期刊文献+
共找到111篇文章
< 1 2 6 >
每页显示 20 50 100
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
1
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
2
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Research on the Status Quo and Countermeasures of Human Resource Management Outsourcing in China’s Pharmaceutical Enterprises
3
作者 Wang Jianing Wang Shuling 《Asian Journal of Social Pharmacy》 2024年第1期64-71,共8页
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit... Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns. 展开更多
关键词 pharmaceutical enterprise human resource management outsourcing countermeasure research
下载PDF
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
4
作者 Atif Ikram Masita Abdul Jalil +3 位作者 Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan 《Computers, Materials & Continua》 SCIE EI 2023年第3期5035-5048,共14页
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most... The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development only.Several frameworks have been developed focusing on guiding software systemmanagers concerning offshore software outsourcing.However,none of these studies delivered comprehensive guidelines for managing the whole process of OSMO.There is a considerable lack of research working on managing OSMO from a vendor’s perspective.Therefore,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s perspective.This study validated the preliminary OSMO process model via a case study research approach.The results showed that the OSMO process model is applicable in an industrial setting with few changes.The industrial data collected during the case study enabled this paper to extend the preliminary OSMO process model.The refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk. 展开更多
关键词 Offshore outsourcing process model model validation vendor challenges case study
下载PDF
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
5
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
On Incentive and Coordination Mechanism of Service Outsourcing Based on Principal-Agent Theory and Blockchain Technology
6
作者 Chenglong Yan Xiao Wang +1 位作者 Xiaonan Zhang Ruzhi Xu 《Journal of Artificial Intelligence and Technology》 2023年第1期1-9,共9页
To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-... To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-agent framework,examines the dynamic game situation before the contract being signed,and develops four information models.The analysis reveals a Pareto improvement in the game’s Nash equilibrium when comparing the four models from the standpoint of the supply chain.In the complete information scenario,the service level of the service provider,the customer company’s incentive effectiveness,and the supply chain system’s ultimate profit are all maximized.Furthermore,a coordinating mechanism for disposable profit is built in this study.The paper then suggests a blockchain-based architecture for the service outsourcing process supervision and a distributed incentive mechanism under the coordination mechanism in response to the inadequacy of the principal-agent theory to address the information asymmetry problem and the moral hazard problem.The experiment’s end findings demonstrate that both parties can benefit from the coordination mechanism,and the application of blockchain technology can resolve these issues and effectively encourage service providers. 展开更多
关键词 service outsourcing coordination mechanism distributed incentive mechanism blockchain
下载PDF
Facilitating IT outsourcing through improving buyer-vendor interaction in outsourcing life cycle
7
作者 谢刚 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2011年第1期96-100,共5页
For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empiric... For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empirical data from a logistics and procurement flat system outsourcing case and earlier research,the industrial network approach and the international marketing and purchasing interaction model are used to analyze the nature of interaction in a three-phased outsourcing life cycle,particularly,characteristics and activities of the transition phase are identified.The findings reveal that developing a relationship between partners requires an industrial network perspective.Improving the key aspects of interaction,information and knowledge sharing,communication and collaborative participation,involved in the important events of three phases would contribute to enhance the relationships performance.The key aspects of interaction should take place among the network actors and not just between buyers and vendors. 展开更多
关键词 information technology(IT) outsourcing outsourcing life cycle INTERACTION
下载PDF
Incentive mechanism analysis of information security outsourcing based on principal-agent model
8
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
The Role of the Outsourcing Contract From a Partnership-based Perspective
9
作者 Paolo Popoli 《Chinese Business Review》 2017年第6期292-302,共11页
The definition of relational contents which outsourcer and outsourcee arrange and formalize inside a contract is one of the critical success factors of the outsourcing choice. The contract criticality is greater if th... The definition of relational contents which outsourcer and outsourcee arrange and formalize inside a contract is one of the critical success factors of the outsourcing choice. The contract criticality is greater if the outsourcing aim is made of highly strategic activities, functions, or processes and if the real aim is not the cost saving but the sharing of added value resources, skills, and knowledge. That is, this paper aims to provide some conceptual insights about the role of the contract with a specific reference to the strategic outsourcing, which is the kind of outsourcing where the relationship between the outsourcer and outsourcee is set inside the "partnership-based" logic. In particular the remarks proposed concern the role of the contract as a tool to face the risk and manage the relationship. 展开更多
关键词 outsourcing contract contract management partnership-based perspective outsourcing risks
下载PDF
Can harvest outsourcing services reduce field harvest losses of rice in China? 被引量:4
10
作者 QU Xue Daizo KOJIMA +2 位作者 Yukinaga NISHIHARA WU La-ping Mitsuyoshi ANDO 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2021年第5期1396-1406,共11页
The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and ... The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and outsourcing services.Data were collected from a national survey conducted in 2016 by the research team in conjunction with the Research Center for the Rural Economy of the Ministry of Agriculture and Rural Affairs of China.A non-parametric method was used to test whether combine harvesting and outsourcing services could significantly reduce harvest losses.Next,quantile regression was used to estimate the real effects of machinery and outsourcing services on harvest losses.The analysis yielded four main study outcomes.First,the harvest loss rate of rice in China was 3.65%.Second,mechanical reaping and winnowing caused greater losses than manual methods,while the opposite was true of field transportation.Third,combine harvesting increased the losses.Fourth,the effects of an outsourcing service on losses differed among the different harvesting methods.Outsourcing services increased losses in segmented harvesting but they reduced losses in combine harvesting. 展开更多
关键词 rice harvest outsourcing service combine harvesting harvest loss RICE
下载PDF
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing 被引量:2
11
作者 Zhen Yang Yongfeng Huang +1 位作者 Xing Li Wenyu Wang 《Computers, Materials & Continua》 SCIE EI 2018年第7期1-17,共17页
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on... To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance. 展开更多
关键词 Data provenance asymmetric fingerprint protocol digital watermarking multimedia outsourcing
下载PDF
The Impact of Outsourcing on Local Industry Upgrading: a Case of China from a Global Value Chain Perspective 被引量:2
12
作者 赵君丽 LI Laubie 《Journal of Donghua University(English Edition)》 EI CAS 2011年第3期261-266,共6页
This paper develops a conceptual model to assess effect of outsourcing by integrating the theories of industrial upgrading and global value chain (GVC) governance. Contrary to the widely accepted perception that outso... This paper develops a conceptual model to assess effect of outsourcing by integrating the theories of industrial upgrading and global value chain (GVC) governance. Contrary to the widely accepted perception that outsourcing is expected to generate positive spillover in particular, the findings indicate that outsourcing has different effects in different GVC governance modes. Excess outsourcing could structurally inhibit technology and management spillovers to subcontractors within the emerging economy context. Based on a case study of the Chinese textile and apparel (T & A) industry, it is found that the Chinese T & A industry has been trapped in the captive governance relationship with foreign buyers, and at the same time is capped below the function upgrading level. Consequences of the situation and implication are then discussed. 展开更多
关键词 outsourcing SPILLOVER global value chain governance Chinese textile and apparel industry industrial upgrading
下载PDF
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server 被引量:2
13
作者 Shuai Li Longxia Huang +1 位作者 Anmin Fu John Yearwood 《Digital Communications and Networks》 SCIE 2017年第4期236-241,共6页
Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the... Outsnurcing computing allows users with resource-constrained devices tn outsnurce their complex computation wnrkloads to cloud servers that may not be honest. In this paper, we propose a new algorithm for securing the outsourcing of composite modnlar exponentiation, which is one of the most complex computing tasks in discrete- log based cryptographic protocols. Unlike algorithms based on two untrusted servers, we outsnurce modular expnnentiation operation to only a single server, which eliminates the potential for a cnllusinn attack when using two servers. Moreover, our proposed algorithm can hide the base and exponent of the outsourced data, which prevents the exposure of sensitive information to clnud servers. In addition, compared with the state-of-the-art algorithms, our scheme has remarkably better checkability, The user could detect any misbehavior with a probability of one if the server returns a fault result. 展开更多
关键词 Cloud computing outsourcing computation Verifiable computation Modular exponentiation
下载PDF
Service outsourcing:A new way to shrink regional gaps 被引量:2
14
作者 刘志彪 《China Economist》 2009年第6期42-48,共7页
International outsourcing is an important way to realize intra-product division of labor. China's industrial upgrade and policy efforts directed at outsourcing are not entirely endogenous but have a dependent path... International outsourcing is an important way to realize intra-product division of labor. China's industrial upgrade and policy efforts directed at outsourcing are not entirely endogenous but have a dependent path prone to be captured and locked at the low end of the global value chain by developed countries at the chain's high end. In light of the stage and reality of China's economic development, we should not only upgrade manufacturing outsourcing but also grasp service outsourcing opportunities. We should implement a strategy of coordinated development of manufacturing and service outsourcing rather than hastily transforming China from a "factory of the world" into an "office of the world." Balancing services with manufacturing and linking the global value chain with the domestic value chain is the best tool to address the problem of China's uneven regional development and establish a multi-tiered modern industrial system. 展开更多
关键词 service outsourcing MANUFACTURING outsourcing INDUSTRIAL UPGRADE China’s ECONOMY
下载PDF
Software outsourcing risk management: establishing outsourcee evaluation item systems 被引量:1
15
作者 WANG Mei-yuan LU Yao-bin ZHANG Jin-long 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第6期1092-1098,共7页
Outsourcing software development has many advantages as well as inevitable risks. Of these risks, outsourcee se-lection is one of the most important. A wrong outsourcee selection may have severe adverse influence on t... Outsourcing software development has many advantages as well as inevitable risks. Of these risks, outsourcee se-lection is one of the most important. A wrong outsourcee selection may have severe adverse influence on the expected outcome of the project. We analyzed the risks involved in outsourcee selection and also provided methods to identify these risks. Using the principles of Analytical Hierarchy Process (AHP) and Cluster Analysis based on Group Decision Making, we established an index evaluation system to evaluate and select outsourcees. Real world applications of this system demonstrated its effectiveness in evaluating and selecting qualified outsourcees. 展开更多
关键词 Software outsourcing Outsourcee evaluation Group decision making
下载PDF
Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing 被引量:4
16
作者 Leqi Jiang Zhangjie Fu 《Journal of Cyber Security》 2020年第1期49-61,共13页
Genetic Algorithm(GA)has been widely used to solve various optimization problems.As the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA ... Genetic Algorithm(GA)has been widely used to solve various optimization problems.As the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the cloud server.However,the algorithm user would never want his data to be disclosed to cloud server.Thus,it is necessary for the user to encrypt the data before transmitting them to the server.But the user will encounter a new problem.The arithmetic operations we are familiar with cannot work directly in the ciphertext domain.In this paper,a privacy-preserving outsourced genetic algorithm is proposed.The user’s data are protected by homomorphic encryption algorithm which can support the operations in the encrypted domain.GA is elaborately adapted to search the optimal result over the encrypted data.The security analysis and experiment results demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 Homomorphic encryption genetic algorithm outsourcing cloud computing
下载PDF
Analyze the service outsourcing on the base of the modern economy theory 被引量:1
17
作者 BAO Jian-bo WANG Shen-shen YANG Fan 《Chinese Business Review》 2008年第9期62-65,共4页
The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Thr... The paper provides information about the concept and the characteristics of the service outsourcing. It also analyzes the service outsourcing classification and the modem economy theory of the service outsourcing. Through the analysis, we hope to provide the foundation for further study. 展开更多
关键词 service outsourcing core capacity theory transaction costs theory agency by agreement resource basis theory
下载PDF
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
18
作者 Linjie Wang Youliang Tian Jinbo Xiong 《Digital Communications and Networks》 SCIE CSCD 2022年第5期644-653,共10页
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving the speed of common connected objects in IoT.However,although it makes it easier for ubiquitous resource-constrained equipment that outsources computing tasks to achieve high-speed transmission services,security concerns,such as a lack of reliability and collusion attacks,still exist in the outsourcing computation.In this paper,we propose a reliable,anti-collusion outsourcing computation and verification protocol,which uses distributed storage solutions in response to the issue of centralized storage,leverages homomorphic encryption to deal with outsourcing computation and ensures data privacy.Moreover,we embed outsourcing computation results and a novel polynomial factorization algorithm into the smart contract of Ethereum,which not only enables the verification of the outsourcing result without a trusted third party but also resists collusion attacks.The results of the theoretical analysis and experimental performance evaluation demonstrate that the proposed protocol is secure,reliable,and more effective compared with state-of-the-art approaches. 展开更多
关键词 outsourcing computation Ethereum Smart contract Public verification Homomorphic encryption
下载PDF
A potential game-based outsourcing computation framework for multiple calculators
19
作者 Duo Zhang Youliang Tian Linjie Wang 《Digital Communications and Networks》 SCIE CSCD 2022年第5期654-663,共10页
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server.The traditional outsourcing computation model forbids communication be... Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server.The traditional outsourcing computation model forbids communication between players,but it has little effect.Based on the game theory,this paper establishes an outsourcing computation model which is more in line with the actual scene.Firstly,we construct a structural mapping relationship between security outsourcing computation and the optimization problem.Secondly,by designing the individual potential function and the global potential function,the individual goal is consistent with the global goal to ensure the correctness of the calculation results.Finally,in the information exchange environment between calculators,we construct a Zero-determinant strategy to ensure that the calculator chooses the strategy according to the predetermined target. 展开更多
关键词 outsourcing computation Game theory Potential function Zero-determinant strategy Information exchange
下载PDF
Scheduling and Outsourcing with Multiple Customers
20
作者 冯艳玲 张玉忠 贾国柱 《Chinese Quarterly Journal of Mathematics》 2015年第3期330-338,共9页
In this paper, we study a new scheduling and outsourcing model with multiple customers in which jobs can be processed by either in-house machine or outsourcing machine.All processed jobs have to be delivered in batche... In this paper, we study a new scheduling and outsourcing model with multiple customers in which jobs can be processed by either in-house machine or outsourcing machine.All processed jobs have to be delivered in batches to their respective customers and each shipment incurs a delivery cost as well as a fixed amount of time. We discuss three commonly used objective functions, analyze their complexity and solve them by dynamic programming algorithms. 展开更多
关键词 SCHEDULING outsourcing DYNAMIC PROGRAMMING MULTIPLE CUSTOMERS
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部