Skip to main content
For uniform traffic, ATM switches employing shared buffering have lower cell loss probability and better buffer utilization than other buffering strategies. However, the performance of shared-buffer switches degrades dramatically under... more
    • by  and +1
    • Computer Networks
    • by 
    • Computer Networks
    • by 
    • E-Commerce
Online trading environments such as business-to-business (B2B) e-commerce enable companies to tender projects and/or to procure goods with low costs and rapid responses. Agent-based architectures are an effective platform for such... more
    • by 
    • E-Commerce
Collaborative writing through wikis has become increasingly popular in recent years. When users contribute to a wiki article they implicitly establish a co-authorship relationship. Discovering these relationships can be of value, for... more
    • by 
    •   2  
      AnalysisCollaborative Writing
A double agents-based model in a make-to-order supply chain (MTOSC), called Collaborative Single Machine Earliest/Tardiness model (CSET model) is proposed. It integrates Pareto-optimal method with Just-in-Time principle (JIT) into two... more
    • by 
    • E-Commerce
Most of the electronic commerce businesses have to address the same issues such as the four core business activities namely Attract, Interact, Act and React. The success of an E-Commerce business hinges on how competent the personnel who... more
    • by 
    • E-Commerce
Supply chains have evolved to web-applications that tap on the power of internet to expand their networks online. Recently some research attention is focused on make-to-order supply chain formation where orders are scheduled to be... more
    • by 
    • Supply Chain Management
This paper presents a knowledge empowered automated negotiation system for buyer-centric multi-bilateral multi-attribute e-Procurement. We propose two knowledge empowered models namely KERM and KACM. KERM is used for the buyer to... more
    • by 
    • E-Commerce
In an effort to compose an optimal supply chain (SC), this paper tries to bring forward a new collaborative agent-based single machine earliness/tardiness (SET) model. It includes the sub-agents, which are designed for fairly coordinating... more
    • by 
    • Supply Chain Management
Recent studies show that the number of mobile devices has already exceeded the number of personal computers. Contradictorily, the commerce conducted via the mobile devices ("M-Commerce") is far less than that of internet ("E-Commerce").... more
    • by 
    • Mobile Commerce
Steam data are continuous and ubiquitous in nature which can be found in many Web applications operating on Internet. Some instances of stream data are web logs, online users' click-streams, online media streaming and Web transaction... more
    • by 
    • Data Mining
    • by 
    • Data Mining
Business Intelligence (BI) capitalized on datamining and analytics techniques for discovering trends and reacting to events with quick decisions. We argued that a new breed of data-mining, namely stream-mining where continuous data... more
    • by 
    • Data Mining
Security in physical environments has become increasingly important in the wake of terror and criminal activity, particularly over the past decade. One of the challenges is to identify activities that may not be outright illegal or... more
    • by 
    •   8  
      Servant LeadershipApplied ResearchInformation SharingDefining Requirements & Measures
This paper discusses about how business intelligence on a website could be obtained from users' access records instead of web logs of "hits". Users' access records are captured by implementing an Access-Control (AC) architectural model on... more
    • by 
    • Data Mining
Wikis, best represented by the popular and highly successful Wikipedia system, have established themselves as important components of a collaboration infrastructure. We suggest that the complex network of user-contributors in... more
    • by 
    •   11  
      Information ScienceDigital EcosystemsComplex NetworksAnalysis
    • by 
    •   7  
      CryptographyAuthenticationProtocolsPayment System
Shared-buffer switches have many advantages such as relatively low cell loss rate and good buffer utilization, and they are increasingly favoured in recent VLSI switch designs for ATM. However, their performance degrades dramatically... more
    • by 
    • Computer Networks
The emerging technology in mobile devices presents new business potential to Internet enterprises. These devices enable users to access the Internet at any time in any location. Based on the infrastructure of the existing e-commerce... more
    • by 
    • Mobile Commerce