You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Handbook is a comprehensive research reference that is essential for anyone interested in conducting research in supply chain. Unique features include: -A focus on the intersection of quantitative supply chain analysis and E-Business, -Unlike other edited volumes in the supply chain area, this is a handbook rather than a collection of research papers. Each chapter was written by one or more leading researchers in the area. These authors were invited on the basis of their scholarly expertise and unique insights in a particular sub-area, -As much attention is given to looking back as to looking forward. Most chapters discuss at length future research needs and research directions from both theoretical and practical perspectives, -Most chapters describe in detail the quantitative models used for analysis and the theoretical underpinnings; many examples and case studies are provided to demonstrate how the models and the theoretical insights are relevant to real situations, -Coverage of most state-of-the-art business practices in supply chain management.
This book constitutes the refereed proceedings of the 8th International Workshop on Internet and Network Economics, WINE 2012, held in Liverpool, UK, in December 2012. The 36 revised full papers and 13 revised short papers presented together with the abstracts of 3 papers about work in progress and 3 invited talks were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on algorithmic game theory; algorithmic mechanism design; auction algorithms and analysis; computational advertising; computational aspects of equilibria; computational social choice; convergence and learning in games; coalitions, coordination and collective action; economics aspects of security and privacy; economics aspects of distributed and network computing; information and attention economics; network games; price differentiation and price dynamics; social networks.
The 8th Annual Financial Cryptography Conference was held during 9-12 February 2004 in Key West, Florida, USA. The conference was organized by the - international Financial Cryptography Association (IFCA). The program committee, which comprised 25 members, reviewed 78 submissions, of which only 17 were accepted for presentation at the conference. This year's conference differed somewhat from those of previous years in its consideration of papers devoted to implementation, rather than purely conceptual research; one of these submissions was presented at the conference. This represented a movement in the conference toward practical problems and real-world perspectives as a complement to more t...
In very short time, peer-to-peer computing has evolved from an attractive new paradigm into an exciting and vibrant research field bringing together researchers from systems, networking, and theory. This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Peer-to-Peer Systems, IPTPS 2003, held in Berkeley, CA, USA in February 2003. The 27 revised papers presented together with an introductory summary of the discussions at the workshop were carefully selected during two rounds of reviewing and revision from initially 166 submissions. The papers are organized in topical sections on experience with P2P; theory and algorithms, P2P in a broader perspective; incentive and fairness; new DHT designs; naming, indexing, and searching; file sharing; and networking and applications.
This volume contains the papers presented at the International Workshop on Internet and Network Economics held during December 17–20, 2008, in Sha- hai, China, for its fourth edition. WINE 2008 provided a forum for researchers from di?erent disciplines to communicate with each other and exchange their researching ?ndings in this emerging ?eld. WINE 2008hadteninvitedspeakers:FanChungGraham,MatthewJackson, Lawrence Lau, Tom Luo, Eric Maskin, Paul Milgrom, Christos Papadimitriou, Herbert Scarf, Hal Varian and Yinyu Ye. There were 126 submissions. Each submission was reviewed on average by 2. 5 Programme Committee members. The Committee decided to accept 68 papers. The programme also included ...
The ubiquitous challenge of learning and decision-making from rank data arises in situations where intelligent systems collect preference and behavior data from humans, learn from the data, and then use the data to help humans make efficient, effective, and timely decisions. Often, such data are represented by rankings. This book surveys some recent progress toward addressing the challenge from the considerations of statistics, computation, and socio-economics. We will cover classical statistical models for rank data, including random utility models, distance-based models, and mixture models. We will discuss and compare classical and state-of-the-art algorithms, such as algorithms based on M...
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23–26, 2009. Financial Cryptography and Data Security (FC) is a well-established int- national forum for research, advanced development, education, exploration and debate regarding information assurance in the context of ?nance and commerce. The conference covers all aspects of securing transactions and systems. The goal of FC is to bring security and cryptography researchers and pr- titioners together with economists, bankers, and policy makers. This year, we assembled a vibrant program featuring 21 peer-reviewe...
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing
Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abstract market models defined by configurations of auctions and traders. Techniques for addressing these choices constitute essential building blocks for the design of trading strategies for rich market applications. The lecture assumes no prior background in game theory or auction theory, or artificial intelligence. Table of Contents: Introduction / Example: Bidding on eBay / Auction Fundamentals / Continuous Double Auctions / Interdependent Markets / Conclusion
WINE 2005, the First Workshop on Internet and Network Economics (WINE 2005), took place in Hong Kong, China, December 15-17, 2005. The symposium aims to provide a forum for researchers working in Internet and Network Economic algorithms from all over the world. The final count of electronic submissions was 372, of which 108 were accepted. It consists of the main program of 31 papers, of which the submitter email accounts are: 10 from edu (USA) accounts, 3 from hk (Hong Kong), 2 each from il (Isreal), cn (China), ch (Switzerland), de (Germany), jp (Japan), gr (Greece), 1 each from hp. com, sohu. com, pl (Poland), fr (France), ca (Canada), and in (India). In addition, 77 papers from 20 countri...