Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise Information Systems Security: A Case Study in the Banking Sector., , , and . CONFENIS, volume 139 of Lecture Notes in Business Information Processing, page 206-214. Springer, (2012)Finding the K shortest paths in a schedule-based transit network., , , and . Comput. Oper. Res., 39 (8): 1812-1826 (2012)Enhancing consumer engagement in e-commerce live streaming via relational bonds., and . Internet Res., 30 (3): 1019-1041 (2020)Electronic markets in emerging markets., , and . Electron. Mark., 29 (2): 151-152 (2019)A genetic algorithm approach to solving the anti-covering location problem.. Expert Syst. J. Knowl. Eng., 23 (5): 251-257 (2006)A small business inventory DSS: Design development, and implementation issues., , and . Comput. Oper. Res., 23 (1): 63-72 (1996)On a class of branching problems in broadcasting and distribution., , , and . Comput. Oper. Res., 39 (8): 1793-1799 (2012)Complex service design: A virtual enterprise architecture for logistics service., , and . Inf. Syst. Frontiers, 10 (5): 503-518 (2008)IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks., , , and . IEEE Access, (2018)Success factors and complex dynamics of crowdfunding: An empirical research on Taobao platform in China., , , , , and . Electron. Mark., 29 (2): 187-199 (2019)