Sciweavers

507 search results - page 65 / 102
» Defensive Marketing Strategies
Sort
View
SIGCOMM
2009
ACM
14 years 4 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
HICSS
2008
IEEE
150views Biometrics» more  HICSS 2008»
14 years 4 months ago
Quantitative Early-Phase User Research Methods: Hard Data for Initial Product Design
We describe questions that commonly arise in early-phase user research for new technology products concerning customer needs, priorities, and market definition. We suggest that me...
Christopher N. Chapman, Edwin Love, James L. Alfor...
AMINING
2003
Springer
293views Data Mining» more  AMINING 2003»
14 years 2 months ago
Data Mining Oriented CRM Systems Based on MUSASHI: C-MUSASHI
Abstract. MUSASHI is a set of commands which enables us to efficiently execute various types of data manipulations in a flexible manner, mainly aiming at data processing of huge a...
Katsutoshi Yada, Yukinobu Hamuro, Naoki Katoh, Tak...
HICSS
2000
IEEE
129views Biometrics» more  HICSS 2000»
14 years 2 months ago
Customer Delivered Value in a Web-based Supermarket
This paper explores the marketing of daily consumer goods in a pilot Web-based supermarket, in which no regular customers existed from among 65 registered ones at the end of the p...
Helena Ahola, Harri Oinas-Kukkonen, Timo Koivum&au...
GECCO
2010
Springer
220views Optimization» more  GECCO 2010»
14 years 1 months ago
Interday foreign exchange trading using linear genetic programming
Foreign exchange (forex) market trading using evolutionary algorithms is an active and controversial area of research. We investigate the use of a linear genetic programming (LGP)...
Garnett Carl Wilson, Wolfgang Banzhaf