54 results on '"Pull Technology"'
Search Results
2. Smart Literature Search Tools for Researchers: A Review
- Author
-
Prasanna Kumar BM and Sachin Y
- Subjects
Webstore ,Smart Searching Tools ,Smart Literature Reviwe ,Chrome extension ,Pull Technology ,Push Technology ,Information Search - Abstract
When deciding on research subjects or analyzing technological trends, researchers should gather and evaluate information from thousands of papers, patents, and technical reports. Information extraction methods from books may assist in speeding up the process. Furthermore, appropriate searching algorithms for the retrieved information are required. While studies into information extraction have been widespread, research into searching and browsing techniques for the retrieved information has not been as appealing. The available published data is enormous; therefore, choosing the appropriate articles, knowledge, and relevant literature related to your field of study is an art. This work proposes an intelligent searching system that includes multiple analytical tools, alternative resources, and paper credibility. We anticipate that researchers will uncover and generate novel research outputs using the suggested searching system.
- Published
- 2022
- Full Text
- View/download PDF
3. A Study on the Limits and Improvement of the Current Korean Military Weapon System Planning Method according to the Change of Age : Based on the demand pull / technology-push theory
- Author
-
Sukjae Jeong and Jongung Cheon
- Subjects
Weapon system ,Operations research ,Planning method ,Political science ,Pull technology - Abstract
전쟁 패러다임을 바꿀 새로운 무기체계의 출현을 예고하는 과학기술의 발전과 정치적 변화에 따른 주적개념의 혼돈은 지금까지와 다른 소요기획 방법을 요구한다. 그러나 한국군은 이러한 급격한 시대적 변화의 상황에서도 여전히 지나치게 소요군 중심의 군사전략 선도형 소요기획방법을 적용하고 있다. 기술발전 속도가 빠르고 주적개념이 혼돈되는 상황에서 기술에 대한 지식이 상대적으로 부족한 소요군이 적을 상대로 하여 첨단기술을 활용한 운용개념을 적시에 정립하는 것은 제한된다. 첨단기술에 대한 전쟁에서의 운용개념을 완벽하게 수립 후 소요를 제기하고 개발을 하는 방식은 전력화 기간을 장기화하고 기술이 진부화되어 실제 전장에서뿐 아니라 무기시장에서도 경쟁력을 갖기 힘들다. 본 연구는 이런 시대 상황에서 한국군 소요기획의 한계를 살펴보고 개선방안을 제시하기 위해 기술혁신과 프로젝트의 성공을 가늠하는 핵심패러다임인 수요견인/기술주도 이론을 적용하였다. 한국군은 주로 북한군 위협, 군사전략변화, 기존무기체계의 노후(결함) 교체 필요성 등에 의해 무기체계 소요가 발생하는 지나친 수요견인형 소요기획방식에 치중해 있으며 이를 극복하기 위해 기술주도형 방식을 조화롭게 적용해야 한다. 이를 위해 소요기획 단계에서부터 ADD와 개발 업체들의 적극적인 참여 보장, 소요군과 국방부 등에 기술적인 조언이 가능한 과학기술 참모조직 보강, 기존 소요기획 프로세스와 구분된 개방형 소요기획 프로세스를 채택해야 한다.
- Published
- 2019
- Full Text
- View/download PDF
4. The Market Pull Versus Technology Push Continuum Of Engineering Education
- Author
-
Jon C. Dixon
- Subjects
Engineering ,Labour economics ,Continuum (topology) ,Technology push ,business.industry ,Engineering education ,Market pull ,business ,Manufacturing engineering ,Pull technology - Published
- 2020
- Full Text
- View/download PDF
5. LISA: Lightweight context-aware IoT service architecture
- Author
-
Prayag Tiwari, Sarada Prasad Gochhayat, Mauro Conti, Deepak Gupta, Ashish Khanna, Pallavi Kaliyar, and V.B.S. Prasath
- Subjects
Internet of things ,Push-based services ,Computer science ,computer.internet_protocol ,020209 energy ,Strategy and Management ,Strategy and Management1409 Tourism ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Industrial and Manufacturing Engineering ,Pull technology ,Human–computer interaction ,0202 electrical engineering, electronic engineering, information engineering ,Use case ,Renewable Energy ,Automatic query generator ,Context-aware ,Web services ,Renewable Energy, Sustainability and the Environment ,2300 ,Strategy and Management1409 Tourism, Leisure and Hospitality Management ,0505 law ,General Environmental Science ,Sustainability and the Environment ,business.industry ,End user ,User modeling ,Leisure and Hospitality Management ,05 social sciences ,Service-oriented architecture ,050501 criminology ,The Internet ,Web service ,business ,computer - Abstract
Internet-of-Things (IoT) promises to provide services to the end users by connecting physical things around them through Internet. The conventional services build for web are primarily based on the pull technology, where the user actively engages with system to get the services. However, in IoT environment, the services are based on push-based, where information and value added services will be pushed towards the user. Unless, these push-based services are properly managed they would overwhelm the user with unnecessary information, thus, it will soon start annoying the user. In this paper, we propose a lightweight context-aware IoT service architecture namely LISA to support IoT push services in an efficient manner. In particular, LISA filter and forward the most important and relevant services to the users by understanding their context. To achieve its goals, LISA formulates a user model to resolve local decision making by using agents and available web services paradigm. The proposed user model describes the user in an abstract way by considering the context and profile information of the user. For evaluation, we simulate LISA by considering an IoT tourist guide system as a use case scenario, and we show the performance of the our user model concerning precision and recall metrics. The results of our preliminary experiments confirm that LISA successfully reduces the information provided to the user by selecting only the most relevant among those. The evaluation shows that LISA can extract services for a user by selecting from 15000 services with precision upto 0.3 and recall upto 0.8, and it can be further optimized by tuning the user-specific design settings. Additionally, our approach shows improvements in query processing time which also includes the query generation time.
- Published
- 2019
- Full Text
- View/download PDF
6. The Effects of QR Delivered Content on Perceived Product Value
- Author
-
Andrea Vocino
- Subjects
Computer science ,Content analysis ,Perception ,media_common.quotation_subject ,Code (cryptography) ,Advertising ,Sample (statistics) ,Product (category theory) ,Value (mathematics) ,Uses and gratifications theory ,media_common ,Pull technology - Abstract
QR code is an important pull technology tool that has increased exponentially worldwide. Although its usefulness for marketers has been widely recognized, little is known about the type of message content (i.e. hedonic vs utilitarian) that generates a greater perceived value of products. Drawing on uses and gratifications theory (UGT), this study investigates the effect of the type of communication (i.e. hedonic vs utilitarian) delivered through two different pull communication tools (i.e. website and QR code) on product value perception in the retail setting. In the first study, we ran a content analysis on data retrieved from a sample of QR codes of wine bottles. In the second one, we tested our hypotheses through an online experiment. The findings show that when the contents conveyed are hedonic, the presence of a QR code influences consumers’ perceived value of the product positively. The reverse is true when considering the website (without the use of the direct QR code platform). These results provide useful insights for managers for the development of a smart experience in stores.
- Published
- 2020
- Full Text
- View/download PDF
7. The Performance of Supply-Push Versus Demand-Pull Technology Transfer and the Role of Technology Marketing Strategies: The Case of a Korean Public Research Institute
- Author
-
Won Jun Choe and Ilyong Ji
- Subjects
technology marketing ,Geography, Planning and Development ,TJ807-830 ,Management, Monitoring, Policy and Law ,TD194-195 ,supply-push ,Renewable energy sources ,Pull technology ,Market segmentation ,Transfer (computing) ,demand pull ,0502 economics and business ,GE1-350 ,Marketing ,technology transfer ,Environmental effects of industries and plants ,Renewable Energy, Sustainability and the Environment ,05 social sciences ,Public research ,target marketing ,Mass marketing ,Environmental sciences ,mass marketing ,Technology transfer ,050211 marketing ,Business ,050203 business & management - Abstract
Technology transfer is one of important strategies in sustainable economic growth. There are supply-push and demand-pull directions of technology transfer, and recently Korean research institutes have paid increasing attention to demand-pull technology transfer in an attempt to improve public research institutes&rsquo, technology transfer performance (TTP). However, our view is that simply adopting a demand-pull or a supply-push model does not always guarantee improved TTP. We argue that technology marketing strategies, such as mass marketing and target marketing, should also be considered. This study aims to investigate the relationship between technology transfer directions and TTP, and the role of technology marketing strategies. We collected a Korean research institute&rsquo, s technology transfer data from 2014 to 2015, and then employed a two-way ANOVA to analyze the data. The result of the analysis shows that TTPs differ by technology transfer directions and technology marketing strategies. More importantly, we found that the demand-pull model yields higher TTP, especially when the model is associated with target marketing strategies rather than mass-marketing strategies. This result implies that marketing strategies, such as market segmentation and customer targeting, are needed if an organization wants to improve TTP by implementing the demand-pull technology transfer model.
- Published
- 2019
8. Herbal Medicine Information System Using Push and Pull Technology in Mobile Application
- Author
-
Marianne Therese P. Cadiz, Genesis G. Esguerra, Berline Mae R. Mabanag Camba, and Mary Jane C. Samonte
- Subjects
Web server ,Multimedia ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Pull technology ,03 medical and health sciences ,0302 clinical medicine ,Acceptance testing ,Server ,Push technology ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,030212 general & internal medicine ,Rural area ,Android (operating system) ,computer ,Mobile device - Abstract
Push technology could be seen being used when the information is generated by a central web server and then pushes it to a client. A client may access this information through their personal computers, laptops, and mobile phones. In contrast to Push technology, there is Pull technology. Pull technology could be seen being used when a client requests information from a server. In this study, the researchers developed an android-based mobile application, called HerbLife, that uses push and pull technology in for alternative medicine information. The herbal solutions app is ideal for use by people who would like to use plant-based medicines instead of the chemical ones to avoid allergies and other medical dilemma. The technology applied is ideal for offline connection especially in remote and rural areas where access is limited and the mobile device has limited memory capacity. This research were able to present information rich content in the form of video, text and other multimedia features in order to fully covered the needed herbal solution instruction to present to the target users. The presented plant-based medicinal information in this study were carefully selected and tested by professional before developing this herbal information system. The mobile application was tested with the fullest of its functionality and supported by user acceptance testing of the experts in herbal medicines and proven users of this alternative approach as shown in this study.
- Published
- 2018
- Full Text
- View/download PDF
9. Relationships between need-pull/technology-push and information security management and the moderating role of regulatory pressure
- Author
-
Sang-Hyun Kim, Geuna Kim, and Aaron M. French
- Subjects
Process (engineering) ,Communication ,Information security ,Affect (psychology) ,Moderation ,Pull technology ,Information security management ,Information system ,Business, Management and Accounting (miscellaneous) ,Operational efficiency ,Business ,Marketing ,Industrial organization ,Information Systems - Abstract
Information security management (ISM) has become more important than ever, as the expansion of corporate information systems and the use of networks continue to increase. Many organizations consider ISM an important part of organizational innovation and key to strategic and operational efficiency. Managers require a firm understanding of the behavioral aspect of ISM, particularly of how their firms' internal and external characteristics affect the ISM process. This study draws on need-pull---technology-push (NP---TP) theories and employs data on information security users to investigate the NP and TP factors influencing the awareness, development, and performance stages of ISM. This study also examines the moderating role of regulatory pressure in those relationships. The research model is tested with data taken from a random sample of global organizations obtained through the Korea Composite Stock Price Index, the Korean Securities Dealers Automated Quotation, and the Korea Foreign Company Association. The results indicate that all NP---TP variables had positive effects on the ISM process (with the exception of perceived benefits). Moreover, regulatory pressure had positive effects as a moderator between ISM awareness and ISM development and performance.
- Published
- 2015
- Full Text
- View/download PDF
10. Leadership
- Author
-
Gary Griffiths, Richard A. Harrison, Peter Hines, and Pauline Found
- Subjects
Engineering ,business.industry ,business ,Automotive engineering ,Pull technology - Published
- 2017
- Full Text
- View/download PDF
11. Web-based GIS ancestral domain management using pull technology
- Author
-
Vicente A. Pitogo
- Subjects
History ,Computer architecture ,Computer science ,business.industry ,Web application ,business ,Computer Science Applications ,Education ,Pull technology ,Domain (software engineering) - Abstract
The changes made by emerging technologies brought a significant effect on how people deal with everyday living even the least and reserved individuals in the community. In the Philippines, especially the National Commission on Indigenous Peoples (NCIP) a commission empowered to take the necessary protection and preservation of welfare, rights, and culture among IP’s has been affected by this rapid changes, particularly the Ancestral Domains. It has twenty (20) Certified Ancestral Domain Title (CADT’s), two (2) ongoing and CADTiables comprising areas of the Caraga region. Gathering and producing of information has always been a challenge but over the years it was eventually resolved into manually storing and keeping of data into the computer. Time, being an essential factor in the delivery of service to the IP clients and vital in coordination with other agencies, as much as possible the office responds immediately to the needs of the clients by providing them with reliable and accurate data. However, with the current status quo, retrieving files will take time, thus delaying coordination and delaying delivery of service to the clients. A “Web-based GIS Ancestral Domain Management Using Pull Technology” is a response to the pressing needs of the commission to the delivery of service to their clients, a digitized spatial data banking. The system is packed with a variety of technologies such as Mobile, Web, GIS, and other mapping tools and frameworks; scripting languages and database software integrating therein that made it functional. Thus, providing a convenient and efficient way of information generation.
- Published
- 2019
- Full Text
- View/download PDF
12. Research on Active Aided Knowledge System Push-Pull Technology Oriented the CAPP
- Author
-
Xi Ai Zhang and Ran Li
- Subjects
Focus (computing) ,Engineering ,Knowledge management ,ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,Process (engineering) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,General Medicine ,Pull technology ,Engineering management ,Knowledge base ,Push technology ,Lack of knowledge ,Creative thinking ,business ,Push pull - Abstract
According to the quick updating of contemporary knowledge and the long learning process for the machinery technologists, this paper sets up an active aided knowledge system oriented the CAPP. On the basis of the knowledge base, the system provides relevant knowledge for the machinery technologists. The technologists can pull the information and this soft not only pushes information customized, but also determines knowledge demanded in order to send the lack of knowledge for the machinery technologists. The active aided knowledge system oriented the CAPP will reduce the machinery technologists’ burdens, improve the utilization of knowledge and focus technologists’ energy on the creative thinking.
- Published
- 2012
- Full Text
- View/download PDF
13. Design a COPINO EDI Model Using the Pull Technology
- Author
-
Kyu-Seok Kwak and Chang-Seung Ha
- Subjects
Engineering ,Risk analysis (engineering) ,Process (engineering) ,business.industry ,Batch processing ,Web application ,Operations management ,Work in process ,business ,Database transaction ,Purchasing ,Field (computer science) ,Pull technology - Abstract
Recently the trade patterns of the entire economy are rapidly changing on development of IT. The field of port logistics is enforcing a competitiveness through preliminary offer of information and a batch process for improving the structure of logistics management which is apparently high cost and the low efficiency since 1990. But a previous EDI is insufficient in process ability. Bemuse it costs for the purchasing and maintenance of the expensive communication devices which is operated on the VAN environment. A web based EDI operating on an open network environment is needed to improve these problems and to handle transaction efficiently among many and unauthorized personals. Therefore, this study is willing to present a new web based model of the pull process which extracts the data when the receiver is needed to improve the push process which is transmitting data unilaterally.
- Published
- 2008
- Full Text
- View/download PDF
14. Design, analysis, and implementation of an agent driven pull-based distributed video-on-demand system
- Author
-
Hun Yen Kwoon, Ho Chin Chow, Goh Kar Whee, See Ying Lai, Long Chen, Lim Peng Hian, and Bharadwaj Veeravalli
- Subjects
Data retrieval ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Distributed computing ,Server ,Fast Ethernet ,Media Technology ,Load balancing (computing) ,Software architecture ,Software ,Pull technology - Abstract
The problem of employing multiple servers to serve a pool of clients on a network based multimedia service is addressed. We have designed and practically implemented a prototype system employing multiple servers to render a long duration movie to the customers. We have employed a multiple server retrieval strategy proposed in the literature [39] to realize this system. In the system, server coordination, client behavior and service facilities are completely controlled by an Agent based approach in which we have used the recent Jini technology. Several issues, ranging from data retrieval from individual server, behavior of the underlying network infrastructure, to client management and resource (client buffers) management, are considered in this implementation. We describe in detail our experiences in this complete design process of every module in the software architecture, its purpose, and working style. Further, the system is shown to be robust amidst unpredictable failures, i.e., in the event of server crashes. The load balancing capability is built-in as a safe guard measure to assure a continuous presentation. We present a comprehensive discussion on the software architecture to realize this working system and present our experiences. A system comprising a series of Pentium III PCs on a fast Ethernet network is built as a test-bed. Through this prototype, a wider scope of research challenges ahead are highlighted as possible extensions.
- Published
- 2006
- Full Text
- View/download PDF
15. [Untitled]
- Author
-
Stephen M. Bauer
- Subjects
Process (engineering) ,General Engineering ,Commercial law ,Field (computer science) ,Pull technology ,Rehabilitation engineering ,Engineering management ,Accounting ,Transfer (computing) ,Assistive technology ,Operations management ,Business ,Business and International Management ,Research center - Abstract
Technology transfer has generally had little impact on the assistive technology industries serving small, highly fragmented “disability markets.” Persons with disabilities often require specialized, relatively sophisticated technology. Third-party payer reimbursement rates and the low levels of disposable income among disability populations often cap product pricing. Transferring technology to these industry segments therefore poses special challenges. In October 1998, the Rehabilitation Engineering Research Center on Technology Transfer initiated the “Demand-Pull Project on Wheeled Mobility.” Successful transfers resulting from this project demonstrate that a systematic technology transfer process can be successfully applied to industries serving specialized and underserved niche markets.
- Published
- 2003
- Full Text
- View/download PDF
16. Push and Pull Planning and Control
- Author
-
Nigel Slack
- Subjects
Computer science ,Push and pull ,Operational planning ,Stimulus (physiology) ,human activities ,Simulation ,Pull technology - Abstract
“Push” and “pull” are terms commonly used in operational planning and control to indicate the direction of the stimulus in the system that causes materials to be moved and activities to be undertaken. Keywords: push; pull
- Published
- 2015
- Full Text
- View/download PDF
17. A Demonstration of Push/Pull Assembly Line
- Author
-
Salwa Ammar and Ronald Wright
- Subjects
Wright ,Computer science ,Push and pull ,Key (cryptography) ,Production (economics) ,Management Science and Operations Research ,Assembly line ,Push pull ,Manufacturing engineering ,Education ,Management Information Systems ,Variety (cybernetics) ,Pull technology - Abstract
In the introduction to operations management course, both at the MBA and undergraduate level, we use a variety of demonstrations and games to illustrate key concepts of production and operation (Ammar and Wright, 1999). One particular topic, which is the subject of this demonstration, is the difference between push and pull production. Although it is easy to describe the two systems of production, the benefits of the pull system are hard to motivate especially to undergraduate students with limited exposure to assembly line manufacturing. In our experience, an in-class demonstration of the two systems allows for a better discussion and ultimately a better understanding of the benefits. One very effective demonstration is the cups game designed by Peter Jackson (2). It illustrates clearly the difference between push and pull production and serves as a very stimulating vehicle for discussion of the relevant concepts.
- Published
- 2002
- Full Text
- View/download PDF
18. Utilizing Internet technologies to support learning: an empirical analysis
- Author
-
Mihir A. Parikh and Sameer Verma
- Subjects
User Friendly ,Multimedia ,Computer Networks and Communications ,business.industry ,Computer science ,Information technology ,Usability ,Library and Information Sciences ,computer.software_genre ,Pull technology ,World Wide Web ,Interactivity ,Push technology ,ComputingMilieux_COMPUTERSANDEDUCATION ,The Internet ,User interface ,business ,computer ,Information Systems - Abstract
The Internet has evolved into a universal platform to communicate and share information. It has profoundly impacted the way in which we organize, work, and learn. This paper proposes and evaluates a unifying framework that utilizes two Internet technologies, Web-based pull technology and push technology, in supporting classroom-based learning. We developed two fully operational education support systems based on the framework for two different types of courses. One system supports courses requiring extensive interactions, both communication and transfer of data files, among the course instructor, individual students, and student teams working on group projects. The other system supports courses requiring moderate interactions. One hundred and eighty-one students in eight classes across three semesters used and evaluated these systems. The study found that the systems supported learning by providing critical course information, study material, and assignments conveniently, timely, and in usable formats. The systems were user friendly and increased student productivity. The students were satisfied with the systems and found the systems useful. In addition, the study found that the system support for highly interactive courses was better than that for less interactive courses on all dimensions of system support.
- Published
- 2002
- Full Text
- View/download PDF
19. Conceptual framework of project actors’ information delivery system
- Author
-
Francis Tekyi Edum-Fotwe, Peter Demian, and Frank K. Dzokoto
- Subjects
Information capture ,Process management ,Conceptual framework ,Operations research ,Computer science ,Information system ,Product data management ,Decision-making ,Personally identifiable information ,Information overload ,Pull technology - Abstract
Research shows that a large proportion of project actors' working time is spent processing, communicating and disseminating information that is not relevant to their tasks. This makes Information Overload (IO) a liability that adversely affects project actors' performance and organisation management. Some advances have been achieved in structuring information resources to support actors' decision making process. However, it is not always possible to structure and direct the right information to the right actor at the right time. Some engineering companies have taken the initiative of resolving this problem by encouraging actors to employ personal information and product data management systems and other software applications. These information systems rely on pull technology which contribute towards time delay, inefficiency and cost in actors' information seeking process. This paper draws on Information Behaviour (IB) literature of engineering project actors to propose the SMART push information capture and delivery framework as a solution to 10, by freeing the actor from active information seeking process to focus on the task at hand.
- Published
- 2014
- Full Text
- View/download PDF
20. Performance analysis of a pull-based parallel video server
- Author
-
P.C. Wong and Jack Y. B. Lee
- Subjects
business.industry ,Computer science ,Real-time computing ,Video server ,Load balancing (computing) ,Video quality ,Scheduling (computing) ,Pull technology ,Client–server model ,Computational Theory and Mathematics ,Internet Authentication Service ,Server farm ,Hardware and Architecture ,Server ,Signal Processing ,Scalability ,Data striping ,business ,Computer network - Abstract
In conventional video-on-demand systems, video data are stored in a video server for delivery to multiple receivers over a communications network. The video server's hardware limits the maximum storage capacity as well as the maximum number of video sessions that can concurrently be delivered. Clearly, these limits will eventually be exceeded by the growing need for better video quality and larger user population. This paper studies a parallel video server architecture that exploits server parallelism to achieve incremental scalability. First, unlike data partition and replication, the architecture employs data striping at the server level to achieve fine-grain load balancing across multiple servers. Second, a client-pull service model is employed to eliminate the need for interserver synchronization. Third, an admission-scheduling algorithm is proposed to further control the instantaneous load at each server so that linear scalability can be achieved. This paper analyzes the performance of the architecture by deriving bounds for server service delay, client buffer requirement, prefetch delay, and scheduling delay. These performance metrics and design tradeoffs are further evaluated using numerical examples. Our results show that the proposed parallel video server architecture can be linearly scaled up to more concurrent users simply by adding more servers and redistributing the video data among the servers.
- Published
- 2000
- Full Text
- View/download PDF
21. Document management systems from current capabilities towards intelligent information retrieval: an overview
- Author
-
Hind Zantout and Farhi Marir
- Subjects
Information management ,Information retrieval ,Computer Networks and Communications ,Computer science ,business.industry ,Information technology ,Document management system ,Library and Information Sciences ,computer.software_genre ,Information overload ,Pull technology ,World Wide Web ,Request for information ,Workflow ,business ,computer ,Workflow management system ,Information Systems - Abstract
Documents circulating in paper form are increasingly being substituted by its electronic equivalent in the modern office today so that any stored document can be retrieved whenever needed later on. The office worker is already burdened with information overload, so effective and efficient retrieval facilities become an important factor affecting worker productivity. This paper first reviews the features of current document management systems with varying facilities to manage, store and retrieve either reference to documents or whole documents. Information retrieval databases, groupware products and workflow management systems are presented as developments to handle different needs, together with the underlying concepts of knowledge management. The two problems of worker finiteness and worker ignorance remain outstanding, as they are only partially addressed by the above-mentioned systems. The solution lies in a shift away from pull technology where the user has to actively initiate the request for information towards push technology, where available information is automatically delivered without user intervention. Intelligent information retrieval agents are presented as a solution together with a marketing scenario of how they can be introduced.
- Published
- 1999
- Full Text
- View/download PDF
22. Minimization of data download by G-Node dissemination method
- Author
-
S. Kalai Selvi and K. Dinakaran
- Subjects
Mobile identification number ,business.industry ,Computer science ,Push technology ,Mobile database ,Mobile computing ,Mobile search ,Mobile technology ,Mobile Web ,business ,Pull technology ,Computer network - Abstract
Mobile computing is one of the rapidly developing area. A survey says, nearly 6.8 billion people owns a mobile and it is quite common for an individual to own more than one and the rate of mobile internet users is also increased to 3.8 billion, so this developing technology makes us comfortable but the issue is, power consumption and latency. There can be many reasons for power consumption but most noted one is, while using mobile internet that too especially while downloading data from the server. In present pull technology (client-server method), total content of the page is retrieved, because of this, content to be downloaded from a particular page is additional than required if you need to retrieve specific content then the location step is needed, which is complicated to remember. This causes more consumption of energy in mobile. Latency is also a major setback faced in the present method. So we propose push technology. In push technology the data will be disseminated commonly and according to client query specific data will be retrieved from it and it is most preferably used for frequently updated data like news. We also define a structure called G-Node, that helps to overcome the structural overheads and help to process the twig pattern queries. To provide efficient query processing an encoding scheme called lineage encoding is used and in addition to that the data can be disseminated dynamically from the server side when needed without relying on third party repositories.
- Published
- 2014
- Full Text
- View/download PDF
23. Online database vendors:will they transform to pull technology?
- Author
-
P. A. van Brakel
- Subjects
World Wide Web ,Web browser ,Computer science ,Online search ,Online database ,Pull technology - Abstract
World-Wide Web-based search systems (or pull technology) stimulated large commercial database vendors to transfer to Web interfaces as well. Various reasons exist why Web-interfacing could be an asset to traditional online search systems, for example, using familiar Web browsers, implementing user-friendly Web sites, or lower search fees because of the unique features of client/server architecture. The differences between the content and retrieval procedures of search engines and database vendors emphasize the fact that vendors have to be extremely cautious when transferring to a Web interface. It seems possible that Web interfacing techniques and database vendors can soon become full partners in the pull technology environment. The purpose of the research was therefore to investigate and report on the trends currently noticeable among those online systems or databases embarking on full Web interfacing. Experienced online searchers, especially those who use front-end software to support their online search activities, seem dubious about the fact that Web interfaces can provide the same search sophistication level as obtained via traditional dial-up searching. The basic features of front-end software were used to address the pros and cons of Web-based online searching. World-Wide Web-gebaseerde herwinningstelsels (sogenaamde pull technology ) het die wereld se groot kommersiele databasismakelaars gestimuleer om ook Web-koppelvlakke te begin gebruik. Verskeie redes kan aangevoer word waarom die Web-koppelvlak 'n bydrae tot die verbetering van intydse stelsels kan lewer, byvoorbeeld die gebruik van bekende Web- browsers , implementering van gebruikervriendelike Web-omgewings, of die verlaging van soekkoste weens die unieke eienskappe van klientlbediener-argitektuur. Die prominente verskille tussen die inhoud en herwinningswyses van soekenjins en databasismakeiaars beklemtoon die feit dat makelaars uiters versigtig sal moet wees wanneer oorbeweeg word na die benutting van die Web-koppelvlak. Dit lyk egter moontlik dat Web-koppelvlaktegnieke en databasismakelaars binnekort ten volle en as deel van pull technology sal kan integreer. Die doel van hierdie navorsing was om vas te stel in watter mate databasismakelaars reeds van Web-koppelvlakke gebruik maak. Ervare gebruikers van intydse stelsels, veral diegene wat tussengangerprogrammatuur be nut, twyfel tans of die vermelde Web-koppelvlakke dieselfde vlak van herwinning sal kan bereik as via die tradisionale direkte lynkoppeling. Die basiese eienskappe van tussengangerprogrammatuur is in die artikel gebruik om die voor- en nadele van Web-gebaseerde intydse herwinning te oorweeg.
- Published
- 2014
- Full Text
- View/download PDF
24. Research for Network Fault Real-time Alarm System Based on Pushlet
- Author
-
Min Huang and Lizhe Zhu
- Subjects
Network management ,business.industry ,Computer science ,Distributed computing ,Push technology ,FCAPS ,Network monitoring ,business ,Network management station ,Fault management ,Pull technology ,Network management application ,Computer network - Abstract
Network fault real-time alarm system as part of network fault management, is responsible for collecting and storing the fault information, then distribute the fault information to administrator. In process of alarm information distribution, network management system need to implement a real-time data transfer mode, which is a server push technology. The traditional work model of HTTP is a pull technology. This model is characterized by client making request and server-side response. With the fast development of HTTP, asynchronous transfer and TCP persistent connection have bean widely used in the web Application. But these technologies for real-time transmission of information have still many problems and disadvantages. In this article network fault real-time alarm system combines pushlet framework with CORBA technology, to implement a server push model based web. Compared with other technologies, it has advantages of better adaptability, versatility, and security.
- Published
- 2012
- Full Text
- View/download PDF
25. Intelligent Acquisition Modeling Based on Intelligent Information Push-Pull Technology
- Author
-
Tu Xuyan, Wang Hong-bo, and Zeng Guangping
- Subjects
Order (exchange) ,Computer science ,Human–computer interaction ,Push technology ,Key (cryptography) ,Intelligent decision support system ,Agent architecture ,Push pull ,Task (project management) ,Pull technology - Abstract
Due to distribution and internal complexity of the issue, one of the key problems in Multi-Agents Communication. Sub-Acquisition need to communicate, so that they can mutually exchange information, or coordination or collaboration to complete tasks in order to achieve the purpose of solving. The introduction of Intelligent information push and pull technology can improve the intelligence level of network and database. It can find a fundamental solution to the problems encountered during these technology applications. The main advantages of Information Pull technology are: better targeted, light source task. Its shortcomings are as follows: poor timeliness.It require the user to have a certain expertise. In order to solve these Pull technology problems, information push technology has come into being.
- Published
- 2012
- Full Text
- View/download PDF
26. Technology Push Integrated Product Team: Stage-gating Innovation for the Future
- Author
-
Edgar Hibsman, Roberta M. Ewart, and Earnetta Cotton
- Subjects
Engineering ,Process management ,Knowledge management ,Technology push ,Cost effectiveness ,business.industry ,Innovation management ,Milestone (project management) ,Technology readiness level ,Integrated product team ,business ,Management process ,Pull technology - Abstract
Many government technology initiatives experience challenges which disrupt an orderly, expeditious and cost-effective path into operational benefits, payoffs and strategic advantages. These strategic advantages are evident in the military as well as competitive industry positions. Requirements pull technology initiatives generally avoid major disruptions in the technology readiness level (TRL) maturation because they are already positioned and sponsored for specific implementation in well defined missions and programs. In the specific programmatic environments, professional career and program incentives are focused on the delivery of a contractual product on/below budget and on/earlier than schedule. The Technology Push candidates typically originate with an innovative but unproven concept which, if proved out, could benefit one or more product/mission areas with enhanced mission performance, cost effectiveness and tactical/strategic advantages. Generally Tech Push initiatives are not driven by specific mission schedules but by various competitive funding solicitation schedules. If a deadline is missed, one usually has to wait for the next annual cycle and opportunity. This results in the loss of intellectual momentum, key personnel turnover, and mismatch with current program upgrade opportunities. This results in a “valley of death” program delay before a subsequent TRL development opportunity is exploited. To streamline the management process of processing, funding, sponsoring and finally implementing innovation to overcome this “valley of death”, the Air Force Space and Missile Center (SMC) together with the support of their parent Air Force Space Command (AFSPC) organization, has implemented a straightforward management process. This process is also consistent with and supportive of the Air Force and DARPA Stage Gating management approach, which supplements the TRL metrics with a management process milestone concept. The pilot test of this process has already proven itself successful. This paper will describe this process, the initial results and expected benefits.
- Published
- 2011
- Full Text
- View/download PDF
27. Market pull and market push
- Author
-
Clive Loughlin
- Subjects
Control and Systems Engineering ,Market pull ,Business ,Industrial and Manufacturing Engineering ,Industrial organization ,Computer Science Applications ,Pull technology - Published
- 2011
- Full Text
- View/download PDF
28. Research for real time information transfer scheme based on HTTP persistent connection
- Author
-
Min Huang, Huiyong Wang, and Jingyang Wang
- Subjects
Web server ,Computer science ,business.industry ,Network monitoring ,computer.software_genre ,Pull technology ,Network management ,Common Object Request Broker Architecture ,Push technology ,Web service ,business ,computer ,Computer network - Abstract
The traditional work model of HTTP is a pull technology. This model is characterized by client making request and server-side response. But In some cases this pull model can not meet the requirements of data transferring between client and server, such as monitoring and controlling system, instant messaging system. These systems need to implement a real-time data transfer mode, which is a push technology. With the fast development of HTTP, asynchronous transfer and TCP persistent connection have bean widely used in the web application. But these technologies for real-time transmission of information have still many problems and disadvantages. In this paper, using the technology of persistent connection based on HTTP to implement a scheme of real time information transfer, and using this scheme in an application of network management based on CORBA. This scheme implements a new web services based on CORBA and push technology. Compared with other technologies, it has advantages of better adaptability, versatility, and security.
- Published
- 2010
- Full Text
- View/download PDF
29. Managing Technology Push and Market Pull within Pre-Product Development
- Author
-
Michael Erner, Christopher Schläffer, Peter Möckel, and Heinrich Arnold
- Subjects
Process management ,Order (exchange) ,Computer science ,Technology push ,business.industry ,Modularity (biology) ,Manufacturing ,New product development ,Innovation management ,Enterprise architecture ,business ,Pull technology - Abstract
Modularization is one approach taken from the manufacturing industries and applied to the early stages of new product development in order to be able to react and adapt to a fast changing and heterogeneous environment of market, competition, and company internal interfaces. With many of the telecommunication service innovations consisting of software, where modularity is common practice, the extension of modularity to the earlier stages of innovation is a logical next step. This concept helps define an interdisciplinary meta-language as an important ingredient in practically combining the forces of innovation (technology push and market pull).
- Published
- 2010
- Full Text
- View/download PDF
30. Trajectory Prediction and Data Filtering for Mobile Networks
- Author
-
Hari Satish Kumar Gondela, V.N.S. Surendhra, Kaja Uday Kumar, Kota Theja Srianirudh, and Pradeep Reddy
- Subjects
Mobile radio ,business.industry ,Wireless network ,Computer science ,Server ,Push technology ,Mobile computing ,Resource management ,Mobile telephony ,business ,Computer network ,Pull technology - Abstract
In today’s modern world people use to move from one place to another regularly. So there is a need for a mechanism which gives mobile user the necessary information about the new location. The proposed project implements two such mechanisms known as Pull technology and Push technology. The project proposes a trajectory prediction which estimates the users futures movement based on the information of the past movements of the user. Mobility prediction algorithm comprises of three modules. The system can allocate the resources to the most probable cell with the prediction module instead of allocating excessive resources blindly to the neighboring cells of the user. Also recommends a filtering mechanism, which avoids the unwanted data to be sent to the user by the server. We propose two mechanisms for the filtering of data.
- Published
- 2009
- Full Text
- View/download PDF
31. Composition dynamique d'Interfaces Homme-Machine : Besoin utilisateur ou Défi de chercheur ?
- Author
-
Gaëlle Calvary, Yoann Gabillon, Humbert Fiorino, Nadine Mandran, IIHM, MAGMA, Laboratoire d'Informatique de Grenoble (LIG), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF), Ingénierie de l’Interaction Homme-Machine (IIHM), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS), and Modélisation d’agents autonomes en univers multi-agents (MAGMA)
- Subjects
Ubiquitous computing ,Multimedia ,business.industry ,Computer science ,Context (language use) ,computer.software_genre ,Qualitative survey ,Task (project management) ,Pull technology ,Software ,Human–computer interaction ,[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC] ,User interface ,business ,Composition (language) ,computer - Abstract
Grenoble; National audience; En ingénierie traditionnelle de l'interaction homme-machine, le contexte d'usage () et la tâche de l'utilisateur () sont supposés connus à la conception. En informatique ambiante où le contexte d'usage devient variable, l'objectif de l'utilisateur peut émerger opportu-nément. Dès lors, il devient nécessaire de composer dy-namiquement des Interfaces Homme-Machine (IHM) aptes à répondre à l'objectif de l'utilisateur dans le con-texte d'usage courant. Cet article relate une étude terrain visant à cerner la pertinence du sujet du point de vue des utilisateurs. L'étude comporte une enquête qualitative menée auprès de 26 personnes et 3 groupes de discus-sion impliquant chacun une dizaine de sujets. Si l'étude mérite d'être élargie, elle apporte déjà des éclairages in-téressants pour orienter les développements.
- Published
- 2009
32. Monitoring Web Resources Discovery by Reusing Classification Knowledge
- Author
-
Yang Sok Kim and Byeong Ho Kang
- Subjects
medicine.medical_specialty ,Information retrieval ,Web search query ,Computer science ,computer.software_genre ,Pull technology ,World Wide Web ,Web query classification ,Web page ,medicine ,Web navigation ,Web service ,Web intelligence ,computer ,Web modeling - Abstract
Any automated client pull systems, such as web monitoring systems, Web services, or RSS systems, require resources that publish relevant information. These resources may be discovered manually, but this is not ideal. Public search engines may be used to find these resources by submitting appropriate queries. In the previous re- search, we proposed a search query formulation method that reuses MCRDR (Multiple Classification Ripple-Down Rules) classification knowledge bases. However, all search results may not relevant web resources, because they may not resources, but web pages linked from the candidate resources. Therefore, it is necessary to develop methods that locate candidate monitoring web resources from search results. This pa- per summarizes heuristics that were obtained user study, which will be used in this automated resource location process.
- Published
- 2009
- Full Text
- View/download PDF
33. A New Web Services Model Based on CORBA and Push Technology in Network Management System
- Author
-
Min Huang, Xiaohong Wang, Huiyong Wang, Jingyang Wang, and Liwei Guo
- Subjects
Web server ,Computer science ,business.industry ,Network monitoring ,computer.software_genre ,System monitoring ,Network management application ,Pull technology ,Network management ,Push technology ,Operating system ,business ,computer ,Network management station ,Computer network - Abstract
Because the traditional network management model based on Web and CORBA which adopts pull technology can not obtain info actively and in time, this paper put forward a new Web services model based on CORBA and push technology in network management system, which combines information push technology with CORBA notification service. This model changes the passive status of server and implements network management in an active style. It can push the trap information to manager actively through the TCP connection established when logging in. Compared with the traditional Web and CORBA based network management model, it has advantages of high efficiency, low time delay, and can save network bandwidth and CPU time. Furthermore, it is important for the manager to acquire alarm information in time.
- Published
- 2008
- Full Text
- View/download PDF
34. Vulnerability and Configuration Management
- Author
-
Steve W. Manzuik, André Gold, and Chris Gatford
- Subjects
Engineering ,business.industry ,Process (engineering) ,Vulnerability ,Vulnerability management ,Computer security ,computer.software_genre ,Pull technology ,Configuration Management (ITSM) ,Vulnerability assessment ,Push technology ,business ,computer ,Change control - Abstract
This chapter focuses on the process of remediating vulnerabilities. Dealing effectively with vulnerabilities in today's networks includes not only managing and dealing with the vulnerability process itself, but also integrating the previous approach toward vulnerability assessment (leveraging scanners to discovery vulnerabilities) into the correlative frameworks and processes of patch management, configuration management, and change control. Patching a system is as much an art as it is a science. Patches can be software or hardware related, and the results of one patch can often affect the operation of both the primary and secondary functions of another patch. One of the most crucial components of a vulnerability management framework lies in the establishment of a patch management program. Patches can be deployed in several ways, such as Push technology, Pull technology, and Sneakernet. The principles behind configuration management are very similar to those of patch management. All patch installations and configuration change should comply with the existing change control procedures.
- Published
- 2006
- Full Text
- View/download PDF
35. Offshoring: from pull to push
- Author
-
Chris Gentle
- Subjects
History ,Offshoring ,Business ,Industrial organization ,Computer Science Applications ,Education ,Pull technology - Published
- 2004
- Full Text
- View/download PDF
36. Video delivery in networks with fluctuating bandwidth
- Author
-
Donald M. Monro and B.G. Heath
- Subjects
Mobile radio ,business.industry ,Wireless network ,Computer science ,Real-time computing ,Visual communication ,The Internet ,Network performance ,Client ,Latency (engineering) ,business ,Pull technology ,Computer network - Abstract
A 'client pull' mechanism is described by which applications can reliably transmit point-point video over a network with time varying bit rate. The system is particularly useful using Internet delivery over wireless networks, and is suitable for carrying live video. The problem is considered at the application level, using protocols such as TCP which will guarantee data delivery, however slowly. At a fixed image quality, the client requests frames which the server codes on demand. Latency can be overcome by the client using recent network performance to predict the time at which a frame should be requested.
- Published
- 2004
- Full Text
- View/download PDF
37. Defining the technical and scientific 'information package of the future'
- Author
-
W. Peter and A. Bigman
- Subjects
business.industry ,Computer science ,Backward chaining ,Hypermedia ,Data science ,Open system (systems theory) ,Usage data ,law.invention ,Pull technology ,World Wide Web ,law ,Electronic publishing ,User interface ,business ,Technology forecasting - Abstract
The first major divergence from conventional publishing will be the emphasis on the article as the core content of the information package, not the journal. It may be the primary citable source. The second change will be a complete digital path for all publishing functions, from receipt of the content through final distribution. The cycle time from acceptance to publication will be measured in hours, not days weeks or months. The third change will be an open system for hypertext linking across titles, regardless of publisher, that will allow for forward and backward chaining; therefore the article will allow for bidirectional information linking. The fourth innovation will be the use of either push or pull technology that will enable the researcher to define the information package that is desired from a number of sources. The fifth significant change will be the ability of publishers to receive usage data to redefine the information package, e.g., content design, links and accessibility in real time.
- Published
- 2002
- Full Text
- View/download PDF
38. Data in your space [wireless access]
- Author
-
Ayse Yasemin Seydim, A. Al-Mogren, Margaret H. Dunham, and Vijay Kumar
- Subjects
Wireless site survey ,Data access ,Wi-Fi array ,Computer science ,business.industry ,Wireless network ,business ,CAPWAP ,Wireless LAN controller ,Computer network ,Wireless distribution system ,Pull technology - Abstract
The wireless world of the future will disseminate data through both push and pull technologies. In this paper, we propose an architecture which facilitates global wireless access to data using both push and pull techniques. By combining these techniques on the wireless channels, a more efficient and effective data access paradigm is developed.
- Published
- 2002
- Full Text
- View/download PDF
39. Digital Representation: Racism on the World Wide Web
- Author
-
Indhu Rajagopal
- Subjects
Computer Networks and Communications ,business.industry ,media_common.quotation_subject ,Internet privacy ,Censorship ,Rhetorical modes ,Advertising ,Representation (arts) ,Racism ,GeneralLiterature_MISCELLANEOUS ,Pull technology ,Human-Computer Interaction ,Power (social and political) ,World Wide Web ,Political science ,The Internet ,business ,Dissemination ,ComputingMilieux_MISCELLANEOUS ,media_common - Abstract
This paper argues that the various rhetorical modes in which hate is expressed on the Web are tailored to the types of messages offered. The unique technologies of the Web, that differentiate it from the earlier media of communication, facilitate the various rhetorical modes. The Web, as an unregulated medium, fosters the worldwide dissemination of both 'actionable' and 'non-actionable' hate messages. The actionable hate messages, regardless of their intensity and potential to excite violent actions, are not legally restricted through any international censorship regulations; the power of restricting such messages is national, if such messages counter national laws and conventions. The questions explored here are: Does the Internet and the Web facilitate the spreading of hate messages? Should Internet hate materials be regulated? If so, how might that be done? What criteria should be used to differentiate between hate and non-hate materials? Is it possible to draw and enforce a line between hate and non-hate messages? What input would measures against hate messages have on the Internet culture itself?
- Published
- 2002
- Full Text
- View/download PDF
40. Web Recency Maintenance Protocol
- Author
-
S. V. Raghavan and K. Satya Sai Prakash
- Subjects
Web server ,business.industry ,Computer science ,computer.software_genre ,Pull technology ,World Wide Web ,Search engine ,Formal specification ,The Internet ,Roaming ,business ,computer ,Protocol (object-oriented programming) ,Information explosion - Abstract
In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, by employing search bots to collect the data from WWW. Pull technology can no longer cater to the growing user base and the information explosion on the web. In view of the gigantic structure and dynamic nature of the WWW, it is impractical to maintain the currency using this technology. This practical limitation makes SEs yield stale results. WRMP ensures the real time update by initiating an update agent as and when the server is modified or updated. The availability of high processing speed enables the SE to maintain the currency of the whole WWW in real time. This protocol cuts down the unwarranted roaming of the search bots and takes the real purpose of the web server establishment i.e. reach the public over Internet as the motivating factor. This protocol gives an additional advantage to the SE by enabling it to prioritize the Web sites based on the change frequency. We have given a formal specification for the protocol and an M/M/1 model based analysis.
- Published
- 2002
- Full Text
- View/download PDF
41. Knowledge pull required
- Author
-
Jürgen Kluge, Susanne Hauschild, Alexandra Bendler, Jens Elzenheimer, Uwe Heckert, Jan Krönig, André Stoffels, Wolfram Stein, and Thomas Licht
- Subjects
Cupboard ,business.industry ,Cultural context ,Recipe ,Openness to experience ,Public relations ,business ,Nature versus nurture ,Reciprocal ,Pull technology ,Project manager - Abstract
Many companies we visited had already tried to introduce knowledge management programs, and at times these efforts were quite substantial. But despite management commitment and healthy budgets, these programs often floundered or failed. In each case something was missing. A vital ingredient of the knowledge management recipe had not just been left in the cupboard; it was not even on the shopping list. All these companies lacked the right cultural context that would create and nurture reciprocal trust, openness and cooperation.
- Published
- 2001
- Full Text
- View/download PDF
42. The premise and promise of a Global Information Infrastructure
- Author
-
Christine L. Borgman
- Subjects
Knowledge management ,Computer Networks and Communications ,business.industry ,Computer science ,Information seeking ,National Information Infrastructure ,Information access ,Information technology ,Pull technology ,Human-Computer Interaction ,World Wide Web ,Push technology ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Information infrastructure ,Information society ,business - Abstract
This article represents the first chapter of From Gutenberg to the Global Information Infrastructure: Access to Information on the Networked World.
- Published
- 2000
43. PERFORMANCE EVALUATION OF PUSH AND PULL PARADIGMS IN FLEXIBLE AUTOMATION
- Author
-
MengChu Zhou and Kurapati Venkatesh
- Subjects
Computer science ,business.industry ,Push and pull ,business ,Automation ,Manufacturing engineering ,Pull technology - Published
- 1999
- Full Text
- View/download PDF
44. An admission control framework for applications with variable consumption rates in client-pull architectures
- Author
-
Karl Aberer, Silvia Hollfelder, and Publica
- Subjects
Earliest deadline first scheduling ,business.industry ,Computer science ,Distributed computing ,Quality of service ,Admission control ,business ,Computer network ,Pull technology ,Scheduling (computing) - Abstract
Highly interactive multimedia applications require variable data rates during their presentation. Current admission control mechanisms do not address the variable data rate requirements appropriately for the following reasons: (1) classical admission control mechanisms are based on the server-push approach, where the required data rate has to be estimated in advance, and (2) worst-case resource reservation is not economic. Client-pull models are more appropriate to serve these kinds of applications. At the current state, there are no suitable mechanisms that support admission control in client-pull architectures at the server. In this paper, a session-oriented framework for admission control is introduced that is based on two steps: (1) the admission of new clients and (2) the scheduling of the single requests of admitted clients to balance the load. The goal of this approach is to improve the server utilization and the Quality of Service. Evaluation studies demonstrate the benefit of the framework.
- Published
- 1998
45. Multi-Retailer Systems: Pull or Push Strategy?
- Author
-
Erik van der Sluis
- Subjects
Schedule ,Variable (computer science) ,Operations research ,Computer science ,Order (business) ,Depot ,Holding cost ,Fixed cost ,Discount points ,Pull technology - Abstract
We consider stochastic multi-retailer systems under periodic review. Retailers are replenished by a central depot which in turn places orders at an outside supplier. Both retailers and depot incur fixed cost for placing order and holding cost for each unit stocked at the end of a period. Two rolling horizon procedures based on a pull or a push approach are examined. In the former retailers replenish independently and the decisions at the depot are based on the expected order schedule of the retailers. In the latter all replenishment decisions are taken simultaneously with the depot ordering either at constant intervals or at variable intervals. The objective of this paper is to point out which approach performs best in a stochastic system.
- Published
- 1994
- Full Text
- View/download PDF
46. Time to pull together
- Author
-
Paul Vaughan
- Subjects
Credit card ,Direct debit ,Applied Mathematics ,Library science ,Business ,Permission ,Cheque ,Pull technology - Abstract
MA Healthcare Ltd, St Jude’s Church, Dulwich Road, Herne Hill, London SE24 0PB (Tel: 020 7738 5454) © MA Healthcare 2011 All rights reserved. No part of the British Journal of Healthcare Assistants may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise, withut prior permission of the Publisher Printed by Pensord Press Ltd, Blackwood, Gwent. NP12 2YA ISSN 1753 -1586 wwww.healthcare-assistants.co.uk UK Personal Quarterly Direct Debit £20 Annual Direct Debit £75 Cheque or credit card £82
- Published
- 2011
- Full Text
- View/download PDF
47. 575: 'To Pull or Not to Pull' that Is the Question
- Author
-
A. Kabeer and D. Mathur
- Subjects
Anesthesiology and Pain Medicine ,business.industry ,Mechanical engineering ,Medicine ,General Medicine ,business ,Pull technology - Published
- 2008
- Full Text
- View/download PDF
48. Orscheln World Class® Push/Pull Cable
- Author
-
David Webb and Mike DeWitt
- Subjects
Engineering ,business.industry ,Electrical engineering ,business ,Push pull ,Pull technology ,World class - Published
- 1990
- Full Text
- View/download PDF
49. The 'Pull Test'
- Author
-
Robert M. Goldwyn
- Subjects
business.industry ,Medicine ,Surgery ,Structural engineering ,business ,Pull technology ,Test (assessment) - Published
- 1998
- Full Text
- View/download PDF
50. Push and pull of base flipping
- Author
-
Samuel H. Wilson and Thomas A. Kunkel
- Subjects
DNA metabolism ,Multidisciplinary ,business.industry ,DNA repair ,DNA glycosylase ,Chemistry ,Uracil-DNA glycosylase ,Push and pull ,Base (geometry) ,Substrate specificity ,Structural engineering ,business ,Pull technology - Published
- 1996
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.