Mookerjee Vijay

Vijay Mookerjee

Information about the author Vijay Mookerjee will soon be added to the site.
Found 15 papers in total
How to Deal with Liars? Designing Intelligent Rule-Based Expert Systems to Increase Accuracy or Reduce Cost
2017
Input distortion is a common problem faced by expert systems, particularly those...
When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security
2016
We study operational and managerial problems arising in the context of security...
The Design of Feature-Limited Demonstration Software: Choosing the Right Features to Include
2017
Today, software supports many important tasks in a variety of industries. In the...
Knowing What Your Customer Wants: Improving Inventory Allocation Decisions in Online Movie Rental Systems
2016
In Online Movie Rental Systems, customer desire to rent can often be observed before...
Optimal Coordination in Distributed Software Development
2016
The construction of a software system requires not only individual coding effort from...
Improving the Milk Supply Chain in Developing Countries: Analysis, Insights, and Recommendations
2014
Quality issues in milk–arising primarily from deliberate adulteration by...
Content Provision Strategies in the Presence of Content Piracy
2012
We consider a publisher that earns advertising revenue while providing content to...
Efficient Distribution of Water Between Head‐Reach and Tail‐End Farms in Developing Countries
2013
The necessity of surface water for irrigation and its increasing scarcity in...
Analyzing Sharing in Peer‐to‐Peer Networks Under Various Congestion Measures
2011
Historically, the use of peer‐to‐peer (P2P) networks has been limited...
When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination
2011
This paper analyzes interactions between a firm that seeks to discriminate between...
Structural Search and Optimization in Social Networks
2012
The explosive growth in the variety and size of social networks has focused attention...
Knowledge sharing and investment decisions in information security
2011
We study the relationship between decisions made by two similar firms pertaining to...
An analysis of coordination mechanisms for the U.S. cash supply chain
2010
The overuse of its currency processing facilities by depository institutions (DIs) has...
Maintaining Diagnostic Knowledge-Based Systems: A Control-Theoretic Approach
2009
Diagnostic knowledge–based systems are used in a variety of application domains...
Value-driven creation of functionality in software projects: optimal sequencing and reuse
2007
We study the problem of optimally sequencing the creation of elements in a software...
Papers per page: