scispace - formally typeset
Search or ask a question
Author

Vishal Gupta

Bio: Vishal Gupta is an academic researcher from University of Alabama. The author has contributed to research in topics: Medicine & Entrepreneurship. The author has an hindex of 47, co-authored 387 publications receiving 9974 citations. Previous affiliations of Vishal Gupta include Michigan State University & Indian Institute of Management Ahmedabad.


Papers
More filters
Proceedings ArticleDOI
08 Mar 2005
TL;DR: Measurements on an Atmel ATmega128L low-power microcontroller platform indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software.
Abstract: In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATmega128L low-power microcontroller indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.

846 citations

Journal ArticleDOI
TL;DR: In this article, the role of socially constructed gender stereotypes in entrepreneurship and their influence on men and women's entrepreneurial intentions was examined and found that those who perceived themselves as more similar to males (high on male gender identification) had higher entrepreneurial intentions than those who saw themselves as less similar to females (low male identification).
Abstract: In this study we examine the role of socially constructed gender stereotypes in entrepreneurship and their influence on men and women's entrepreneurial intentions. Data on characteristics of males, females, and entrepreneurs were collected from young adults in three countries. As hypothesized, entrepreneurs were perceived to have predominantly masculine characteristics. Additional results revealed that although both men and women perceive entrepreneurs to have characteristics similar to those of males (masculine gender-role stereotype), only women also perceived entrepreneurs and females as having similar characteristics (feminine gender-role stereotype). Further, though men and women did not differ in their entrepreneurial intentions, those who perceived themselves as more similar to males (high on male gender identification) had higher entrepreneurial intentions than those who saw themselves as less similar to males (low male gender identification). No such difference was found for people who saw themselves as more or less similar to females (female gender identification). The results were consistent across the three countries. Practical implications and directions for future research are discussed.

839 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide a comprehensive qualitative review and evaluation of the entrepreneurship orientation (EO) at the firm-level, focusing on the most widely accepted firm level constructs in the literature.
Abstract: Entrepreneurial orientation (EO) is one of the most widely accepted firm-level constructs in the literature. The present study provides a comprehensive qualitative review and evaluation of the empi...

570 citations

Proceedings ArticleDOI
26 Mar 2000
TL;DR: This paper explores the "freeze-TCP" mechanism which is a true end-to-end scheme and does not require the involvement of any intermediaries (such as base stations) for flow control and outlines a method which integrates the best attributes of freeze- TCP and some existing solutions.
Abstract: Optimizing TCP (transport layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require intermediaries (such as base stations) to monitor the TCP traffic and actively participate in flow control in order to enhance performance. Although these methods simulate end-to-end semantics, they do not comprise true end-to-end signaling. As a result, these techniques are not applicable when the IP payload is encrypted. For instance IPSEC, which is expected to be standard under IPv6, encrypts the entire IP payload making it impossible for intermediaries to monitor TCP traffic unless those entities are part of the security association. In addition, these schemes require changes (in the TCP/IP code) at intermediate nodes making it difficult for the mobile clients to inter-operate with the existing infrastructure. In this paper we explore the "freeze-TCP" mechanism which is a true end-to-end scheme and does not require the involvement of any intermediaries (such as base stations) for flow control. Furthermore, this scheme does not require any changes on the "sender side" or intermediate routers; changes in TCP code are restricted to the mobile client side, making it possible to fully inter-operate with the existing infrastructure. We then outline a method which integrates the best attributes of freeze-TCP and some existing solutions. Performance results highlight the importance of pro-active action/signaling by the mobile-host. The data indicate that in most cases, simply reacting to disconnections tends to yield lower performance than pro-active mechanisms such as freeze-TCP.

548 citations

Journal ArticleDOI
TL;DR: In this article, the authors used insights from the resource-based view and upper echelons perspective to introduce top management's transformational leadership behaviors as moderators in the EO-performance relationship.

333 citations


Cited by
More filters
01 Jan 2016
TL;DR: The using multivariate statistics is universally compatible with any devices to read, allowing you to get the most less latency time to download any of the authors' books like this one.
Abstract: Thank you for downloading using multivariate statistics. As you may know, people have look hundreds times for their favorite novels like this using multivariate statistics, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their laptop. using multivariate statistics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the using multivariate statistics is universally compatible with any devices to read.

14,604 citations

01 Jan 2002

9,314 citations

01 Jan 2020
TL;DR: Prolonged viral shedding provides the rationale for a strategy of isolation of infected patients and optimal antiviral interventions in the future.
Abstract: Summary Background Since December, 2019, Wuhan, China, has experienced an outbreak of coronavirus disease 2019 (COVID-19), caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Epidemiological and clinical characteristics of patients with COVID-19 have been reported but risk factors for mortality and a detailed clinical course of illness, including viral shedding, have not been well described. Methods In this retrospective, multicentre cohort study, we included all adult inpatients (≥18 years old) with laboratory-confirmed COVID-19 from Jinyintan Hospital and Wuhan Pulmonary Hospital (Wuhan, China) who had been discharged or had died by Jan 31, 2020. Demographic, clinical, treatment, and laboratory data, including serial samples for viral RNA detection, were extracted from electronic medical records and compared between survivors and non-survivors. We used univariable and multivariable logistic regression methods to explore the risk factors associated with in-hospital death. Findings 191 patients (135 from Jinyintan Hospital and 56 from Wuhan Pulmonary Hospital) were included in this study, of whom 137 were discharged and 54 died in hospital. 91 (48%) patients had a comorbidity, with hypertension being the most common (58 [30%] patients), followed by diabetes (36 [19%] patients) and coronary heart disease (15 [8%] patients). Multivariable regression showed increasing odds of in-hospital death associated with older age (odds ratio 1·10, 95% CI 1·03–1·17, per year increase; p=0·0043), higher Sequential Organ Failure Assessment (SOFA) score (5·65, 2·61–12·23; p Interpretation The potential risk factors of older age, high SOFA score, and d-dimer greater than 1 μg/mL could help clinicians to identify patients with poor prognosis at an early stage. Prolonged viral shedding provides the rationale for a strategy of isolation of infected patients and optimal antiviral interventions in the future. Funding Chinese Academy of Medical Sciences Innovation Fund for Medical Sciences; National Science Grant for Distinguished Young Scholars; National Key Research and Development Program of China; The Beijing Science and Technology Project; and Major Projects of National Science and Technology on New Drug Creation and Development.

4,408 citations

Book ChapterDOI
01 Jan 1998
TL;DR: The four Visegrad states (Poland, Czech Republic, Slovakia and Hungary) form a compact area between Germany and Austria in the west and the states of the former USSR in the east as discussed by the authors.
Abstract: The four Visegrad states — Poland, the Czech Republic, Slovakia (until 1993 Czechoslovakia) and Hungary — form a compact area between Germany and Austria in the west and the states of the former USSR in the east. They are bounded by the Baltic in the north and the Danube river in the south. They are cut by the Sudeten and Carpathian mountain ranges, which divide Poland off from the other states. Poland is an extension of the North European plain and like the latter is drained by rivers that flow from south to north west — the Oder, the Vlatava and the Elbe, the Vistula and the Bug. The Danube is the great exception, flowing from its source eastward, turning through two 90-degree turns to end up in the Black Sea, forming the barrier and often the political frontier between central Europe and the Balkans. Hungary to the east of the Danube is also an open plain. The region is historically and culturally part of western Europe, but its eastern Marches now represents a vital strategic zone between Germany and the core of the European Union to the west and the Russian zone to the east.

3,056 citations