• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 111
  • 65
  • 48
  • 41
  • 18
  • 16
  • 14
  • 10
  • 10
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 391
  • 50
  • 45
  • 41
  • 34
  • 32
  • 32
  • 29
  • 28
  • 25
  • 25
  • 25
  • 24
  • 24
  • 23
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Dependency verification for electronic data interchange with binary decision diagrams

Schwake, Gregor January 2001 (has links)
No description available.
12

Regulation of related party transactions of financial institutions in China /

Sui, Ping. January 2009 (has links) (PDF)
Thesis (JSD)--City University of Hong Kong, 2009. / "Submitted to School of Law for the degree of Doctor of Juridical Science." Includes bibliographical references (leaves 337-358)
13

Generic Transaction Message Interface for Operations of Communication Networks

Byrne, Charles J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 13-16, 1986 / Riviera Hotel, Las Vegas, Nevada / Transaction messages are those which control action at a remote point. They are used in communication networks for such functions as surveillance of alarms, performance monitoring, administration of data bases and tests of leased circuits. Generic interface requirements permit full compatibility of a wide range of telecommunications equipment with common operations systems. The specifications cover all aspects of the interface, from connectors to messages. Existing commercial standards are used where appropriate, including those of the Open System Interconnection (OSI) model. This paper covers the methods used to define the requirements and reports on the status of work in various standards groups.
14

Corporate governance, connected transactions and firm valuation

Lei, C. H., Adrian., 李卓雄. January 2005 (has links)
published_or_final_version / abstract / Economics and Finance / Doctoral / Doctor of Philosophy
15

Secure Applications for Financial Environments (<em>SAFE) S</em>ystem

Zhang, Feng January 2010 (has links)
<p>One of the main trends in the IT field today is to provide more mobility to existing IT based systems and users. With this trend, more and more people are using mobile financial transactions due to a widespread proliferation of mobile phones and wireless technologies. One of the most important concerns with such transactions is their security. The reasons are based on weaknesses of wireless protocols and additional requirements for handling of financial data. These aspects make mobile financial transactions and applications even more vulnerable to fraud and illegal use than similar transactions performed over fixed networks.</p><p> </p><p>There are two important aspects related to security in mobile environments. First, security features provided by the communication protocols, such as GSM, SMS, Bluetooth, Mobile Internet, etc. are not adequate. Some security algorithms used by these protocols have even been broken, what requires upper layer applications to provide comprehensive protection in order to compensate the shortcomings of a transportation layer. Second, mobile devices have limited capabilities, limited processing speed, limited storage, etc, so that many security mechanisms are not suitable for mobile environments. Therefore, new, effective, lightweight and flexible security solutions are required.</p><p> </p><p>In order to solve these two groups of security issues, in this research we created a service-oriented security infrastructure for mobile financial transactions and applications. Based on this infrastructure, we also designed and implemented a system, which is called <em>SAFE</em> (Secure Applications for Financial Environment), that represents a secure, convenient and reliable large–scale infrastructure for mobile financial transactions. The components of the system are Secure Mobile Wallet and three <em>SAFE</em> servers: Communications (Gateway) Server, IDMS (Identity Management System) Server, and Payment Server. Those core infrastructure components with secure messages exchanged between them provide a number of secure financial services. These services may be used for various types of mobile transactions: m–Banking, m–Commerce, m–Ticketing, m-Parking, m–Loans, etc. all supported by additional Application Services Provider servers, connected to the <em>SAFE</em> security system. This report gives the details of the concept design and current implementation of the <em>SAFE</em> system.</p> / QC20100608 / Secure Applications for Financial Environments (SAFE) Project
16

Corporate Sale-and-Leaseback Transactions: An Examination of Corporate Incentives, Wealth Effects and Dealer Spreads

Gordon, Bruce L. (Bruce Lee) 08 1900 (has links)
There is a limited amount of research dealing with the wealth effects of sale-and-leaseback transactions, but previous research has focused predominantly on the tax effects of these transactions. The results of these studies have often been in conflict with one another. This dissertation shows that tax effects do play a role in determining the wealth effect of sale-and-leasebacks on stockholders, but there exists a framework of finance research that suggests several other factors could play a determining role as well.
17

Serializable Isolation for Snapshot Databases

Cahill, Michael James January 2009 (has links)
PhD / Many popular database management systems implement a multiversion concurrency control algorithm called snapshot isolation rather than providing full serializability based on locking. There are well-known anomalies permitted by snapshot isolation that can lead to violations of data consistency by interleaving transactions that would maintain consistency if run serially. Until now, the only way to prevent these anomalies was to modify the applications by introducing explicit locking or artificial update conflicts, following careful analysis of conflicts between all pairs of transactions. This thesis describes a modification to the concurrency control algorithm of a database management system that automatically detects and prevents snapshot isolation anomalies at runtime for arbitrary applications, thus providing serializable isolation. The new algorithm preserves the properties that make snapshot isolation attractive, including that readers do not block writers and vice versa. An implementation of the algorithm in a relational database management system is described, along with a benchmark and performance study, showing that the throughput approaches that of snapshot isolation in most cases.
18

Towards a Better Definition of Transactions

Kerns, Barbara S. 01 December 1980 (has links)
This paper builds on a technical report written by Carl Hewitt and Henry Baker called "Actors and Continuous Functionals". What is called a "goal-oriented activity" in that paper will be referred to in this paper as a "transaction". The word "transaction" brings to mind an object closer in function to what we wish to present than does the word "activity". This memo, therefore, presents the definitions of a reply and a transaction as given in Hewitt and Baker's paper and points out some discrepancies in their definitions. That is, that the properties of transactions and replies as they were defined did not correspond with our intuitions, and thus the definitions should be changed. The issues of what should constitute a transaction are discussed, and a new definition is presented which eliminates the discrepancies caused by the original definitions. Some properties of the newly defined transactions are discussed, and it is shown that the results of Hewitt and Baker's paper still hold given the new definitions.
19

Corporate governance, connected transactions and firm valuation

Lei, C. H., Adrian. January 2005 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
20

The effect of uncertainty on the choice of agricultural transaction modes: a case study on the broiler contracts of the Charoen Pokphand Enterprise (Taiwan) Co.

Chu, Hui-Ming 07 September 2004 (has links)
The transaction of agricultural products, which take place in the local farmers¡¦ market, has a variety of modes. According to Oliver. E Williamson (1991), the characteristics of transactions differ from incentives intensity, administrative control, and performance attributes. Based upon the foregoing, agricultural transaction modes in the local farmers¡¦ market distinctions into three kinds: (1) market mode (2) hybrid mode, and (3) hierarchy mode. The purpose of this study is attempting to abstract the crucial dimension of agricultural transactions for organizing some transactions this way and other transactions another. The overall objectives of this study can be said to be threefold: (1) To investigate and collect literatures about the agricultural transaction modes which are presently most popular in Taiwan. (2) To identify and distinguish these transactions into market mode, hybrid mode, and hierarchy mode as suggested by Williamson. (3) As an exploratory study, to suggest uncertainty as the crucial dimension of agricultural transactions alternatives, to demonstrate why and how uncertainty rule on the selection decision. The results from this study suggest that: (1) When the uncertainty of agricultural transactions is high, hierarchy mode appears to be feasible relatively. (2) When the uncertainty is low, market mode appears to be feasible relatively. (3) When the uncertainty is in an intermediate situation, hybrid mode appears to be feasible relatively. A case study of the broiler contracts of the Charoen Pokphand Enterprise (Taiwan) Co. shows that the relationship between feasible contract mode and uncertainty of transaction is consistent with theoretical expectation.

Page generated in 0.1211 seconds