Login / Signup
Data concealing of supply chain transactions using the Distributed Trust Backbone.
Potchara Pruksasri
Jan van den Berg
Wout Hofman
Yao-Hua Tan
Published in:
ICITST (2014)
Keyphrases
</>
supply chain
dynamic programming
wireless sensor networks
data mining techniques
service level
inventory control