Airline efficiency with optimal employee allocation: An Input-shared Network Range Adjusted Measure

2018 ◽  
Vol 73 ◽  
pp. 150-162 ◽  
Author(s):  
Ye Li ◽  
Qiang Cui
Keyword(s):  
2010 ◽  
Vol 9 (4) ◽  
pp. 181-194 ◽  
Author(s):  
Jürgen Weibler ◽  
Sigrid Rohn-Endres

This paper develops an understanding of how shared leadership emerges in social network interactions. On the basis of a qualitative research design (grounded theory methodology – GTM) our study in two interorganizational networks offers insights into the interplay between structures, individuals, and the collective for the emergence of shared network leadership (SNL). The network-specific Gestalt of SNL appears as a pattern of collective and individual leadership activities unified under the roof of a highly developed learning conversation. More importantly, our findings support the idea that individual network leadership would not emerge without embeddedness in certain high-quality collective processes of relating and dialogue. Both theoretical and practical implications of this original network leadership perspective are discussed.


2009 ◽  
Vol E92-B (12) ◽  
pp. 3581-3585
Author(s):  
Hyoungsuk JEON ◽  
Sooyeol IM ◽  
Youmin KIM ◽  
Seunghee KIM ◽  
Jinup KIM ◽  
...  

Author(s):  
Rohit Anand ◽  
Akash Sinha ◽  
Abhishek Bhardwaj ◽  
Aswin Sreeraj

This chapter deals with the security flaws of social network of things. The network of things (NoT) is a dynamic structure that is basically an interface of real world and virtual world having capabilities of collection and sharing data over a shared network. The social network of things (SNoT) is a versatile way of connecting virtual and real world. Like any other device connected to internet, objects in SNoT are also vulnerable to the various security and privacy attacks. Generally, to secure Social Network of Things in which human intervention is absent, data capturing devices must be avoided. Types of security attacks that are huge threats to NoT as well as SNoT will be discussed in the chapter. The huge collection of information without necessary security measures allows an intruder to misuse the personal data of owner. Different types of attacks with reference to the different layers are also discussed in detail. The best possible potential solutions for the security of devices in SNoT will be considered.


Author(s):  
Shailendra Singh ◽  
Sunita Gond

As this is the age of technology and every day we are receiving the news about growing popularity of internet and its applications. Cloud computing is an emerging paradigm of today that is rapidly accepted by the industry/organizations/educational institutions etc. for various applications and purpose. As computing is related to distributed and parallel computing which are from a very long time in the market, but today is the world of cloud computing that reduces the cost of computing by focusing on personal computing to data center computing. Cloud computing architecture and standard provide a unique way for delivering computation services to cloud users. It is having a simple API (Application Platform Interface) to users for accessing storage, platform and hardware by paying-as-per-use basis. Services provided by cloud computing is as same as other utility oriented services like electricity bill, water, telephone etc. over shared network. There are many cloud services providers in the market for providing services like Google, Microsoft, Manjrasoft Aneka, etc.


Author(s):  
Marcus Tanque

Cloud computing consists of three fundamental service models: infrastructure-as-a-service, platform-as-a service and software-as-a-service. The technology “cloud computing” comprises four deployment models: public cloud, private cloud, hybrid cloud and community cloud. This chapter describes the six cloud service and deployment models, the association each of these services and models have with physical/virtual networks. Cloud service models are designed to power storage platforms, infrastructure solutions, provisioning and virtualization. Cloud computing services are developed to support shared network resources, provisioned between physical and virtual networks. These solutions are offered to organizations and consumers as utilities, to support dynamic, static, network and database provisioning processes. Vendors offer these resources to support day-to-day resource provisioning amid physical and virtual machines.


Author(s):  
Xuedong Zhang ◽  
Shuqin Kang ◽  
Miaole Hou ◽  
Xianglei Liu

With the rapid development of network technology, large enterprises have established their own online learning and examination system respectively. However, as those network examination systems are dispersive, closed and disconnected, so various resources are unable to be utilized in a balanced way, which may cause substantial waste of enterprise resources. To solve such a problem, the emerging cloud computing technology with the characteristics of service on demand and dynamic expansion capability, provides a possibility of a shared network examination system with lower cost, named as cloud exam support service. A feasible solution for the application of the cloud computing technology in the network examination, which combines the theoretical analysis, system design and technical implementation, is put forward in this paper. The design, development, and pilot application of the cloud examination system described in this paper show that this study is highly practical, operable, and worthy of application and popularization.


Sign in / Sign up

Export Citation Format

Share Document