* Harvard University, Cambridge, Massachusetts, USA
Mar ’08 "Quality, competition and optimal financing of a venture enterprise
in information entropy backdrop"
– We delve into an integrative analysis of how absolution and relativity of product quality relate to the competition
that an entrepreneur grapples with. Owing to the bearing of enterprise financing on both quality and competition, the toggling
of optimality levels of financing are portrayed and understood in terms of cost returns of quality. A basic though lethal
assumption that is often contracted is the homogeneity of business information between a venture capitalist and an entrepreneur,
which is never the case. We analyze mathematically the concept of information entropy that establishes the financial orientations
in an entrepreneurial ecosystem.
* Persuasive Technology Laboratory, Stanford University, California
Apr ’07 "Conflation
of Service-Orientation and Persuasiveness - A Study based on Influence and Trust"
– In this talk I explore how persuasion operates in a service-oriented environment or more lucidly put, Service-Oriented
Architecture (SOA). I put forth a model based on the four key forces – influence, persuasiveness, trust and trustworthiness.
I also discuss an informal mathematical model to understand the dependencies that function between a service provider and
the end user and how persuasion based on influence depends on inherent factors in this environment. Since the service details
are hidden to the user, achieving persuasion in this system is indeed a very interesting phenomenon.
* Massachusetts Institute of Technology (MIT), Cambridge
Oct ’06 "XML Based Authorization with Provisional Authorization and
Temporal Certification"
– In this presentation I discussed a model called ProTemp-Z that synthesizes the notions of provisional authorization
and temporal certifications, resulting in a system that is powerful enough to enforce security based on a well-defined set
of provisions and also based on the temporal coordinates of data. The temporal orientation of this model also accounts for
the safeguard of security of dynamically changing data, which is of great value.
|