Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Content delivery networks (2)
- Dominant design (2)
- Multihoming (2)
- Network neutrality (2)
- Paid peering (2)
-
- Partial transit (2)
- Private peering (2)
- Secondary peering (2)
- Server farms (2)
- Two-sided markets (2)
- Approximation theory (1)
- Bluetooth (1)
- Broadband policy (1)
- Business modeling (1)
- Canine pose estimation (1)
- Client-server (1)
- Complementary assets (1)
- Congestion (1)
- Credit card fraud (1)
- Credit cards (1)
- Cryptography (1)
- Data structures (1)
- Debit cards (1)
- Design hierarchies (1)
- Design hierarchy (1)
- Digital business models (1)
- Divided technical leadership (1)
- Electronic payments (1)
- Emergency management computational public safety (1)
- Game theory (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Business
On-Line Discovery Of Hot Motion Paths, Dimitris Sacharidis, Kostas Patroumpas, Manolis Terrovitis, Verena Kantere, Michalis Potamias, Kyriakos Mouratidis, Timos Sellis
On-Line Discovery Of Hot Motion Paths, Dimitris Sacharidis, Kostas Patroumpas, Manolis Terrovitis, Verena Kantere, Michalis Potamias, Kyriakos Mouratidis, Timos Sellis
Kyriakos MOURATIDIS
We consider an environment of numerous moving objects, equipped with location-sensing devices and capable of communicating with a central coordinator. In this setting, we investigate the problem of maintaining hot motion paths, i.e., routes frequently followed by multiple objects over the recent past. Motion paths approximate portions of objects' movement within a tolerance margin that depends on the uncertainty inherent in positional measurements. Discovery of hot motion paths is important to applications requiring classification/profiling based on monitored movement patterns, such as targeted advertising, resource allocation, etc. To achieve this goal, we delegate part of the path extraction process to objects, …
Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo
Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo
All Faculty Scholarship
Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …
Assessing Value Creation And Value Capture In Digital Business Ecosystems, Ravi S. Sharma, Francis Pereira, Narayan Ramasubbu, Margaret Tan, F. Ted Tschang
Assessing Value Creation And Value Capture In Digital Business Ecosystems, Ravi S. Sharma, Francis Pereira, Narayan Ramasubbu, Margaret Tan, F. Ted Tschang
Research Collection Lee Kong Chian School of Business
Interest in business modeling of technology enterprises – the activity of designing the architecture for revenues, costs, products and/or services delivery and the overall value of an enterprise – has risen to prominence with the global crossing of the Internet chasm. However, as several studies have pointed out (c.f., Osterwalder, Pigneur & Tucci, 2005; Teece 2010; Zott & Amit, 2010), the investigations of business models and their fit with the strategy of an enterprise, have received little scholarly attention. In this article we formulate a framework, called ADVISOR, for modeling the business strategies of enterprises in the Interactive Digital Media …
Is The Internet A Maturing Market? If So, What Does That Imply?, Christopher S. Yoo
Is The Internet A Maturing Market? If So, What Does That Imply?, Christopher S. Yoo
All Faculty Scholarship
Network providers are experimenting with a variety of new business arrangements. Some are offering specialized services the guarantee higher levels of quality of service those willing to pay for it. Others are entering into strategic partnerships that allocate more bandwidth to certain sources. Interestingly, a management literature exists suggesting that both developments may simply reflect the ways that the nature of competition and innovation can be expected as markets mature. The real question is not if the nature of competition and innovation will change, but rather when and how. This theory also suggests that policymakers should be careful not to …
Reasonable Number Of Issuing Original Bill Of Lading, Zhongming Ren
Reasonable Number Of Issuing Original Bill Of Lading, Zhongming Ren
World Maritime University Dissertations
No abstract provided.
Open Innovation In Platform Competition, Mei Lin
Open Innovation In Platform Competition, Mei Lin
Research Collection School Of Computing and Information Systems
We examine the competition between a proprietary platform and an open platform,where each platform holds a two-sided market consisted of app developers and users.The open platform cultivates an innovative environment by inviting public efforts todevelop the platform itself and permitting distribution of apps outside of its own appmarket; the proprietary platform restricts apps sales solely within its app market. Weuse a game theoretic model to capture this competitive phenomenon and analyze theimpact of growth of the open source community on the platform competition. We foundthat growth of the open community mitigates the platform rivalry, and balances the developernetwork sizes on …
A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim
A Secure On-Line Credit Card Transaction Method Based On Kerberos Authentication Protocol, Jung Eun Kim
UNLV Theses, Dissertations, Professional Papers, and Capstones
Nowadays, electronic payment system is an essential part of modern business. Credit cards or debit cards have been widely used for on-site or remote transactions, greatly reducing the need for inconvenient cash transactions. However, there have been a huge number of incidents of credit card frauds over the Internet due to the security weakness of electronic payment system. A number of solutions have been proposed in the past to prevent this problem, but most of them were inconvenient and did not satisfy the needs of cardholders and merchants at the same time.
In this thesis, we present a new secure …
Network Neutrality Or Internet Innovation?, Christopher S. Yoo
Network Neutrality Or Internet Innovation?, Christopher S. Yoo
All Faculty Scholarship
Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …
Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens
Research Poster: Htsma: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme In Heterogeneous Wireless Mesh Networks, Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang, John Gowens
2010 Annual Nevada NSF EPSCoR Climate Change Conference
Research poster
Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn
Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn
Publications and Scholarship
Communications are very important in any situation but in emergency management it is imperative that the communications be reliable and responsive to the evolving situation. In emergency management there are many different types of networks with different objectives. It is of immense value to have the ability to seamlessly integrate other networks and computing resources into one interconnected heterogeneous network. The entire management team should be able to access any of the individual networks and their resources. In this paper we discuss various wireless network communication options in the context of their viability for use in emergency management. We analyze …
Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo
Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo
All Faculty Scholarship
The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …