Institution
Indian Institute of Management Calcutta
Education•Kolkata, India•
About: Indian Institute of Management Calcutta is a education organization based out in Kolkata, India. It is known for research contribution in the topics: Supply chain & Emerging markets. The organization has 415 authors who have published 1354 publications receiving 21725 citations. The organization is also known as: IIMC & IIM Calcutta.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The results from the analytical model show that the mafia offer increases the profits of both the producer and the retailer in a deteriorating items' supply chain.
Abstract: Mafia offer is an unbelievably good offer that a company makes to its customers; the attractiveness of the offer makes it impossible for the customers to decline the offer and difficult for the com...
9 citations
••
TL;DR: Data Envelopment Analysis is integrated with DEA to generate local weights of alternatives from pair-wise comparison of judgment matrix used in the AHP for a three attribute system for measuring performance of personnel at entry level of managerial hierarchy.
Abstract: The manpower in an organization constitutes an important and essential asset. Competent personnel endowed with individual academic and managerial strengths in specific disciplines and personal capabilities, who can undertake a variety of marketing or research assignments, are needed in any organization as they substantially credit to its performance. Development of rational techniques for capability assessment during recruitment of personnel is therefore vital. The techniques that are normally employed for decision making in identification of performance attributes including their weight assignments include techniques like Delphi and decision matrix, Analytic Hierarchy Process (AHP) etc. AHP converts qualitative opinion of experts into quantified values and generates a decision matrix. In this paper, we have integrated Data Envelopment Analysis (DEA) to generate local weights of alternatives from pair-wise comparison of judgment matrix used in the AHP for a three attribute system for measuring performance of personnel at entry level of managerial hierarchy. Multiple expert judgments have been considered for weight determination of the attributes. Thus, DEAHP (i.e., combined DEA-AHP approach) has been proposed in this paper as an alternative to the traditional methods of weight derivation in AHP.
9 citations
••
04 Jan 2015TL;DR: This proposed protocol adapts PRoPHET for post disaster group encounter based routing and enhances it by incorporating certain security elements into it to provide full security against possible attacks by malicious nodes in the network.
Abstract: In this paper, we propose SAGE-PRoPHET, a security enhanced PRoPHET routing protocol that enables secure dissemination of post disaster situational messages using history of group encounters. Post disaster rescue and relief operations are essentially group based, where volunteers and rescue workers, belonging to different rescue groups, relay situational information relevant to their group to their respective relief camps, in multiple hops on a peer-to-peer basis. Now, it is evidently better to route situational information, destined for a relief camp of a particular group, through volunteers of that group or who has a history of encountering volunteers of that group frequently. Such history of encounters based routing resembles the PRoPHET routing protocol for delay tolerant networks that forwards messages intended to a particular receiver through those nodes that encounter that receiver frequently. However, to use PRoPHET for such group based routing of group specific messages the protocol needs to be tuned to use history of group encounters rather than individual encounters. On the other hand, PRoPHET assumes that nodes in the network are trusted and cooperate towards message forwarding. Such assumption turns out inaccurate in presence of malicious nodes that may severely impede the delivery, accuracy and timeliness of situational messages. Therefore, integrating proper security components with PRoPHET is extremely important. Our proposed protocol adapts PRoPHET for post disaster group encounter based routing and enhances it by incorporating certain security elements into it to provide full security against possible attacks by malicious nodes in the network. Simulation results show that our proposed protocol, in a disaster scenario, offers better performance in comparison to other well known routing protocols.
9 citations
••
05 Mar 2007TL;DR: A scheme SECURE_IP, which relies on the application of cryptographic principles and the watermarking techniques to provide both direct and indirect IP protection in VLSI physical design, makes unauthorized disclosure of a valuable design infeasible during its transmission, and can easily detect any alteration of the design file during transmission.
Abstract: The emerging trend of design reuse in VLSI circuits poses the threat of theft and misappropriation of intellectual property (IP) of the design. Protection of design IP is a matter of prime concern today. We propose a scheme SECURE_IP, which tackles the problem from an entirely new viewpoint. It relies on the application of cryptographic principles and the watermarking techniques to provide both direct and indirect IP protection in VLSI physical design. It makes unauthorized disclosure of a valuable design infeasible during its transmission, and can easily detect any alteration of the design file during transmission. The proposed scheme ensures authentication of the original designer as well as non-repudiation between the designer (seller) and the buyer. Illegal reselling can be efficiently detected by the proposed scheme. The algorithm SECURE_IP is tested on random and MCNC benchmark instances, and the experimental results are quite encouraging
9 citations
••
01 Jul 1988TL;DR: In this paper, Chakraborty compared the two theories and sketches the similarities and differences between them and found that Guna theory is more comprehensive in its scope than Transactional Analysis, and is therefore able to explain better, both the industry's impact on environment, and the aggravated negative tendencies in our society.
Abstract: A good theory of social interaction is fundamental to individual, organizational and societal well-being and progress. Transactional Analysis, the psychology of human relationships, is such a theory that is immensely popular in management literature. Guna Dynamics is an Indian psycho-philosophical theory of human conduct and behaviour that has retained its logical appeal over thousands of years. Yet, rigorous study and application of Guna theory to management is grossly neglected. S K Chakraborty compares the two theories and sketches the similarities and differences between them. He finds that Guna theory is more comprehensive in its scope than Transactional Analysis, and is, therefore, able to explain better, both the industry's impact on environment, and the aggravated negative tendencies in our society. He proposes a synthesis of the two theories for more effective handling of human-relationships.
9 citations
Authors
Showing all 426 results
Name | H-index | Papers | Citations |
---|---|---|---|
Russell W. Belk | 76 | 351 | 39909 |
Vishal Gupta | 47 | 387 | 9974 |
Sankaran Venkataraman | 32 | 75 | 19911 |
Subrata Mitra | 32 | 219 | 3332 |
Eiji Oki | 32 | 588 | 5995 |
Indranil Bose | 30 | 97 | 3629 |
Pradip K. Srimani | 30 | 268 | 2889 |
Rahul Mukerjee | 30 | 206 | 3507 |
Ruby Roy Dholakia | 29 | 102 | 5158 |
Per Skålén | 25 | 57 | 2763 |
Somprakash Bandyopadhyay | 23 | 111 | 1764 |
Debashis Saha | 22 | 181 | 2615 |
Haritha Saranga | 19 | 42 | 1523 |
Janat Shah | 19 | 52 | 1767 |
Rohit Varman | 18 | 46 | 1387 |