Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List no author result Created with Sketch.
Loading Scinapse...
Robert A. Burgelman19
Estimated H-index: 19
(Stanford University)
To examine the consequences of a period of extraordinary success for the long-term adaptive capability of a firm's strategy-making process, this comparative longitudinal study of Andy Grove's tenure as Intel Corporation's chief executive officer (CEO) documents how he moved Intel's strategy-making process from an internal-ecology model to the classical rational-actor model during 1987-1998. His creation of a highly successful strategy vector pursued through an extremely focused induced-strategy ...
476 Citations Source Cite
2018
Richard J. Cameron13
Estimated H-index: 13
,
Chandra M. Kudsia7
Estimated H-index: 7
,
Raafat R. Mansour33
Estimated H-index: 33
This chapter presents five different techniques for computer‐aided tuning of microwave filters. The five different techniques are: sequential tuning of coupled resonator filters, computer‐aided tuning based on circuit model parameter extraction, computer‐aided tuning using poles and zeros of the input reflection coefficient, time‐domain tuning, and Fuzzy logic (FL) tuning. The sequential and the time‐domain tuning techniques are useful in guiding the technologists to tune th...
Source Cite
Ermal Hetemi1
Estimated H-index: 1
(Royal Institute of Technology),
Joaquín Bienvenido Ordieres Meré4
Estimated H-index: 4
(Technical University of Madrid)
+ 1 AuthorsMats Engwall12
Estimated H-index: 12
(Royal Institute of Technology)
Abstract Research in large scale infrastructure projects have argued that the overall project performance is subject to lock-in, yet this is little understood empirically and more research is needed. Recently studies reported that lock-in can occur both at the decision-making level and at the project execution level respectively. The underlying patterns influencing project scope transformation, due to evolving expectations and/or stakeholder’s perspective and the occurrence of l...
1 Citations Source Cite
Justice Opara-Martins3
Estimated H-index: 3
,
Reza Sahandi6
Estimated H-index: 6
,
Feng Tian12
Estimated H-index: 12
Cloud computing offers an innovative business model to enterprise for IT services consumption and delivery. Software as a Service (SaaS) is one of the cloud offerings that attract organisations as a potential solution in reducing their IT cost. However, the vast diversity among the available cloud SaaS services makes it difficult for customers to decide whose vendor services to use or even to determine a valid basis for their selections. Moreover, this variety of cloud SaaS services has led to p...
1 Citations Source Cite
1996 in ScienceIF: 41.06
Charles Seife10
Estimated H-index: 10
The computer security systems that lock up messages in supposedly unreadable code are taking hit after hit. In the past year, a security consultant found a sneaky way to read “secure” public-key messages, and a team of researchers showed how to unravel entire public-key encryption systems. In the latest attack, a cryptographer has cracked tough secret-key systems including the Data Encryption Standard, widely used in credit card verification and automated teller machines.
7 Citations Download PDF Cite
2015
Thomas H. Cormen17
Estimated H-index: 17
(Dartmouth College)
Abstract Drawing heavily from Blelloch’s work on the vector model and scan operations, we work our way up to performing a parallel version of the quicksort algorithm on a shared-memory machine with p processors. We first see how to perform reduction and scan operations in parallel. We then examine parallel meld and permute operations, which lead to unsegmented partitioning in parallel. We then introduce segmented operations and modify our partitioning procedure to work with segmented operations,...
1 Citations Source Cite
1979 in Financial ManagementIF: 0.97
Robert M. Nauss11
Estimated H-index: 11
,
Robert E. Markland16
Estimated H-index: 16
"Cash management is being given a priority throughout U.S. business today that it has never enjoyed before, and company after company is being swept along," according to a recent Business Week article [4]. Need for more efficient cash management has concentrated attention on more sophisticated computer-based methods for managing corporate cash flows. During the last few years, more and more corporations have begun using computer-based management science approaches to cash ma...
7 Citations Source Cite
Heiko Hamann16
Estimated H-index: 16
,
Gabriele Valentini8
Estimated H-index: 8
Self-organizing systems that show processes of pattern formation rely on positive feedback. Especially in swarm systems, positive feedback builds up in a transient phase until maximal positive feedback is reached and the system converges. We investigate alignment in locusts as an example of swarm systems showing time-variant positive feedback. We identify an influencing bias in the spatial distribution of agents compared to a well-mixed distribution and two features, percentage of aligned swarm ...
Source
Weiwu Hu15
Estimated H-index: 15
(Chinese Academy of Sciences),
Weisong Shi30
Estimated H-index: 30
(Chinese Academy of Sciences)
+ 1 AuthorsMing Li1
Estimated H-index: 1
(Chinese Academy of Sciences)
Directory protocols are widely adopted to maintain cache coherence of distributed shared memory multiprocessors. Although scalable to a certain extent, directory protocols are complex enough to prevent it from being used in very large scale multiprocessors with tens of thousands of nodes. This paper proposes a lock-based cache coherence protocol for scope consistency. It does not rely on directory information to maintain cache coherence. Instead, cache coherence is maintained through requ...
22 Citations Source Cite
P. Krishna Reddy14
Estimated H-index: 14
(University of Tokyo),
Masaru Kitsuregawa36
Estimated H-index: 36
(University of Tokyo)
Since mobile transactions are long-lived, in case of a conflict, the waiting transactions are either blocked for longer durations or aborted if two-phase locking is employed for concurrency control. In this paper, we propose mobile speculative locking (MSL) protocol to reduce the blocking of transactions. MSL allows a transaction to release a lock on a data object whenever it produces corresponding after-image value. By accessing both before- and after-images, the waiting tr...
9 Citations Source Cite