You are on page 1of 5

Literature cited

Kobsa, A. (2001). Generic user modeling systems. User modeling and useradapted

interaction, 11(1-2),

49-63.October

31

2015

Retrieved

fromhttp://link.springer.com/article/10.1023/A:1011187500863#page-1
Sumner, M. (1999, April). Critical success factors in enterprise wide
information management systems projects. In Proceedings of the 1999 ACM
SIGCPR

conference

on

Computer

personnel

research (pp.

297-303).

ACM.October 31 2015 Retrieved fromhttps://www.google.com/patents/US6131067


Lee, Y. H., Cho, M. K., Kim, S. J., & Kim, Y. B. (2002). Supply chain simulation
with

discretecontinuous

Engineering, 43(1),

combined

modeling. Computers

375-392.October

31

&

2015

Industrial
Retrieved

fromhttp://www.sciencedirect.com/science/article/pii/S0360835202000803
Morris, R. J. (1997). U.S. Patent No. 5,634,052. Washington, DC: U.S. Patent
and

Trademark

Office.October

31

2015

Retrieved

fromhttps://www.google.com/patents/US5634052
Rogers,

R.

M.,

&Lagarde,

K.

C.

(1999). U.S.

Patent

No.

5,974,441.

Washington, DC: U.S. Patent and Trademark Office.October 31 2015


Retrieved fromhttps://www.google.com/patents/US5974441
Lenz, M. A. (2000). U.S. Patent No. 6,029,196. Washington, DC: U.S. Patent
and

Trademark

Office.October

31

2015

Retrieved

fromhttps://www.google.com/patents/US6029196
Kloba, D. D., Gray, M. R., Moore, D. M., Whittaker, T. E., Williams, D. J.,
Weinstein, R. Z., ...& Upson, L. M. (2002). U.S. Patent No. 6,341,316.
Washington, DC: U.S. Patent and Trademark Office.October 31 2015
Retrieved fromhttps://www.google.com/patents/US6341316

Levergood, T. M., Stewart, L. C., Morris, S. J., Payne, A. C., &Treese, G. W.


(1998). U.S. Patent No. 5,708,780. Washington, DC: U.S. Patent and
Trademark

Office..October

31

2015Retrieved

fromhttps://www.google.com/patents/US5708780
Shi, S. B., Ault, M. B., Plassmann, E. R., Rich, B. A., Rosiles, M. A., &Shrader, T.
J. L. (1999). U.S. Patent No. 5,875,296. Washington, DC: U.S. Patent and
Trademark

Office.October

31

2015Retrieved

fromhttps://www.google.com/patents/us5875296
Putzolu, D. M. (2003). U.S. Patent No. 6,578,076. Washington, DC: U.S. Patent
and

Trademark

Office..October

31

2015Retrieved

fromhttps://www.google.com/patents/US6578076
Brinkley, P. A., Dorval, T. L., Zwierzynski, T. M., &Gerenser, G. J. (1999). U.S.
Patent

No.

5,963,919.

Washington,

DC:

U.S.

Patent

and

Trademark

Office.October 31 2015Retrieved fromhttps://www.google.com/patents/US5963919


Knight,

P.,

Salmen,

L.,

&Krajec,

10/769,098.October

R.

(2004). U.S.

31

Patent

2015

Application
Retrieved

fromhttps://www.google.com/patents/US20040186783
Hellerstein, J. L., Kar, G., & Keller, A. (2006). U.S. Patent No. 7,013,461.
Washington, DC: U.S. Patent and Trademark Office.October 31 2015Retrieved
fromhttps://www.google.com/patents/US7013461
Joseph, J. (1999). U.S. Patent No. 5,878,401. Washington, DC: U.S. Patent and
Trademark

Office..October

31

2015Retrieved

fromhttps://www.google.com/patents/US5878401
Buchanan, D. D. (1998). U.S. Patent No. 5,758,355. Washington, DC: U.S.
Patent

and

Trademark

Office.October

31

2015Retrieved

fromhttps://www.google.com/patents/US5758355
Lucas,

M.

(2007). U.S.

Patent

Application

11/657,584.October

2015Retrieved fromhttps://www.google.com/patents/US20070124216

31

Parker, J. A., Legner, G. J., Lima, G., Schwartz, D. P., &Gunkel, J. R. (2002).U.S.
Patent

No.

6,366,930.

Washington,

DC:

U.S.

Patent

and

Trademark

Office.October 31 2015Retrieved fromhttps://www.google.com/patents/US6366930


Kobsa, A. (2001). It describes their purposes, their services within useradaptive systems, and the different design requirements for research
prototypes and commercially deployed servers.
Lee, Y. H., Cho, M. K., Kim, S. J., & Kim, Y. B. (2002).Many simulation models
have been built to facilitate the use of simulation in designing, evaluating,
and optimizing supply chains
Morris, R. J. (1997). In a client/server environment having a backup
subsystem, a method and means for reducing the storage requirement in
said backup subsystem and further reducing the load on the transmission
bandwidth between the clients and the backup subsystem.
Rogers, R. M., &Lagarde, K. C. (1999). A World Wide Web browser makes
requests to web servers on a network which receive and fulfill requests as an
agent of the browser client, organizing distributed sub-agents as distributed
integration solution (DIS) servers on an intranet network supporting the web
server which also has an access agent servers accessible over the Internet.
Lenz, M. A. (2000). An automatic client configuration system provides a
system administrator with the ability to configure every client in a network
with one file which resides on the server, and which contains information for
setting the client's lock files, preferences, configuration information, and
software versions.
Kloba, D. D., Gray, M. R., Moore, D. M., Whittaker, T. E., Williams, D. J.,
Weinstein, R. Z., ... & Upson, L. M. (2002).Described herein are systems,
methods,

computer

program

products,

and

combinations

and

sub-

combinations thereof, for enabling web content (as well as other objects) to
be loaded on mobile devices (as well as other types of devices), and for

users of mobile devices to operate with such web content on their mobile
devices in an interactive manner while in an off-line mode.
Levergood, T. M., Stewart, L. C., Morris, S. J., Payne, A. C., &Treese, G. W.
(1998). In particular, the process described in the invention includes clientserver sessions over the Internet involving hypertext files.
Shi, S. B., Ault, M. B., Plassmann, E. R., Rich, B. A., Rosiles, M. A., &Shrader, T.
J. L. (1999).The distributed computing environment includes a security
service for returning a credential to a user authenticated to access the
distributed file system.
Putzolu, D. M. (2003). A system and method for managing a network involves
evaluating a condition relating to a network resource.
Brinkley, P. A., Dorval, T. L., Zwierzynski, T. M., &Gerenser, G. J. (1999).A
system and method for evaluating an inventory management strategy
combines

multiple

management

strategies

in

single

inventory

management system.
Knight, P., Salmen, L., &Krajec, R. (2004). Inventory data, including time
sensitive inventory data, are used to rank a list of choices presented at a
point of sale terminal.
Hellerstein, J. L., Kar, G., & Keller, A. (2006). Computer-based methods and
systems for performing automated distribution of a software package to one
or more target machines in one or more regions of a distributed network of
target machines, comprises the following steps.
Joseph, J. (1999). The computer determines from a database whether the
requested item is available.
Buchanan, D. D. (1998). A storage medium encoded is provided for use in
synchronization of a server database, which includes a plurality of tables and
which is accessible on a server computer system, and a client database

Lucas, M. (2007). Location information for inventory items available for sale
by one or more sellers; for permitting potential customers to search,
preferably in near real time, for the availability and location of such inventory
items; for permitting customers to reserve, and purchase, such inventory
items at location(s) of their choosing; and for permitting sellers to improve
their inventory management based on customer search requests.
Parker, J. A., Legner, G. J., Lima, G., Schwartz, D. P., &Gunkel, J. R. (2002).A
computerized process of intelligently inventorying data and managing assets
includes the steps of initially inventorying a plurality of hardware, software,
and data files on-site by assigning a hexadecimal signature identifying each
file in the database