نتایج جستجو برای: vendor buyer coordination
تعداد نتایج: 90200 فیلتر نتایج به سال:
An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol between a vendor and a buyer. The vendor sells a set of messages m1, . . . ,mN with prices p1, . . . , pN . In each transfer phase i = 1, . . . , k, the buyer chooses a selection value σi ∈ {1, . . . ,N } and interacts with the vendor to buy message mσi in such a way that the vendor does not learn σi and the b...
Simultaneously reducing inventory levels of raw materials, work-in-process, and finished items has become a major focus for supply chain management. In order to achieve a higher degree of coordination and automation among the supply chain parties, the supply chain sometimes invests in reducing the ordering cost to streamline and speed up transactions via the application of information technolog...
An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol betweena vendor and a buyer. The vendor sells a set of messagesm1, . . .,mN with pricesp1, . . . ,pN . Ineach transfer phase i = 1, . . . , k, the buyer chooses a selection value σi ∈ {1, . . . ,N } and interactswith the vendor to buy messagemσi in such a way that the vendor doe...
This study investigates the single-vendor single-buyer integrated production inventory models with controllable lead time. The lead time demand is stochastic and shortage during the lead time is permitted. The buyer orders a lot of size Q and the vendor manufactures mQ with a finite production rate P at one set-up but ships in quantity Q to the buyer over m times. Most researchers do not take t...
A supply chain consisting of a single-supplier and a single-buyer is modeled and compared in two different modes: non-coordinated and coordinated. The model is established based on the fact that the demand is uncertain and shortages are considered as lost sales. The buyer’s order lead time is a nonlinear function of the buyer’s order size and the number of shipments from the supplier. Quantity ...
Privacy threats and problems in the context of electronic commerce are extensively discussed in literature since the discovery of the economical importance of the Internet. In academic work done so far, solutions are mostly proposed for those cases in which the trade objects are restricted to intangible goods, e.g., see [1, 2, 8]. These intangible goods —such as electronic documents, image, mus...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید