نتایج جستجو برای: lock in
تعداد نتایج: 16977860 فیلتر نتایج به سال:
w The ‘‘lock-in’’ model by Arthur Arthur, W.B., 1988. Competing technologies. In: Dosi, G., Freeman, C., Nelson, R., Ž . x Silverberg, G., Soete, L. Eds. , Technical Change and Economic Theory. Pinter, London, pp. 590–607. can be extended to the case of two and even three sources of random variation. Thus, one can model a triple helix of university–industry– government relations. In the case of...
Amit and Zott [2] recognized the importance of understanding value sources in electronic business (ebusiness). However, the concept of e-business is rather broad and therefore this paper suggests a more narrow focus on the value of complementary services. The reason for this approach is an ever-increasing importance for firms to provide complimentary services supporting products. Amit and Zott’...
O software poses a serious challenge to proprietary software vendors. “Lock in customers” seems a tempting strategy for proprietary software vendors, who attempt to lock in customers by creating switching costs. This paper examines whether such a lock-in strategy will indeed benefit proprietary software vendors facing competition from open-source software, who can credibly commit future prices....
The digitization of work and life has generated numerous market opportunities that remain untapped. The realization of strategic potentials of digitization is particularly difficult for path-dependent firms that are locked-in and perceive little scope of action to deviate from their established strategic patterns. In order to gain deeper insights into this phenomenon, we draw on qualitative dat...
We create an agent-based simulation to explore consumer lock-in in a duopoly of experience goods (goods with characteristics that are difficult to determine in advance, but ascertained upon consumption). We model heterogeneous agents using simple assumptions, where agents choose between products based upon personal experience and neighbours’ decisions. We test strategies to break a lock-in thro...
The bidirectional replication of a circular chromosome by many bacteria necessitates proper termination to avoid the head-on collision of the opposing replisomes. In Escherichia coli, replisome progression beyond the termination site is prevented by Tus proteins bound to asymmetric Ter sites. Structural evidence indicates that strand separation on the blocking (nonpermissive) side of Tus-Ter tr...
© Transactional Memory Should Be an Implementation Technique, Not a Programming Interface Hans-J. Boehm HP Laboratories HPL-2009-45 transactional memory, locks Transactional memory is often advocated as an easier-to-use replacement or locks that avoids any possibility of deadlock. Recently, as more care has been exercised in precisely specifying its semantics, a number of researchers have obser...
in recent years, the number of research works devoted to applying the highly accurate numerical schemes, in particular compact finite difference schemes, to numerical simulation of complex flow fields with multi-scale structures, is increasing. the use of compact finite-difference schemes are the simple and powerful ways to reach the objectives of high accuracy and low computational cost. compa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید