Sciweavers

507 search results - page 69 / 102
» Defensive Marketing Strategies
Sort
View
ICPR
2008
IEEE
14 years 11 months ago
How to make iris recognition easier?
Iris recognition is regarded as the most reliable biometrics and has been widely applied in both public and personal security areas. However users have to highly cooperate with th...
Tieniu Tan, Wenbo Dong, Zhenan Sun
IAT
2009
IEEE
14 years 4 months ago
Extending Alternating-Offers Bargaining in One-to-Many and Many-to-Many Settings
Automating negotiations in markets where multiple buyers and sellers operate is a scientific challenge of extraordinary importance. One-to-one negotiations are classically studie...
Bo An, Nicola Gatti, Victor R. Lesser
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 4 months ago
Do Next Generation Networks Need Path Diversity?
—We have currently reached a phase where big shifts in the network traffic might impose to rethink the design of current architectures, and where new technologies, being pushed ...
Luca Muscariello, Diego Perino, Dario Rossi
DEEC
2007
IEEE
14 years 4 months ago
BestChoice SRM: a simple and practical supplier relationship management system for e-procurement
Supplier relationship management (SRM) is an important contributor to a company’s efficiency and credibility. Although several ways are used to provide SRM functionality, these a...
Dongjoo Lee, Seungseok Kang, Sangkeun Lee, Young-g...
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 4 months ago
Modeling Network Decisions under Uncertainty: Countervailing Externalities and Embedded Options
The analysis of externalities in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, ...
Robert J. Kauffman, Ajay Kumar