Siga este link para ver outros tipos de publicações sobre o tema: Business protocol.

Artigos de revistas sobre o tema "Business protocol"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Business protocol".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Seguel, Ricardo, Rik Eshuis e Paul Grefen. "Architecture Support for Flexible Business Chain Integration Using Protocol Adaptors". International Journal of Cooperative Information Systems 23, n.º 04 (dezembro de 2014): 1450008. http://dx.doi.org/10.1142/s0218843014500087.

Texto completo da fonte
Resumo:
Business chains increasingly rely on the dynamic integration of business processes of different partners. The interaction constraints that result from the business processes are captured in business protocols. Since the business protocols of each partner support its own way of working, the business protocols can easily mismatch, which hinders organizations from forming a business chain. Such mismatches can be resolved by protocol adaptors. In this paper, we show how protocol adaptors can be used to enable the flexible formation of business chains. For different types of business chains, we present formation cases that describe which partners are responsible for the construction and operation of protocol adaptors. Next, we present for each formation case an accompanying concrete software architecture that realizes the case. The presented software architectures support the flexible formation of business chains and use protocol adaptation as a key component. We show the feasibility of the approach by discussing a prototype implementation, which we apply to a case study from the healthcare domain.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Fernández y Vázquez, Jorge Jesús. "Introducción al protocolo turístico-hotelero //Introduction to protocol Tourist & Hospitality". REVISTA ESTUDIOS INSTITUCIONALES 2, n.º 3 (1 de dezembro de 2015): 201. http://dx.doi.org/10.5944/eeii.vol.2.n.3.2015.18370.

Texto completo da fonte
Resumo:
El Protocolo Turístico y Hotelero una visión desde la perspectiva intercultural. Del Profesional del Turismo y Hotelería que ofrece los servicios del sector y del Profesional de Protocolo que necesita de los servicios del Sector Turístico.Un Protocolo que tiene conexión con el Protocolo de Empresa.¿Por qué el Protocolo en el sector Turístico? Por 5 razones importantes, y más especialmente en el Sector Hotelero El Protocolo en la empresa turística se establece desde 3 componentes.The Tourism and Hospitality Protocol a view from an intercultural perspective. Professional Tourism and Hospitality offering services sector and Professional Protocol need the services of the Tourism Sector.A protocol that has connection with the Business Protocol. Why the Protocol on Tourism sector? For 5 important reasons, and especially in the Hospitality Industry. The Protocol on the tourist business is set for 3 components.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ott, Hermann E. "The Kyoto Protocol: Unfinished Business". Environment: Science and Policy for Sustainable Development 40, n.º 6 (julho de 1998): 16–20. http://dx.doi.org/10.1080/00139159809604595.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Dan, A., D. M. Dias, R. Kearney, T. C. Lau, T. N. Nguyen, F. N. Parr, M. W. Sachs e H. H. Shaikh. "Business-to-business integration with tpaML and a business-to-business protocol framework". IBM Systems Journal 40, n.º 1 (2001): 68–90. http://dx.doi.org/10.1147/sj.401.0068.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Botero, Isabel C., Gonzalo Gomez Betancourt, Jose Bernardo Betancourt Ramirez e Maria Piedad Lopez Vergara. "Family protocols as governance tools". Journal of Family Business Management 5, n.º 2 (12 de outubro de 2015): 218–37. http://dx.doi.org/10.1108/jfbm-01-2015-0001.

Texto completo da fonte
Resumo:
Purpose – The purpose of this paper is to focus on the family protocol as a governance policy tool that can help ameliorate intra-family conflict and enhance the probabilities of survivability of the family business. Design/methodology/approach – Using equity theory and organizational justice as theoretical frameworks, the authors explain how and why the development of a protocol can help the family firm and their survivability. The authors combine academic and practitioner knowledge to present a process model for creating family protocols. Findings – Based on four important considerations (i.e. process view, deep knowledge about the family business, dynamic environment, and the need for change and adaptation) the authors develop a process model for the development of family tailored protocols. Originality/value – This paper integrates the work of practitioners and academics to help understand what is a family protocol, why and how the protocol affects the family and business relationships and presents a procedural model for the development of a family protocol that can help govern the relationship between the family and the business.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Cortes, Angélica C. "Business protocol: a public relations approach". Corporate Communications: An International Journal 5, n.º 3 (setembro de 2000): 140–43. http://dx.doi.org/10.1108/13563280010377527.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Nourine, L., R. Ragab e F. Toumani. "Decidability and Complexity of Web Service Business Protocol Synthesis". International Journal of Cooperative Information Systems 25, n.º 03 (setembro de 2016): 1650008. http://dx.doi.org/10.1142/s0218843016500088.

Texto completo da fonte
Resumo:
Automatic synthesis of web services business protocols (BPs) aims at solving algorithmically the problem of deriving a mediator that realizes a BP of a target service using a set of specifications of available services. This problem, and its variants, gave rise to a large number of fundamental research work over the last decade. However, existing works considered this problem under the restriction that the number of instances of an available service that can be involved in a composition is bounded by a constant [Formula: see text] which is fixed a priori. This paper investigates the unbounded variant of this problem using a formal framework in which web service BPs are described by means of finite state machines (FSM). We show that in this context, the protocol synthesis problem can be reduced to that of testing simulation preorder between an FSM and an (infinitely) iterated product of FSMs. Existing results regarding close decision problems in the context of the so-called shuffle languages are rather negative and cannot be directly exploited in our context. In this paper, we develop a novel technique to prove the decidability of testing simulation in our case of interest. We provide complexity bounds for the general protocol synthesis problem and identify two cases of particular interest, namely loop-free target services and hybrid states-free component services, for which protocol synthesis is shown to be respectively NP-COMPETE and EXPTIME-COMPLETE.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Díaz Gómez, María Angustias, e Elicio Díaz Gómez. "Reflexiones sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las sociedades familiares". Pecvnia : Revista de la Facultad de Ciencias Económicas y Empresariales, Universidad de León, n.º 12 (1 de junho de 2011): 91. http://dx.doi.org/10.18002/pec.v0i12.617.

Texto completo da fonte
Resumo:
El objeto de este trabajo es analizar el Protocolo Familiar, estudiando su concepto, naturaleza jurídica y eficacia, su contenido, publicidad y desarrollo. El protocolo familiar es un instrumento jurídico que pretende organizar la relación entre la familia y la empresa, separando ambas realidades y, especialmente, trata de planificar adecuadamente la sucesión de la empresa familiar. Se trata de reflexionar sobre el Real Decreto español 171/2007, de 9 de febrero, por el que se regula la publicidad de los protocolos familiares en las Sociedades Familiares.<br /><br /><br />The object of this work is to analyze the Family Protocol, studying his concept, juridical nature and effectiveness, his content, advertising and development. The family protocol is a legal instrument that, intends to organize the interaction between a family and their family-owned business, separating both realities and, specially, it tries to plan adequately the succession of the family business. It is a question of thinking about the Spanish Royal decree 171/2007, of February 9rd, by which there is regulated the advertising of the family protocols in the Familiar Companies.<br />
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Zhi, Huang, Xiang Qun Wang e Wei Chen. "Application of IEEE802.1x Protocol Based on EPON System". Applied Mechanics and Materials 336-338 (julho de 2013): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2433.

Texto completo da fonte
Resumo:
IEEE 802.1x is a port-based network access control protocol, the one of the newest authentication protocols. With the MD5 algorithm as an example, this paper introduces the type of protocol packets and the authentication process in detail. The authentication port is apart from the business stream based on the logical port. The business stream is transmitted over the controlled port, but the authentication stream is transmitted over the uncontrolled port. Therefore, the port control and authorization for users can be carried out. In this paper, two authentication methods based on EPON system are studied in detail. The 802.1x authentication protocol has many advantages, such as low-cost, simply and so on. It can satisfy the requirement of intelligent distribution network communication system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Arteaga, Rocio, e Susana Menéndez-Requejo. "Family Constitution and Business Performance: Moderating Factors". Family Business Review 30, n.º 4 (27 de setembro de 2017): 320–38. http://dx.doi.org/10.1177/0894486517732438.

Texto completo da fonte
Resumo:
This study analyzes the relationship between implementing a Family Constitution (Protocol) and future family business performance. We analyze a unique sample of 530 Spanish family businesses. Half of these firms received financial aid from the government to implement a Family Protocol during 2003-2013. The analysis reveals that family businesses that implemented a Family Constitution had significantly improved performance within 2 years after the implementation. The positive relationship between the implementation of a Family Constitution and future firm performance is stronger for firms that had a nonfamily CEO, had multiple family owners, or were controlled by later generations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Ding, Xia Jun, Xiao Dan Jiang e Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol". Advanced Materials Research 267 (junho de 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.

Texto completo da fonte
Resumo:
To implement e-commerce, the key issue is to ensure that the security of system on entire business process, primarily through encryption, security, security agreement to guarantee the e-commerce network security. The security protocol mainly used Secure Sockets Layer Protocol and Secure Electronic Transaction. In this paper, after analysis two kinds of protocol and the security technology used in the protocol, put forward a small scale enterprise e-commerce transaction system design of network security protocols, which play a reference role to small and medium enterprises engaged in electronic commerce and transaction security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Arslan, Halil. "Extensible messaging and presence protocol’s adaptation to business applications". Global Journal of Computer Sciences: Theory and Research 6, n.º 1 (20 de novembro de 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1210.

Texto completo da fonte
Resumo:
Communication protocols are used for data communication between different parties in computer networks. Research on improvement and generalization of the usage areas of these protocols keeps going. One of these protocols, Extensible Messaging and Presence Protocol (XMPP), draws the attention with the advantages of providing an open communication infrastructure for real-time transmission and usage of XML format along with packet definition, which is also available in other protocols. In this study, a new model was developed making the use of XMPP advantages. The developed model can interoperate with the software using other protocols and is intended for efficient, location-independent communication of people and business applications with each other. To verify the constructed model, a new enterprise application including an instant messaging service was developed that is able to interoperate with business applications. A new area was added to the usage areas of XMPP that contributes to the generalization of the protocol.Keywords: XMPP, business application, instant messaging, presence management
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Arslan, Hasan, Sinan Tuncel e Osman Gun. "Extensible messaging and presence protocol’s adaptation to business applications". Global Journal of Computer Sciences: Theory and Research 6, n.º 1 (12 de abril de 2016): 10. http://dx.doi.org/10.18844/gjcs.v6i1.1338.

Texto completo da fonte
Resumo:
Communication protocols are used for data communication between different parties in computer networks. Research on improvement and generalization of the usage areas of these protocols keeps going. One of these protocols, Extensible Messaging and Presence Protocol (XMPP), draws the attention with the advantages of providing an open communication infrastructure for real-time transmission and usage of XML format along with packet definition, which is also available in other protocols. In this study, a new model was developed making the use of XMPP advantages. The developed model can interoperate with the software using other protocols and is intended for efficient, location-independent communication of people and business applications with each other. To verify the constructed model, a new enterprise application including an instant messaging service was developed that is able to interoperate with business applications. A new area was added to the usage areas of XMPP that contributes to the generalization of the protocol.Keywords: XMPP, business application, instant messaging, presence management
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

LLORET, JAIME, JESUS TOMAS, MIGUEL GARCIA e RAQUEL LACUESTA. "A B2B ARCHITECTURE AND PROTOCOL FOR RESEARCHERS COOPERATION". International Journal of Cooperative Information Systems 22, n.º 02 (junho de 2013): 1350010. http://dx.doi.org/10.1142/s021884301350010x.

Texto completo da fonte
Resumo:
Some works on the researchers cooperation's literature provide the key lines for building research networks and propose new protocols and standards for business to business (B2B) data exchange, but none of them explains how researchers should contact and the procedure to select the most appropriate partner of a research enterprise, institute or university. In this paper, we propose a B2B architecture and protocol between research entities, that uses ebXML protocol. The contacts for cooperation are established based on some defined parameters and an information retrieval system. We explain the information retrieval system, the researcher selection procedure, the XML-based protocol and the workflow of our proposal. We also show the information that has to be exchanged to contact other researchers. Several simulations demonstrate that our proposal is a feasible architecture and may be used to promote the research cooperation. The main purpose of this paper is to propose an efficient procedure for searching project partners.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Wang, Yi Ran. "Research of E-Business Security Based on SOAP Protocol". Advanced Materials Research 189-193 (fevereiro de 2011): 4304–7. http://dx.doi.org/10.4028/www.scientific.net/amr.189-193.4304.

Texto completo da fonte
Resumo:
When applied in E-Business, the technology of Web Services based on SOAP protocol can promote integration of E-commerce and distributed application. But it has some potential problems of security. Through research of technology correlated SOAP, combined with E-business safety analysis, the paper designs a kind of secure E-Business application model based on SOAP protocol. It includes SOAP secure disposal and access controller, and is realized by J2EE. The model makes the SOAP messages transmit safely and solves the secure problems of E-Business. It has great significance for popularization and application of E-commerce.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

LI, Xiang, Jin-Peng HUAI, Xu-Dong LIU, Hai-Long SUN e Xian-Yang QU. "Web Service Business Protocol Mining Based on Message Logs". Journal of Software 22, n.º 7 (15 de julho de 2011): 1413–25. http://dx.doi.org/10.3724/sp.j.1001.2011.03820.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

AlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun e Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring". International Journal of Internet Technology and Secured Transactions 5, n.º 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Younas, Muhammad, Barry Eaglestone e Kuo-Ming Chao. "A low-latency resilient protocol for e-business transactions". International Journal of Web Engineering and Technology 1, n.º 3 (2004): 278. http://dx.doi.org/10.1504/ijwet.2004.005234.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Tang, Lin, En Jian Bai e Wen Qiang Wu. "A Secure Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard". Advanced Materials Research 403-408 (novembro de 2011): 1845–48. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1845.

Texto completo da fonte
Resumo:
With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often used to identify object because it can work without manual intervention. Several organizations including EPC global and ISO have been working on the standard of RFID all the time in order to promote it using low-cost tags. In particular, the EPC Class-1 Generation-2 standard was accepted as an international standard by ISO/IEC. However, this standard exists some security vulnerabilities. To resolve these vulnerabilities, some protocols conforming to EPC Class 1 Generation 2 was proposed. In this paper, we show the weaknesses which exist in RFID system’s security protocols conforming to EPC Class-1 Generation-2 and submit a new security protocol suitable to the standard, then validate the whole security performance of the new protocol. The safety performance of the new protocol and existing protocols are also compared in this paper .The result shows that the the new protocol could be used in the low-cost tag because of its high security and low communication complexity.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Trinkaus, John. "Business Manners: An Informal Look". Perceptual and Motor Skills 68, n.º 3 (junho de 1989): 945–46. http://dx.doi.org/10.2466/pms.1989.68.3.945.

Texto completo da fonte
Resumo:
A number of top executives feel that many of their organization's problems are rooted in a lack of proper business etiquette and protocol. Based on an informal inquiry as to the social courtesy displayed by a group of business students, this thinking may well have some merit.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Zhang, Chao Yi, e Yan Dong Zhao. "Multi-Path Relay Selection Based on Radio and Television Business". Advanced Materials Research 756-759 (setembro de 2013): 1883–88. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1883.

Texto completo da fonte
Resumo:
This paper presents a relay selection method for radio and television business, this method uses nodes time-delay and power information, obtains the value of network interrupt as decision threshold, then selects the relay node. At same time this paper proposes an optimal relay selection strategy which can minimize the network interrupt probability combination with power distributionMulti-Path Relay Routing Protocol, this protocol can change the appropriate route path according to the dynamic network. Simulation results show that this protocol can extend cells coverage area, reduce time-delay and increase system throughput, improve system spectral efficiency, and enhance Qos of radio and television business.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Yefremova, Kateryna, e Maryna Lobko. "The art of diplomatic protocol as tool of business communication". Law and innovative society, n.º 2 (15) (4 de janeiro de 2020): 35–39. http://dx.doi.org/10.37772/2309-9275-2020-2(15)-6.

Texto completo da fonte
Resumo:
Problem setting. At the present stage of development of international relations, more and more diplomatic negotiations are taking place and a large number of international agreements are being concluded, so for the successful and effective functioning of the state foreign policy mechanism many tools are needed, each of which sets the mechanism in motion. However, the issues of gift literacy and their conceptualization of the role as a tool of diplomatic protocol in the implementation of international contacts of bilateral and multilateral nature remain unexplored. Analysis of resent researches and publications. The following scientists were engaged in research of the specified question: Ukrainian scientists – O. Sagaidak, G. Rudenko, Polish – L. Ikanovich, J. Picarsky, T. Orlovsky, English – John Wood, Jean Serre and others. The target of research is to study the essence of diplomatic protocol and etiquette on the example of gift literacy as a special tool for establishing relations in international cooperation, as well as outlining the realities of regulating this procedure and determining the practical side of the gift process in the context of diplomatic relations. Article’s main body. In the article investigated the essence and genesis of the practice of applying the diplomatic protocol in multilateral diplomacy for political purposes. It is argued that some protocol aspects of a multilateral meeting may be subject to political manipulation, and their behavioral influence on decision-makers is used. The importance of using gifts at the present stage of diplomacy development as one of the political tools that is subordinated to foreign policy goals is determined. The gifts received during the working trips of the presidents of the countries reflect the current state of development of the states, cover meetings and communication with the population, outline the professional and political interests and priorities of the states. The exchange of memorable gifts and souvenirs is carried out in the protocol order or by agreement of the parties in a solemn atmosphere as a separate protocol event within the framework of the state visit of the head of a foreign state. Examining the gifts, you can determine the geography of official visits of high-ranking officials, the current state of development of states, assess the outcome of meetings and communication with the population, learn about professional and political interests and priorities of states. In the protocol practice of most countries, strict cost limits have been introduced for gifts given or received by senior officials. Conclusions and prospects for the development. Gift literacy is one of the modern tools of diplomatic protocol, and the rules for choosing diplomatic gifts are a science, the basic principles of which have changed and improved over the centuries and to this day. Gifts from foreign heads of state, representatives of international organizations and business circles represent the donor country, reflecting customs, culture, government.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

ESWARAN, P. K., S. PRAKASH, DAVID D. FERGUSON e KATHLEEN NAASZ. "LEVERAGING IP FOR BUSINESS SUCCESS". International Journal of Information Technology & Decision Making 02, n.º 04 (dezembro de 2003): 641–50. http://dx.doi.org/10.1142/s0219622003000884.

Texto completo da fonte
Resumo:
Businesses are faced today with the challenge of leveraging existing network infrastructures while evolving to technologies that will provide a positive impact on their business performance. Internet Protocol (IP) is a technology foundation that many companies have begun to leverage, but IP requires a more integrated strategy for seamless migration and the achievement of its full benefits. In this paper, we examine the creation of an Enterprise IP Strategy from a business impact and a technology point of view and provide factors to consider when developing this strategy. A framework considering business perspective and technology umbrella is presented to guide businesses to make the right choice for networking needs. IP is a common thread that runs through various systems and networks comprising enterprise IT infrastructure. In the last five years, virtually everyone from shipping clerks to CEOs has been touched by IP's influence. Hence, IP provides a strategic vantage point for building a sound enterprise networking strategy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Moudjari, Abdelkader, Salim Chikhi e Hamamache Kheddouci. "Latent semantic analysis for business protocol discovery using log files". International Journal of Web Engineering and Technology 9, n.º 4 (2014): 365. http://dx.doi.org/10.1504/ijwet.2014.067550.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

El Amin, M. H. M., L. N. Chung e B. G. Evans. "Access protocol performance for on-board processing business satellite systems". International Journal of Satellite Communications 4, n.º 4 (outubro de 1986): 203–10. http://dx.doi.org/10.1002/sat.4600040406.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Oya, Makoto, Masahiro Kinoshita e Yukinori Kakazu. "On dynamic generation of business protocol in autonomous Web services". Systems and Computers in Japan 37, n.º 2 (fevereiro de 2006): 37–45. http://dx.doi.org/10.1002/scj.20352.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Ji, Qiang, Shifeng Zhang e Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion". MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.

Texto completo da fonte
Resumo:
This paper has designed the integrated electronic system and protocol architecture based on the standard of Consultative Committee for Space Data Systems (CCSDS) and European Communication Satellite System (ECSS). The application layer, application support layer, transport layer and sub network layer in the architecture can be described in detail, and the functions can be realized through the combination of various business and protocols. The architecture can provide technical support for the intellectualization and networking of spacecraft, standardize the spacecraft interface and protocol, it can promote the generalization of spacecraft equipment and software, and provide more flexible and powerful functions for the spacecraft.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Suminski Jr, Richard Robert, Shannon Robson, Jennie Turner e Eric Plautz. "Promoting Small Business Support of Youth Physical Activity in Low-Income, Minority Neighborhoods: Protocol for a Randomized Controlled Trial". JMIR Research Protocols 8, n.º 7 (30 de julho de 2019): e13141. http://dx.doi.org/10.2196/13141.

Texto completo da fonte
Resumo:
Background An unacceptably high percentage of our nation’s low-income, minority youth (age<18 years) are not regularly physically active. One reason for this could be their lack of access to quality youth physical activity opportunities (YPAOs). Our previous research found that small businesses (<500 employees), which represent over 99.64% (27.9/28.0 million businesses in United States) of all employers, are powerful resources for creating and improving YPAOs. In accordance with the socioecological model and established philanthropic principles, we developed an alpha version of an intervention (alpha-i) for increasing small businesses’ involvement with YPAOs. Objective The aims of this proposed study are to (1) create a beta version (beta-i) of the intervention and (2) conduct a pilot study of its impact on small business support for YPAOs and YPAO utilization by the youth in low-income, minority neighborhoods. Methods The alpha-i will be refined using information from focus groups and surveys conducted with small business owners and managers, YPAO providers, and parents and guardians of the youths from low-income, predominantly minority neighborhoods. A cluster randomized controlled trial will then be conducted for 1 year to examine the effects of the refined intervention (beta-i) on small business support for YPAOs in 10 low-income, minority neighborhoods. The control group of neighborhoods (n=10) will be provided with a standard practice intervention. The primary outcome for aim 2 will be the percentage of small businesses not supporting YPAOs at baseline that subsequently provide support for YPAOs at follow-up. We also will consider the US dollar equivalent of all types of support (monetary, goods/services, and time) donated for YPAOs by small businesses. In addition, we will examine the impact of the increased small business support for YPAOs on YPAO utilization by the youth. Results As of May 1, 2019, all YPAOs and small businesses in the study neighborhoods have been identified, and surveys have begun with these groups. In addition, 9 focus groups were completed, and the data have been transcribed. We anticipate that manuscripts regarding these aspects of the study will be submitted in fall 2019. Conclusions The proposed study is significant because it will provide evidence that an easily replicated approach can be used to increase small business support for YPAOs and that this support results in greater use of the YPAOs by youth. A logical next step will be to determine if YPAO changes resulting from increased small business support positively influence youth physical activity levels. ClinicalTrial ClinicalTrials.gov NCT03936582; https://clinicaltrials.gov/ct2/show/NCT03936582. International Registered Report Identifier (IRRID) DERR1-10.2196/13141
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Crawford, William B., e Christopher Engholm. "When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim". Journal of Marketing 57, n.º 1 (janeiro de 1993): 127. http://dx.doi.org/10.2307/1252062.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Elabd, Emad, Emmanuel Coquery e Mohand-Said Hacid. "From Implicit to Explicit Transitions in Business Protocols". International Journal of Web Services Research 9, n.º 4 (outubro de 2012): 69–95. http://dx.doi.org/10.4018/jwsr.2012100104.

Texto completo da fonte
Resumo:
Modeling Web services is a major step towards their automated analysis. One of the important parameters in this modeling, for the majority of Web services, is the time. A Web service can be presented by its behavior which can be described by a business protocol representing the possible sequences of message exchanges. To the best of the authors’ knowledge, automated analysis of timed Web services (e.g., compatibility and replaceability checking) is very difficult and in some cases it is not possible with the presence of implicit transitions (internal transitions) based on time constraints. The semantics of the implicit transitions is the source of this difficulty because most of well-known modeling tools do not express this semantics (e.g., epsilon transition on the timed automata has a different semantics). This paper presents an approach for converting any protocol containing implicit transitions to an equivalent one without implicit transitions before performing analysis.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Tareen, Laraib, Fowzia Menga, Nadeem Zaman, Manzoor Brohi e Hadi Khan. "Business Motives among Students: A Qualitative Appraisal of Drive Theory". Jinnah Business Review 9, n.º 2 (1 de julho de 2021): 61–74. http://dx.doi.org/10.53369/tcoq8790.

Texto completo da fonte
Resumo:
The main purpose of conducting this exploratory qualitative research was to determine the nature of drive theory among business students, where drive is a motivation for some behavior based on a biological need. The target population of our study was the universitylevel business students. We used the existing literature on drive theory for the development of interview protocol. After the finalization of the interview protocol, six semi-structured interviews were conducted with the business students enrolled in different programs with different fields of specialization. The data were analyzed using ATLAS.ti version 8. We found that business-related motivation was created by six drivers including aggressiveness, acquisition, achievement, social recognition, personal goals and desire for power.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Matias, Cláudia, e Mário Franco. "Family protocol: how it shapes succession in family firms". Journal of Business Strategy 41, n.º 3 (20 de dezembro de 2018): 35–44. http://dx.doi.org/10.1108/jbs-09-2018-0167.

Texto completo da fonte
Resumo:
Purpose This study aims to understand the role that family protocol can have in the succession planning process of family businesses. Design/methodology/approach For this purpose, the authors decided on a qualitative approach and performed an exploratory case study in Portugal: one firm with a family protocol. As data collection techniques, interviewing, direct observation and documentary analysis were used. Findings Based on the empirical evidence, it is concluded that a family protocol can help succession planning and favour the continuity and survival of the family business. Practical implications This study shows the relevance of a family protocol for the succession process that seems to be at the basis of family firms’ continuity, survival and minimising their failure. Originality/value Although family firms are many in number and central in the dynamics of the world economy, the family protocol has not been approached as a determinant of a successful succession process. This holds particularly for the realm of family firms.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

BICHLER, MARTIN, ARIE SEGEV e CARRIE BEAM. "AN ELECTRONIC BROKER FOR BUSINESS-TO-BUSINESS ELECTRONIC COMMERCE ON THE INTERNET". International Journal of Cooperative Information Systems 07, n.º 04 (dezembro de 1998): 315–29. http://dx.doi.org/10.1142/s0218843098000155.

Texto completo da fonte
Resumo:
Distributed object standards provide a key to building interoperable applications that can run on a range of platforms. The paper describes a CORBA-based research prototype for an electronic broker in business-to-business electronic commerce. High-level IDL specifications are used to achieve interoperability between components of the electronic marketplace. The two key functionalities of the electronic broker are the ability to dynamically gather information from remote electronic catalogs and the support for negotiations through auction mechanisms. The paper discusses the functionality and the design of the electronic broker and gives an overview of current extensions of the prototype. As application-level interoperability is a crucial precondition for many brokerage services, we put special emphasis on electronic commerce protocol standards.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Simanis, Erik, Stuart Hart e Duncan Duke. "The Base of the Pyramid Protocol: Beyond “Basic Needs” Business Strategies". Innovations: Technology, Governance, Globalization 3, n.º 1 (janeiro de 2008): 57–84. http://dx.doi.org/10.1162/itgg.2008.3.1.57.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Tao, Xiao Xia, Hong Yang, Rong Chen e Zhen Jun Du. "An Improvement on Randomly Changed Identification Protocol for Low-Cost Tags". Advanced Materials Research 562-564 (agosto de 2012): 1583–89. http://dx.doi.org/10.4028/www.scientific.net/amr.562-564.1583.

Texto completo da fonte
Resumo:
With the benefits to improve productivity and reduce operation cost, RFID (Radio Frequency Identification) has recently seen a great increase in a wide variety of business information systems. However, the downside in business applications is the problem caused by data security and privacy. Enhancement without extra costs in RFID identification poses new challenges to privacy and security in RFID-driven just-in-time business information systems. In this paper, we propose an unilateral randomly authentication protocol on the basis of one-way hash function for low-cost RFID tags. We illustrate the whole operating procedure of the proposed protocol in a typical RFID system. Experimental results show that the proposed protocol has some security improvements in data consistency and can work against some attacks like eavesdropping and DoS, compared with several existing methods.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

UBERMORGEN, /. "Everything is always (the liquid protocol)". Finance and Society 2, n.º 2 (19 de dezembro de 2016): 175–79. http://dx.doi.org/10.2218/finsoc.v2i2.1731.

Texto completo da fonte
Resumo:
UBERMORGEN are lizvlx (AT, 1973) and Hans Bernhard (CH/USA, 1971), European artists and net.art pioneers. They tenaciously convert code & language and concept & aesthetics into digital objects, software art, net.art, installation, new painting, videos, press releases and actions. CNN described them as ‘maverick Austrian business people’ and the New York Times called Google Will Eat Itself ‘simply brilliant’. Their main influences are Rammstein, Samantha Fox, Guns N’ Roses & Duran Duran, Olanzapine, LSD & Kentucky Fried Chicken’s Coconut Shrimps Deluxe. Visit their website at http://ubermorgen.com
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree e Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol". International Journal of Interactive Mobile Technologies (iJIM) 14, n.º 18 (10 de novembro de 2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Texto completo da fonte
Resumo:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Internet. The paper follows and sets standards for different types of protocols and techniques, the VPN (Virtual Private Network) architectural feature is made to deliver dependable and safe network that is not in line with regular networks that provide a higher trust and a higher secure channel between user and organization. The current study took place to summaries the usage of existing VPNs protocol and to show the strength of every VPN. Through different studies that have been made by other researchers as well as an extra focus on the state of art protocol, Wire guard. It is also worthy to mention that wire guard compared with other protocols such as IPsec and GRE. The studies show the WireGuard being a better choice in terms of other well-known procedures to inaugurate a secure and trusted VPN.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Watters, Paul Andrew, e Maya Espinosa Walters. "Implications of Distributed Information Technology for South Pacific Development". South Pacific Journal of Psychology 9 (1997): 75–80. http://dx.doi.org/10.1017/s0257543400001188.

Texto completo da fonte
Resumo:
AbstractThe global digital communications network, colloquially known as the “internet”, has received much attention in recent years from business, media, cultural, and government interests. This paper looks behind the hype and sales-pitches, at the essential features of the medium which have made it (and will continue to make it) the central technology for the dissemination of information in the next century. It is a particularly important technology for remote communities, since all information resources (educational, commercial, and recreational) can be transmitted using a standard set of protocols (Hypertext Transfer Protocol, File Transfer Protocol, Network News Transfer Protocol), over any physical medium (packet radio, satellite, phone-line, and optic fibre), in any data format that can be digitised (radio, television, text, graphics, and sound). The implications of this non-coercive technology are explored in the context of the impact on development in the physically distant communities of the South Pacific.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Kabou, Salheddine, e Sidi Mohamed Benslimane. "A New Distributed Anonymization Protocol with Minimal Loss of Information". International Journal of Organizational and Collective Intelligence 7, n.º 1 (janeiro de 2017): 1–19. http://dx.doi.org/10.4018/ijoci.2017010101.

Texto completo da fonte
Resumo:
Cloud computing represents a new business model which enables diverse benefits such as the sharing of computing resources containing personal information across multiple distributed and private databases. However, privacy and security concerns are a significant obstacle that is preventing the extensive adoption of this new technology. Anonymization is one of the solutions methods that can be used to preserve the privacy of data while still allowing the data to be used.. Most of the existing works use a k-anonymity model for preserving privacy for data subject that offers lower utility. Motivated by this, the authors develop a new distributed anonymization protocol to satisfy multiple data providers privacy requirements based on a k-concealment model that offers a higher utility with less generalisation. The experimental results show that their proposal protocol outperforms the commonly used protocols.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Wang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai e Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT". Security and Communication Networks 2021 (2 de agosto de 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.

Texto completo da fonte
Resumo:
Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Ocenasek, Pavel. "Effective Design and Implementation of Distributed Business Information Systems". Applied Mechanics and Materials 307 (fevereiro de 2013): 451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.307.451.

Texto completo da fonte
Resumo:
This paper deals with the effective design and implementation aspects of distributed business information systems. After a short introduction to the state of the art, it proposes a study on a payment protocol design, which is based on the composition method.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Jägers, Nicola. "National Human Rights Institutions: The Missing Link in Business and Human Rights Governance?" ICL Journal 14, n.º 3 (25 de novembro de 2020): 289–325. http://dx.doi.org/10.1515/icl-2020-0006.

Texto completo da fonte
Resumo:
AbstractIn 2014, the United Nations established a working group to elaborate an international treaty on business and human rights. In October 2018, negotiations on a first draft of the actually text took place. Besides this zero-draft, the working group released the draft text of an Optional Protocol containing several institutional arrangements. The Optional Protocol carves out a key role for national implementation mechanisms to promote compliance with, monitor and implement the treaty on business and human rights. With such an institutional arrangement, the future treaty would join the ranks of what can be called a new generation of human right treaties which institutionalize a top down with a bottom up approach aiming to address the disjuncture between rules and practice. The Optional Protocol indicates that this role of national implementation mechanism could be taken up by National Human Rights Institutions (NHRIs). This follows an increased recognition of NHRIs as significant actors in the business and human rights domain. Yet, the role of NHRIs in human rights governance in general, and in the business and human rights field in particular, is not yet well understood and undertheorized. The aim of this article is to add insight into the role of NHRIs in business and human rights by, first, describing some of the current activities undertaken by NHRIs in this field in order to analyze whether the role ascribed to them is actually being taken up and what challenges NHRIs face. From this perspective, it will be discussed whether the role foreseen in the Optional Protocol of the future business and human rights treaty holds promise.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Ahmed, Ajaz, e Aneel Salman. "Clean Development Mechanism (CDM) Business in Pakistan: Perceptions and Realities". Pakistan Development Review 51, n.º 4II (1 de dezembro de 2012): 303–16. http://dx.doi.org/10.30541/v51i4iipp.303-316.

Texto completo da fonte
Resumo:
Climate change is the biggest challenge human family has ever faced in world history. It has local as well as global impacts and almost all the ethnic groups, communities, and geographical locations are exposed to it [Stern (2006)]. But comparatively developing countries are more exposed to the changes which are taking places due to climate [Stern (2006) and Barker (2008)]. The degree of their exposure which has a number of determinants varies across different regions [Karen, et al. (2004)]. Climate experts so far have proposed two broader solutions for this problem; mitigation of climate change by reducing the amount of emitted carbon from atmosphere, and adaptation to climate changes [Tompkins and Adger (2005) and Becken (2005)]. Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCCC) is dealing with climate change mitigation. It is the milestone towards global carbon mitigation efforts [Miriam, et al. (2007)]. This protocol has resulted in the establishment of carbon markets by adopting the Clean Development Mechanism (CDM). Pakistan ratified the Kyoto Protocol in 1997 and implemented it in 2005. To ensure the smooth functioning of carbon trading business in Pakistan, CDM related infrastructure was developed. Mainly this includes the establishment of CDM Cell in Pakistan, but a number of private consultancies also came into being with the emergence of this mechanism.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Shin, Sora, Hae-Hyun Choi, Yung Bin Kim, Byung-Hee Hong e Joo-Young Lee. "Evaluation of body heating protocols with graphene heated clothing in a cold environment". International Journal of Clothing Science and Technology 29, n.º 6 (6 de novembro de 2017): 830–44. http://dx.doi.org/10.1108/ijcst-03-2017-0026.

Texto completo da fonte
Resumo:
Purpose The purpose of this paper is to evaluate the effects of intermittent and continuous heating protocols using graphene-heated clothing and identify more effective body region for heating in a cold environment. Design/methodology/approach Eight males participated in five experimental conditions at an air temperature of 0.6°C with 40 percent relative humidity: no heating, continuous heating the chest, continuous heating the back, intermittent heating the chest, and intermittent heating the back. Findings The results showed that the electric power consumption of the intermittent heating protocol (2.49 W) was conserved by 71 percent compared to the continuous protocol (8.58 W). Rectal temperature, cardiovascular and respiratory responses showed no significant differences among the four heating conditions, while heating the back showed more beneficial effects on skin temperatures than heating the chest. Originality/value First of all, this study was the first report to evaluate cold protective clothing with graphene heaters. Second, the authors provided effective intermittent heating protocols in terms of reducing power consumption, which was able to be evaluated with the characteristics of fast-responsive graphene heaters. Third, an intermittent heating protocol on the back was recommended to keep a balance between saving electric power and minimizing thermal discomfort in cold environments.
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Hunter, M. Gordon. "Creating Qualitative Interview Protocols". International Journal of Sociotechnology and Knowledge Development 4, n.º 3 (julho de 2012): 1–16. http://dx.doi.org/10.4018/jskd.2012070101.

Texto completo da fonte
Resumo:
This manuscript describes a technique which facilitates the documentation of research participant stories interpreting their experiences in response to a research question. From a Narrative Inquiry approach interview protocols were developed based upon the exploration of a research question. The technique may be applied when gathering qualitative data in one-on-one interviews. Each interview protocol provided consistency across a number of interviews; but also allowed for flexibility of responses by the research participant within their respective interviews. This document provides a description of a technique which addresses the conundrum of consistency and flexibility. Four different research projects are described in this manuscript. The specific interview protocol is presented and it is shown how the protocol serves to address the project’s research question. This document concludes with a description of how these techniques may be employed, in general, to contribute to the exploratory investigation of a research topic in business and management studies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Atienza, Mabelle A., e Almighty C. Tabuena. "The Impact of COVID-19 Pandemic on Managerial Accounting and Its Adjustments in Financial Markets". International Journal of Business, Technology and Organizational Behavior (IJBTOB) 1, n.º 4 (12 de agosto de 2021): 287–96. http://dx.doi.org/10.52218/ijbtob.v1i4.109.

Texto completo da fonte
Resumo:
This study aimed to identify the impact of the COVID-19 pandemic on managerial accounting and its adjustments in financial markets to help business society deal with their businesses and companies during the pandemic. This study was conducted in one of the cities in the Metropolitan Manila in Quezon City, Philippines, employing the descriptive design under the qualitative research method through an interview protocol and online form methods with accountants, managers, and business owners using Fiedler’s Contingency Theory. This research initiative is a great help for those who are suffering in their business, especially managers, accountants, and business owners. Managerial accounting in the financial markets has had a lot of difficulties since this pandemic occurred. In this case, businesses were not prepared for the advent of the COVID-19 pandemic. Some business owners had to close their businesses for three months because of the outbreak. Business owners are taking steps to become affable and open to the consumers that might purchase their products. Despite the pandemic, company owners are determined to stay open. They knew how to cope with scammers, especially those who ran an online company during this pandemic crisis. Keywords: adjustment, contingency theory, COVID-19, financial market, impact, managerial accounting
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Zinkhan, George M., e William B. Crawford. "Book Review: When Business East Meets Business West: The Guide to Practice and Protocol in the Pacific Rim". Journal of Marketing 57, n.º 1 (janeiro de 1993): 127–28. http://dx.doi.org/10.1177/002224299305700109.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Levä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar e Oleksiy Mazhelis. "Adoption of Constrained Application Protocol". International Journal of Innovation in the Digital Economy 7, n.º 1 (janeiro de 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.

Texto completo da fonte
Resumo:
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodological framework. Based on eleven expert interviews complemented with a literature survey, the paper identifies potential deployment challenges for CoAP, both technical and business-related, and suggests approaches to overcome them. The findings should facilitate the uptake of CoAP by supporting the potential adopters of the protocol in their decision-making.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Martin, Angela H., George Eckert, Gary W. Lemmon, Alan Sawchuk e Michael C. Dalsing. "A vascular laboratory protocol for improving and managing after-hours suspected acute deep venous thrombosis". Vascular 22, n.º 2 (13 de maio de 2013): 127–33. http://dx.doi.org/10.1177/1708538112474258.

Texto completo da fonte
Resumo:
This study reviews the clinical and workforce impact of a suggested protocol designed for the management of suspected acute deep venous thrombosis (DVT) in patients seen after standard vascular laboratory business hours. The protocol included the use of Wells score, D-dimer and a single dose of therapeutic anticoagulant to defer venous duplex ultrasound (VDU) testing until routine business hours unless contraindicated. Information was collected on medical history, physical exam and the timing of any diagnostic studies and treatment provided. Over 15% of studies done after-hours were deemed unnecessary by our protocol and in every individual the results were negative for an acute DVT. There were no adverse events from a one-time dose of anticoagulant. Limiting emergency VDU coverage to evaluate for acute DVT based on a management protocol can eliminate unnecessary after-hours VDU testing without having a negative impact on patient care.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Wu, Min, Ru Chuan Wang, Jing Li e Zhi Jie Han. "A Novel P2P Business Traffic Prediction Algorithm". Key Engineering Materials 467-469 (fevereiro de 2011): 1339–44. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1339.

Texto completo da fonte
Resumo:
The increasing P2P network traffic on the Internet has leaded to the problem of network congestion. In the consequence of the diversification of the P2P business and protocol, research on the management of P2P traffic has many problems to resolve. Prediction of the P2P traffic is the kernel problem in the P2P traffic management. Based on the existed P2P traffic characters, this paper structures a P2P traffic model, gives a traffic prediction algorithm bases on wavelet-analysis, and proves the accuracy of the algorithm. Simulation experiment figures that the algorithm has a high prediction precision and a superior real-time performance.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia