Different relationships for coping with ambiguity and uncertainty in organizations Fulltext Access 7 Pages 2009
Personality disorder in social networks: Network position as a marker of interpersonal dysfunction Fulltext Access 7 Pages 2009
A diffusion approximation for batch queues of type GX/G(b,b)/1GX/G(b,b)/1 Fulltext Access 7 Pages 2009
Analysis and compensation of transistor non-idealities in log-domain wave active filters Fulltext Access 7 Pages 2009
De-embedding parasitic components from propagation constant calculations Fulltext Access 7 Pages 2009
Field-programmable analogue array design based on the wave active filter design method Fulltext Access 7 Pages 2009
You are who remembers you. Detecting leadership through accuracy of recall Fulltext Access 7 Pages 2009
Single-resistance-controlled quadrature oscillator and universal biquad filter using CFOAs Fulltext Access 7 Pages 2009
Achievable rates for two interfering broadcast channels with a cognitive transmitter Fulltext Access 7 Pages 2009
Explicit calculation of overflow variances in loss systems with selective trunk reservation Fulltext Access 7 Pages 2009
Experimental verification of a linear inverse scattering algorithm for the localization of planar interfaces Fulltext Access 7 Pages 2009
Bootstrapping least distance estimator in the multivariate regression model Fulltext Access 7 Pages 2009
Nonparametric density estimation of streaming data using orthogonal series Fulltext Access 7 Pages 2009
The finite-sample effects of VAR dimensions on OLS bias, OLS variance, and minimum MSE estimators Fulltext Access 7 Pages 2009
Sample path large and moderate deviations for risk model with delayed claims Fulltext Access 7 Pages 2009
Optimal financing and dividend control of the insurance company with fixed and proportional transaction costs Fulltext Access 7 Pages 2009
The credibility premiums for models with dependence induced by common effects Fulltext Access 7 Pages 2009
Generalized dynamic spectrum access: An order statistics design perspective Fulltext Access 7 Pages 2009
Full backward non-homogeneous semi-Markov processes for disability insurance models: A Catalunya real data application Fulltext Access 7 Pages 2009
Risk measures with comonotonic subadditivity or convexity and respecting stochastic orders Fulltext Access 7 Pages 2009
Doubly singular matrix variate beta type I and II and singular inverted matricvariate tt distributions Fulltext Access 7 Pages 2009
A note on the differentiation formula in Stratonovich type for fractional Brownian sheet Fulltext Access 7 Pages 2009
Approximate MLE for the scaled generalized exponential distribution under progressive type-II censoring Fulltext Access 7 Pages 2009
Discussion: Why do we test multiple traits in genetic association studies Fulltext Access 7 Pages 2009
Recognizing yield patterns through hybrid applications of machine learning techniques Fulltext Access 7 Pages 2009
Embedding Hamiltonian cycles in alternating group graphs under conditional fault model Fulltext Access 7 Pages 2009
Convergence of powers for a fuzzy matrix with convex combination of max-min and max-arithmetic mean operations Fulltext Access 7 Pages 2009
Quantum scholasticism: On quantum contexts, counterfactuals, and the absurdities of quantum omniscience Fulltext Access 7 Pages 2009
Diagnosable evaluation of DCC linear congruential graphs under the PMC diagnostic model Fulltext Access 7 Pages 2009
A survivable routing algorithm with differentiated domain protection based on a virtual topology graph in multi-domain optical networks Fulltext Access 7 Pages 2009
Logic of knowledge and discovery via interacting agents – Decision algorithm for true and satisfiable statements Fulltext Access 7 Pages 2009
Noninformative priors for the common mean in the bivariate normal distribution Fulltext Access 8 Pages 2009
Comparison of hyperbolic and constant width simultaneous confidence bands in multiple linear regression under MVCS criterion Fulltext Access 8 Pages 2009
Exact inference on contrasts in means of intraclass correlation models with missing responses Fulltext Access 8 Pages 2009
Rotation test with pairwise distance measures of sample vectors in a GLM Fulltext Access 8 Pages 2009
The equivalence of convergences of sequences of fuzzy numbers and its applications to the characterization of compact sets Fulltext Access 8 Pages 2009
Distribution of ratio of extreme of isotonic estimators of chi-square variables with applications Fulltext Access 8 Pages 2009
Planning life tests with progressively Type-I interval censored data from the lognormal distribution Fulltext Access 8 Pages 2009
A non-interactive deniable authentication scheme based on designated verifier proofs Fulltext Access 8 Pages 2009
A fuzzy analysis of country-size argument for the Feldstein–Horioka puzzle Fulltext Access 8 Pages 2009
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Fulltext Access 8 Pages 2009
Getting insights from the voices of customers: Conversation mining at a contact center Fulltext Access 8 Pages 2009
Associated evolution of a support vector machine-based classifier for pedestrian detection Fulltext Access 8 Pages 2009
A Lookup Table Decoding of systematic (47, 24, 11) quadratic residue code Fulltext Access 8 Pages 2009
A bi-level programming for logistics network design with system-optimized flows Fulltext Access 8 Pages 2009
Extracting complex linguistic data summaries from personnel database via simple linguistic aggregations Fulltext Access 8 Pages 2009
It takes two to tango: The (un)easy dance between life-course sociology and life-span psychology Fulltext Access 8 Pages 2009
On the conflict between inducing confusion and attaining payoff in adversarial decision making Fulltext Access 8 Pages 2009
A novel secret image sharing scheme for true-color images with size constraint Fulltext Access 8 Pages 2009
Estimation of the scale parameter of the Rayleigh distribution under general progressive censoring Fulltext Access 8 Pages 2009
Analysis of the efficiency of the Chor–Rivest cryptosystem implementation in a safe-parameter range Fulltext Access 8 Pages 2009
Stochastic orders and aging notions based upon the moment generating function order: Theory Fulltext Access 8 Pages 2009
Some single-machine and m-machine flowshop scheduling problems with learning considerations Fulltext Access 8 Pages 2009