Author of the publication

Applications of real option analysis to vendor selection process in IT outsourcing.

, , and . IJISCM, 4 (2): 143-155 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking., , and . Inf. Manag., 51 (2): 225-239 (2014)Agent-mediated architecture for reputation-based electronic tourism systems: A neural network approach., and . Inf. Manag., 43 (5): 598-606 (2006)TPD: Travel Prediction-based Data Forwarding for light-traffic vehicular networks., , , , , , , , and . Comput. Networks, (2015)Forecasting medical cost inflation rates: A model comparison approach., , and . Decis. Support Syst., 53 (1): 154-160 (2012)Correlation-Aware Traffic Consolidation for Power Optimization of Data Center Networks., , , , and . IEEE Trans. Parallel Distributed Syst., 27 (4): 992-1006 (2016)Total Variation Image De-noising Bases on the Improved Sobel Operator., and . J. Multim., 8 (4): 410-417 (2013)Alleviating the bullwhip effect in supply chain management using the multi-agent approach: an empirical study., and . Int. J. Comput. Appl. Technol., 31 (3/4): 225-237 (2008)kBF: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems., , , , , , , and . IEEE Trans. Cloud Comput., 5 (1): 85-98 (2017)Achieving location error tolerant barrier coverage for wireless sensor networks., , , , , and . Comput. Networks, (2017)New Emoji Requests from Twitter Users: When, Where, Why, and What We Can Do About Them., , , , and . ACM Trans. Soc. Comput., 3 (2): 8:1-8:25 (2020)