نتایج جستجو برای: style management

تعداد نتایج: 910977  

2015
Shazia Nauman Azhar Mansur Khan Nadeem Ehsan

The current study explores the relationship of empowerment, leadership style and customer service as a measure of effective project management in projects with varying degree of virtuality. The study makes comparisons of empowerment climate in less and more virtual projects. Moreover, the study examines moderating effects of degree of virtuality on the relationship between empowerment and leade...

2012
Ellen Ernst Kossek Brenda A. Lautsch

We develop a cross-level model and typology of work–family (W–F) boundary management styles in organizations. A boundary management style is the general approach an individual uses to demarcate boundaries and attend to work and family roles. We argue that variation in W–F boundary management styles (integrator, separator, alternating) is a function of individual boundary-crossing preferences (f...

2000
Azzedine Boukerche Alessandro Fabbri

In this paper, we present a simulation testbed for wireless and mobile telecommunication systems, a two-stage PCS parallel simulation testbed which makes use of a conservative scheme at Stage 1, and of time warp at Stage 2. While Time warp is considered to be an effective synchronization mechanism in parallel and distributed discrete event simulation (PDES) it is also well known for its unstabi...

Journal: :Knowl.-Based Syst. 2018
Dong Wang Nathan Vance Chao Huang

Social sensing has emerged as a new data collection paradigm in networked sensing applications where humans are used as “sensors” to report their observations about the physical world. While many previous studies in social sensing focus on the problem of ascertaining the reliability of data sources and the correctness of their reported claims (often known as truth discovery), this paper investi...

Journal: :CoRR 2016
Shi Zong Hao Ni Kenny Sung Nan Rosemary Ke Zheng Wen Branislav Kveton

Most recommender systems recommend a list of items. The user examines the list, from the first item to the last, and often chooses the first attractive item and does not examine the rest. This type of user behavior can be modeled by the cascade model. In this work, we study cascading bandits, an online learning variant of the cascade model where the goal is to recommend K most attractive items ...

1998
John Paynter

An Internet browser-based computer-support learning tool was designed and built by MTTU to serve as an assessment vehicle for business students. Now in its third year of operation it has migrated across computer platforms and been completely redesigned to become a university resource. Hundreds of students use CSL daily. This paper will outline the development of CSL and discuss our work in conn...

2017
Xiaozhu Meng Barton P. Miller Kwang-Sung Jun

Knowing the authors of a binary program has significant application to forensics of malicious software (malware), software supply chain risk management, and software plagiarism detection. Existing techniques assume that a binary is written by a single author, which does not hold true in real world because most modern software, including malware, often contains code from multiple authors. In thi...

2011
Maayan Shorer Ravit David Michal Schoenberg-Taz Ifat Levavi-Lavi Moshe Phillip Joseph Meyerovitch

OBJECTIVE To examine the role of parenting style in achieving metabolic control and treatment adherence in adolescents with type 1 diabetes. RESEARCH DESIGN AND METHODS Parents of 100 adolescents with type 1 diabetes completed assessments of their parenting style and sense of helplessness. Parents and patients rated patient adherence to the treatment regimen. Glycemic control was evaluated by...

2000
Jamie Cano

The purpose of this study was to describe the learning style of 1994 incomingfreshmen students enrolled in the College of Food Agricultural, and Environmental Sciences at The Ohio State University. The study investigated the relationships between learning style, academic performance, and selected student characteristics. Results of the study indicated that the 1994 enteringfreshmen tended to le...

2016
Ian Dobson David E. Newman

Cascading blackouts can be thought of as initiating events followed by propagating events that progressively weaken the power system. We briefly discuss the implications for assessing cascading risk by proper sampling from the various sources of uncertainty and for mitigating cascading risk by reducing both the initiating events and their propagation.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید