Остановите войну!
for scientists:
default search action
Selwyn Piramuthu
- > Home > Persons > Selwyn Piramuthu
Publications
- 2023
- [j89]Pierrick Pelé, Julia Schulze, Selwyn Piramuthu, Wei Zhou:
IoT and Blockchain Based Framework for Logistics in Food Supply Chains. Inf. Syst. Frontiers 25(5): 1743-1756 (2023) - 2022
- [j88]Yu-Ju Tu, Selwyn Piramuthu:
Models to address RFID-based ticket-switching in retailing. Decis. Support Syst. 153: 113666 (2022) - [j87]Xiang Ning Zhu, Gabrielle Peko, David Sundaram, Selwyn Piramuthu:
Blockchain-Based Agile Supply Chain Framework with IoT. Inf. Syst. Frontiers 24(2): 563-578 (2022) - [j86]Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu:
On Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 24(5): 1577-1584 (2022) - 2021
- [j85]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
Critical risk considerations in auto-ID security: Barcode vs. RFID. Decis. Support Syst. 142: 113471 (2021) - [j84]Shenle Pan, Wei Zhou, Selwyn Piramuthu, Vaggelis Giannikas, Chao Chen:
Smart city for sustainable urban freight logistics. Int. J. Prod. Res. 59(7): 2079-2089 (2021) - [j82]Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu:
Security of lightweight mutual authentication protocols. J. Supercomput. 77(5): 4565-4581 (2021) - 2020
- [j81]Yu-Ju Tu, Selwyn Piramuthu:
On addressing RFID/NFC-based relay attacks: An overview. Decis. Support Syst. 129 (2020) - [j80]Robin Doss, Rolando Trujillo-Rasua, Selwyn Piramuthu:
Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 132: 113270 (2020) - [j79]Ya Yang, Huihui Chi, Wei Zhou, Tijun Fan, Selwyn Piramuthu:
Deterioration control decision support for perishable inventory management. Decis. Support Syst. 134: 113308 (2020) - 2019
- [c45]Yu-Ju Tu, Huihui Chi, Wei Zhou, Gaurav Kapoor, Enes Eryarsoy, Selwyn Piramuthu:
Critical Evaluation of RFID Applications in Healthcare. FNSS 2019: 240-248 - [e6]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings. Communications in Computer and Information Science 1113, Springer 2019, ISBN 978-3-030-34352-1 [contents] - 2018
- [j78]Montbel Thibaud, Huihui Chi, Wei Zhou, Selwyn Piramuthu:
Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review. Decis. Support Syst. 108: 79-95 (2018) - [j77]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
A novel means to address RFID tag/item separation in supply chains. Decis. Support Syst. 115: 13-23 (2018) - [j76]Malcolm Townsend, Thanh Le Quoc, Gaurav Kapoor, Hao Hu, Wei Zhou, Selwyn Piramuthu:
Real-Time business data acquisition: How frequent is frequent enough? Inf. Manag. 55(4): 422-429 (2018) - [j75]Zhanguo Zhu, Feng Chu, Alexandre Dolgui, Chengbin Chu, Wei Zhou, Selwyn Piramuthu:
Recent advances and opportunities in sustainable food supply chain: a model-oriented review. Int. J. Prod. Res. 56(17): 5700-5722 (2018) - [j74]Juheng Zhang, Selwyn Piramuthu:
Product recommendation with latent review topics. Inf. Syst. Frontiers 20(3): 617-625 (2018) - [j73]Wei Zhou, Selwyn Piramuthu:
IoT security perspective of a flexible healthcare supply chain. Inf. Technol. Manag. 19(3): 141-153 (2018) - [e5]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings. Communications in Computer and Information Science 878, Springer 2018, ISBN 978-3-319-94420-3 [contents] - 2017
- [j72]Wei Zhou, Selwyn Piramuthu:
Identification shrinkage in inventory management: an RFID-based solution. Ann. Oper. Res. 258(2): 285-300 (2017) - [j71]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A secure search protocol for low cost passive RFID tags. Comput. Networks 122: 70-82 (2017) - [j70]Selwyn Piramuthu, Robin Doss:
On sensor-based solutions for simultaneous presence of multiple RFID tags. Decis. Support Syst. 95: 102-109 (2017) - [j69]Wei Zhou, Selwyn Piramuthu, Feng Chu, Chengbin Chu:
RFID-enabled flexible warehousing. Decis. Support Syst. 98: 99-112 (2017) - [j68]Tony Yu-Ju Tu, Selwyn Piramuthu:
Lightweight non-distance-bounding means to address RFID relay attacks. Decis. Support Syst. 102: 12-21 (2017) - [e4]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings. Communications in Computer and Information Science 759, Springer 2017, ISBN 978-3-319-65547-5 [contents] - 2016
- [j67]Tracey Yuan Ting Wong, Gabrielle Peko, David Sundaram, Selwyn Piramuthu:
Mobile environments and innovation co-creation processes & ecosystems. Inf. Manag. 53(3): 336-344 (2016) - [c42]Wei Zhou, Frederique Alexandre-Bailly, Selwyn Piramuthu:
Dynamic Organizational Learning with IoT and Retail Social Network Data. HICSS 2016: 3822-3828 - [c41]Huihui Chi, Wei Zhou, Selwyn Piramuthu:
Temporal Ownership Boundary in Sharing Economy. WEB 2016: 54-66 - [e3]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings. Communications in Computer and Information Science 670, 2016, ISBN 978-3-319-48020-6 [contents] - 2015
- [j66]Saravanan Sundaresan, Robin Doss, Wanlei Zhou, Selwyn Piramuthu:
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Comput. Commun. 55: 112-124 (2015) - [j65]Wei Zhou, Selwyn Piramuthu:
Effect of ticket-switching on inventory and shelf-space allocation. Decis. Support Syst. 69: 31-39 (2015) - [j64]Valeria Sadovykh, David Sundaram, Selwyn Piramuthu:
Do online social networks support decision-making? Decis. Support Syst. 70: 15-30 (2015) - [j63]Valeria Sadovykh, David Sundaram, Selwyn Piramuthu:
Do decision-making structure and sequence exist in health online social networks? Decis. Support Syst. 74: 102-120 (2015) - [j62]Wei Zhou, Selwyn Piramuthu:
Effects of ticket-switching on inventory management: Actual vs. information system-based data. Decis. Support Syst. 77: 31-40 (2015) - [j60]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
Secure Tag Search in RFID Systems Using Mobile Readers. IEEE Trans. Dependable Secur. Comput. 12(2): 230-242 (2015) - [c40]Wei Zhou, Selwyn Piramuthu:
IoT and Supply Chain Traceability. FNSS 2015: 156-165 - [e2]Robin Doss, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings. Communications in Computer and Information Science 523, Springer 2015, ISBN 978-3-319-19209-3 [contents] - [e1]El-Sayed M. El-Alfy, Sabu M. Thampi, Hideyuki Takagi, Selwyn Piramuthu, Thomas Hanne:
Advances in Intelligent Informatics - Proceedings of the Third International Symposium on Intelligent Informatics, ISI 2014, September 24-27, 2014, Greater Noida, Delhi, India. Advances in Intelligent Systems and Computing 320, Springer 2015, ISBN 978-3-319-11217-6 [contents] - 2014
- [j59]Wei Zhou, Selwyn Piramuthu:
Consumer preference and service quality management with RFID. Ann. Oper. Res. 216(1): 35-51 (2014) - [j57]Wei Zhou, Wenjing Duan, Selwyn Piramuthu:
A social network matrix for implicit and explicit social network plates. Decis. Support Syst. 68: 89-97 (2014) - [j55]Enes Eryarsoy, Selwyn Piramuthu:
Experimental evaluation of sequential bias in online customer reviews. Inf. Manag. 51(8): 964-971 (2014) - [j54]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Inf. Forensics Secur. 9(6): 961-975 (2014) - 2013
- [j53]Wei Zhou, Selwyn Piramuthu:
Preventing ticket-switching of RFID-tagged items in apparel retail stores. Decis. Support Syst. 55(3): 802-810 (2013) - [j51]Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
Item-level RFID in retailing: What can B&M retailers learn from online retailers? Int. J. RF Technol. Res. Appl. 5(1-2): 107-122 (2013) - 2012
- [j50]Selwyn Piramuthu, Gaurav Kapoor, Wei Zhou, Sjouke Mauw:
Input online review data and related bias in recommender systems. Decis. Support Syst. 53(3): 418-424 (2012) - [j49]Wei Zhou, Eun Jung Yoon, Selwyn Piramuthu:
Simultaneous multi-level RFID tag ownership & transfer in health care environments. Decis. Support Syst. 54(1): 98-108 (2012) - [j48]Farzad Shafiei, David Sundaram, Selwyn Piramuthu:
Multi-enterprise collaborative decision support system. Expert Syst. Appl. 39(9): 7637-7651 (2012) - [j45]Gaurav Kapoor, Selwyn Piramuthu:
Single RFID Tag Ownership Transfer Protocols. IEEE Trans. Syst. Man Cybern. Part C 42(2): 164-173 (2012) - [c35]Wei Zhou, Selwyn Piramuthu:
A Critical Evaluation of RFID in Manufacturing. APMS (2) 2012: 41-48 - [c34]Sjouke Mauw, Selwyn Piramuthu:
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. STM 2012: 209-224 - 2011
- [j43]Yannick Meiller, Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
Adaptive knowledge-based system for health care applications with RFID-generated information. Decis. Support Syst. 51(1): 198-207 (2011) - [j42]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Multi-tag and multi-owner RFID ownership transfer in supply chains. Decis. Support Syst. 52(1): 258-270 (2011) - [j41]Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol. Eng. Appl. Artif. Intell. 24(7): 1300-1302 (2011) - [j40]Wei Zhou, Selwyn Piramuthu:
Current Developments in RFID Research. J. Organ. Comput. Electron. Commer. 21(4): 265-267 (2011) - [j39]Sylvain Bureau, Yannick Meiller, Wei Zhou, Selwyn Piramuthu:
Performance Drivers for RFID-Generated Item-Level Information in the Oil Industry. J. Organ. Comput. Electron. Commer. 21(4): 295-314 (2011) - [j38]Yu-Ju Tu, Selwyn Piramuthu:
A Decision-Support Model for Filtering RFID Read Data in Supply Chains. IEEE Trans. Syst. Man Cybern. Part C 41(2): 268-273 (2011) - [c33]Wei Zhou, Selwyn Piramuthu:
Combining fuzzy evidence from HB protocol variant for RFID authentication in supply chains. FSKD 2011: 816-819 - [c32]Yannick Meiller, Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
RFID-Embedded Decision Support for Tracking Surgical Equipment. HICSS 2011: 1-6 - [c31]Wei Zhou, Selwyn Piramuthu:
Remanufacturing/Refurbishment with RFID-Generated Item-Level Information. APMS 2011: 165-170 - [c30]Wei Zhou, Eun Jung Yoon, Selwyn Piramuthu:
Varying Levels of RFID Tag Ownership in Supply Chains. OTM Workshops 2011: 228-235 - [c29]Wei Zhou, Eun Jung Yoon, Selwyn Piramuthu:
Hierarchical RFID Tag Ownership and Transfer in Supply Chains. WEB 2011: 390-398 - 2010
- [j37]M. Daud Ahmed, David Sundaram, Selwyn Piramuthu:
Knowledge-based scenario management - Process and support. Decis. Support Syst. 49(4): 507-520 (2010) - [j36]Wei Zhou, Selwyn Piramuthu:
Framework, strategy and evaluation of health care processes with RFID. Decis. Support Syst. 50(1): 222-233 (2010) - [j35]David Sundaram, Wei Zhou, Selwyn Piramuthu, Schalk Pienaar:
Knowledge-based RFID enabled Web Service architecture for supply chain management. Expert Syst. Appl. 37(12): 7937-7946 (2010) - [j34]Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in some recently proposed RFID ownership transfer protocols. IEEE Commun. Lett. 14(3): 260-262 (2010) - [c28]Sylvain Bureau, Markus Bick, Selwyn Piramuthu, Yannick Meiller, Wei Zhou, Samuel Fosso Wamba:
Radio frequency identification: a case for health care. iiWAS 2010: 875-878 - 2009
- [j33]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
Identifying RFID-embedded objects in pervasive healthcare applications. Decis. Support Syst. 46(2): 586-593 (2009) - [j32]Wei Zhou, Yu-Ju Tu, Selwyn Piramuthu:
RFID-enabled item-level retail pricing. Decis. Support Syst. 48(1): 169-179 (2009) - [j31]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Challenges associated with RFID tag implementations in supply chains. Eur. J. Inf. Syst. 18(6): 526-533 (2009) - [j30]Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:
RFID-enabled item-level product information revelation. Eur. J. Inf. Syst. 18(6): 570-577 (2009) - [j29]Denise Emerson, Wei Zhou, Selwyn Piramuthu:
Goodwill, inventory penalty, and adaptive supply chain management. Eur. J. Oper. Res. 199(1): 130-138 (2009) - [j28]Selwyn Piramuthu, Riyaz T. Sikora:
Iterative feature construction for improving inductive learning algorithms. Expert Syst. Appl. 36(2): 3401-3406 (2009) - [j27]Selwyn Piramuthu, Michael J. Shaw:
Learning-enhanced adaptive DSS: a Design Science perspective. Inf. Technol. Manag. 10(1): 41-54 (2009) - [j26]Gaurav Kapoor, Selwyn Piramuthu:
Sequential Bias in Online Product Reviews. J. Organ. Comput. Electron. Commer. 19(2): 85-95 (2009) - [c26]Wei Zhou, Selwyn Piramuthu:
Healthcare Process Mining with RFID. Business Process Management Workshops 2009: 405-411 - [c25]David Sundaram, Wei Zhou, Schalk Pienaar, Selwyn Piramuthu:
Web Services-based architecture for RFID applications. EDOCW 2009: 100-106 - [c24]Farzad Shafiei, David Sundaram, Selwyn Piramuthu:
Implementing a multi-enterprise collaborative DSS. EDOCW 2009: 220-229 - [c23]Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:
Modified Slotted ALOHA protocol for RFID tag collisions. ICITST 2009: 1-2 - [c22]David Sundaram, Wei Zhou, Selwyn Piramuthu, Schalk Pienaar:
On Building a Web Services-based Prototype for RFID Applications. Intelligent Environments (Workshops) 2009: 109-115 - [c21]Wei Zhou, Selwyn Piramuthu:
RFID and Real-Time CRM. Intelligent Environments (Workshops) 2009: 125-133 - [c20]Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. NetCoM 2009: 354-357 - [c19]Wei Zhou, Selwyn Piramuthu:
Remanufacturing with RFID Item-Level Information. WEB 2009: 96-104 - 2008
- [j25]Juheng Zhang, Subhajyoti Bandyopadhyay, Selwyn Piramuthu:
Real option valuation on grid computing. Decis. Support Syst. 46(1): 333-343 (2008) - [j22]Yu-Ju Tu, Selwyn Piramuthu:
Reducing False Reads in RFID-Embedded Supply Chains. J. Theor. Appl. Electron. Commer. Res. 3(2): 60-70 (2008) - [c18]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
Distance Bounding Protocol for Multiple RFID Tag Authentication. EUC (2) 2008: 115-120 - [c17]Gaurav Kapoor, Wei Zhou, Selwyn Piramuthu:
RFID and Information Security in Supply Chains. MSN 2008: 59-62 - 2007
- [j19]Riyaz Sikora, Selwyn Piramuthu:
Framework for efficient feature selection in genetic algorithm based data mining. Eur. J. Oper. Res. 180(2): 723-737 (2007) - 2005
- [j15]Riyaz Sikora, Selwyn Piramuthu:
Efficient Genetic Algorithm Based Data Mining Using Feature Selection with Hausdorff Distance. Inf. Technol. Manag. 6(4): 315-331 (2005) - 2004
- [c13]Denise Emerson, Selwyn Piramuthu:
Agent-Based Framework for Dynamic Supply Chain Configuration. HICSS 2004 - 2001
- [j8]Sang C. Park, Selwyn Piramuthu, Michael J. Shaw:
Dynamic rule refinement in knowledge-based data mining systems. Decis. Support Syst. 31(2): 205-222 (2001) - 1998
- [j4]Selwyn Piramuthu, Narayan Raman, Michael J. Shaw:
Decision support system for scheduling a Flexible Flow System: Incorporation of feature construction. Ann. Oper. Res. 78: 219-234 (1998) - 1994
- [j3]Selwyn Piramuthu, Michael J. Shaw, James A. Gentry:
A classification approach using multi-layered neural networks. Decis. Support Syst. 11(5): 509-525 (1994) - 1993
- [j2]Selwyn Piramuthu, Narayan Raman, Michael J. Shaw, Sang-Chan Park:
Integration of simulation modeling and inductive learning in an adaptive decision support system. Decis. Support Syst. 9(1): 127-142 (1993) - [j1]Selwyn Piramuthu, Chung-Ming Kuan, Michael J. Shaw:
Learning Algorithms for Neural-Net Decision Support. INFORMS J. Comput. 5(4): 361-373 (1993) - 1991
- [c3]Harish Ragavan, Selwyn Piramuthu:
The Utility of Feature Construcuon for Back-Propagation. IJCAI 1991: 844-850 - 1990
- [c2]Sang-Chan Park, Selwyn Piramuthu, Narayan Raman, Michael J. Shaw:
Integrating Inductive Learning and Simulation in Rule-based Scheduling. Expert Systems in Engineering 1990: 152-167
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint