- Supply Chain and Inventory Management
- Sustainable Supply Chain Management
- Scheduling and Optimization Algorithms
- Advanced Queuing Theory Analysis
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Evolutionary Game Theory and Cooperation
- Oil and Gas Production Techniques
- Hydraulic Fracturing and Reservoir Analysis
- Mathematical and Theoretical Epidemiology and Ecology Models
- Public Procurement and Policy
- Drilling and Well Engineering
- IoT and Edge/Fog Computing
- Auction Theory and Applications
- Evolution and Genetic Dynamics
- Marketing and Advertising Strategies
- Ophthalmology and Visual Health Research
- Customer Service Quality and Loyalty
- Digital Media and Visual Art
- Education and Work Dynamics
- SARS-CoV-2 and COVID-19 Research
- Military Defense Systems Analysis
- EFL/ESL Teaching and Learning
- Embedded Systems and FPGA Design
- Multi-Agent Systems and Negotiation
University of Washington
2015-2024
Anhui Xinhua University
2024
Fudan University
1990-2020
China Power Engineering Consulting Group (China)
2019
Yangzhou University
2017-2018
North Carolina State University
2015
Pennsylvania State University
2010
Taiyuan University of Science and Technology
2008
Dezhou University
2007
Bangur Institute of Neurosciences
2002
We analyze a brand's disclosure of its supplier list to improve the suppliers’ compliance with social and environmental sustainability standards. develop model buyer, supplier, an NGO; when violation occurs, buyer both incur penalties. Given that influences NGO's perception results in different level NGO scrutiny, decides whether reveal her supplier. Our characterizes buyer's optimal revelation strategy provides equilibrium efforts NGO. The show increase penalty for or auditing efficiency...
Problem definition: Cloud computing is recognized as a critical driver of information technology–enabled innovations. The operations management (OM) community, however, has not been exposed enough to the essential problems that arise from cloud value chains. Academic/practical relevance: In this paper, we examine recent research on chains and explore future opportunities an OM perspective. particular, focus major challenges facing provider in three problem domains: (1) resource management,...
Cloud computing has been a rising trend in the business world. In this study, we consider two most important pricing schemes offered to sustained customers by major service providers cloud industry: reservation‐based scheme (the R‐scheme) Amazon or Microsoft, and utilization‐based U‐scheme) Google. We duopoly model with heterogeneous characterized mean coefficient of variation their usage. show that under either scheme, effective price is essentially an increasing function usage, thus both...
Under the cloud computing environment of IaaS(Infrastructure as a Service), due to expansion system scale and virtual machines' migrations, etc, it is easy cause some problems like fragmentation physical resources, low utilization resources. The consequences lead high energy consumption within an Internet Data center. In this paper, we propose pre-migration strategy based on three load dimensions: CPU utilization, network throughput, disk I/O rate, which are considered complementary in...
We study a supply chain involving supplier–retailer relationship. When production lead-time is long and the selling season short, retailer has to place an order ahead of season, which resembles classical Newsvendor model. However, we consider situation when supplier agrees deliver in multiple shipments then needs determine quantity and/or timing each shipment. Under centralized setting, derive optimal decisions retailer. decentralized incentive misalignment arises from ineffective allocation...
Smart grid provides convenience for power generation, consumption and distribution. Authenticated key exchange (AKE) is a fundamental technique to protect data transmission from interception tampering in smart grid. However, since the meters only have limited resources computation communication, most of existing AKE schemes are inefficient First, many use large security parameters compensate loose reduction their proofs. Second, these require at least three-round communication negotiate...
Rapid growth in the cloud industry not only provides tremendous opportunities to providers who have invested heavily computing capacities, but also leads low utilization of capacities at times. To alleviate this problem, some launched a low-priority service with so-called preemptible or spot instances, which allows them reclaim when necessary. This study focuses on an emerging market segment customers fault-tolerant jobs, are potential users instances. Through analytical model that captures...
Private and consortium blockchains have recently raised interest in the blockchain community around facilitating business collaboration. In a network, multiple participants either (1) work with centralized authority to maintain complete verifiable ledger, or (2) transact decentralized manner an independent shared ledger. A centralized, private system, such as Amazon QLDB, addresses scenario one good price-to-performance ratio. The second is commonly backed by Hyperledger Fabric, that...
Problem definition: The recent surge in demand for cloud services has posed a significant capacity-expansion problem infrastructure providers. Although the growth of capacity attributes—for example, CPU and RAM—is disproportionate, these attributes are often provided preconfigured packages (cluster-types), fixed ratio package does not match with time-varying demand. We analyze class expansion policies to determine timing magnitude expansions, using cluster-types, we examine optimal...
We consider a project supply chain where manufacturer carries out sequence of tasks, and each task requires certain key materials from supplier. Since fixed-price contract cannot attain cha...
In recent years, there has been an increasing trend in supply chains to employ a “control tower” approach improve chain performance. One such strategy is customer-managed inventory (CMI) which the customer (the downstream party) controls of supplier upstream party). However, optimal design control policy and required incentive structure for CMI not fully explored related literature. this paper, we develop two-echelon model consisting that captures interaction between both decision makers....
This passage provides an analysis of Apple Inc.’s marketing strategies, focusing on its advertising and product tactics, as well approach to celebrity film marketing. It highlights Apple’s emphasis simplicity minimalism in campaigns, utilizing short, memorable slogans a clean design aesthetic. The also discusses use secrecy mystery surrounding launches generate consumer curiosity anticipation. Additionally, it addresses engagement with filmmakers feature products movies TV shows, further...
After reform and opening up, China is experiencing rapid economic growth but inefficient public services provision. Public education expenditure-to-GDP ratio too low to keep sustainable of China’s social development. Some scholars believe that fiscal decentralization an important reason. Firstly, this paper analyzes the main factors path how affects While 1994 tax-sharing raised revenue central government, it also increased expenditure burden local governments. Under officials’ yard-stick...
We analyze a brand's disclosure of its supplier list to improve the suppliers' compliance with social and environmental sustainability standards. develop model buyer, supplier, an NGO; when violation occurs, buyer both incur penalties. Given that influences NGO's perception results in different level NGO scrutiny, decides whether reveal her supplier. Our characterizes buyer's optimal revelation strategy provides equilibrium efforts NGO. The show increase penalty for or auditing efficiency...
We study an inventory system involving a contractor, who provides quotations of delivery times to customers, and suppliers, stock prefabricated modules that the contractor will use complete orders. The customers’ decisions on whether wait or leave depend quotations. This is assembly with partial lost sales, where interaction between quotation policy complicated. consider either uniform adaptive independent modified S control inventory. Under policy, we show multiple-supplier can be converted...
Auto‐delivery is a subscription model widely employed in supply chains, whereby supplier delivers products to buyer (or multiple buyers) according the buyer's choice of constant shipping quantity be delivered at prescheduled dates. The enjoys discount for auto‐delivery orders and other benefits, including free cancellation. Because these benefits seem all accrue supplier's expense, rationale decision offer its impact on profitability both parties an intriguing concern. We first develop that...
Problem definition: We study a two-stage supply chain, where the supplier procures key component to manufacture product and buyer orders from meet price-sensitive demand. As input price is volatile, two parties enter into either standard contract, just before starts production, or time-flexible can lock wholesale in advance. Moreover, we consider three selling-price schemes: Market Driven, Cost Plus, Profit Max. Academic/practical relevance: This problem motivated by real practices cloud...
The adoption of cloud computing has been accelerating over the last decade, while enterprise users (“firms”) are struggling to manage their growing expenditures in face intermittent digital demand surges caused by planned or random events. To deal with such challenges, a firm can employ reserved instances standard contract length (e.g., one year) meet stationary base demand, which we refer as contracts, complemented additional either shorter lengths, supplementary cope surges. We first...
Abstract Water is essential for energy exploitation, and moreover the contradiction between water resources recovery seen in China more severe than those other countries. Given this, CO2 waterless fracturing, which improves production factor of an individual well meanwhile serves preservation underground storage, can contribute to sustainable development China's oil industry. The continuity reliability equipment a key technical aspect successful operation required be done sealed, pressurized...