نتایج جستجو برای: buyer seller relationship

تعداد نتایج: 559084  

2003
Randolph Sloof

This paper investigates the extent of the holdup underinvestment problem in a buyer-seller relationship in which the seller has private information about his alternative trading opportunities. Theory predicts that, compared with a situation in which outside options are publicly observed, the seller obtains an informational rent while the buyer bears an informational loss. As a result the seller...

Journal: :Journal of Business & Industrial Marketing 2020

Journal: :IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 1998
Nasir D. Memon Ping Wah Wong

Digital watermarks have previously been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer...

2003
Ellen Römer

Industrial buyer-seller relationships are frequently characterized by the fact that the seller and/or the buyer have to dedicate specific up-front investments to the relationship. Marketing research analyzes these relationships on the basis of Transaction Cost Economics (TCE). TCE highlights the risk of hold-up which arises after specific investments are dedicated. However, exogenous uncertaint...

2015
Yi-Ching Hsieh Hung-Chang Chiu Yi-Chieh Hsu

As customers' needs have changed rapidly, market orientation has become a more primary focus of marketing literature. This study explores the strategies market-oriented suppliers use to accommodate customer needs. In addition, because buyer–seller relationships proceed through phases characterized by distinct behaviors, this study explores the relationship between market orientation and accommo...

Journal: :JDIM 2011
Defa Hu Qiaoliang Li

AbstrAct: Digital watermarking is an emerging technology for combating copyright piracy. In real applications, the transaction between a buyer and a seller is done through a specific watermarking protocol, which enables the seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an inno cent buyer. In this paper, we propose a new buyer-s...

Journal: :Games 2016
Alison Watts

Buyer-seller networks where price is determined by an ascending-bid auction are important in many economic examples such as certain real estate markets, radio spectrum sharing, and buyer-supplier networks. However, it may be that some sellers are better off not participating in the auction. We consider what happens if sellers can make a take it or leave it offer to one of their linked buyers be...

Journal: :I. J. Network Security 2012
Shuhua Wu Qiong Pu

Buyer-seller watermarking are protocols guaranteeing the buyer prevents false infringement accusations and the seller protects the watermark secrets from the buyer. Most recently, Chang et al. proposed an efficient and fair buyer-seller watermarking scheme for large scale networks quite recently. In this correspondence, we first shows its three weaknesses: the buyer can easily remove the waterm...

Journal: :J. Economic Theory 2007
Tao Zhu Neil Wallace

A new theory of coexistence of money and higher-return assets is set out. It applies to any setting in which some trade involves an exchange of goods for assets and occurs between two people–a buyer and a seller. We show that there exists a function mapping the portfolios of the buyer and the seller to the trade that occurs such that (i) the trade is in the buyer-seller core and (ii) some peopl...

2015
Chin-Ling Chen Chin-Chang Chen De-Kui Li Po-Yueh Chen

A trusted third party (TTP) is introduced to the buyer-seller protocol to guarantee the transaction fairness in protocol. However, the TTP practically increases the cost in the buyer-seller protocol. To address this issue, we propose a novel buyer–seller watermarking protocol to eliminate the need for a TTP. By dividing the buyer’s secret key into two primary mechanisms: the buyer’s watermark, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید