains all the key terms - protocol, business protocol, diplomatic protocol, business negotiation, etiquette. The second chapter focuses on French business protocol, especially organization and course of business negotiation, dress code and gift-giving etiquette, and finally characterizes a typical French company. The third chapter focuses on French diplomatic protocol, especially on all aspects conserning ambassadors in France. The fourth chapter represents the practical part and gives several practical examples of French business and diplomatic protocol. This part is based on four qualitative conversations with four experts on this domain.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Morrison, Charles Michael. "An investigation of network efficiency and control protocol issues for a configurable collaboration support system". Diss., The University of Arizona, 1992. http://hdl.handle.net/10150/185931.

Texto completo da fonte
Resumo:
Increased global competition is fueling a movement towards semi-autonomous or "self-managing" business teams. At the same time, the ability to interconnect computers has provided a technological base for increased computer support of business teams. A flexible system should accommodate a wide variety of group and task characteristics in both face-to-face and geographically-dispersed environments. An architecture for a system named TEAMWORK is developed that provides flexible support for business teams. System functions are organized into six configurable components, audio processing, video processing, text processing, graphic processing, data management, and numeric processing, collectively addressing a wide spectrum of group tasks. TeamWriter is highly configurable text processing tool implemented to represent and partially evaluate one aspect of TEAMWORK's architecture. Pulldown menus and picture buttons allow access functions. Support for a wide variety of team access protocols, real- and non-real-time work styles, multi-user document writing, brainstorming, idea consolidation, visual group dynamics, and more is included. Document changes appended to a centrally located server file maintain a linear revision history. Evaluation session indicated participants especially liked TeamWriter's multiuser document writing capabilities, picture buttons, authorship provisions, and multiple configurations. Suggestions for enhancing brainstorming and idea consolidation capabilities are supported by the underlying set of configurable functions and involve adding new interface configurations. Sessions also demonstrated that field testing will be needed to thoroughly evaluate TeamWriter; participants were unable to explore all of TeamWriter's features in the one and a half hour long evaluation sessions. Research contributions include a comprehensive team collaboration support system architecture, an implemented configurable text processing module suited for further evaluation, implementation methods, and insight into the functional requirements of a team collaboration support system. Future research directions include field testing TeamWriter, implementing and evaluating the numeric processing module, and investigating non-hierarchical, iconic interfaces to TeamWriter section. As audio, video, and high speed LAN technology become available, prototypes investigating design and implementation strategies for audio, video, and graphic modules will be built.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Tycová, Tereza. "Specifika obchodního jednání v Číně". Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-206682.

Texto completo da fonte
Resumo:
This thesis aims to provide complex view of business negotiations with Chinese partners, particularly with regard to intercultural differences and characteristics of business protocol. The thesis is divided into four chapters, focused on China as a territory, distinctions in culture and business, as well as selected business dealings between Czech and Chinese company. Knowledge of Chinese "game rules" and sufficient preparation are two essential preconditions for long-term success in the Chinese scene.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Treleaven, James Burris. "A protocol study of a complexity model of information acquisition from graphs and tables". Case Western Reserve University School of Graduate Studies / OhioLINK, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=case1059052459.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Schmidt, Robert. "What's Really Keeping the US from Joining the Kyoto Protocol. A Game Theoretic Empirical Analysis". Honors in the Major Thesis, University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/994.

Texto completo da fonte
Resumo:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Business Administration
Business Economics
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Echaiz, Moreno Daniel. "El protocolo familiar. La contractualización en las familias empresarias para la gestión de las empresas familiares". Instituto de Investigaciones Jurídicas de la UNAM, 2014. http://hdl.handle.net/10757/316346.

Texto completo da fonte
Resumo:
Las empresas familiares son un fenómeno mundial de gran trascendencia por el elevado número de ellas, no obstante se ven agobiadas por el problema de la transición generacional que, en muchas ocaciones, marca el inicio del fin de la empresa familiar. El derecho peruano ha desatendido hasta ahora el presente tema; sin embargo, en otros países se aprecia la atención que se le ofrece desde la perspectiva jurídica, por ejemplo a través del protocolo familiar, un instrumento contractual que favorece a la gestión de las empresas familiares.
The family enterprises are a world phenomenon of great transcendency for the hight number of them, nevertheless they meet overwhelmed by the problem of the generational transition that, in many occasions, it marks the beginning of the end of the family enterprise
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kozlova, Tatjana, e Olga Tytarenko. "To buy and what to buy? : the study of consumer behaviour on the Internet". Thesis, Gotland University, Department of Business Administration, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-139.

Texto completo da fonte
Resumo:

The process that consumers go through while buying something is called consumer buying process and has been studied for a long time. Three stages of the Five-Stage Model (Kotler, 2006) provide a starting point for analysis in this paper and the reason of using this model is to make collected data more structured and easier for understanding. The purpose of this paper is to describe and analyze costumer buying process online.The method for data collection applied in this study is called “think-aloud” that means participants are verbalizing their screen activity and thoughts during the process of observation. The results of this research show that consumer buying process online is a complex process that is influenced by the amount and intensity of information received during the process as well as consumer knowledge and experience on the area of problem. The sequence of the stages proposed by the research model can vary depending on the preferences of consumer and readiness to make a decision.

Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Rana, Chirag N. "Enabling One-Phase Commit (1PC) Protocol for Web Service Atomic Transaction (WS-AT)". UNF Digital Commons, 2014. http://digitalcommons.unf.edu/etd/498.

Texto completo da fonte
Resumo:
Business transactions (a.k.a., business conversations) are series of message exchanges that occur between software applications coordinating to achieve a business objective. Web service has been proven to be a promising technology in supporting business transactions. Business transaction can either be long-running or short-lived. A transaction whether in a database or web service paradigm consists of an “all-or-nothing” property. A transaction could either succeed or fail. Web Service Atomic Transactions (WS-AT) is a specification that currently supports Two-Phase Commit (2PC) protocol in a short-lived transaction. WS-AT is developed by OASIS–a standards development organization. However, not all business process scenarios require a 2PC, in that case, just a One-Phase Commit (1PC) would be sufficient. But unfortunately, WS-AT currently does not support 1PC optimization. The ideal scenario where 1PC can be used instead of 2PC is when there is only a single participant. Short-lived transactions involving only one participant can commit without requiring initial “prepare” phase. Thus, there is no overhead to check whether the participant is prepared to either commit or rollback. This research focuses on designing a mechanism that can add 1PC support in WS-AT. The technical implementation of this mechanism is developed by using JBoss Transaction API. As a part of this thesis, 1PC mechanism for a single participant scenario was implemented. This mechanism optimizes the web service transaction process in terms of overhead and performance in terms of execution time. The technical implementation solution for 1PC mechanism was evaluated using three different business process scenarios in a controlled experiment as a presence or absence test. Evaluation results show that 1PC mechanism has a lower mean for execution time and performed significantly better than 2PC mechanism. Based on the contributions made by this thesis, we recommend OASIS to consider including 1PC mechanism as a part of the WS-AT specification.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Smith, Curtis. "The Role of Feedforward-Enabled Predictive Analytics in Changing Mental Models". Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/492421.

Texto completo da fonte
Resumo:
Business Administration/Management Information Systems
D.B.A.
One of the key determinants of an organization’s success is its ability to adapt to marketplace change. Given this reality, how do organizations survive or even thrive in today’s dynamic markets? The answer to this question is highly related to the adaptability of one of the organization’s key resource: its employees. Indeed, the central component of an organization’s success will depend on its ability to drive changes in the mental models of individual employees. Moreover, a critical facilitator of that will be the development of decision support tools that support change of those mental models. In response to this need there has been a tremendous growth in business analytic decision support tools, estimated to reach almost $200 billion in sales by 2019. The premise of this research is that these decision support tools are ill-suited to support true mental model change because they have focused on a feedback-enabled view and generally lack a predictive (feedforward-enabled) view of the likely outcomes of the decision. The purpose of this research is to study how changes in mental models can be facilitated through this feedforward mechanisms within the DSS tool. This research used a mixed method approach, leveraging the strengths of quantitative and qualitative research methodologies, to study this research question. The research showed that the feedforward-enabled DSS tool did create more mental model change and alignment (versus an ideal solution) compared to the control. The feedforward enabled tool also produced better alignment than the feedback-enabled decision support tool. In fact, the feedback-enabled decision support was shown to result in a poorer alignment with the ideal solution. This paper concludes by suggesting five areas for future research.
Temple University--Theses
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Schoenfeld, Tara McKenzie. "Risky business: a regional comparison of the levels of risk and service needs of sexually offending youth". Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/3097.

Texto completo da fonte
Resumo:
Considerable attention has focussed on identifying individual factors associated with, or predictive of, sexual offending (e.g., Efta-Breitbach & Freeman, 2004). In light of these individual factors, clinicians and researchers have developed standardized instruments for assessing the risk posed by sexually offending youth. Two such instruments are the Juvenile Sex Offender Assessment Protocol-II (J-SOAP-II; Prentky & Righthand, 2003) and the Estimate of Risk of Adolescent Sexual Offence Recidivism Version 2.0 (ERASOR-II; Worling & Curwen, 2001). In addition to individual factors, research on crime has demonstrated that structural factors within the community may be important determinants of sexual and non-sexual offending (e.g., McCarthy, 1991; Ouimet, 1999; Shaw & McKay, 1942; Wirth, 1938). Therefore, the purpose of this study was twofold: (a) to compare the psychometric properties of two newly developed risk assessment instruments (i.e., J-SOAP-II and ERASOR-II) and (b) to use the better instrument to compare the levels of risk posed by sexually offending youth in 3 neighbouring, but diverse communities. Using file information, the J-SOAP-II and ERASOR-II were scored on 84 adolescent males between the ages of 11 and 20 years who had committed a sexual offence and received treatment at Youth Forensic Psychiatric Services (YFPS) in the Greater Vancouver Area (GVA; n = 30), Central Okanagan (CO; n = 26), and Thompson Nicola region (TN; n = 28). Calculations of interrater reliability and item-total correlations indicated that the J-SOAP-II was a better assessment instrument for this sample of offenders. Consequently, further regional analysis of risk was conducted using the J-SOAP-II data. Results indicated that although there were no regional differences among the severity and history of sexual offending, TN youth generally had a greater number of risk factors than did youth in CO and GVA. Specifically, youth in TN were found to be higher risk in the areas of intervention, general problem behaviour, iii and family/environment dynamics. These results suggest that to better understand youth who commit sexual offences and to provide appropriate prevention and intervention strategies for individual offenders and their communities, youth should not be evaluated in isolation from their social and community context. Recommendations for practice are discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Babikian, Arziv, e Alexander Fagrell. "Identifying incentives & discouragements to understand how a Scope 3 boundary could be set : A case study on a metal processing company". Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85266.

Texto completo da fonte
Resumo:
Purpose: The purpose of this study is to identify incentives and discouragements thus providinga better understanding of how metal processing companies could set their Scope 3 boundary. Method: To achieve the purpose of the study, a qualitative case study with an inductive approach was used. The studied company was a global metal processing company that was working towards setting a Scope 3 boundary, and the data consists of semi-structured interviews that were gathered from both internal and external stakeholders. Findings: Firstly, the findings presented, highlight incentives that affected companies in the metal processing industry to pursue setting a Scope 3 boundary, namely incentives that are categorised into 1) Improved corporate environmental reputation, 2) Increased competitive advantage, and 3) Financial gains. The discouragements found were categorised into 1) High uncertainty, 2) Immature industry/technical solutions, and 3) Low influence outside of the organisational boundary. These incentives and discouragements were analysed to show how they affected the Scope 3 boundary. This resulted in an industry-specific guideline on how companies in the metal processing industry could set their Scope 3 boundary. Theoretical contribution: The findings prolong earlier research by defining incentives and discouragements in a Scope 3 context. A theoretical contribution from this study was that regulations might inhibit some of the Scope 3 incentives. The findings indicate that drivers to benchmark against other stakeholders, such as differentiating from competitors and improved corporate sustainable reputation. A non-regulatory market environment is, therefore, fostering these incentives, which could be useful to acknowledge in further studies in a Scope 3 context. Practical implications: This study provides an enhanced understanding of how metal processing companies can set their Scope 3 boundary based on what set of incentives or discouragements that drives them. It is also important for companies to understand incentives and discouragements that may change (e.g., regulations towards Scope 3 emissions) in time, which would result in different Scope 3 boundaries. Also, this understanding of what incentives and discouragementsaffecting the boundary-setting could benefit policymakers in their work improving the Scope 3 discouragements.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Gerard, Scott Neal. "Designing, Verifying, and Evolving Commitment-based Protocols for Business". Thesis, North Carolina State University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3575895.

Texto completo da fonte
Resumo:

Businesses today are facing increasing pressure to interoperate across multiple business partners. We address the design, verification, and evolution of business services in open environments. We approach the problem as an application of multiagent system concepts and techniques using protocols and commitments. We present an approach to the design and hierarchical composition of protocols that treats protocols as first-class entities, and explicitly addresses role-specific responsibilities and accountabilities. We propose a definition of protocol refinement between a putative subprotocol and a putative superprotocol. To address the evolution of protocol requirements, we describe an interaction architecture and a library of automated, interaction refactorings. We demonstrate these approaches via realistic applications from the insurance, manufacturing, healthcare, and software development domains.

Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Musaraj, Kreshnik. "Extraction automatique de protocoles de communication pour la composition de services Web". Thesis, Lyon 1, 2010. http://www.theses.fr/2010LYO10288/document.

Texto completo da fonte
Resumo:
La gestion des processus-métiers, des architectures orientées-services et leur rétro-ingénierie s’appuie fortement sur l’extraction des protocoles-métier des services Web et des modèles des processus-métiers à partir de fichiers de journaux. La fouille et l’extraction de ces modèles visent la (re)découverte du comportement d'un modèle mis en œuvre lors de son exécution en utilisant uniquement les traces d'activité, ne faisant usage d’aucune information a priori sur le modèle cible. Notre étude préliminaire montre que : (i) une minorité de données sur l'interaction sont enregistrées par le processus et les architectures de services, (ii) un nombre limité de méthodes d'extraction découvrent ce modèle sans connaître ni les instances positives du protocole, ni l'information pour les déduire, et (iii) les approches actuelles se basent sur des hypothèses restrictives que seule une fraction des services Web issus du monde réel satisfont. Rendre possible l'extraction de ces modèles d'interaction des journaux d'activité, en se basant sur des hypothèses réalistes nécessite: (i) des approches qui font abstraction du contexte de l'entreprise afin de permettre une utilisation élargie et générique, et (ii) des outils pour évaluer le résultat de la fouille à travers la mise en œuvre du cycle de vie des modèles découverts de services. En outre, puisque les journaux d'interaction sont souvent incomplets, comportent des erreurs et de l’information incertaine, alors les approches d'extraction proposées dans cette thèse doivent être capables de traiter ces imperfections correctement. Nous proposons un ensemble de modèles mathématiques qui englobent les différents aspects de la fouille des protocoles-métiers. Les approches d’extraction que nous présentons, issues de l'algèbre linéaire, nous permettent d'extraire le protocole-métier tout en fusionnant les étapes classiques de la fouille des processus-métiers. D'autre part, notre représentation du protocole basée sur des séries temporelles des variations de densité de flux permet de récupérer l'ordre temporel de l'exécution des événements et des messages dans un processus. En outre, nous proposons la définition des expirations propres pour identifier les transitions temporisées, et fournissons une méthode pour les extraire en dépit de leur propriété d'être invisible dans les journaux. Finalement, nous présentons un cadre multitâche visant à soutenir toutes les étapes du cycle de vie des workflow de processus et des protocoles, allant de la conception à l'optimisation. Les approches présentées dans ce manuscrit ont été implantées dans des outils de prototypage, et validées expérimentalement sur des ensembles de données et des modèles de processus et de services Web. Le protocole-métier découvert, peut ensuite être utilisé pour effectuer une multitude de tâches dans une organisation ou une entreprise
Business process management, service-oriented architectures and their reverse engineering heavily rely on the fundamental endeavor of mining business process models and Web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. Our preliminary study shows that : (i) a minority of interaction data is recorded by process and service-aware architectures, (ii) a limited number of methods achieve model extraction without knowledge of either positive process and protocol instances or the information to infer them, and (iii) the existing approaches rely on restrictive assumptions that only a fraction of real-world Web services satisfy. Enabling the extraction of these interaction models from activity logs based on realistic hypothesis necessitates: (i) approaches that make abstraction of the business context in order to allow their extended and generic usage, and (ii) tools for assessing the mining result through implementation of the process and service life-cycle. Moreover, since interaction logs are often incomplete, uncertain and contain errors, then mining approaches proposed in this work need to be capable of handling these imperfections properly. We propose a set of mathematical models that encompass the different aspects of process and protocol mining. The extraction approaches that we present, issued from linear algebra, allow us to extract the business protocol while merging the classic process mining stages. On the other hand, our protocol representation based on time series of flow density variations makes it possible to recover the temporal order of execution of events and messages in the process. In addition, we propose the concept of proper timeouts to refer to timed transitions, and provide a method for extracting them despite their property of being invisible in logs. In the end, we present a multitask framework aimed at supporting all the steps of the process workflow and business protocol life-cycle from design to optimization.The approaches presented in this manuscript have been implemented in prototype tools, and experimentally validated on scalable datasets and real-world process and web service models.The discovered business protocols, can thus be used to perform a multitude of tasks in an organization or enterprise
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Matsson, Erik, Gustav Dahllöf e Julius Nilsson. "Business to Business - Electronic Invoice Processing : A report on the challenges, solutions and outcomes for companies switching from manual to electronic invoice handling". Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-26793.

Texto completo da fonte
Resumo:
Electronic document handling was first used in the automotive industry in the early 1970’s, the way of communicating electronic at the time was concerned with the communication way of EDI (Hsieh, 2004). In the beginning of 2000 a new way of communicating electronic documents was introduced with the emergence of VAN-operators (Hsieh, 2004). This technology of communicating electronic invoices has shown to be less complex for the businesses than the previous EDI connections. The VAN-operators enable companies regardless of size, ERP, also known as Enterprise Resource Planning, system, formats or transaction volume to send and receive electronic invoices. The subject of electronic invoice handling have become increasingly debated, mainly because of the legislations taking place all over Europe, and as well as the environmental impact by business transactions being sent by paper. The objective of this thesis is to examine the challenges, solutions and outcomes for companies switching to electronic invoice handling. The data collected for the thesis is divided into two parts. The first part consist of information retrieved by previous literature as well as internet sources. The second part concerns the case studies conducted for the thesis in respect to our research questions. For this reason Scandinavian companies have been interviewed, with different precondition as in size, industry, transaction volume and IT structure. The findings from the first and second part have been analyzed and conclusion have been made, we suggest using a VAN-operators, which have shown to be the most appropriate alternative for companies that are implementing electronic invoice handling. The result of this thesis can be used as a guideline for companies when considering a switch from manual to electronic invoice handling.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Modimogale, Lloyd. "ICT and SMEs’ competitiveness in South Africa : how SMEs could use ICT to become competitive in South Africa". Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/27585.

Texto completo da fonte
Resumo:
This mini-dissertation reviews present literature to define ICT and SMEs and determine the current situation in South Africa with regard to the use of ICT by SMEs, including possible benefits to SMEs as well as stumbling blocks to adopting ICT. The research consists of collecting data from ten SMEs in Gauteng in South Africa using questionnaires and interviews, to determine how SMEs can use ICT to become more competitive. The mini-dissertation will have a number of chapters: the first chapter will give an overview of the subject. The second chapter will explain the research motivation and methodology while the third chapter will be the literature review, which will explore the topic of ICT and SMEs in depth, with a focus on South Africa. Chapter four will deal with data collection and analysis; the main source of data will be interviews based on structured questions. The fifth chapter will be the discussion and recommendations based on the results of the analysis and the literature review. Chapter Six will be the conclusion.
Dissertation (MIT)--University of Pretoria, 2008.
Informatics
unrestricted
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Tuminas, Paulius. "Verslo B2B transakcijų realizavimas panaudojant BTP protokolą". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080716_100515-15941.

Texto completo da fonte
Resumo:
Šio darbo tikslas – sukurti informacine sistema (IS), kuri atvaizduotų B2B transakcijas realizuojant BTP protokolą. IS yra palyginti jauna žinių sritis, jai šiek tiek daugiau nei 50 metų, tačiau be šiuolaikinių IS sunku įsivaizduoti šiandieninę įmonę. Pastaruoju metu IS sparčiai plinta, jos poreikiai vis labiau didėja: vykdomas nuotolinis mokymas, organizuojamas nuotolinis darbas (teledarbas), sparčiai plečiasi elektroninė prekyba, daug dėmesio skiriama medicinai, naujas galimybes žada elektroninės bibliotekos. Šis atliktas darbas apima daugelį paminėtų sričių, nes realizuojami duomenų mainai tarp IS nepriklausomai nuo įmonės dalykinės srities. Daugelyje įmonių duomenys kaupiami duomenų bazėse ar duomenų centruose, todėl norint realizuoti duomen�� mainus tarp IS programuotojams reikia įdėti nemažai pastangų, kad galėtų realizuoti duomenų mainus tarp paskirstytų sistemų ar duomenų bazių, juolab, kad vienos verslo įmonės duomenų gali nepakakti siekiant įgyti konkurencinį pranašumą. Šiame darbe atliktas duomenų apsikeitimo supaprastinimas, kuris leidžia atlikti duomenų mainus vienus metu tarp neriboto skaičiaus verslo įmonių vienu metu realizuojant visiems žinomą OASIS konsorciumo sukurtą BTP protokolą. Duomenų mainai vykdomi užklausiant verslo dalyvius standartinėmis SQL užklausomis, tokiu būdu šių duomenų prašantiems asmenims galima pateikti duomenis nepriklausomai nuo naudojamos duomenų bazės. Siekiant įgyvendinti sistemos išplečiamumą, duomenys yra pateikiami standartiniu... [toliau žr. visą tekstą]
This work aim is to create information systems (IS), which can implement B2B transaction by using the Business Transaction Protocol (BTP). IS has only 50 years history, but without IS we can’t imagine modern business company. Now computers are usable in most leading edge areas and theirs needs and power always grows. We use its in distance learning, organizing distance work (work-net), expeditiously developing electronic business, appointing a lot off attention to modernize medicine, new possibilities for electronic libraries. This work can be used in all mentioned regions implementing data exchange among computers regardless their actions in business. Many companies store data in database or data centers, so if we want to realize exchange data among computer – our programmers have to avail a lot of energy and workforce to realize exchange from remote systems or databases, especially, if some services and data are in different databases. This work can realize data exchange simplification, which executes data exchange from unlimited numbers of business companies. It uses well-known BTP protocol from OASIS consortium to exchange data. All needed data we get from business participants using standard SQL queries. Thus people which are asking for data – in this work we can offer to get data from different databases platforms. To access system in different programming languages, data are implemented into standard SOAP1.1 protocol - where they will be transported in XML document... [to full text]
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Hayashida, Marchinares Augusto Enrique. "Business intelligence bajo plataforma IP versión 6 y su influencia en la gestión empresarial". Bachelor's thesis, Universidad Nacional Mayor de San Marcos, 2009. https://hdl.handle.net/20.500.12672/2380.

Texto completo da fonte
Resumo:
-- The advent of Internet, the phone mobile and the globalization have modified the forms of communication in the world and the enterprises in general. All this has brought the search of facilities of communications permanents, mobilities and secures with quality of service to improve the Internet and the new aplications on devices mobile. The studies of the new protocol of internet as Ipv6 are in a proces that consist in finding new focus to improve the quality of service. This thesis consists in analyzing and give recomendations of Ipv6 with Business Intelligence to demonstrate that the use improve the management in the enterprises. Ipv6 is the best solution to improve the throughput in the network. The other side, it proposes a new way of business on internet y the born the new aplications as for example the m-commerce and Business Intelligence since any devices mobile.
Determinar el grado de influencia que el Business Intelligence bajo plataforma IP versión6 ejerce en la Gestión empresarial. Además de realizar un analisis de IPv6 sobre redes inalámbricas y su desempeño con las aplicaciones que permiten el acceso a la información. Comparativos entre los protocolos IPv4 y/o IPv6. En base a estos estudios, se proponen una serie de recomendaciones para el modelado de aplicaciones, mismas que ayudan a obtener un mejor desempeño de ellas sobre las redes alámbricas e inalámbricas. Su enfoque está enmarcado en la importancia de la consecución, análisis y difusión de la información para producir inteligencia que ayude a las empresas en la toma de mejores decisiones, aunado a todo ello el avance tecnológico y la revolución de la redes de hoy y ello se obtiene con el aporte del Ipv6.
Determinar el grado de influencia que el Business Intelligence bajo plataforma IP versión6 ejerce en la Gestión empresarial. Además de realizar un analisis de IPv6 sobre redes inalámbricas y su desempeño con las aplicaciones que permiten el acceso a la información. Comparativos entre los protocolos IPv4 y/o IPv6. En base a estos estudios, se proponen una serie de recomendaciones para el modelado de aplicaciones, mismas que ayudan a obtener un mejor desempeño de ellas sobre las redes alámbricas e inalámbricas. Su enfoque está enmarcado en la importancia de la consecución, análisis y difusión de la información para producir inteligencia que ayude a las empresas en la toma de mejores decisiones, aunado a todo ello el avance tecnológico y la revolución de la redes de hoy y ello se obtiene con el aporte del Ipv6.
Tesis
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Elabd, Emad. "Compliance of Web services over a high level specification". Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.

Texto completo da fonte
Resumo:
Actuellement, la technologie des services Web évolue rapidement, en étant soutenue par les grands acteurs du domaine des systèmes d'information. Les applications basés sur services Web sont faiblement couplées et utilisables de façon automatique via l'utilisation d'un ensemble de normes basées sur XML. Hormis la description syntaxique des messages, il est nécessaire d’avoir une description sémantique du comportement des services. En effet, lors de la conception d'un service ou lors d'une composition de services, il est important de vérifier la conformité avec un cahier des charges. L’enrichissement des descriptions des services par l’inclusion de leurs comportements est de plus en plus important. Ce comportement peut être décrit par des protocoles métier représentant les séquences possibles d'échanges de messages. Les services Web utilisent des politiques de contrôle d'accès (ACP) pour restreindre l'accès à des consommateurs autorisés. Ces politiques doivent faire partie de la description du service. Dans cette thèse, l'analyse d'interopérabilité en termes de contrôle d’accès après la formalisation des services Web annotés avec les politiques de contrôle d’accès est réalisée. Nous présentons une approche pour intégrer les outils de vérification dans l'architecture de contrôle d’accès de façon à garantir une interaction sans erreurs. Les politiques et les crédits sont présentés comme une ontologie afin de bénéficier de la flexibilité offerte par subsomption sur des concepts. La chorégraphie des services Web est utilisée dans la phase de conception d’applications pair à pair complexes dans lesquelles chaque pair peut être implémenté par un service Web. Par conséquent, la sélection des services Web pour l’implémentation de chorégraphie en utilisant l’approche de vérification de compatibilité avec contrôle d'accès est l'un des objectifs de notre recherche. Dans ce travail, les modèles de protocole métier du service Web sont étendus en ajoutant des informations au message sur chaque transition du service dans lequel ce message sera envoyé ou reçu. Nous définissons et vérifions la compatibilité des services Web afin de voir si (et comment) plusieurs services peuvent avoir des interactions en fonction de leurs protocoles. Cette approche aidera les concepteurs à choisir des services Web de manière simple et à vérifier s’ils peuvent mettre en œuvre la chorégraphie nécessaire en vérifiant la compatibilité avec notre approche
Currently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Du, Rong. "Secure electronic tendering". Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.

Texto completo da fonte
Resumo:
Tendering is a method for entering into a sales contract. Numerous electronic tendering systems have been established with the intent of improving the efficiency of the tendering process. Although providing adequate security services is a desired feature in an e-tendering system, current e-tendering systems are usually designed with little consideration of security and legal compliance. This research focuses on designing secure protocols for e-tendering systems. It involves developing methodologies for establishing security requirements, constructing security protocols and using formal methods in protocol security verification. The implication is that it may prove suitable for developing secure protocols in other electronic business domains. In depth investigations are conducted into a range of issues in relation to establishing generic security requirements for e-tendering systems. The outcomes are presented in a form of basic and advanced security requirements for e-tendering process. This analysis shows that advanced security services are required to secure e-tender negotiation integrity and the submission process. Two generic issues discovered in the course of this research, functional difference and functional limitations, are fundamental in constructing secure protocols for tender negotiation and submission processes. Functional difference identification derives advanced security requirements. Functional limitation assessment defines how the logic of generic security mechanisms should be constructed. These principles form a proactive analysis applied prior to the construction of security protocols. Security protocols have been successfully constructed using generic cryptographic security mechanisms. These protocols are secure e-tender negotiation integrity protocol suite, and secure e-tender submission protocols. Their security has been verified progressively during the design. Verification results show that protocols are secure against common threat scenarios. The primary contribution of this stage are the procedures developed for the complex e-business protocol analysis using formal methods. The research shows that proactive analysis has made this formal security verification possible and practical for complex protocols. These primary outcomes have raised awareness of security issues in e-tendering. The security solutions proposed in the protocol format are the first in e-tendering with verifiable security against common threat scenarios, and which are also practical for implementation. The procedures developed for securing the e-tendering process are generic and can be applied to other business domains. The study has made improvements in: establishing adequate security for a business process; applying proactive analysis prior to secure protocol construction; and verifying security of complex e-business protocols using tool aided formal methods.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Laclau, Marie. "Jeux répétés en réseaux et communication". Phd thesis, HEC, 2012. http://pastel.archives-ouvertes.fr/pastel-00741919.

Texto completo da fonte
Resumo:
On s'intéresse aux jeux infiniment répétés avec observation imparfaite et privée, joués dans des réseaux. Différents réseaux peuvent modéliser les structures d'interaction, d'observation ou de communication d'un jeu répété. La communication est gratuite, et peut être privée ou publique. Différents modèles de jeux répétés sont étudiés, en fonction des réseaux considérés, de la nature de la communication, et du concept d'équilibre étudié. L'objectif principal de cette thèse est d'établir des conditions nécessaires et suffisantes sur les réseaux considérés afin d'obtenir un folk théorème
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Pittendrigh, Alistair. "The potential impact of greenhouse gas emissions constraints on the Southern African primary aluminium business". Thesis, Stellenbosch : Stellenbosch University, 2006. http://hdl.handle.net/10019.1/50666.

Texto completo da fonte
Resumo:
Thesis (MBA)--Stellenbosch University, 2006.
ENGLISH ABSTRACT: The Kyoto protocol was signed early in 2005 whereby Annexure 1 industrialised countries committed to reducing their greenhouse gas (GHG) emissions. South Africa signed the Protocol. however being a developing country it has no GHG emissions reduction target for the first commitment period until 2012. Primary aluminium is a GHG intensive global commodity to which Southem Africa contributes significantly. This dissertation aims to investigate how the profitability of the Southern African primary aluminium sector may be affected by Kyoto Protocol GHG restrictions even though the smelters are situated in non-Annexure 1 countries. A Delphi-type survey is conducted to gather opinions on identified pressures and drivers that could affect the industry. The survey respondents indicate that the greatest impact will occur from internal pressures from holding companies. Further pressure will originate from external sources namely government, Non Governmental Organisations, shareholders and investors. Direct manufacturing costs are not expected to increase as a result of the Protocol. Rather. industry changes are expected to be the result of internal and external pressures. Opportunities for Clean Development Mechanism (COM) projects are rated as highly importance and are strongly recommended. Various strategies are identified and presented in a matrix to compare the effect of each on the various identified pressures and drivers. From the matrix it is observed that the majority of the selected strategies have a profound impact on the internal and external pressures. From this research report it is recommended that a cooperative proactive strategy be followed . focusing initially on low cost GHG emissions reduction projects and rigorously pursuing COM projects.
AFRIKAANSE OPSOMMING: Die Kyoto Protokol, waardeur Anneks 1 geindustraliseerde lande hul daartoe verbind het om hul kweekhuis gas (GHG) emissies te verminder, is vroeg in 2005 onderteken. Suidelike Afrika het die Protokol onderteken, maar weens sy status as ontwikkelende land, het dit geen GHG emissieverminderingsdoelwit vir die eerste verpligtingsfase tot en met 2012 nie. Primere aluminium is 'n GHG intensiewe globale kommoditeit waartoe Suidelike Afrika 'n groot bydrae lewer. Hierdie tesis poog om ondersoek in te stel na die impak van Protokol GHG beperkings op die winsgewendheid van die Suidelike Afrika primere aluminium sektor, ten spyle daarvan dat die smelters in nie-Annex 1 lande gelee is. 'n Delphi-tipe opname was geloods om opinies in te win oor geidentifiseerde drukpunte en drywers wat 'n impak kon he op die industrie. Die respondente het aangedui dat die grootste impak sal kom van interne druk van beheermaatskappye. Addisionele druk sal afkomstig wees van eksteme bronne soos die regering, Nie-regerings organisasies (NGO's), aandeelhouers en beleggers. Daar word nie verwag dat die direkte vervaardigingskoste sal eskaleer as gevolg van die Protokol nie. Daar word eerder verwag dat veranderinge in die industrie die gevolg sal wees van interne en eksterne druk. Geleenthede vir skoon-ontwikkelings meganisme (COM) projekte is geweldig belangrik en word sterk aanbeveel. Verskeie strategiee word geidentifiseer en voorgele in 'n matriks om sodoende 'n vergelyking te tref tussen die effek wat elk het op die onderskeie drukpunte en drywers. Uit die matriks kan afgelei word dat die meerderheid strategiee 'n diepgaande invloed het op die inteme en eksterne drukpunte. Hierdie navorsingsverslag beveel aan dat 'n samewerkende proaktiewe strategie gevolg word, wat aanvanklik sal fokus op lae-koste GHG emissieverminderingsprojekte, asook die nougesette najaag van CDM projekte.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Ponge, Julien Nicolas Computer Science &amp Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions". Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.

Texto completo da fonte
Resumo:
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted that a service description should include not only the interface, but also the business protocol supported by the service. The present work focuses on the formalization of the important category of protocols that include time-related constraints (called timed protocols), and the impact of time on compatibility and replaceability analysis. We formalized the following timing constraints: CInvoke constraints define time windows of availability while MInvoke constraints define expirations deadlines. We extended techniques for compatibility and replaceability analysis between timed protocols by using a semantic-preserving mapping between timed protocols and timed automata, leading to the novel class of protocol timed automata (PTA). Specifically, PTA exhibit silent transitions that cannot be removed in general, yet they are closed under complementation, making every type of compatibility or replaceability analysis decidable. Finally, we implemented our approach in the context of a larger project called ServiceMosaic, a model-driven framework for web service life-cycle management.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Dobias, Ondrej. "Dolování procesů jako služba". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-319183.

Texto completo da fonte
Resumo:
Softwérové a hardvérové aplikácie zaznamenávajú veľké množstvo informácií do protokolov udalostí. Každé dva roky sa množstvo zaznamenaných dát viac než zdvojnásobí. Dolovanie procesov je relatívne mladá disciplína, ktorá sa nachádza na rozmedzí strojového učenia a dolovania dát na jednej strane a modelovania a analýzy procesov na druhej strane. Cieľom dolovania procesov je popísať a analyzovať skutočné procesy extrahovaním znalostí z protokolov udalostí, ktoré sú v dnešných aplikáciách bežne dostupné. Táto práca mieri na spojenie obchodných príležitostí (organizácie bohaté na dáta; dopyt po službách BPM; limitácie na strane tradičnej dodávky BPM služieb) s technickými možnosťammi Dolovania procesov. Cieľom práce je návrh produktu, ktorý bude riešiť potreby zákazníkov a poskytovateľov služieb v oblasti Dolovania procesov lepšie než súčasné riešenie vybranej spoločnosti.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Botshinda, Amelia. "Implementeringen av koldioxidsnåla och klimatpositiva benchmarks samt ESG-relaterad transparens i BMR : en kritisk granskning av kommissionens föreslagna ändringar av Benchmarkförordningen och dess förenlighet med de åsyftade ändamålen". Thesis, Linköpings universitet, Filosofiska fakulteten, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-165454.

Texto completo da fonte
Resumo:
Vi lever i en tid präglad av drastiska klimatförändringar och ökade utsläpp av växthusgaser, där klimatångest har kommit att bli ett problem som tycks drabba såväl privatpersoner som företag. Allteftersom vår medvetenhet för samtidens klimathot ökar, har även hållbarhet fått en allt större betydelse för europeiska investerare. En tydlig konsekvens härav är den kraftiga ökningen av antalet hållbarhetsindex som identifierats på finansmarknaden. Hållbarhetsindex används ofta som komponent i passiva investeringsstrategier eller som verktyg för att mäta prestationen av olika värdepapper i en portfölj, och får på så vis funktionen av ett benchmark. Metoden för att utveckla såväl hållbara index som benchmarks kan emellertid variera, vilket ofta beror på att klimatrelaterad information kan vara extremt komplex att omvandla till finansiellt relaterbara värden. Svårigheterna härom har således minskat marknadens förtroende för sådana investeringsalternativ, trots den ökade benägenheten hos investerare att ta hänsyn till hållbarhet även i finansiella sammanhang. Bristande lagstiftning inom området föranledde Europeiska kommissionen att upprätta ett förslag om ändring av Benchmarkförordningen år 2018, som en del av sin handlingsplan för finansiering av hållbar tillväxt. Förordningen reglerar i dagsläget främst administratörer av benchmarks, vilka innehar det övergripande juridiska ansvaret för ett benchmark. Med förslaget införs nya kategorier för koldioxidsnåla och klimatpositiva benchmarks samt en reviderad transparensreglering som förpliktigar administratörer att offentliggöra hur de beaktar hållbarhet i sin metod och referensvärdesdeklaration. Även om förslaget välkomnats av flertalet aktörer, föreligger anledning att ifrågasätta huruvida marknaden kommer kunna förhålla sig till de ambitiösa ändringarna, samt om effekten av reglerna blir den som kommissionen eftersträvat. I uppsatsen identifieras och diskuteras de potentiella utmaningarna med förslagets ikraftträdande, vilka sedermera analyseras i förhållande till de åsyftade ändamålen med reglerna. Kritik riktas i uppsatsen främst mot förordningens bristande möjligheter att hålla andra aktörer ansvariga, eftersom uppfyllandet av de nya reglerna inte enbart är beroende av administratörernas eget agerande. Vidare konstateras att marknaden inledningsvis kommer att få stora svårigheter med insamling och verifiering av den klimatrelaterade information som är avgörande för användningen av miljövänliga benchmarks. Sett ur ett långsiktigt perspektiv tros emellertid ändringarna kunna skapa goda förutsättningar för en bättre inkludering av hållbarhet på finansmarknaden, utan kompromiss av ett konsument- eller investerarskydd.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Alzahrani, Naif Saeed. "A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games". PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5038.

Texto completo da fonte
Resumo:
Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades. To combat this problem, many anti-counterfeiting approaches have been proposed. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeiting approaches track-and-trace the physical locations of products as the products flow through supply chains. Existing approaches suffer from two main drawbacks. They cannot detect tag reapplication attacks, wherein a counterfeiter removes a legitimate tag from a genuine product and reapplies it to a counterfeit or expired product. Second, most existing approaches typically rely on a central server to authenticate products. This is not scalable and creates tremendous processing burden on the server, since significant volumes of products flood through the supply chain's nodes. In addition, centralized supply chains require substantial data storage to store authentication records for all products. Moreover, as with centralized systems, traditional supply chains inherently have the problem of a single-point of failure. The thesis of this dissertation is that a robust, scalable, counterfeiting-resistant supply chain that addresses the above drawbacks and can be simultaneously achieved by (i) using a combination of NFC tags on products and a distributed ledger such as blockchain for reapplication-proof, decentralized, and transparent product authentication (ii) a novel game-theoretical consensus protocol for enforcing true decentralization, and enhancing the protocol's security and performance. In this dissertation, we first propose a new Tag Reapplication Detection (TRD) system to detect reapplication attacks using low-cost NFC tags and public key cryptography. To detect reapplication attacks, TRD tracks the number of times a tag has been read in the supply chain using a 'central' authentication server. Second, leveraging the blockchain technology, we propose the Block-Supply Chain, a transformation of TRD into a decentralized supply chain. In this chain, each node maintains a blockchain (distributed public ledger) per product. This blockchain comprises chained blocks, where each is an authentication event. The Block-Supply Chain can detect tag reapplication attacks and can replace the centralized supply chain design, thus overcoming the centralization issues. One of the fundamental characteristics of blockchain technology is the consensus protocol. Consensus protocols ensure that all nodes in the blockchain network agree on the validity of a block to be included in the public ledger. The first and most popular of the existing consensus protocols is Proof of Work (PoW). However, PoW requires massive computational effort, resulting in high energy and computing resources consumption. Alternatively, Byzantine Fault Tolerance (BFT) protocols, such as Tendermint, were adapted in blockchain technology to be efficient and easy to implement. Nevertheless, not all of BFT protocols guarantee true decentralization, and they are mostly based on fixed-validators. BFT fixed-validators protocols typically rely on fixed, static validators responsible for validating all newly proposed blocks. This opens the door for adversaries to launch several attacks on these validators, such as Distributed Denial of Service (DDoS) and Eclipse attacks. In contrast, a truly decentralized protocol ensures that variable sets of anonymous validators execute the blocks' validations. Building on this observation, we propose the TrueBFT, a truly decentralized BFT-based consensus protocol that does not require PoW and randomly employs a different set of validators on each block's proposal. TrueBFT is designed for permissioned blockchains (in such blockchains, the participants who can transact on the blockchain are limited, and each participant is required to have permission to join the system). Our simulations show that TrueBFT offers remarkable performance with a satisfactory level of security compared to the state-of-the-art protocol Tendermint. Another issue with current consensus protocols, particularly the BFT, is that the majority of them do not take the number of employed validators into consideration. The number of validators in a blockchain network influences its security and performance substantially. In response, we integrate a game theoretical model into TrueBFT that analyzes the risk likelihood of each proposer (i.e., the node that creates and proposes the new block). Consequently, each time a new block is proposed, the 'number of validators' becomes proportional to the risk likelihood block's proposer. Additionally, the game model reinforces the honest behavior of the validators by rewarding honest validators and punishing dishonest ones. Together, TRD, Block-Supply Chain, and the game-theoretical TrueBFT consensus protocol enable robust, scalable, decentralized anti-counterfeiting supply chain that is resistant to tag reapplication attacks, as well as attacks to consensus protocols such as DDoS and Eclipse attacks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Banaszewski, Roni Fabio. "Modelo multiagentes baseado em um protocolo de leilões simultâneos para aplicação no problema de planejamento de transferências de produtos no segmento downstream do sistema logístico brasileiro de petróleo". Universidade Tecnológica Federal do Paraná, 2014. http://repositorio.utfpr.edu.br/jspui/handle/1/822.

Texto completo da fonte
Resumo:
CAPES
O segmento downstream da cadeia de suprimentos da indústria brasileira de petróleo é composta por bases de produção (e.g. refinarias), armazenamento (e.g. terminais) e consumo (e.g. mercados consumidores) e modais de transportes (e.g. oleodutos, navios, caminhões e trens). O planejamento da transferência de derivados de petróleo nesta rede multimodal é um problema complexo e atualmente é realizado para um horizonte de três meses com base na experiência de profissionais e sem auxílio de um sistema computacional de apoio à decisão. Basicamente, o problema pode ser visto como uma negociação para alocação de recursos disponíveis (tais como derivados de petróleo, tanques e modais de transporte) pelas diferentes bases envolvidas que necessitam enviar ou receber derivados de petróleo. Na literatura, alguns problemas semelhantes, porém mais voltados para o planejamento de redes formadas por um único tipo de modal de transporte, têm sido tratados por diferentes abordagens, com predominância da programação matemática. Estes trabalhos ilustram a difícil tarefa de modelar grandes problemas por meio desta abordagem. Geralmente, tais trabalhos consideram apenas um curto horizonte de planejamento ou apenas uma parte do problema original, tal como uma parte da rede petrolífera brasileira, gerando limitações importantes para os modelos desenvolvidos. Devido às características do problema em estudo, o qual envolve toda a rede de transporte e apresenta perfil de negociação entre as diferentes entidades envolvidas, surge o interesse da utilização do paradigma de sistemas multiagente. O paradigma de agentes tem sido aplicado a problemas de diferentes contextos, particularmente em problemas de gerenciamento de cadeias de suprimentos devido à sua correspondência natural com a realidade e, em geral, em problemas que envolvem a competição por recursos por meio de mecanismos de negociação com base em leilões. Este trabalho apresenta um novo protocolo de negociação baseado em leilões e aplicação deste protocolo em forma de um modelo multiagente na resolução do problema de planejamento em questão. Os agentes que formam a solução representam principalmente os locais de produção, armazenamento, consumo e os modais de transporte na rede petrolífera brasileira. O objetivo destes agentes é manter um nível de estoque diário factível de cada produto em cada local por meio de transferências de produtos pela rede petrolífera brasileira com preferível redução do custo de transporte. Por fim, este trabalho apresenta a satisfação destes objetivos por meio de experimentos em cenários fictícios e reais da rede brasileira de petróleo.
The Brazilian oil supply chain is composed by oil refineries, consumer markets, terminals for intermediary storage and several transportation modals, such as pipelines, ships, trucks and trains. The transportation planning of oil products in this multimodal network is a complex problem that is currently performed manually based on expertise, for a period of three months, due to the lack of a software system to cover the problem complexity. Such problem involves the negotiation of available resources such as oil products, tanks and transportation modals between different sources and consumption points. Similar problems, but more directed to the planning of single modes of transportation, have been treated by different approaches, mainly mathematical programming. Such works illustrate the difficult task of modeling large problems with this mechanism. Generally, they consider a short horizon planning or only part of the original problem, such as a part of the network, rendering important limitations to the models developed. Due to the characteristics of the problem in study where the full network needs to be considered and there exists negotiation amongst the different entities involved, the usage of multi-agent models seems to be worth to explore. Such models have been applied in different contexts such as to supply chain problems due its natural correspondence with the reality. Furthermore, in problems involving competition for resources, multi-agents negotiation mechanisms based on auctions are commonly applied. Thus, this thesis presents one auction-based solution formed by the cooperation among agents for them to achieve their goals. The agents involved in the auctions represent mainly the production, storage and consumption locations. Their goal is to maintain a daily suitable inventory level for each product by means of transportation through the multimodal network at a low transport cost. Finally, this paper presents the satisfaction of these objectives through experiments on real and fictional scenarios of Brazilian oil network.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

De, Klerk W. A. (Willem Abraham). "An investigation into the trading in emissions credits as a free market mechanism to curb global warming". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/49717.

Texto completo da fonte
Resumo:
Thesis (MBA)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: One of the most topical and widely discussed factors which could lead to the ultimate end of life on earth is global warming and its devastating effects. Several current trends clearly demonstrate that global warming is directly impacting on rising sea levels, the melting of icecaps and other significant worldwide climatic changes. These climatic changes will have a profound effect on the economy of the world as well as having health and social consequences for humans on earth. It has also become evident that mankind has played a significant role in causing global warming through its excessive burning of fossil fuels and its deforestation activities. Mainstream economists have increasingly realised that the prime cause of environmental problems is the absence of markets and more specifically, the absence of private ownership, which provide the foundation for markets. This occurrence has also been described in the literature as the tragedy of the commons. Mankind has come to a point in its history whereby it is in great danger of causing its own annihilation through the destruction of its natural environment. As a result of this, world leaders and many industrialists have realised that it is essential that the world must do something to preserve the natural environment. This was the rationale behind the Kyoto Protocol. In Kyoto 38 industrial states undertook to reduce their total emissions of six important greenhouse gases by at least 5 percent by the period 2012 at the latest. It was agreed in Kyoto that the system to be used to curb global warming should be based on free market principles that would focus on limiting the tragedy of the commons. On this basis it was agreed that the international trade in greenhouse gas emission allowances might fulfil an important role in providing countries and companies with the capabilities to achieve part of their reduction obligations. The Kyoto mechanism was therefore designed on the basis of emissions trading, but also had an equity objective with respect to developing countries. Supporters of the trading scheme are of the opinion that this market will guarantee that certain emission targets are met. In principle, the international trade in emission credits offers several advantages in terms of a flexible and cost-efficient realisation of the reduction obligations undertaken at Kyoto. Supporters of emissions trading are also of the opinion that trading in these gases also has economic and technological benefits. The answer to global warming might be as simple as buy low, sell high conventions. Now greenhouse-gas emissions are becoming a commodity that can be bought and sold on a worldwide scale, just like gold or soybeans. It is expected that the trading in greenhouse-gas emission rights will ultimately constitute the largest commodities market in the world. An international market for greenhouse gas emission allowances is already developing. However, rules governing such transactions are not fully worked out yet. The 178-nation Kyoto Protocol on global warming may provide a start, despite the US's refusal to support the treaty. It will be the aim of this thesis to provide understanding in terms of the functioning of emissions trading schemes and therefore the Kyoto mechanism as a solution to this problem of global warming. It will also be an important objective of this thesis to provide insight into the issues applicable to climatic change and the Kyoto mechanism.
AFRIKAANSE OPSOMMING: Atmosfeerverwarming is wêreldwyd een van die mees bespreekte kwessies. Die nadelige effek van atmosfeerverwarming as gevolg van die toenemende kweekhuiseffek, het die potensiaal om tot die uiteindelike uitwissing van lewe op aarde te lei. Verskeie tendense dui daarop dat atmosfeerverwarming 'n direkte impak op stygende seevlakke, die ontvriesing van die pakys by die pole en ander noemenswaardige klimaatsversteuringe het. Indien iets drasties nie gedoen word om atmosfeer verhitting te keer nie, sal klimaatsversteuringe 'n geweldig nadelige effek op die wêreld ekonomie te weeg bring, asook 'n nadelige effek op gesondheids- en sosiale toestande tot gevolg hê. Dit het duidelik geword dat die aktiwiteite van die mensdom, hoofsaaklik verbranding van fossielbrandstowwe en ontbossing, te blameer is vir atmosfeerverwarming. Ekonome wêreldwyd het toenemend besef dat die hoofrede vir omgewingsprobleme, soos atmosfeerverwarming, toegeskryf kan word aan die afwesigheid van markte en meer spesifiek die afwesigheid van privaatbesit, wat in effek die basis van die vrye mark vorm. Hierdie gebeurtenis word in die ekonomiese literatuur beskryf as die "tragedie van die gemene goedere" . Wêreldpolitici en industriële leiers het besef dat die mens by 'n punt in sy geskiedenis gekom het waar hy moontlik sy eie uitwissing kan bewerkstellig en dat iets drasties gedoen moet word om die natuurlike omgewing te beskerm om sodoende volhoubare ekonomiese groei te verseker. Hierdie besef het gelei tot die totstandkoming van die Kyoto Protokol waar 38 nywerheidslande ooreengekom het om voor die jaar 2012 hul totale nasionale emissies van die ses belangrikste kweekhuisgasse met ten minste 5 persent tot onder hul 1990 emissievlakke te verminder. Daar was in Kyoto ooreengekom dat die stelsel wat gebruik moet word om die Kyoto doelwitte te bereik sterk vryemark eienskappe moet besit asook meganismes om regverdigheid en gelykheid tussen lande in terme van kweekhuisgasbeperkings te verseker. Die Kyoto meganismes is ontwerp met sterk vryemark eienskappe, wat basies 'n stelsel is waarvolgens lugbesoedelingsregte verhandel kan word. Hierdie verhandeling van besoedelingsregte kan toegepas word om kweekhuis gasse te verminder. Die Kyoto meganismes en dus lugbesoedelingsverhandeling verskaf buigbaarheid aan besighede en lande om hul onderskeie besoedelingsbeperkingsdoelwitte op die mees koste effektiewe manier te bereik. Die antwoord op atmosfeer verwarming kan dalk so eenvoudig wees soos koop laag en verkoop hoog. Kweekhuisgasse is besig om net soos graan of goud 'n kommoditeit te raak. Daar word verwag dat die verhandeling in kweekhuis gas besoedelingsregte uiteindelik sal groei tot die grootste kommoditeitsmark ter wêreld. Ondersteuners van die Kyoto meganismes is van mening dat kweekhuisgas verhandeling ook ekonomiese en tegnologiese voordele inhou. Dit is 'n oogmerk van die Kyoto meganismes om die verskuiwing van tegnologie tussen ontwikkelde en ontwikkelende lande asook volhoubare groei te verseker. 'n Grysmark vir kweekhuisgas regte is reeds internasionaal, voor die beplande instelling van die Kyoto meganismes, aan die ontwikkel. Die reëls en regulasies vir die Kyoto meganismes is nog nie gefinaliseer nie. Dit en die onwilligheid van die VSA om die Protokol te onderteken, belemmer die vroegtydige implementering van die Kyoto meganismes en die effektiwiteit van die stelsel. Dit is die doelwit van die werkstuk om die leser bekend te maak met die funksionering van emissieverhandeling as 'n vryemark stelsel om omgewingsprobleme soos atmosfeerverwarming te verminder. Die werkstuk beoog ook om die kwessies betrokke by klimaatsverandering en die Kyoto meganismes aan die leser te verduidelik.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Harder, Benjamin. "Voice over IP 2.0: an analysis of limits and potential of IP2IP telecommunication". reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/9712.

Texto completo da fonte
Resumo:
Submitted by Gisele Isaura Hannickel (gisele.hannickel@fgv.br) on 2012-04-24T18:53:49Z No. of bitstreams: 1 120423 Master Thesis FGV.pdf: 3697873 bytes, checksum: f3ccbecacf430eaee0f0606f9daa9f36 (MD5)
Approved for entry into archive by Eliene Soares da Silva (eliene.silva@fgv.br) on 2012-04-25T15:52:36Z (GMT) No. of bitstreams: 1 120423 Master Thesis FGV.pdf: 3697873 bytes, checksum: f3ccbecacf430eaee0f0606f9daa9f36 (MD5)
Made available in DSpace on 2012-04-25T15:54:46Z (GMT). No. of bitstreams: 1 120423 Master Thesis FGV.pdf: 3697873 bytes, checksum: f3ccbecacf430eaee0f0606f9daa9f36 (MD5) Previous issue date: 2012-04-23
Internet Telephony (VoIP) is changing the telecommunication industry. Oftentimes free, VoIP is becoming more and more popular amongst users. Large software companies have entered the market and heavily invest into it. In 2011, for instance, Microsoft bought Skype for 8.5bn USD. This trend increasingly impacts the incumbent telecommunication operators. They see their main source of revenue – classic telephony – under siege and disappear. The thesis at hand develops a most-likely scenario in order to determine how VoIP is evolving further and it predicts, based on a ten-year forecast, the impact it will have on the players in the telecommunication industry.The paper presents a model combining Rogers’ diffusion and Christensen’s innovation research. The model has the goal of explaining the past evolution of VoIP and to isolate the factors that determine the further diffusion of the innovation. Interviews with industry experts serve to assess how the identified factors are evolving.Two propositions are offered. First, VoIP operators are becoming more important in international, corporate, and mobile telephony. End-to-end VoIP (IP2IP) will exhibit strong growth rates and increasingly cannibalize the telephony revenues of the classic operators. Second, fix-net telephony in SMEs and at home will continue to be dominated by the incumbents. Yet, as prices for telephony fall towards zero also they will implement IP2IP in order to save costs. By 2022, up to 90% of the calls will be IP2IP. The author recommends the incumbents and VoIP operators to proactively face the change, to rethink their business strategies, and to even be open for cooperation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

白啟昌. "A Study of Internet Protocol Television Business Model". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/37090987028007832759.

Texto completo da fonte
Resumo:
碩士
國立政治大學
經營管理碩士學程(EMBA)
96
The study topics included: Communication, Broadcasting, Television marketing status, Trends, Evolution, Architecture, Theorey, Regulations, and Research from worldwide IPTV related technologies; we hope to got current worldwide business model and provide our own innovation ideas from EMBA program and implement to future living environment to every family and persons. Study area targeted on IPTV’s background, definition and value chain and discuss with Taiwan’s policy for Dihgital content, M-Taiwan project, Chunghwa Telecom MOD( Multimedia On Demand) project, Cable TV, WebTV and related applications in current market and take actions for analysis and find out the weakness, strenth and chellange of market current status; this study will be generate key successful factors and discover in future oppoprtunities.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Rocha, Filipe Muller. "Interlusa & the family protocol". Master's thesis, 2017. http://hdl.handle.net/10362/28303.

Texto completo da fonte
Resumo:
The following Work Project will provide a background of the Müller Family, introducing the family business Interlusa and its current state. The academia unveils scarce odds for the survival of the family business past the third generation. Bound to avoid that outcome, the family protocol is one of the keystones to sustain the family’s and company’s success. The Müller Family protocol, conceived under alternative practices than the ones suggested by consulting firms and the literature review, will be analyzed. Its discussion with the third generation family members will be presented, followed by the due diagnosis and recommendations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Sai, Ying. "Transparent safe settlement protocol and I-ticket booth user verification mechanism for electronic commerce". 2002. http://www.lib.utexas.edu/etd/r/d/2002/saiy022/saiy022.pdf#page=4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Alvarez, Charles Conceicao, e 安查爾. "New Business Model on IP (Web) based Network - Voice over Internet Protocol (VoIP) Technology (Telecommunications Industry)". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/24714424707511802749.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

JEON, SUNG-HO, e 全成浩. "Benefits and Risks of Using Voice over Internet Protocol (VoIP) in Taiwan Business: An Exploratory Study". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/36881265238365350767.

Texto completo da fonte
Resumo:
碩士
銘傳大學
企業管理學系碩士班
99
ABSTRACT This research thesis was presented as groundwork, an analytical data to promote convenience of internet phone users as well as revitalization of internet phone service by understanding the service quality and device preference that internet users prefer. A total of 620 survey studies were handed out to accompany the research with direct approach method for higher percentage of collection. The major purpose of this study is twofold: Firstly, to understand the current state of VoIP adoption and use within Taiwanese business. Secondly, we will discuss our analysis on both the different benefits expected for subscribers of various characteristics as well as their risk and satisfaction levels. In Taiwan the top 3 VoIP service providers by number of subscribers are (in order): “PChome Internet''s Skype", "Microsoft MSN" and "Yahoo! Messenger". In general, the most popular use of VoIP services includes sending text messages as well as voice chat and video chat with other users. For VoIP phone call services, over 24.8% was for international calls. In the enterprise, 40% of enterprise subscribers respond to having used VoIP over the last 3 years. Most respondents agreed that with the added convenience of VoIP service comes certain risks, with the top concerns being reliability (internet connections are often subject to sudden disconnection) and sometimes lower voice quality (highly dependent on environment). However, subscribers generally agree that the benefits of using VoIP outweigh the common risks, the foremost benefit being cheaper costs. Still, even with significant cost savings, many respondents expressed dissatisfaction with the current charge rates of service providers. When analyzing the subscriber base by certain characteristics, we have found that among Taiwanese business subscribers, benefit and risk recognition was noticeably more pronounced in females compared to males. In contrast, satisfaction level was generally more recognized among males than females. With regards to the different service providers, the satisfaction level of Microsoft MSN subscribers was generally lower than with other subscribers. Accordingly, the results from this research and their interpretation must be expropriated with certain considerations including research limitations and restrictions. It is suggested that additional in-depth research with improved conditions should be carried out in the future. What’s more, there’s a need to review VoIP receptivity that must be conducted systematically in a wider spectrum, while measures for the promotion and growth of VoIP service in Taiwanese business through development and sale of additional service must be presented.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Yu, Min-Chieh. "A secure mobile agent e-commerce protocol". Thesis, 2015. http://hdl.handle.net/1805/10117.

Texto completo da fonte
Resumo:
Indiana University-Purdue University Indianapolis (IUPUI)
There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Ryu, Seung Hwan Computer Science &amp Engineering Faculty of Engineering UNSW. "A framework for managing the evolving web service protocols in service-oriented architectures". 2007. http://handle.unsw.edu.au/1959.4/40566.

Texto completo da fonte
Resumo:
In Service-Oriented Architectures, everything is a service and services can interact with each other when needed. Web services (or simply services) are loosely coupled software components that are published, discovered, and invoked across the Web. As the use of Web services grows, in order to correctly interact with the growing services, it is important to understand the business protocols that provide clients with the information on how to interact with services. In dynamic Web services environments, service providers need to constantly adapt their business protocols for reflecting the restrictions and requirements proposed by new applications, new business strategies, and new laws, or for fixing the problems found in the protocol definition. However, the effective management of such a protocol evolution raises critical problems: one of the most critical issues is to handle instances running under the old protocol when their protocol has been changed. Simple solutions, such as aborting them or allowing them to continue to run according to the old protocol, can be considered, but they are inapplicable for many reasons (e.g., the lose of work already done and the critical nature of work). We present a framework that supports service administrators in managing the business protocol evolution by providing several features, such as a set of change operators allowing modifications of protocols, a variety of protocol change impact analyses automatically determining which ongoing instances can be migrated to the new version of protocol, and data mining techniques inducing a model for classifying ongoing instances migrateable to the new protocol. To support the protocol evolution process, we have also developed database-backed GUI tools on top of our existing system. The proposed approach and tools can help service administrators in managing the evolution of ongoing instances when the business protocols of services with which they are interacting have changed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Duduka, Jacint. "Towards a simulation interoperability framework between an agent-based simulator and a BPMN engine using REST protocol". Master's thesis, 2020. http://hdl.handle.net/10400.2/10381.

Texto completo da fonte
Resumo:
O paradigma atual de um modelo de processo de negócio é que é uma representação de uma sequência de tarefas que atuam sobre um “input” de dados, para produzir uma “output”, visando a produção de um novo serviço ou produto. Embora esta seja uma forma válida de interpretar um processo de negócio, ela não considera em pormenor a influência de fenómenos externos, por exemplo, comportamento humano, comunicação, interações sociais, a cultura organizacional que pode ter um efeito significativo na eficiência um processo de negócio. Como a dinâmica destes fenómenos externos não é linear, eles podem ser interpretados como um sistema complexo, que são sistemas que se comportam de tal forma que não podem ser explicados simplesmente olhando para o comportamento das suas partes individuais. Esta forma holística de pensar sobre os processos de negócio abre as portas à possibilidade de combinar diferentes métodos de simulação para modelar diferentes aspetos que influenciam um processo. A simulação baseada em agentes (ABS) e BPMN são escolhidas como os dois métodos de simulação para estudar o potencial dessa integração em processos de negócio, e a nossa abordagem para os combinar consiste em modelar o comportamento do utilizador em ABS e o próprio processo de negócio utilizando o BPMN. Por fim, a integração entre os dois motores de simulação acontece durante o decurso da simulação através da invocação de APIs usando o protocolo REST, onde os agentes controlam a dinâmica de execução do processo no BPMN. Esta abordagem de integração é validada através da construção de uma experiência, com o objetivo de determinar se os resultados de simulação obtidos são estatisticamente coerentes
The current paradigm of a business process model is that it is a representation of a sequence of tasks that act upon some data input, to produce an output, aiming the production of a new service or product to be delivered from a producer to a customer. Although this is a valid way of thinking, it neglects to consider in enough detail the influence of some phenomenon on inputs, e.g. human behaviour, communication, social interactions, the organisational culture which can have a significant effect on the output delivered by a business process. As the dynamics of these phenomena are non-linear, they can be interpreted as a complex system. This holistic way of thinking about business processes opens the doors to the possibility of combining different simulation methods to model different aspects that influence a process. A BPMN engine and an agent-based simulation (ABS) engine are chosen to serve the basis of our framework. In its conception, we not only consider the technical aspects of the framework but also delve into exploring its management and organizational dimensions, with the intent of facilitating its adoption in enterprises, as a tool to support decision support systems. We analyse how accurate the simulation results can be when using these two tools as well as what considerations need to be considered within organizations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Wagle, Leena V. "Incorporating business policies into business protocols". 2005. http://www.lib.ncsu.edu/theses/available/etd-08162005-125546/unrestricted/etd.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Rajagopalan, Koushik N. "Tools for business protocols". 2010. http://www.lib.ncsu.edu/resolver/1840.16/6005.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Santos, Inês Maria Testa. "Bermanne - when there is no room for all". Master's thesis, 2020. http://hdl.handle.net/10362/107294.

Texto completo da fonte
Resumo:
This project introduces the real case of the family business Bermanne,in 2012,along with real decisions regarding the future of the firmas its trugglesto survive past second generation and hasa third generation eager to join. From the founder and CEO’s perspective, the case illustrates the dilemma in which hefinds himself in. Needing to take the best decision for the company’s survival but not wanting to hurt his family’s feelings. The case will guide through the family and firm’s history and reasons why the business became an important asset to all family members
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Xavier, Ana Lúcia Teixeira Marques. "Relatório de estágio realizado no Sport Lisboa e Benfica: o protocolo empresarial no Sport Lisboa e Benfica". Master's thesis, 2018. http://hdl.handle.net/10400.5/20042.

Texto completo da fonte
Resumo:
A necessidade do Protocolo num clube desportivo obriga a que haja um conhecimento de um conjunto de preceitos que têm de ser alcançados em eventos, não só em cerimónias protocolares, mas também no simples quotidiano. As normas de cortesia, os códigos de conduta, os atos de boa educação e bom senso, facilitam a vida em sociedade em qualquer espaço. Neste relatório de estágio curricular, desenvolvido no Departamento da Direção Comercial e de Marketing: Inovação e Desenvolvimento de Negócio: Protocolo do Sport Lisboa e Benfica, será abordada a: caraterização da instituição, finalidades e processos de estágio, enquadramento da prática profissional de natureza concetual, contexto institucional e legal da instituição, história e instalações do clube, caraterísticas da instituição, realização da prática profissional das atividades desenvolvidas pelo protocolo, comparação entre várias instituições desportivas e por fim, conclusões onde consta a análise SWOT do protocolo, dificuldades sentidas, análise dos efeitos e das consequências da intervenção realizada, estabelecimento de perspetivas futuras e sugestões a propor. Nestas páginas, é possível verificar que o Sport Lisboa e Benfica alargou ao máximo as ações de trabalho da mestranda, permitindo o acompanhamento em funções dentro da Direção Comercial e de Marketing, não só no Protocolo, mas também nos Eventos.
The necessity of the Protocol in a sports club obliged to a knowledge of a set of precepts that have to be reached in events, not only in protocol ceremonies, but also in the simple day to day. Courtesy norms, codes of conduct and acts of good education and common sense, facilitate the life in society in any space. In this curricular internship report, developed in the Department of Commercial and Marketing Management: Innovation and Business Development: Protocol of Sport Lisboa e Benfica, are addressed the: characterization of the institution, purposes and internship processes, framework of professional practice of a conceptual nature, institutional and legal context of the institution, history and facilities of the club, characteristics of the institution, accomplishment of the professional practice where the activities developed by the protocol are described, comparison between several sports institutions, and, finally, findings where protocol SWOT analysis is verified, difficulties experienced, analysis of the effects and consequences of the intervention performed, establishment of future perspectives and suggestions to propose. In these pages, it is possible to verify that the Sport Lisboa e Benfica extended to the maximum the work actions of the master, allowing the monitoring in functions within the Commercial and Marketing Department, not only in the Protocol, but also in the Events.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Chuang, Ping-Jang, e 莊評彰. "A Study of Electronic Transaction Protocols for International Business". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/68380388317226031098.

Texto completo da fonte
Resumo:
碩士
朝陽科技大學
資訊管理系碩士班
95
There''s still room for improving the use of stamped signature and the lack of well designed trading model in the trading protocols made and designed in business transnational electronic commerce. For example, the sizes of stamped signatures, that send in business transnational electronic commerce, would be increased by the number of businesses been send. It would lead to the transactional security problems such as, making the size of stamped signature being too long for verification and making the stamped signature cannot fully reveal the sequence of the senders. This study will discuss these problems and will make some suggestions in improving the security of trading protocols and the efficiency of verifying stamped signature. With the higher acceptance in doing transnational business over the Internet, it shall bring brokers to smoothly go through the trading model in combining or splitting orders with either the buyer party or the selling party in transnational electronic commerce. However, current trading protocol can’t fully offer these transactions. It would lead cash flow and material flow to non-Internet electronic information transmission model and would lower the continuity of trading, due to the transfer among operating systems from the defects of the current trading protocol. Therefore, the main purpose of this study is to refining a trading protocol for combining and splitting orders to reduce the trading risks and toimprove the trading convenience.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Mallya, Ashok Ullal. "Modeling and enacting business processes via commitment protocols among agents". 2005. http://www.lib.ncsu.edu/theses/available/etd-11212005-133937/unrestricted/etd.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Cheng, Zhengang. "Verifying commitment based business protocols and their compositions: model checking using promela and spin". 2006. http://www.lib.ncsu.edu/theses/available/etd-08092006-005135/unrestricted/etd.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Pech, Varguez José Luis. "Cohérence et cohésion de l'équipe de direction dans la petite et moyenne entreprise : Le cas des hôtels familiaux au Yucatan". Phd thesis, 2003. http://pastel.archives-ouvertes.fr/pastel-00918649.

Texto completo da fonte
Resumo:
Cette thèse vise à contribuer au développement des connaissances concernant la convergence au sein des équipes dirigeantes et pour cela à distinguer entre la convergence des actions et celles des affects. En outre, la thèse essaie, grâce à la mise en place d'un système formel de gestion, de comprendre l'interaction entre ces deux dimensions et leurs effets sur les résultats des entreprises. Pour cela, cette thèse propose d'analyser la convergence en faisant la différence entre la cohérence et la cohésion. La cohérence correspond au degré d'articulation des différentes fonctions des éléments d'un groupe qui permet, à travers la réalisation des objectifs individuels, d'atteindre les objectifs collectifs. La cohésion correspond au degré d'adhésion volontaire des membres du groupe à un idéal, une aspiration ou un sentiment communs, qui leur permet de se renforcer émotionnellement les uns les autres et ainsi de faire face, comme un tout, aux difficultés qu'ils rencontrent. La cohérence relève donc du champ des faits et des actions quand la cohésion relève des valeurs, des sentiments et des affects. L'approche méthodologique a multiplié les sources de données qualitatives (observation participante et entretiens en profondeur) et quantitatives (questionnaires structurés et fermés) en s'appuyant sur une démarche de recherche-action, complétée par un schéma expérimental destiné à améliorer la validité et le degré de généralisation des résultats et permettant de mesurer les effets de l'intervention du chercheur. Ce protocole a été appliqué à trois moyennes entreprises hôtelières mexicaines. La thèse a ainsi pu mettre en évidence l'existence d'une relation hélicoïdale entre la cohérence et la cohésion et montrer comment un système formel de gestion pouvait améliorer ces dernières. Elle a principalement démontré que: * une cohésion minimale était une condition nécessaire de la cohérence, * la cohérence sanctionnée par des conséquences positives peut contribuer à augmenter l'adhésion des participants et améliorer la cohésion, * l'amélioration de la cohésion, en engendrant une atmosphère conviviale, peut contribuer à améliorer la cohérence, * il est possible à travers la mise en place d'un système formel de gestion, de développer à la fois la cohérence et la cohésion. La thèse essaie de proposer à la fois un apport conceptuel (la distinction entre cohérence et cohésion), un apport méthodologique (l'établissement de la complémentarité entre la recherche-action et la méthode expérimentale) et un apport pratique (la proposition de solutions opérationnelles pour améliorer la cohérence et la cohésion)
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia