-
1
-
-
23344436675
-
Information sharing and coordination in make-to-order supply chains
-
F. Sahin, and J. Robinson, E. Powell, "Information sharing and coordination in make-to-order supply chains," Journal of Operations Management, 23, 2005, pp. 579-598.
-
(2005)
Journal of Operations Management
, vol.23
, pp. 579-598
-
-
Sahin, F.1
Robinson, J.2
Powell, E.3
-
2
-
-
0033686633
-
-
H.L, Lee, K.C, So, and T. C.S., The Value of Information Sharing in a Two-Level Supply Chain, Management Science, 46, 2000, INFORMS, pp. 626-643.
-
H.L, Lee, K.C, So, and T. C.S., "The Value of Information Sharing in a Two-Level Supply Chain," Management Science, 46, 2000, INFORMS, pp. 626-643.
-
-
-
-
3
-
-
25144440407
-
-
B, Huang, and I. S.M.R., Production Control Policies in Supply Chains with Selective-Information Sharing, Operations Research, 53, 2005, pp. 662-674.
-
B, Huang, and I. S.M.R., "Production Control Policies in Supply Chains with Selective-Information Sharing," Operations Research, 53, 2005, pp. 662-674.
-
-
-
-
4
-
-
34547713117
-
Unlocking the value of RFID
-
H.L, Lee, and O. O., "Unlocking the value of RFID," Graduate School of Business, Standford University, working paper, 2005,
-
(2005)
Graduate School of Business, Standford University, working paper
-
-
Lee, H.L.1
O., O.2
-
5
-
-
34547708481
-
The EPCglobal Architecture Framework
-
K, Traub, G, Allgair, and B. H., "The EPCglobal Architecture Framework," EPCglobal Final Version, 2005,
-
(2005)
EPCglobal Final Version
-
-
Traub, K.1
Allgair, G.2
H., B.3
-
6
-
-
35248831886
-
Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise
-
T.-Y. Chen et al., "Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise," Computers in Industry, In Press, Corrected Proof, 2006,
-
(2006)
Computers in Industry, In Press, Corrected Proof
-
-
Chen, T.-Y.1
-
7
-
-
79955130588
-
-
H, Afsarmanesh, C, Garita, and H. L.O., Virtual Enterprises and Federated Information Sharing, Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
-
H, Afsarmanesh, C, Garita, and H. L.O., "Virtual Enterprises and Federated Information Sharing," Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
-
-
-
-
8
-
-
0035455653
-
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
-
I, Foster, C, Kesselman, and T. S., "The Anatomy of the Grid: Enabling Scalable Virtual Organizations," International Journal of High Performance Computing Applications, 15, 2001, pp. 200-222.
-
(2001)
International Journal of High Performance Computing Applications
, vol.15
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
S., T.3
-
9
-
-
0037661197
-
An approach to secure information flow on Object Oriented Role-based Access Control model
-
ACM Press, pp
-
C. Yang, and C. N. Zhang, "An approach to secure information flow on Object Oriented Role-based Access Control model," SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, 2003, ACM Press, pp. 302-306.
-
(2003)
SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
, pp. 302-306
-
-
Yang, C.1
Zhang, C.N.2
-
10
-
-
33746560721
-
Exploiting information relationships for access control in pervasive computing
-
U. Hengartner, and P. Steenkiste, "Exploiting information relationships for access control in pervasive computing," Pervasive and Mobile Computing, 2, 2006, pp. 344-367.
-
(2006)
Pervasive and Mobile Computing
, vol.2
, pp. 344-367
-
-
Hengartner, U.1
Steenkiste, P.2
-
11
-
-
84957707751
-
Token-Based Access to Digital Information
-
Springer, pp
-
L.E, Holmquist, J, Redstroem, and L. P., "Token-Based Access to Digital Information," Proceedings of First International Symposium on Handheld and Ubiquitous Computing (HUC'99), 1999, Springer, pp. 234-245.
-
(1999)
Proceedings of First International Symposium on Handheld and Ubiquitous Computing (HUC'99)
, pp. 234-245
-
-
Holmquist, L.E.1
Redstroem, J.2
P., L.3
|