UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Detection of Suspicious Patterns in Secure Physical Environments Conference paper
Fourth International Conference on Information Technology and Applications, ICITA 2007, Sydney, Australia, January 2007
Authors:  Pengfan Yan;  Robert P. Biuk-Aghai;  Simon Fong;  Yain-Whar Si
Favorite  |  View/Download:7/0  |  Submit date:2019/02/13
Data Mining  Rfid  Security  
Knowledge-empowered automated negotiation system for B2B e-commerce Conference paper
Proceedings - The 9th IEEE International Conference on E-Commerce Technology; The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services, CEC/EEE 2007
Authors:  Yan Z.;  Fong S.;  Pengfan Y.;  Meilin S.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Agent technology  Automated negotiation  B2B e-commerce