首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到5条相似文献,搜索用时 3 毫秒
1.
过程系统管理与技术的综合集成   总被引:9,自引:1,他引:8  
在激烈的市场竞争中,过程企业不仅要重视技术、更要加强管理,实现全局优化运行。提高过程企业的市场竞争能力必须全面综合集成人、组织、战略管理、经营管理、过程管理及信息自动化技术等因素。本文以石化企业为背景,对过程企业面临的问题及发展趋势进行了分析,并且对过程企业管理模式、过程企业的体系结构以及过程集成与优化技术进行了探讨。  相似文献   

2.
游静  刘伟 《中国管理科学》2008,16(1):142-146
针对信息系统集成项目中知识域动态变动性对知识扩散有效性的影响,构建知识域变动形态模型,对模型进行演算得到知识域变动影响下,扩散路径中相关知识域的实际变化形态,从而提出信息系统集成项目环境下适应知识域动态变动特征的知识扩散路径的时间序列优化策略,以帮助企业在信息系统集成项目中识别知识域变动形态、合理配置项目资源。最后介绍优化策略的应用案例。  相似文献   

3.
As a result of government budgetary limits and rapid market growth, many public service systems—such as health care—are characterized by extensive customer wait times that have become a serious problem. This problem might be solved by allowing private firms to enter these markets, which would provide customers with a choice between a free (governmental) public service provider (SP) and a fee‐charging (or “toll”) private SP. In such a two‐tier service system, the two SPs are differentiated by service quality and cost efficiency. This study focuses on the competition and coordination issues for two‐tier service systems with customers who are sensitive to both service quality and delay. The free system attempts to maximize its expected total customer utility with limited capacity, whereas the toll system attempts to maximize its profit. Neither goal is aligned with the social welfare goal of the public service. To achieve the social welfare goal, the government plays a crucial role in coordinating the two‐tier service system via the budget, the tradeoff of social members' goals, and tax‐subsidy policies. Using a mixed duopoly game, we establish Nash equilibrium strategies and identify the conditions for the existence of the two‐tier service system. We employ several interesting and counter‐intuitive managerial insights generated by the model to show that the public service can be delivered more efficiently via customer choice and SP competition. In addition, we show that a relatively low tax‐subsidy rate can almost perfectly coordinate the two SPs to achieve most of the maximum possible benefit of the two‐tier service system.  相似文献   

4.
We consider a service system with two types of customers. In such an environment, the servers can either be specialists (or dedicated) who serve a specific customer type, or generalists (or flexible) who serve either type of customers. Cross‐trained workers are more flexible and help reduce system delay, but also contribute to increased service costs and reduced service efficiency. Our objective is to provide insights into the choice of an optimal workforce mix of flexible and dedicated servers. We assume Poisson arrivals and exponential service times, and use matrix‐analytic methods to investigate the impact of various system parameters such as the number of servers, server utilization, and server efficiency on the choice of server mix. We develop guidelines for managers that would help them to decide whether they should be either at one of the extremes, i.e., total flexibility or total specialization, or some combination. If it is the latter, we offer an analytical tool to optimize the server mix.  相似文献   

5.
Empowered by virtualization technology, service requests from cloud users can be honored through creating and running virtual machines. Virtual machines established for different users may be allocated to the same physical server, making the cloud vulnerable to co‐residence attacks where a malicious attacker can steal a user's data through co‐residing their virtual machines on the same server. For protecting data against the theft, the data partition technique is applied to divide the user's data into multiple blocks with each being handled by a separate virtual machine. Moreover, early warning agents (EWAs) are deployed to possibly detect and prevent co‐residence attacks at a nascent stage. This article models and analyzes the attack success probability (complement of data security) in cloud systems subject to competing attack detection process (by EWAs) and data theft process (by co‐residence attackers). Based on the suggested probabilistic model, the optimal data partition and protection policy is determined with the objective of minimizing the user's cost subject to providing a desired level of data security. Examples are presented to illustrate effects of different model parameters (attack rate, number of cloud servers, number of data blocks, attack detection time, and data theft time distribution parameters) on the attack success probability and optimization solutions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号