Author of the publication

Buyer's Bankruptcy Risk, Sourcing Strategy, and Firm Value: Evidence from the Supplier Protection Act.

, , and . Manag. Sci., 68 (11): 7940-7957 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zonotopic Set-Membership State Estimation for Discrete-Time Descriptor LPV Systems., , , and . IEEE Trans. Automat. Contr., 64 (5): 2092-2099 (2019)Gaussian-Process-Based Demand Forecasting for Predictive Control of Drinking Water Networks., , , and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 69-80. Springer, (2014)Privacy-Preserving Adversarial Networks., , and . CoRR, (2017)Delayed Sequential Coding of Correlated Sources, , and . CoRR, (2007)On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases, , and . CoRR, (2013)Robust fault detection and isolation based on finite-frequency H-/ H∞ unknown input observers and zonotopic threshold analysis., , and . IEEE CAA J. Autom. Sinica, 6 (3): 750-759 (2019)Information-Theoretically Secure Three-Party Computation with One Active Adversary, , and . CoRR, (2012)Secure Two-Party Sampling Primitives are either Useless or Complete., , and . CoRR, (2014)Singing voice detection using twice-iterated composite Fourier transform., , , and . ICME, page 1347-1350. IEEE Computer Society, (2004)On unconditionally secure multiparty computation for realizing correlated equilibria in games., , and . GlobalSIP, page 241-244. IEEE, (2013)