Urs Birchler, Inke Nyborg, How Should We Deal with Large Financial Institutions in a Crisis?, In: 38th Economics Conference 2010, Oesterreichische Nationalbank, Vienna, 2010-05-31. (Conference or Workshop Paper published in Proceedings)
|
|
Anja Feierabend, Familienorientierte Personalpolitik, In: Neue Zürcher Zeitung, 121, p. 77, 29 May 2010. (Newspaper Article)
|
|
Andreas Scherer, Guido Palazzo, The Political Role of Global Business and Civil Society Actors – A Paradigm Shift in Business and Society and its Implications for CSR, Governance, and Democracy, In: 5th Organization Studies Summer Workshop 2010: “Social Movements, Civil Societies and Corporations”. 2010. (Conference Presentation)
|
|
Matija Piškorec, Parallel Protein Docking Tool, In: Proceedings of the 33rd International Convention on Information and Communication Technology, Electronics and Microelectronics, s.n., 2010-05-24. (Conference or Workshop Paper published in Proceedings)
|
|
M Schaffner, Nicht nur der Chef beurteilt, In: Neue Zürcher Zeitung, 116, p. 75, 22 May 2010. (Newspaper Article)
|
|
Burkhard Stiller, Initial Results on Simulations and Experiments with Economic Traffic Management (ETM), In: 4th COST IS0605 WG4 Meeting. 2010. (Conference Presentation)
|
|
Dorothée Baumann-Pauly, Andreas Scherer, Anselm Jakob Schneider, Corporate Citizenship and Corporate Governance – compensating for the democratic deficit of corporate political activity, In: Fourth International Colloquium on Corporate Political Activity “The Governance Challenges of Corporate Political Activity” . 2010. (Conference Presentation)
In this paper we address the democratic deficit that emerges when private corporations engage with public policy, either by providing citizenship rights and global public goods (corporate citizenship) or by influencing the political system and lobbying for their economic interests (strategic corporate political activities). This democratic deficit is significant, especially when multinational corporations operate in locations where national governance mechanisms are weak or even fail, where the rule of law is absent and there is a lack of democratic control. This may lead to a decline in the social acceptance of the business firm and its corporate political activities and, thus, to a loss of corporate legitimacy. Under these conditions corporations may compensate the emerging democratic deficit and reestablish their legitimacy by internalizing democratic mechanisms within their organizations, in particular in their corporate governance structures and procedures. We analyze the available corporate governance models with the help of a typology and discuss the possible contributions of a new form of democratic corporate governance. |
|
Burkhard Stiller, Monitoring and Accounting in IP-based Networks, In: Incentage AG, Planning 3 Years ahead in Financial Messaging. 2010. (Conference Presentation)
|
|
Margit Osterloh, Unternehmen Universität?, In: Neue Zürcher Zeitung (NZZ), 113, p. 31, 19 May 2010. (Newspaper Article)
|
|
Margit Osterloh, Unternehmen Universität? Wie die Suche nach Effizienz, Output-Messung und das Ranking-Fieber in der Wissenschaft zu Opportunismus und Ideenarmut führen können, In: Neue Zürcher Zeitung, 113, p. 31, 19 May 2010. (Newspaper Article)
In der Wissenschaft sucht man immer wieder Qualität und Output der Arbeit zu messen und die Effizienz zu ermitteln. Die Autorin des folgenden Beitrags zeigt auf, welche Nebenwirkungen damit verbunden sind und welche Regeln produktiver wären. |
|
Sadaf Tanvir, Eryk Jerzy Schiller, Benoit Ponsard, Andrzej Duda, Propagation Protocols for Network-Wide Localization Based on Two-Way Ranging, In: Networking Conference (WCNC), IEEE, Piscataway, New Jersey, US, 2010-05-18. (Conference or Workshop Paper published in Proceedings)
In this paper, we study the problem of designing propagation protocols for network-wide localization based on two-way ranging. At the beginning, a network contains a few localized anchor nodes and a large number unlocalized nodes. Unlocalized nodes in the communication range of anchor nodes perform two-way ranging, estimate their positions, and become anchor nodes. The process repeats until all nodes know their positions. We consider three protocols for this propagation process, analyze their convergence speed, and evaluate the communication costs related to the energy consumption. We show that the proposed Optimized Beacon protocol requires much less messages than two other considered protocols while achieving almost the same convergence delay as the Beacon protocol. |
|
P Mahler, Daten auswerten und sinnvoll nutzen, In: Neue Zürcher Zeitung, 110, p. 69, 15 May 2010. (Newspaper Article)
|
|
Sybille Sachs, Hans Groth, Ruth Schmitt, The 'Stakeholder View' Approach: An Untapped Opportunity to Manage Corporate Performance and Wealth, Strategic Change, Vol. 19, 2010. (Journal Article)
|
|
Jie Tang, Sven Seuken, David C. Parkes, Hybrid Transitive Trust Mechanisms, In: Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Toronto, Canada, 2010. (Conference or Workshop Paper published in Proceedings)
Establishing trust amongst agents is of central importance to the development
of well-functioning multi-agent systems. For example,
the anonymity of transactions on the Internet can lead to inefficiencies;
e.g., a seller on eBay failing to ship a good as promised, or
a user free-riding on a file-sharing network. Trust (or reputation)
mechanisms can help by aggregating and sharing trust information
between agents. Unfortunately these mechanisms can often be manipulated
by strategic agents. Existing mechanisms are either very
robust to manipulation (i.e., manipulations are not beneficial for
strategic agents), or they are very informative (i.e., good at aggregating
trust data), but never both. This paper explores this trade-off
between these competing desiderata. First, we introduce a metric to
evaluate the informativeness of existing trust mechanisms. We then
show analytically that trust mechanisms can be combined to generate
new hybrid mechanisms with intermediate robustness properties.
We establish through simulation that hybrid mechanisms can
achieve higher overall efficiency in environments with risky transactions
and mixtures of agent types (some cooperative, some malicious,
and some strategic) than any previously known mechanism. |
|
Helen He, Saul Greenberg, Elaine May Huang, One size does not fit all: Applying the Transtheoretical Model to energy feedback technology design, In: ACM Conference on Human Factors in Computing Systems (CHI), USA, 2010. (Conference or Workshop Paper published in Proceedings)
|
|
Emanuel Giger, Martin Pinzger, Harald Gall, Predicting the fix time of bugs, In: 2nd International Workshop on Recommendation Systems for Software Engineering, 2010-05-04. (Conference or Workshop Paper published in Proceedings)
Two important questions concerning the coordination of development effort are which bugs to fix first and how long it takes to fix them. In this paper we investigate empirically the relationships between bug report attributes and the time to fix. The objective is to compute prediction models that can be used to recommend whether a new bug should and will be fixed fast or will take more time for resolution. We examine in detail if attributes of a bug report can be used to build such a recommender system. We use decision tree analysis to compute and 10-fold cross validation to test prediction models. We explore prediction models in a series of empirical studies with bug report data of six systems of the three open source projects Eclipse, Mozilla, and Gnome. Results show that our models perform significantly better than random classification. For example, fast fixed Eclipse Platform bugs were classified correctly with a precision of 0.654 and a recall of 0.692. We also show that the inclusion of postsubmission bug report data of up to one month can further improve prediction models. |
|
Burkhard Stiller, Charging and Accounting Technologies for the Internet, In: COST Action IS0605 "Econ@Tel" Summer and Traning School. 2010. (Conference Presentation)
|
|
A Koller-Hodac, Daniel Germann, A Gilgen, K Dietrich, M Hadorn, W Schatz, P Eggenberger Hotz, Actuated Bivalve Robot -- Study of the Burrowing Locomotion in Sediment, In: IEEE International Conference on Robotics and Automation (ICRA), 2010-05-03. (Conference or Workshop Paper published in Proceedings)
This paper presents the design and control of an actuated bivalve robot, which has been developed to study the burrowing locomotion of bivalves in sediment. The setup consists of a tank filled with sand and water, plastic models of bivalve shells capable of expelling water and an external actuation mechanism simulating the rocking burrowing motion typically used by these animals. The realistic shell shapes have been realized using three-dimensional plotting techniques allowing testing influences of different shell shapes and surface structures (sculptures) on the burrowing efficiency. Based on the experimental setup, the burrowing process has been reproduced. The results show that this setup can be used to identify correlations in the burrowing process. Further experimental work will investigate the influence of factors such as shell shape and sculpture or the motion sequence on the burrowing performance. Keywords: biorobotics; biomimetics; burrowing locomotion; bivalves |
|
Proceedings of the 3rd International Workshop on Software Product Management (IWSPM'09) at RE'09, Edited by: T Gorschek, S Fricker, S Brinkkemper, C Ebert, IEEE, Atlanta, GA, USA, 2010-05-03. (Edited Scientific Work)
|
|
Giacomo Ghezzi, SOFAS: Software Analysis Services, In: 32nd ACM/IEEE International Conference on Software Engineering, 2010-05-02. (Conference or Workshop Paper published in Proceedings)
We propose a distributed and collaborative software analysis platform to enable seamless interoperability of software analysis tools across platform, geographical and organizational boundaries. In particular, we devise software analysis tools as services that can be accessed and composed over the Internet. These distributed services shall be widely accessible through a software analysis broker where organizations and research groups can register and share their tools. To enable (semi)-automatic use and composition of these tools, they will be classified and mapped into a software analysis taxonomy and adhere to specific meta-models and ontologies for their category of analysis. We claim that moving software analysis ”outside the lab and into the Web” is highly beneficial from many point of views. Simple, common analyses can be effortlessly combined together into much meaningful, complex and novel ones. Analyses can be run everywhere and anytime without the need to install several tools and to cope with many output formats. Empirical studies can be easily replicated. At last, we claim that this will greatly help in the maturing of the field and boost its role in supporting software development practices. |
|