Sciweavers

507 search results - page 73 / 102
» Defensive Marketing Strategies
Sort
View
IOR
2008
96views more  IOR 2008»
13 years 9 months ago
Competition for Procurement Contracts with Service Guarantees
We consider a market with two suppliers and a set of buyers in search of procurement contracts with one of the suppliers. In particular, each buyer needs to process a certain volu...
Fernando Bernstein, Francis de Véricourt
KES
2008
Springer
13 years 9 months ago
EasyLife: A Location-Aware Service Oriented Mobile Information System
Many examples of Location-aware services have been developed in recent years as the enabling technologies mature. However, these services frequently exist in isolation and address ...
J. M. Shen, Michael J. O'Grady, Gregory M. P. O'Ha...
AMC
2005
143views more  AMC 2005»
13 years 9 months ago
Investment with restricted stock and the value of information
In most public companies in China, there are two thirds of shares that cannot be traded freely in the secondary market. These illiquid shares, however, may be allowed to circulate...
Weixing Wu, Yongxiang Wang
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
14 years 2 months ago
The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role
: This research note both confirms and extends the value relevance of information technology announcements found by Im et al (2001) and Dos Santos et al. (1993). We extend their wo...
Vernon J. Richardson, Robert W. Zmud
AUSDM
2008
Springer
274views Data Mining» more  AUSDM 2008»
13 years 11 months ago
Identifying Stock Similarity Based on Multi-event Episodes
Predicting stock market movements is always difficult. Investors try to guess a stock's behavior, but it often backfires. Thumb rules and intuition seems to be the major indi...
Abhi Dattasharma, Praveen Kumar Tripathi, Sridhar ...