22,367 research outputs found
Designing, Producing and Using Artifacts in the Structuration of Firm Knowledge: Evidence from Proprietary and Open Processes of Software Development.
In the paper we study the recursive nature of artifacts in the production and the socialization of organizational knowledge. In this respect, artifacts are interpreted both as the product (output) of organizational knowledge processes and, at the same time, as tools easing the development of other artifacts. We compare different practices of knowledge creation and diffusion in complex software production processes with the aim of understanding the effects of interplay between (1) coordination and control practices, (2) mediating artifacts and development tools, and (3) interactions between different actors in the development process. We aim at identifying the peculiar traits emerging in contrasting development paradigms, namely the closed, fully proprietary one widespread in the gaming console industry, and the open model of free/open source software developmentvideo/computer game industry; artifacts; free/open source software; video game consoles
Exact ICL maximization in a non-stationary time extension of the latent block model for dynamic networks
The latent block model (LBM) is a flexible probabilistic tool to describe
interactions between node sets in bipartite networks, but it does not account
for interactions of time varying intensity between nodes in unknown classes. In
this paper we propose a non stationary temporal extension of the LBM that
clusters simultaneously the two node sets of a bipartite network and constructs
classes of time intervals on which interactions are stationary. The number of
clusters as well as the membership to classes are obtained by maximizing the
exact complete-data integrated likelihood relying on a greedy search approach.
Experiments on simulated and real data are carried out in order to assess the
proposed methodology.Comment: European Symposium on Artificial Neural Networks, Computational
Intelligence and Machine Learning (ESANN), Apr 2015, Bruges, Belgium.
pp.225-230, 2015, Proceedings of the 23-th European Symposium on Artificial
Neural Networks, Computational Intelligence and Machine Learning (ESANN 2015
Beyond cusp anomalous dimension from integrability in SYM
We study the first sub-leading correction to the cusp
anomalous dimension in the high spin expansion of finite twist operators in
SYM theory. This term is still governed by a linear integral
equation which we study in the weak and strong coupling regimes. In the strong
coupling regime we find agreement with the string theory computationsComment: 5 pages, contribution to the proceedings of the workshop Diffraction
2010, Otranto, 10th-15th September, talk given by M.Rossi; v2: references
adde
On the fundamental limitations of performance for distributed decision-making in robotic networks
This paper studies fundamental limitations of performance for distributed
decision-making in robotic networks. The class of decision-making problems we
consider encompasses a number of prototypical problems such as average-based
consensus as well as distributed optimization, leader election, majority
voting, MAX, MIN, and logical formulas. We first propose a formal model for
distributed computation on robotic networks that is based on the concept of I/O
automata and is inspired by the Computer Science literature on distributed
computing clusters. Then, we present a number of bounds on time, message, and
byte complexity, which we use to discuss the relative performance of a number
of approaches for distributed decision-making. From a methodological
standpoint, our work sheds light on the relation between the tools developed by
the Computer Science and Controls communities on the topic of distributed
algorithms.Comment: Will be presented at CDC201
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
This paper proposes KISS, a novel Internet classifica- tion engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of Peer-to-Peer (P2P) streaming appli- cations, we propose a novel classification framework that leverages on statistical characterization of payload. Statistical signatures are derived by the means of a Chi-Square-like test, which extracts the protocol "format," but ignores the protocol "semantic" and "synchronization" rules. The signatures feed a decision process based either on the geometric distance among samples, or on Sup- port Vector Machines. KISS is very accurate, and its signatures are intrinsically robust to packet sampling, reordering, and flow asym- metry, so that it can be used on almost any network. KISS is tested in different scenarios, considering traditional client-server proto- cols, VoIP, and both traditional and new P2P Internet applications. Results are astonishing. The average True Positive percentage is 99.6%, with the worst case equal to 98.1,% while results are al- most perfect when dealing with new P2P streaming applications
The elliptic scattering theory of the 1/2-XYZ and higher order Deformed Virasoro Algebras
Bound state excitations of the spin 1/2-XYZ model are considered inside the
Bethe Ansatz framework by exploiting the equivalent Non-Linear Integral
Equations. Of course, these bound states go to the sine-Gordon breathers in the
suitable limit and therefore the scattering factors between them are explicitly
computed by inspecting the corresponding Non-Linear Integral Equations. As a
consequence, abstracting from the physical model the Zamolodchikov-Faddeev
algebra of two -th elliptic breathers defines a tower of -order Deformed
Virasoro Algebras, reproducing the case the usual well-known algebra of
Shiraishi-Kubo-Awata-Odake \cite{SKAO}.Comment: Latex version, 13 page
On the finite size corrections of anti-ferromagnetic anomalous dimensions in SYM
Non-linear integral equations derived from Bethe Ansatz are used to evaluate
finite size corrections to the highest (i.e. {\it anti-ferromagnetic}) and
immediately lower anomalous dimensions of scalar operators in SYM.
In specific, multi-loop corrections are computed in the SU(2) operator
subspace, whereas in the general SO(6) case only one loop calculations have
been finalised. In these cases, the leading finite size corrections are given
by means of explicit formul\ae and compared with the exact numerical
evaluation. In addition, the method here proposed is quite general and
especially suitable for numerical evaluations.Comment: 38 pages, Latex revised version: draft formulae indicator deleted,
one reference added, typos corrected, few minor text modification
- …
