Author of the publication

Analyzing Document-Duplication Effects on Policies for Browser and Proxy Caching.

, , and . INFORMS J. Comput., 18 (4): 506-522 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing the Versions of a Software Product Under Variable and Endogenous Demand., , , and . Inf. Syst. Res., 22 (1): 5-21 (2011)Incorporating Knowledge Building in Real Options Analysis of Technology Project Investment.. ICIS, page 268. Association for Information Systems, (2010)Needle exchange for controlling HIV spread under endogenous infectivity., , and . INFOR Inf. Syst. Oper. Res., 55 (2): 93-117 (2017)Analyzing Document-Duplication Effects on Policies for Browser and Proxy Caching., , and . INFORMS J. Comput., 18 (4): 506-522 (2006)Optimal Software Development: A Control Theoretic Approach., , and . Inf. Syst. Res., 16 (3): 292-306 (2005)When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security., , and . Inf. Syst. Res., 27 (4): 897-918 (2016)Business-to-Consumer Platform Strategy: How Vendor Certification Changes Platform and Seller Incentives., , , and . ACM Trans. Manag. Inf. Syst., 8 (2-3): 6:1-6:42 (2017)Information Security Investment with Different Information Types: A Two-Firm Analysis., , and . AMCIS, page 455. Association for Information Systems, (2005)Knowledge sharing and investment decisions in information security., , and . Decis. Support Syst., 52 (1): 95-107 (2011)Real Options and Software Upgrades: An Economic Analysis., , and . ICIS, page 66. Association for Information Systems, (2002)