E-service providers usually encrypt each E-service message to prevent unauthorized receivers from reading the content and they change the encryption keys periodically for security...
We analyze the service times of customers in a stable M/M/1 queue in equilibrium depending on their position in a busy period. We give the law of the service of a customer at the b...
In our problem we are given a set of customers, their positions on the plane and their demands. Geometrically, the area covered by a directional antenna with parameters , ,
Piotr Berman, Jieun K. Jeong, Shiva Prasad Kasivis...
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
5 In the probabilistic traveling salesman problem (PTSP), customers require a visit with a given probability, and the best solution is the tour through all customers with the lowe...
We study a problem faced by a major beverage producer. The company produces and distributes several brands to various customers from its regional distributors. For some of these b...
Resources including various assets of supply chains, face random demand over time and can be shared by others. We consider an operational setting where a resource is shared by two...
With customer relationship management (CRM) companies move away from a mainly product-centered view to a customer-centered view. Resulting from this change, the effective manageme...
We report in this paper measurements from France Telecom commercial networks carrying traffic generated and received by ADSL and FTTH customers. By adopting a flowbased approach to...
Fabrice Guillemin, Catherine Rosenberg, Long Le, G...
In most physical queueing applications, customers join a queue and move forward after each service, leaving room for others to join behind them. Some queues found in material hand...