Author of the publication

General Framework of Chain Store Information System base on Supply Chain Management Theory.

, and . Computer and Information Science, 1 (4): 150-154 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of the Suitability of NB-IoT Technology for ORM in Smart Grids., , and . EuCNC, page 418-423. IEEE, (2018)A Framework for Unique Ring Signatures., and . IACR Cryptology ePrint Archive, (2012)Bits Security of the CDH Problems over Finite Fields., , and . IACR Cryptology ePrint Archive, (2014)PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion., , , and . IACR Cryptology ePrint Archive, (2018)An Efficient Version on a New Improved Method of Tangent Hyperbolas., , , and . LSMS (1), volume 4688 of Lecture Notes in Computer Science, page 205-214. Springer, (2007)The Security of Ciphertext Stealing., , and . FSE, volume 7549 of Lecture Notes in Computer Science, page 180-195. Springer, (2012)Adjoint code generator., , , and . Sci. China Ser. F Inf. Sci., 52 (6): 926-941 (2009)On the Origins and Variations of Blockchain Technologies., , , and . IEEE Secur. Priv., 17 (1): 72-77 (2019)An interior point trust region method for nonnegative matrix factorization., , and . Neurocomputing, (2012)Multi-hop multi-AP multi-channel cooperation for high efficiency WLAN., , , , and . PIMRC, page 1-7. IEEE, (2016)