Results 1 - 10
of
32
Transfer costs, spatial arbitrage, and testing for food market integration
- American Journal of Agricultural Economics
, 1997
"... Conventional tests for food market integration ask often misleadingly, whether prices in different locations move together. This paper develops an alternative methodology, the parity bounds model (PBM), which uses information on transfer costs in addition to food prices to assess the efficiency of s ..."
Abstract
-
Cited by 90 (2 self)
- Add to MetaCart
Conventional tests for food market integration ask often misleadingly, whether prices in different locations move together. This paper develops an alternative methodology, the parity bounds model (PBM), which uses information on transfer costs in addition to food prices to assess the efficiency
W B
"... Point-and-shoot: rapid quantitative detection methods for on-site food fraud analysis – moving out of the laboratory and into the food supply chain ..."
Abstract
- Add to MetaCart
Point-and-shoot: rapid quantitative detection methods for on-site food fraud analysis – moving out of the laboratory and into the food supply chain
Food Bytes: Intelligent Systems in the Food Industry
- British Food Journal
, 2002
"... Computers have transformed the design of everything from cars to coffee cups. Now the food industry faces the same revolution, with intelligent computer models being used in the design, production and marketing of food products. The combined market capitalisation of the world’s biggest food, cosmeti ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
and genetic algorithms, mimic human skills such as the ability to learn from incomplete information, to adapt to changing circumstances, to explain their decisions and to cope with novel situations. These systems are being used to tackle a growing range of problems, from credit card fraud detection and stock
1 Deceptive and Subliminal Food Advertising
"... Abstract The purpose of advertising is to make sure that people know about the range of products and services that are available on the market. It is the interest of the manufacturers and retailers to make as many consumers as possible aware of their products or services. But, it is important to ens ..."
Abstract
- Add to MetaCart
to ensure that ads meet certain standards, particularly relating legal and ethical requirements, because consumers do not always have sufficient knowledge to decipher the messages in advertising, to detect the exaggerations or the possible frauds. They, therefore, need to be protected from the incorrect
Risk Detection in E-Commerce Using Markov Decision Process 1
, 2013
"... The growth of e-commerce business especially in the business- to- customer and business- to-business relationships segments in recent years is an indication of how computer technology has improved activities in human lives. It is widely projected that e-commerce as a sector of business transaction i ..."
Abstract
- Add to MetaCart
is poised for spectacular growth. An immediate shortcoming of e-commerce is the risk involved in transactions itself. Such risks include viruses, hacking, repudiation, account takeover fraud, card generators, changing ship address, lost and stolen cards, delivery of physical goods, delivery of digital goods
RESEARCH ARTICLE Benford’s Law: Textbook Exercises and
"... Benford’s Law describes the finding that the distribution of leading (or leftmost) digits of innumerable datasets follows a well-defined logarithmic trend, rather than an intuitive unifor-mity. In practice this means that the most common leading digit is 1, with an expected frequency of 30.1%, and t ..."
Abstract
- Add to MetaCart
.1%, and the least common is 9, with an expected frequency of 4.6%. Cur-rently, the most common application of Benford’s Law is in detecting number invention and tampering such as found in accounting-, tax-, and voter-fraud. We demonstrate that an-swers to end-of-chapter exercises in physics and chemistry textbooks
Funkspiel schemes: an alternative to conventional tamper resistance
- In Proceedings of the 7th ACM conference on Computer and communications security, CCS'00
, 2000
"... Abstract We investigate a simple method of fraud management for secure devices that may serve as an alternative or complement to conventional hardware-based tamper resistance. Under normal operating conditions in our scheme, a secure device includes an authentication code in its communications, e.g ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
.g., in the digital signatures it issues. This code may be verified by a fraud management center under a pre-determined key σ. When the device detects an attempted break-in, it modifies σ. This results in a change to the authentication codes issued by the device such that the fraud management center can detect
By
, 2013
"... I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution. ..."
Abstract
- Add to MetaCart
I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution.
From Commodity to Value: A Privacy Preserving e-Business Architecture
, 2006
"... Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this paper we propose treating privacy as a “value ” that is to be added to other services to avoid the adoption pitfall. We p ..."
Abstract
- Add to MetaCart
present an architecture that anonymizes online transactions and makes them unlinkable to any customer or to each other. In the mean time, our scheme guarantees fair payment to the vendor and provides efficient fraud detection and tracing mechanisms. Not only our scheme anonymizes transactions that involve
1Applying Spatial Diversity to Mitigate Partial Band Interference in Undersea Networks
, 2014
"... See next page for additional authors ..."
Results 1 - 10
of
32