Author of the publication

Analyzing manufacturer and the insurance-based risk mitigation policy with equipment service contracting.

, , , , and . Enterprise IS, 12 (10): 1359-1381 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A semantic similarity analysis of Internet of Things., , , , and . Enterprise IS, 12 (7): 820-855 (2018)A case study on multimedia e-tailing services: can watermarks help build customer relationships?, , , , and . Int. J. Serv. Technol. Manag., 14 (1): 58-76 (2010)Integrating Internet of Things and multi-temperature delivery planning for perishable food E-commerce logistics: a model and application., , , , and . Int. J. Prod. Res., 59 (5): 1534-1556 (2021)Chaotic species based particle swarm optimization algorithms and its application in PCB components detection., , , , and . Expert Syst. Appl., 39 (16): 12501-12511 (2012)A Robust PAST-Based ESPRIT Algorithm With Variable Forgetting Factor and Regularization for Frequencies/Harmonics Estimation in Impulsive Noise., , and . IEEE Trans. Instrum. Meas., (2022)Application of virtual reality (VR) technology for medical practitioners in type and screen (T&S) training., , , , , and . J. Comput. Assist. Learn., 37 (2): 359-369 (2021)Changing Digital Age in the Wake of COVID-19: How Does Humility Impact on Virtual Leaderless Teams?, , , and . J. Glob. Inf. Manag., 30 (4): 1-23 (2022)B2C or O2O? The strategic implications for the fresh produce supply chain based on blockchain technology., , , and . Comput. Ind. Eng., (September 2023)Customer Loyalty Enhancement of Online-to-Offline Marketing in Beauty Industry., , , , , and . ES, page 51-59. IEEE Computer Society, (2016)Applying Chaotic Particle Swarm Optimization to the Template Matching Problem., , , , and . ISICA, volume 5821 of Lecture Notes in Computer Science, page 411-421. Springer, (2009)