Author of the publication

Predicting customer choice in services using discrete choice analysis.

, , , , and . IBM Systems Journal, 47 (1): 179-191 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Services Using Crowdsourcing., and . ANT/SEIT, volume 32 of Procedia Computer Science, page 505-512. Elsevier, (2014)Supplier-Switching Inertia and Competitive Asymmetry: A Demand-Side Perspective., , , and . Decision Sciences, 37 (4): 547-576 (2006)Teaching Note - Revenue Management at the Hong Kong Grand: The Dine in Grandeur Dilemma., , and . INFORMS Trans. Education, 10 (3): 133-139 (2010)SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN., , , , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 159-169. Springer, (2012)Layer Two Tunneling Protocol (L2TP) over Frame Relay., , , and . RFC, (February 2001)Margdarshak: A Mobile Data Analytics based Commute Time Estimator cum Route Recommender., , , and . WPA@MobiSys, page 31-36. ACM, (2016)Mining spatio-temporal data for computing driver stress and observing its effects on driving behavior., , , and . SIGSPATIAL/GIS, page 452-455. ACM, (2018)Vision based hand gesture recognition using finite state machines and fuzzy logic., and . ICUMT, page 1-6. IEEE, (2009)A novel wavelet edge detection algorithm for noisy images., , , and . ICUMT, page 1-8. IEEE, (2009)Issues in the use of ratings-based versus choice-based conjoint analysis in operations management research., , , and . European Journal of Operational Research, 197 (1): 340-348 (2009)