default search action
Sherry X. Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j19]Jiaqi Yan, Xin Li, Yani Shi, Sherry X. Sun, Huaiqing Wang:
The effect of intention analysis-based fraud detection systems in repeated supply Chain quality inspection: A context of learning and contract. Inf. Manag. 57(3): 103177 (2020) - [j18]Jiaqi Yan, Xin Li, Sherry X. Sun, Yani Shi, Huaiqing Wang:
A BDI Modeling Approach for Decision Support in Supply Chain Quality Inspection. IEEE Trans. Syst. Man Cybern. Syst. 50(3): 884-898 (2020)
2010 – 2019
- 2017
- [j17]Sherry X. Sun, Jing Zhao, Sumit Sarkar:
How High Should We Go? Determining Reservation Values to Negotiate Successfully for Composite Software Services. Inf. Syst. Res. 28(2): 353-377 (2017) - 2016
- [j16]Xin Li, Kun Chen, Sherry X. Sun, Terrance Fung, Huaiqing Wang, Daniel Dajun Zeng:
A Commonsense Knowledge-Enabled Textual Analysis Approach for Financial Market Surveillance. INFORMS J. Comput. 28(2): 278-294 (2016) - 2015
- [j15]Xin Li, Sherry X. Sun, Kun Chen, Terrance Fung, Huaiqing Wang:
Design Theory for Market Surveillance Systems. J. Manag. Inf. Syst. 32(2): 278-313 (2015) - 2014
- [j14]Xitong Guo, Sherry X. Sun, Doug Vogel:
A Dataflow Perspective for Business Process Integration. ACM Trans. Manag. Inf. Syst. 5(4): 22:1-22:33 (2014) - [c13]Jiaqi Yan, Sherry X. Sun, Huaiqing Wang, Yani Shi, Daning Hu:
Decision Support Systems to Detect Quality Deceptions in Supply Chain Quality Inspections: Design and Experimental Evaluation. ICIS 2014 - 2013
- [j13]Qingtian Zeng, Sherry X. Sun, Hua Duan, Cong Liu, Huaiqing Wang:
Cross-organizational collaborative workflow mining from a multi-source log. Decis. Support Syst. 54(3): 1280-1301 (2013) - [j12]Sherry X. Sun, J. Leon Zhao:
Formal workflow design analytics using data flow modeling. Decis. Support Syst. 55(1): 270-283 (2013) - [j11]Heng Tang, Stephen Shaoyi Liao, Sherry Xiaoyun Sun:
A prediction framework based on contextual data to support Mobile Personalized Marketing. Decis. Support Syst. 56: 234-246 (2013) - [j10]Yongzhi Cao, Sherry X. Sun, Huaiqing Wang, Guoqing Chen:
A Behavioral Distance for Fuzzy-Transition Systems. IEEE Trans. Fuzzy Syst. 21(4): 735-747 (2013) - [c12]Jing Zhao, Sherry X. Sun, Sumit Sarkar:
Coordinating One-to-many Concurrent Negotiation for Service Provision. ICIS 2013 - 2012
- [j9]Sherry X. Sun, Jing Zhao, Huaiqing Wang:
An agent based approach for exception handling in e-procurement management. Expert Syst. Appl. 39(1): 1174-1182 (2012) - [j8]Sherry X. Sun, Jing Zhao:
A decomposition-based approach for service composition with global QoS guarantees. Inf. Sci. 199: 138-153 (2012) - [j7]Narasimha Bolloju, Sherry Xiaoyun Sun:
Benefits of supplementing use case narratives with activity diagrams - An exploratory study. J. Syst. Softw. 85(9): 2182-2191 (2012) - 2011
- [j6]Daning Hu, Sherry X. Sun, J. Leon Zhao, Xinlei Zhao:
Strategic choices of inter-organizational information systems: A network perspective. Inf. Syst. Frontiers 13(5): 681-692 (2011) - [j5]Quan Liu, Sherry X. Sun, Huaiqing Wang, Jing Zhao:
A multi-agent based system for e-procurement exception management. Knowl. Based Syst. 24(1): 49-57 (2011) - [j4]Sherry Xiaoyun Sun, Qingtian Zeng, Huaiqing Wang:
Process-Mining-Based Workflow Model Fragmentation for Distributed Execution. IEEE Trans. Syst. Man Cybern. Part A 41(2): 294-310 (2011) - [i1]Yongzhi Cao, Huaiqing Wang, Sherry X. Sun, Guoqing Chen:
A Behavioral Distance for Fuzzy-Transition Systems. CoRR abs/1110.0248 (2011) - 2010
- [c11]Sherry X. Sun, Jing Zhao, Huaiqing Wang:
A Negotiation Based Approach for Service Composition. DESRIST 2010: 381-393 - [c10]Jiaqi Yan, Yani Shi, Sherry Xiaoyun Sun, Huaiqing Wang, Zhongsheng Hua:
Intelligent Agents for Negotiation and Recommendation in Mass Customization. PACIS 2010: 174
2000 – 2009
- 2009
- [j3]Hua Duan, Qingtian Zeng, Huaiqing Wang, Sherry X. Sun, Dongming Xu:
Classification and evaluation of timed running schemas for workflow based on process mining. J. Syst. Softw. 82(3): 400-410 (2009) - [c9]Jing Zhao, Sherry X. Sun, Huaiqing Wang, Quan Liu:
A Multi-Agent-Based System for eProcurement. AMCIS 2009: 28 - [c8]Narasimha Bolloju, Sherry X. Sun:
Enhancing the quality of use case models and activity diagrams using a differential quality model. DESRIST 2009 - 2008
- [j2]Honghui Deng, Qiwen Wang, G. Keong Leong, Sherry X. Sun:
The Usage of Opportunity Cost to Maximize Performance in Revenue Management. Decis. Sci. 39(4): 737-758 (2008) - [c7]Narasimha Bolloju, Sherry Xiaoyun Sun:
Exploiting the Complementary Relationship between Use Case Models and Activity Diagrams for Developing Quality Requirements Specifications. ER Workshops 2008: 144-153 - [c6]Sherry X. Sun, J. Leon Zhao:
Developing a Workflow Design Framework Based on Dataflow Analysis. HICSS 2008: 19 - [c5]Xitong (Maxwell) Guo, Sherry X. Sun, Doug Vogel:
A Data Flow Perspective for Business Process Integration. ICIS 2008: 118 - [c4]Heng Tang, Stephen Shaoyi Liao, Sherry Xiaoyun Sun:
Mining Sequential Relations from Multidimensional Data Sequence for Prediction. ICIS 2008: 197 - 2006
- [j1]Sherry X. Sun, J. Leon Zhao, Jay F. Nunamaker Jr., Olivia R. Liu Sheng:
Formulating the Data-Flow Perspective for Business Process Management. Inf. Syst. Res. 17(4): 374-391 (2006) - [c3]Sherry X. Sun, J. Leon Zhao:
Activity Relations: A Dataflow Approach to Workflow Design. ICIS 2006: 44 - 2005
- [c2]Sherry X. Sun, J. Leon Zhao, Jay F. Nunamaker Jr.:
On The Theoretical Foundation for Data Flow Analysis in Workflow Management. AMCIS 2005: 188 - 2004
- [c1]Sherry X. Sun, J. Leon Zhao, Olivia R. Liu Sheng:
Data Flow Modeling and Verification in Business Process Management. AMCIS 2004: 508
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint