Foreign operation mode combinations and internationalization
نویسندگان
چکیده
منابع مشابه
Foreign Operation Mode Combinations and Internationalization
The standard formula in theoretical and empirical studies of entry mode choice and internationalization processes of firms has been ‘one foreign country, one operation mode’, i.e. a singular mode approach. However, even with fairly broad operation mode definitions it is by no means exceptional to see firms having more than one operation mode in a foreign country. This paper explores the phenome...
متن کاملNonlinear Measurement Combinations for Optimal Operation
Competition, rising energy prices and environmental demands make it increasingly necessary to operate chemical processes as close to optimality as possible. In order to avoid suboptimal performance in presence of disturbances, mainly two approaches are considered for control [3]: On-line and off-line optimization based control. The first approach implies computing the optimal setpoints of the c...
متن کامل“time-setting” Mode of Operation
The IEEE 1588 precision time protocol (PTP) time-setting mode of operation can be used to dramatically improve the quality of time-based systems that rely on a physical layer syntonization source in addition to PTP. Based on the standardized PTP protocol and common network frequency distribution techniques, the PTP time-setting mode of operation is capable of distributing time over packet-based...
متن کاملThe EAX Mode of Operation
We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryption with associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects the privacy of M and the authenticity of bothM andH . StringsN ,M , andH are arbitrary bit strings, and the mode uses 2djM j=ne + djHj=ne + djN j=ne block-cipher calls when these strings are nonempty...
متن کاملAn Hybrid Mode of Operation
In this paper I propose a tweakable block cipher construction with a mode of operation that combines counter and chaining methods. Using a single key, the direct application of this mode produces unrepeatable message authentication tags.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Business Research
سال: 2002
ISSN: 0148-2963
DOI: 10.1016/s0148-2963(00)00151-x