22,367 research outputs found

    Designing, Producing and Using Artifacts in the Structuration of Firm Knowledge: Evidence from Proprietary and Open Processes of Software Development.

    Get PDF
    In the paper we study the recursive nature of artifacts in the production and the socialization of organizational knowledge. In this respect, artifacts are interpreted both as the product (output) of organizational knowledge processes and, at the same time, as tools easing the development of other artifacts. We compare different practices of knowledge creation and diffusion in complex software production processes with the aim of understanding the effects of interplay between (1) coordination and control practices, (2) mediating artifacts and development tools, and (3) interactions between different actors in the development process. We aim at identifying the peculiar traits emerging in contrasting development paradigms, namely the closed, fully proprietary one widespread in the gaming console industry, and the open model of free/open source software developmentvideo/computer game industry; artifacts; free/open source software; video game consoles

    Exact ICL maximization in a non-stationary time extension of the latent block model for dynamic networks

    Get PDF
    The latent block model (LBM) is a flexible probabilistic tool to describe interactions between node sets in bipartite networks, but it does not account for interactions of time varying intensity between nodes in unknown classes. In this paper we propose a non stationary temporal extension of the LBM that clusters simultaneously the two node sets of a bipartite network and constructs classes of time intervals on which interactions are stationary. The number of clusters as well as the membership to classes are obtained by maximizing the exact complete-data integrated likelihood relying on a greedy search approach. Experiments on simulated and real data are carried out in order to assess the proposed methodology.Comment: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN), Apr 2015, Bruges, Belgium. pp.225-230, 2015, Proceedings of the 23-th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2015

    Beyond cusp anomalous dimension from integrability in SYM4_4

    Full text link
    We study the first sub-leading correction O((lns)0)O((\ln s)^0) to the cusp anomalous dimension in the high spin expansion of finite twist operators in N=4{\cal N}=4 SYM theory. This term is still governed by a linear integral equation which we study in the weak and strong coupling regimes. In the strong coupling regime we find agreement with the string theory computationsComment: 5 pages, contribution to the proceedings of the workshop Diffraction 2010, Otranto, 10th-15th September, talk given by M.Rossi; v2: references adde

    On the fundamental limitations of performance for distributed decision-making in robotic networks

    Full text link
    This paper studies fundamental limitations of performance for distributed decision-making in robotic networks. The class of decision-making problems we consider encompasses a number of prototypical problems such as average-based consensus as well as distributed optimization, leader election, majority voting, MAX, MIN, and logical formulas. We first propose a formal model for distributed computation on robotic networks that is based on the concept of I/O automata and is inspired by the Computer Science literature on distributed computing clusters. Then, we present a number of bounds on time, message, and byte complexity, which we use to discuss the relative performance of a number of approaches for distributed decision-making. From a methodological standpoint, our work sheds light on the relation between the tools developed by the Computer Science and Controls communities on the topic of distributed algorithms.Comment: Will be presented at CDC201

    KISS: Stochastic Packet Inspection Classifier for UDP Traffic

    Get PDF
    This paper proposes KISS, a novel Internet classifica- tion engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of Peer-to-Peer (P2P) streaming appli- cations, we propose a novel classification framework that leverages on statistical characterization of payload. Statistical signatures are derived by the means of a Chi-Square-like test, which extracts the protocol "format," but ignores the protocol "semantic" and "synchronization" rules. The signatures feed a decision process based either on the geometric distance among samples, or on Sup- port Vector Machines. KISS is very accurate, and its signatures are intrinsically robust to packet sampling, reordering, and flow asym- metry, so that it can be used on almost any network. KISS is tested in different scenarios, considering traditional client-server proto- cols, VoIP, and both traditional and new P2P Internet applications. Results are astonishing. The average True Positive percentage is 99.6%, with the worst case equal to 98.1,% while results are al- most perfect when dealing with new P2P streaming applications

    The elliptic scattering theory of the 1/2-XYZ and higher order Deformed Virasoro Algebras

    Full text link
    Bound state excitations of the spin 1/2-XYZ model are considered inside the Bethe Ansatz framework by exploiting the equivalent Non-Linear Integral Equations. Of course, these bound states go to the sine-Gordon breathers in the suitable limit and therefore the scattering factors between them are explicitly computed by inspecting the corresponding Non-Linear Integral Equations. As a consequence, abstracting from the physical model the Zamolodchikov-Faddeev algebra of two nn-th elliptic breathers defines a tower of nn-order Deformed Virasoro Algebras, reproducing the n=1n=1 case the usual well-known algebra of Shiraishi-Kubo-Awata-Odake \cite{SKAO}.Comment: Latex version, 13 page

    On the finite size corrections of anti-ferromagnetic anomalous dimensions in N=4{\cal N}=4 SYM

    Full text link
    Non-linear integral equations derived from Bethe Ansatz are used to evaluate finite size corrections to the highest (i.e. {\it anti-ferromagnetic}) and immediately lower anomalous dimensions of scalar operators in N=4{\cal N}=4 SYM. In specific, multi-loop corrections are computed in the SU(2) operator subspace, whereas in the general SO(6) case only one loop calculations have been finalised. In these cases, the leading finite size corrections are given by means of explicit formul\ae and compared with the exact numerical evaluation. In addition, the method here proposed is quite general and especially suitable for numerical evaluations.Comment: 38 pages, Latex revised version: draft formulae indicator deleted, one reference added, typos corrected, few minor text modification
    corecore