نتایج جستجو برای: opportunistic behavior
تعداد نتایج: 638689 فیلتر نتایج به سال:
Sharing knowledge through inter-organizational relationships is one means of enhancing strategic competitiveness. It is generally agreed that the development of close relationships facilitates such sharing among partners. This paper presents a research model comprises five research hypotheses with four constructs, including moral orientation, opportunistic behavior, loss of competences risk and...
The IEEE 802.22 standard is the first proposed standard for the cognitive radio networks in which a set of base stations (BSs) make opportunistic spectrum access to provide wireless access to the customer-premise equipments (CPE) within their cells in wireless regional area networks (WRAN). The channel assignment and power control must be carried out in BSs and CPEs, such that no excessive inte...
In the enterprise application software industry, dominant system vendors (hubs) have formed strategic partnerships with small software companies (spokes), resulting in the emergence of hub-and-spoke networks. Based upon the concept of software stacks, we argue that the governance mechanisms applied by hub and spokes depend on the complementarity between hub's and spoke's resources. Specifically...
Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists) who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and mo...
This paper reviews the Latin American experience with highway privatization during the last decade. Using evidence from Argentina, Colombia and Chile, we find that private financing of new highways freed up fewer public resources than expected because public funds were often diverted to bail out franchise holders. Furthermore, our review of the evidence suggests that pervasive contract renegoti...
This paper presents a novel path planning heuristic for multi-UAV pipe inspection missions inspired by the booby bird’s foraging behavior. The enables each UAV to find an optimal that minimizes detection time of defects in networks while avoiding collisions with obstacles and other UAVs. proposed method is compared four existing algorithms adapted scenarios: ant colony optimization (ACO), parti...
The North Island kākā (Nestor meridionalis septentrionalis), a threatened New Zealand native parrot, was successfully reintroduced to an urban sanctuary in Wellington, New Zealand. Conflict has recently begun to emerge with Wellington City residents due to tree damage caused by kākā sap foraging. Little is known about sap foraging behavior of kākā, and this study aimed to gain a greater underst...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید