Pricing access to the Internet with partial information
|
|
|
- Jeffry Lawrence
- 9 years ago
- Views:
Transcription
1 Pricing access to the Internet with partial information Ilaria Brunetti, Eitan Altman, Majed Haddad To cite this version: Ilaria Brunetti, Eitan Altman, Majed Haddad. Pricing access to the Internet with partial information. Valuetools, Oct 2012, Cargese, France <hal > HAL Id: hal Submitted on 24 May 2012 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Pricing access to the Internet with partial information Ilaria Brunetti, Eitan Altman and Majed Haddad May 24, 2012 Abstract We shall consider two competition problems between service providers with asymmetric information. The utility of each one of them depends on the demand it gets and in its price. The demand itself is also a function of the prices of the providers. In both problems there is one provider (player 1) that has more information than the other (player 2) on the demand function. The more informed provider plays first, and then the second observes the move of the first provider and chooses accordingly its own action: it determines its price per unit demand. In the first problem that we consider, the first provider does not control its price (it has a fixed price known to the other provider which does not depend on the information that is unknown to provider 2). Before player 2 takes its action it receives a signal (or a recommendation) from the more informed player, i.e. from provider 1. The pure actions of provider 1 are thus the possible choices of what signal to send. The second problem that we consider is the same as the first one except that the actions of provider 1 is to choose its price. Since player 2 observes the choice of price of player 1 before it takes its own pricing decision, we can consider the choice of price by player 1 has also a role of signalling. We reduce each one of the problem to an equivalent four by four matrix game. 1 Introduction and Model This note uses Bayesian game theory in order to study pricing issues in competitive environment. We model two problems related to pricing under the assumption that only one mobile fully knows the demand function. In the first part we study the signalling problem in which the informed player can signal information to the other one and has to decide on a signalling rule such that, given an optimal reaction of the other player reacts to the signal, the utility of the informed player would be maximized. In a second sceario that we study, each of the two players determine their prices. Yet the order of the decisions is such that the player that is not informed of the demand function that is used, determines its own price after observing the choice of the first player. We formulate both games as Bayesian games and show how to transform them into equivalent matrix games. Our starting point is to define two service providers. The demand d i that provider i receives is a function of both its own price as well as of its competitor. We thus write it as d i (p 1, p 2 ). We assume that the utility for provider i is given by U i = d i p i, i = 1, 2 Each provider wishes to maximize the expectation of its own utility. 1
3 2 The Signalling Game Let us first consider the following scenario, which is common knowledge for both providers (which we call players). The price p 1 of player 1 is fixed and known. Player 2 can choose one of two possible levels of pricing: ζ l and ζ h. The demand d i for each provider is a function of the prices of both providers. demand function of player 2 is known to both players. The We assume that the demand of player 1 depends on some parameter θ. θ is known to player 1 but not to player 2. It can take one of two values: θ 1 and θ 2. The game is then played as follows. The value of θ is chosen by nature according to some distribution π. It equals θ r with probability π r. Player 1 observes θ and then sends a signal to player 2. It has four pure strategies for signalling: q 1 q 1, q 1 q 2, q 2 q 1 and q 2 q 2. Here, q i q j is the strategy according to which player 1 signals q i if it observes θ 1 and signals q j if it observes θ 2. Player 2 has also four pure strategies. We write them as ζ l ζ l, ζ l ζ h, ζ h ζ l and ζ h ζ h. Here, a strategy of the form ζ i ζ j means choosing ζ i if player 2 observes a signal q 1 by player 1 and choosing ζ j otherwise. The game that we study is known as a game with cheap talk ; this is a signaling game where the sender incurs no cost for his signals [1, Sec. 7]. 2.1 Transformation into a matrix game We can now represent the game as a 4 4 matrix game. Fix i (1, 2), j (1, 2), m (l, h), n (l, h). Assume that player 1 chooses q i q j and that player 2 chooses ζ m ζ n. For r = 1, 2, define ξ(r, i, j) to be i if r = 1 and j otherwise. Player 1 sends signal q ξ(r,i,j) to player 2 if θ = θ r. Define φ(r, i, j, m, n) to be the price chosen by player 2 as a result of the signal ξ(r, i, j) when it uses the strategy ζ m ζ n. φ(r, i, j, m, n) equals ζ m if ξ(r, i, j) = 1 and is otherwise ζ n. Then U 1 (q i q j ; ζ m ζ n ) = E qi q j ;ζ mζ n [p 1 d 1 (p 1, p 2 )] (1) = π r E qi q j ;ζ mζ n [p 1 d 1 (p 1, p 2 ) θ = θ r ] (2) where E qi q j ;ζ mζ n [p 1 d 1 (p 1, p 2 ) θ = θ r ] = p 1 d 1 (p 1, φ(r, i, j, m, n). Thus we can rewrite: U 1 (q i q j ; ζ m ζ n ) = p 1 2 π r d 1 (p 1, φ(r, i, j, m, n)
4 For player 2 we obtain: 2.2 The Linear Case U 2 (q i q j ; ζ m ζ n ) = E qi q j ;ζ mζ n [p 2 d 2 (p 1, p 2 )] (3) = π r φ(r, i, j, m, n) d 2 (p 1, φ(r, i, j, m, n) (4) We now consider a linear demand function: d i = d 0 i A ii p i + A ji p j (5) Assume that A is known but that d 0 2 is unknown. It can be written as a function of a parameter θ, i.e., d 0 2 = d0 2 (θ). It follows from the above considerations that the utility functions of player 1 and player 2 can be expressed as: ) U 1 (q i q j ; ζ m ζ n ) = p 1 π r (θ r A 11 p 1 + A 21 φ(r, i, j, m, n) (6) 3 Prices as signals ) π r φ(r, i, j, m, n) (d 0 2(θ r ) A 22 φ(r, i, j, m, n) + A 12 p 1 Now consider the following variant of the problem. Instead of a fixed price p 1, the first player can choose one of two values as its own price instead of just a signle. Yet the price itself serves also as a signal that player 2 can see. q i, i = 1, 2 now stands for the price chosen by player 1. In this case assuming that q i stands for the price chosen by player 1 and following the previous definitions, we have that q ξ(r,i,j) corresponds to the price chosen by player 1 if he plays strategy q i q j and θ = θ r. The utility functions we obtain are: The Linear Case π r q ξ(r,i,j) (d 1 (q ξ(r,i,j), φ(r, i, j, m, n))) π r φ(r, i, j, m, n)(d 2 (q ξ(r,i,j), φ(r, i, j, m, n))) If we consider again the linear demand function defined in (5), the utility functions of player 1 and player 2 can be expressed as: π r q ξ(r,i,j) (θ r A 11 q ξ(r,i,j) + A 21 φ(r, i, j, m, n)) π r φ(r, i, j, m, n)(d 0 2(θ r ) A 22 φ(r, i, j, m, n) + A 12 q ξ(r,i,j) ) 3 (7)
5 It follows from the above considerations that p 1 = q ξ(r,i,j), yielding the following expressions for the utility functions of player 1 and player 2 π r q ξ(r,i,j) (θ r A 11 q ξ(r,i,j) + A 21 φ(r, i, j, m, n)) (8) 4 Discussion π r φ(r, i, j, m, n)(d 0 2(θ r ) A 22 φ(r, i, j, m, n) + A 12 q ξ(r,i,j) ) (9) In this paper, we studied a model of pricing access to the Internet and investigated the role of signalling (or recommendations) in identifying side payments (price per unit demand). We considered the case of two Internet service providers aiming at maximizing their own expected utility. Under this setting, we assume that that the amount of information made available to both ISPs on the demand function is not the same: the more informed provider plays first, and then the second observes the move of the first provider and chooses accordingly its own action. We studied two configurations of the proposed problem. In the first configuration, one service provider (say provider 1) has a fixed price known to the other provider (say provider 2). The pure actions of provider 1 are thus the possible choices of what signal to send. In the second configuration, provider 1 is allowed to choose his prices which serves as a signal to provider 2. We then reduced each one of the configuration to an equivalent four by four matrix game and studied the equilibria Our model is, needless to say, a mere caricature that captures certain types of interactions between ISPs. The biggest benefit is that it is tractable, as evidenced by the obtained expressions in this paper. The litmus test of its usefulness will be its ability, or otherwise, to explain some observed behavior, even if only qualitatively. Studies in this direction are ongoing. Finally, an extension of our model to account for aspects of quality of service (QoS) should be brought in to enrich the model. We hope to pursue some of these in future works. References [1] D. M. Kreps and J. Sobel, signaling, Chapter 25 in Handbook of Game Theory, vol. 2, R. J. Aumann and S. Hart, Elsevier Science B.V., 1994, pp
Novel Client Booking System in KLCC Twin Tower Bridge
Novel Client Booking System in KLCC Twin Tower Bridge Hossein Ameri Mahabadi, Reza Ameri To cite this version: Hossein Ameri Mahabadi, Reza Ameri. Novel Client Booking System in KLCC Twin Tower Bridge.
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs Thomas Durieux, Martin Monperrus To cite this version: Thomas Durieux, Martin Monperrus. IntroClassJava: A Benchmark of 297 Small and Buggy
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
Territorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
The truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
Blind Source Separation for Robot Audition using Fixed Beamforming with HRTFs
Blind Source Separation for Robot Audition using Fixed Beamforming with HRTFs Mounira Maazaoui, Yves Grenier, Karim Abed-Meraim To cite this version: Mounira Maazaoui, Yves Grenier, Karim Abed-Meraim.
Cobi: Communitysourcing Large-Scale Conference Scheduling
Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi
A model driven approach for bridging ILOG Rule Language and RIF
A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.
Advantages and disadvantages of e-learning at the technical university
Advantages and disadvantages of e-learning at the technical university Olga Sheypak, Galina Artyushina, Anna Artyushina To cite this version: Olga Sheypak, Galina Artyushina, Anna Artyushina. Advantages
Use of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed
Donatella Corti, Alberto Portioli-Staudacher. To cite this version: HAL Id: hal-01055802 https://hal.inria.fr/hal-01055802
A Structured Comparison of the Service Offer and the Service Supply Chain of Manufacturers Competing in the Capital Goods and Durable Consumer Goods Industries Donatella Corti, Alberto Portioli-Staudacher
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
An Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
On the beam deflection method applied to ultrasound absorption measurements
On the beam deflection method applied to ultrasound absorption measurements K. Giese To cite this version: K. Giese. On the beam deflection method applied to ultrasound absorption measurements. Journal
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
Minkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
Comparative optical study and 2 m laser performance of the Tm3+ doped oxyde crystals : Y3Al5O12, YAlO3, Gd3Ga5O12, Y2SiO5, SrY4(SiO4)3O
Comparative optical study and 2 m laser performance of the Tm3+ doped oxyde crystals : Y3Al5O12, YAlO3, Gd3Ga5O12, Y2SiO5, SrY4(SiO4)3O R. Moncorge, H. Manaa, M. Koselja, G. Boulon, C. Madej, J. Souriau,
An update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model Seungwoo Kang, Sandrine Selosse, Nadia Maïzi To cite this version: Seungwoo Kang, Sandrine
The Cross Flow Turbine Behavior towards the Turbine Rotation Quality, Efficiency, and Generated Power
The Cross Flow Turbine Behavior towards the Turbine Rotation Quality, Efficiency, and Generated Power Jusuf Haurissa, Slamet Wahyudi, Yudy Surya Irawan, Rudy Soenoko To cite this version: Jusuf Haurissa,
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER
Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network
Generalization Capacity of Handwritten Outlier Symbols Rejection with Neural Network Harold Mouchère, Eric Anquetil To cite this version: Harold Mouchère, Eric Anquetil. Generalization Capacity of Handwritten
Block-o-Matic: a Web Page Segmentation Tool and its Evaluation
Block-o-Matic: a Web Page Segmentation Tool and its Evaluation Andrés Sanoja, Stéphane Gançarski To cite this version: Andrés Sanoja, Stéphane Gançarski. Block-o-Matic: a Web Page Segmentation Tool and
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
Solution Formulas for Cubic Equations Without or With Constraints
Solution Formulas for Cubic Equations Without or With Constraints Ting Zhao, Dongming Wang, Hoon Hong To cite this version: Ting Zhao, Dongming Wang, Hoon Hong. Solution Formulas for Cubic Equations Without
SELECTIVELY ABSORBING COATINGS
SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),
PHYML Online: A Web Server for Fast Maximum Likelihood-Based Phylogenetic Inference
PHYML Online: A Web Server for Fast Maximum Likelihood-Based Phylogenetic Inference Stephane Guindon, F. Le Thiec, Patrice Duroux, Olivier Gascuel To cite this version: Stephane Guindon, F. Le Thiec, Patrice
Running an HCI Experiment in Multiple Parallel Universes
Running an HCI Experiment in Multiple Parallel Universes,, To cite this version:,,. Running an HCI Experiment in Multiple Parallel Universes. CHI 14 Extended Abstracts on Human Factors in Computing Systems.
Contribution of Multiresolution Description for Archive Document Structure Recognition
Contribution of Multiresolution Description for Archive Document Structure Recognition Aurélie Lemaitre, Jean Camillerapp, Bertrand Coüasnon To cite this version: Aurélie Lemaitre, Jean Camillerapp, Bertrand
Proper Name Retrieval from Diachronic Documents for Automatic Speech Transcription using Lexical and Temporal Context
Proper Name Retrieval from Diachronic Documents for Automatic Speech Transcription using Lexical and Temporal Context Irina Illina, Dominique Fohr, Georges Linarès To cite this version: Irina Illina, Dominique
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
Formant frequencies of British English vowels produced by native speakers of Farsi
Formant frequencies of British English vowels produced by native speakers of Farsi Gordon HUNTER, Hanna Kebede To cite this version: Gordon HUNTER, Hanna Kebede. Formant frequencies of British English
New implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
Cracks detection by a moving photothermal probe
Cracks detection by a moving photothermal probe J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, M. Pigeon, J. Sellier To cite this version: J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, et
Cheap acoustics as a learning methodology
Cheap acoustics as a learning methodology Stephen DANCE To cite this version: Stephen DANCE. Cheap acoustics as a learning methodology. Société Française d Acoustique. Acoustics 2012, Apr 2012, Nantes,
The Basics of Game Theory
Sloan School of Management 15.010/15.011 Massachusetts Institute of Technology RECITATION NOTES #7 The Basics of Game Theory Friday - November 5, 2004 OUTLINE OF TODAY S RECITATION 1. Game theory definitions:
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China Pree Thiengburanathum, Jesus Gonzalez-Feliu, Yacine Ouzrout,
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Numerical simulations of heat transfer in plane channel
Numerical simulations of heat transfer in plane channel flow Najla El Gharbi, Rafik Absi, Ahmed Benzaoui To cite this version: Najla El Gharbi, Rafik Absi, Ahmed Benzaoui. Numerical simulations of heat
Towards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
Spindle position influence on milling operation stability
Spindle position influence on milling operation stability Jaouher Selmi, Jean-Philippe Costes, Philippe Lorong, Gérard Poulachon, Patrice Carras To cite this version: Jaouher Selmi, Jean-Philippe Costes,
ISO9001 Certification in UK Organisations A comparative study of motivations and impacts.
ISO9001 Certification in UK Organisations A comparative study of motivations and impacts. Scott McCrosson, Michele Cano, Eileen O Neill, Abdessamad Kobi To cite this version: Scott McCrosson, Michele Cano,
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas Olivier Guyon, Nabil Absi, Dominique Feillet, Thierry Garaix To cite this version: Olivier Guyon, Nabil Absi,
