Author of the publication

Mining shopping behavior in the Taiwan luxury products market.

, , , and . Expert Syst. Appl., 39 (12): 11257-11268 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avoiding Collisions Between IEEE 802.11 and IEEE 802.15.4 Using Coexistence Inter-Frame Space., , , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 1185-1193. Springer, (2013)Modeling and Performance Analysis of Route-Over and Mesh-Under Routing Schemes in 6LoWPAN., , , , , and . SMC, page 3802-3806. IEEE, (2013)Mining shopping behavior in the Taiwan luxury products market., , , and . Expert Syst. Appl., 39 (12): 11257-11268 (2012)Identifying Smuggling Vessels with Artificial Neural Network and Logistics Regression in Criminal Intelligence Using Vessels Smuggling Case Data., , , and . ACIIDS (2), volume 7197 of Lecture Notes in Computer Science, page 539-548. Springer, (2012)Web Text Clustering with Dynamic Themes., , , and . WISM (2), volume 6988 of Lecture Notes in Computer Science, page 122-130. Springer, (2011)A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN., , , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 1205-1213. Springer, (2013)