scispace - formally typeset
Search or ask a question
Institution

Indian Institute of Management Calcutta

EducationKolkata, India
About: Indian Institute of Management Calcutta is a education organization based out in Kolkata, India. It is known for research contribution in the topics: Supply chain & Context (language use). The organization has 415 authors who have published 1354 publications receiving 21725 citations. The organization is also known as: IIMC & IIM Calcutta.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a prediction procedure based on a purely sequential sampling scheme is introduced, followed by a batch sequential scheme, and computational evidence is provided to demonstrate the efficiency of the latter procedure compared to the former one.
Abstract: Prediction using a multiple-regression model is addressed when the penalties for overpredicting and underpredicting the true future value are not equal. Such asymmetric penalty functions are appropriate in many practical situations. If one imposes some preassigned precision on the prediction procedure, it is shown that in the presence of nuisance parameters in the model, the sample size needed to achieve the fixed precision is unknown. Some adaptive multistage sampling techniques are discussed that offer solutions to this problem. A prediction procedure based on a purely sequential sampling scheme is introduced, followed by a batch sequential scheme. Finally, a real-life example is provided to illustrate the use of these procedures, and computational evidence is supplied to demonstrate the efficiency of the latter procedure compared to the former one.

10 citations

Journal ArticleDOI
TL;DR: The benefits of nuclear energy for power production and its allied applications on the one side and the risks posed on the other side have been a subject of constant debate as discussed by the authors. But the benefits and risks posed by nuclear energy as a safe source of energy have been constant debate.
Abstract: Nuclear energy as a safe source of energy has been a subject of constant debate. The benefits of nuclear energy for power production and its allied applications on the one side and the risks posed ...

10 citations

Book ChapterDOI
TL;DR: The chapter discusses its functional properties, especially the engineering of its major components, and their interactions, and identifies the existing protocols and middlewares that have already shown the required potential to fit into this model and suggest requirements to turn PerCom into a “technology that disappears.”
Abstract: Pervasive Computing (PerCom) is “omni-computing.” It is “all-pervasive” by combining open ubiquitous applications with everyday activities. In the vision of PerCom, the environment is saturated with a host of computing and communication capabilities which are gracefully integrated with daily life so that user will be able to interact with a smart environment from everywhere using a seemingly invisible infrastructure of various wireline and/or wireless networks and communication/computing devices. Beginning with a sketch of the evolutionary path for this new paradigm of computing, the chapter discusses its functional properties, especially the engineering of its major components, and their interactions. This helps us identify the existing protocols and middlewares that have already shown the required potential to fit into this model and suggest requirements that they must meet to turn PerCom into a “technology that disappears.” For the ease in understanding, it is argued that PerCom is about four things: pervasive devices, pervasive applications (PerApp), pervasive middlewares (PerWare), and pervasive networks (PerNet). First, it concerns the way people view mobile/static computing and/or communication devices, and use them within their environments to perform tasks. Second, it concerns the way applications are automatically created and deployed to enable such tasks to be performed. Third, it concerns the intelligent environment, which comprises interface between the applications and the network. Fourth, it concerns the underlying network that supports ubiquity and pervasiveness. A novel concept of using organic living entities as sensor nodes at the bottom layer of PerNet opens up a potential way to blend the physical world with the computing world. Later part of the chapter specifies the high level principles and structures that will guide this blending. Finally, it concludes with an overview of current research initiatives on PerCom, highlighting some common requirements for the intelligent environment that PerCom demands.

10 citations

Journal ArticleDOI
TL;DR: The authors examines the cultural experiences of subaltern migrants from Kerala, India to the Middle East, and draws upon the French pragmatic sociology with attention to convention theory to cast them in the same category.
Abstract: This study examines the cultural experiences of subaltern migrants from Kerala, India to the Middle East. It draws upon the French pragmatic sociology with attention to convention theory to cast in...

10 citations

Journal ArticleDOI
TL;DR: A model that identifies and assesses risk in an h-MANET deployed by a healthcare institution in a disaster-prone region a priori by modeling the possible routes a hacker might follow to compromise a target is proposed.
Abstract: Information security breaches are of major concern for healthcare mobile ad-hoc networks (h-MANETs). In this paper, we propose a model that identifies and assesses risk in an h-MANET deployed by a healthcare institution in a disaster-prone region a priori by modeling the possible routes a hacker might follow to compromise a target. Our model proposes a novel method to compute the transition probability of each hop in the h-MANET. Next, it employs Markov theory to compute the maximum and minimum number of hops required to compromise the target for a given source-target pair. It then determines the vulnerability for all the paths comprising minimum to maximum hops only for each pair by computing their overall transition probability. Finally, our model computes the risk associated with each of these paths. Based on the calculated risk level of each path, the management can recommend an appropriate risk mitigation strategy.

10 citations


Authors

Showing all 426 results

NameH-indexPapersCitations
Russell W. Belk7635139909
Vishal Gupta473879974
Sankaran Venkataraman327519911
Subrata Mitra322193332
Eiji Oki325885995
Indranil Bose30973629
Pradip K. Srimani302682889
Rahul Mukerjee302063507
Ruby Roy Dholakia291025158
Per Skålén25572763
Somprakash Bandyopadhyay231111764
Debashis Saha221812615
Haritha Saranga19421523
Janat Shah19521767
Rohit Varman18461387
Network Information
Related Institutions (5)
Copenhagen Business School
9.6K papers, 341.8K citations

84% related

Vienna University of Economics and Business
6.6K papers, 176.4K citations

84% related

University of Mannheim
12.9K papers, 446.5K citations

83% related

Athens University of Economics and Business
6.9K papers, 177.8K citations

83% related

Singapore Management University
8.3K papers, 239.6K citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20233
202216
202189
202080
201998
201873