Results 1 - 10
of
4,469
Query evaluation techniques for large databases
- ACM COMPUTING SURVEYS
, 1993
"... Database management systems will continue to manage large data volumes. Thus, efficient algorithms for accessing and manipulating large sets and sequences will be required to provide acceptable performance. The advent of object-oriented and extensible database systems will not solve this problem. On ..."
Abstract
-
Cited by 767 (11 self)
- Add to MetaCart
Database management systems will continue to manage large data volumes. Thus, efficient algorithms for accessing and manipulating large sets and sequences will be required to provide acceptable performance. The advent of object-oriented and extensible database systems will not solve this problem
Bayesian density estimation and inference using mixtures.
- J. Amer. Statist. Assoc.
, 1995
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract
-
Cited by 653 (18 self)
- Add to MetaCart
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about
Secure Group Communications Using Key Graphs
- SIGCOMM '98
, 1998
"... Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e., they require packet delivery from one or more authorized senders to a very large number of au ..."
Abstract
-
Cited by 556 (17 self)
- Add to MetaCart
management. We formalize the notion of a secure group as a triple (U; K;R) where U denotes a set of users, K a set of keys held by the users, and R a user-key relation. We then introduce key graphs to specify secure groups. For a special class of key graphs, we present three strategies for securely
A resource-based perspective on corporate environmental performance and profitability
- Acad. Management J
, 1997
"... Drawing on the resource-based view of the firm, we posited that environmental performance and economic performance are positively linked and that industry growth moderates the relationship, with the returns to environmental performance higher in high-growth industries. We tested these hypotheses wit ..."
Abstract
-
Cited by 312 (3 self)
- Add to MetaCart
reference to the social issues in management literature. We wish to express our appreciation to the Franklin Research and Development Corporation for allowing us to use their proprietary database and to Roger Chope and Steven Matsunaga for assistance with methodological issues. We also thank Thomas
The state of the art in distributed query processing
- ACM Computing Surveys
, 2000
"... Distributed data processing is fast becoming a reality. Businesses want to have it for many reasons, and they often must have it in order to stay competitive. While much of the infrastructure for distributed data processing is already in place (e.g., modern network technology), there are a number of ..."
Abstract
-
Cited by 320 (3 self)
- Add to MetaCart
of issues which still make distributed data processing a complex undertaking: (1) distributed systems can become very large involving thousands of heterogeneous sites including PCs and mainframe server machines � (2) the state of a distributed system changes rapidly because the load of sites varies over
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
- IEEE TRANSACTIONS ON MOBILE COMPUTING
, 2003
"... In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that requ ..."
Abstract
-
Cited by 257 (11 self)
- Add to MetaCart
that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. In this paper, we propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication
Total quality management: Empirical, conceptual, and practical issues’, Administrative Science Quarterly
, 1995
"... •We gratefully acknowledge the assistance of Cathy Sirett in conducting library research for this commentary. We do not provide here a comprehensive review of the large and rapidly growing literature on TOM. For a sampling, see Jablonski (1992), Krishnan et al., (1993), Sashkin and Kiser (1993), and ..."
Abstract
-
Cited by 179 (1 self)
- Add to MetaCart
), and the July 1994 special issue of the Academy of Management Review (vol, 19. no. 3) on "total quality." In recent years, total quality management (TOM) has become something of a social movement in the United States. This commentary returns to the writings of the movement's founders-W. Edwards
The digitization of word of mouth: Promise and challenges of online feedback mechanisms
- Management Science
, 2003
"... Online feedback mechanisms harness the bidirectional communication capabilities of the Internet to engineer large-scale, word-of-mouth networks. Best known so far as a technology for building trust and fostering cooperation in online marketplaces, such as eBay, these mechanisms are poised to have a ..."
Abstract
-
Cited by 206 (5 self)
- Add to MetaCart
work in game theory and economics on the topic of reputation. It discusses how this body of work is being extended and combined with insights from computer science, management science, sociology, and psychology to take into consideration the special properties of online environments. Finally
Special Issue
, 2013
"... This paper studies different styles of leadership in modern organizations touristic and their benefits and disadvantages, with a focus on the characteristics of leaders driven by achievement and what happens when this leadership style crosses the line and becomes damaging for any organization. Even ..."
Abstract
- Add to MetaCart
if the overachieving style of leadership may be successful in the short term, the long term performance of an organization may be damaged and an overachieving leader may demolish trust and undermine morale, reducing overall productivity. In the end, there are presented the different styles of leadership with their pro
Special Issue: Organizational Downsizing Downsizing Trust
"... Organizational downsizing has been a major organizational strategy emphasized by managers to improve performance since the late 1980s. Despite the popularity of downsizing in organizations, the implementation of downsizing has resulted in various negative effects on employee morale. This paper exami ..."
Abstract
- Add to MetaCart
Organizational downsizing has been a major organizational strategy emphasized by managers to improve performance since the late 1980s. Despite the popularity of downsizing in organizations, the implementation of downsizing has resulted in various negative effects on employee morale. This paper
Results 1 - 10
of
4,469