The persistence of memory: Forensic identification and extraction of cryptographic keys Fulltext Access 9 Pages 2009
Expanding the Technology Acceptance Model to examine Personal Computing Technology utilization in government agencies in developing countries Fulltext Access 9 Pages 2009
To theme or not to theme: Can theme strength be the music industry's “killer app”? Fulltext Access 9 Pages 2009
Improving efficiency in multiple-unit combinatorial auctions: Bundling bids from multiple bidders Fulltext Access 9 Pages 2009
Classification algorithm sensitivity to training data with non representative attribute noise Fulltext Access 9 Pages 2009
The influence of warning messages on the public's perception of substance use: A theoretical framework Fulltext Access 9 Pages 2009
Modeling and analysis of project team formation factors in a project-oriented virtual organization (ProVO) Fulltext Access 9 Pages 2009
Comparison of different matching methods in observational studies and sensitivity analysis: The relation between depression and STAI-2 scores Fulltext Access 9 Pages 2009
Social capital, behavioural control, and tacit knowledge sharing—A multi-informant design Fulltext Access 9 Pages 2009
Why the whole is less than the sum of its parts: Examining knowledge management in acquisitions Fulltext Access 9 Pages 2009
Evaluation of a personalized digital library based on cognitive styles: Adaptivity vs. adaptability Fulltext Access 9 Pages 2009
Uniting formal and informal descriptive power: Reconciling ontologies with folksonomies Fulltext Access 9 Pages 2009
On the need for collaboration in KM education in the LIS sector: Some professional perspectives Fulltext Access 9 Pages 2009
Going beyond technology: Knowledge sharing as a tool for enhancing customer-oriented attitudes Fulltext Access 9 Pages 2009
Public sector information management in east and southern Africa: Implications for FOI, democracy and integrity in government Fulltext Access 9 Pages 2009
A study on customer, supplier, and competitor knowledge using the knowledge chain model Fulltext Access 9 Pages 2009
The information security policy unpacked: A critical study of the content of university policies Fulltext Access 9 Pages 2009
DEX: Digital evidence provenance supporting reproducibility and comparison Fulltext Access 9 Pages 2009
The present status and analysis of Science & Technology Information (STI) service policy in Korea: Centered on Representative National STI Institute Fulltext Access 9 Pages 2009
The use of information systems in the Greek public financial services: The case of TAXIS Fulltext Access 9 Pages 2009
Tale of two databases: The history of federally funded information systems for education and medicine Fulltext Access 9 Pages 2009
Internet information-seeking and its relation to support for access to government records Fulltext Access 9 Pages 2009
Pestilence in paradise: Leprosy accounts in the annual reports of the governor of the territory of Hawaii Fulltext Access 9 Pages 2009
Regime formation and consequence: The case of internet security in the East-Asia ‘Four Tigers’ Fulltext Access 9 Pages 2009
Improving the process of E-Government initiative: An in-depth case study of web-based GIS implementation Fulltext Access 9 Pages 2009
Fuzzy system models (FSMs) for analysis of rock mass displacement caused by underground mining in soft rock strata Fulltext Access 9 Pages 2009
Grey clustering analysis for incipient fault diagnosis in oil-immersed transformers Fulltext Access 9 Pages 2009
Ensemble one-class support vector machines for content-based image retrieval Fulltext Access 9 Pages 2009
Extending co-citation analysis to discover authors with multiple expertise Fulltext Access 9 Pages 2009
An expert system for fault diagnosis in internal combustion engines using wavelet packet transform and neural network Fulltext Access 9 Pages 2009
A knowledge based real-time travel time prediction system for urban network Fulltext Access 9 Pages 2009
Context-aware selection of politeness level for polite mobile service in Korea Fulltext Access 9 Pages 2009
Classifying the segmentation of customer value via RFM model and RS theory Fulltext Access 9 Pages 2009
Sentiment classification of online reviews to travel destinations by supervised machine learning approaches Fulltext Access 9 Pages 2009
Fuzzy risk analysis based on similarity measures between interval-valued fuzzy numbers and interval-valued fuzzy number arithmetic operators Fulltext Access 9 Pages 2009
An integrated fuzzy QFD model proposal on routing of shipping investment decisions in crude oil tanker market Fulltext Access 9 Pages 2009
Calling communities analysis and identification using machine learning techniques Fulltext Access 9 Pages 2009
Reactive power and voltage control based on general quantum genetic algorithms Fulltext Access 9 Pages 2009
On-the-fly generation of multi-robot team formation strategies based on game conditions Fulltext Access 9 Pages 2009
Optimal design of discrete-value tilt angle of PV using sequential neural-network approximation and orthogonal array Fulltext Access 9 Pages 2009
Evolutionary-based feature selection approaches with new criteria for data mining: A case study of credit approval data Fulltext Access 9 Pages 2009
Forecasting of entropy production due to buoyant convection using support vector machines (SVM) in a partially cooled square cross-sectional room Fulltext Access 9 Pages 2009
A methodological concept for material selection of highly sensitive components based on multiple criteria decision analysis Fulltext Access 9 Pages 2009
A hybrid electromagnetism-like algorithm for single machine scheduling problem Fulltext Access 9 Pages 2009
Dynamically exploring internal mechanism of stock market by fuzzy-based support vector machines with high dimension input space and genetic algorithm Fulltext Access 9 Pages 2009
The use of a fuzzy logic-based system in cost-volume-profit analysis under uncertainty Fulltext Access 9 Pages 2009
Process parameter optimization for MIMO plastic injection molding via soft computing Fulltext Access 9 Pages 2009
Fuzzy efficiency measures in fuzzy DEA/AR with application to university libraries Fulltext Access 9 Pages 2009
Driver identification based on voice signal using continuous wavelet transform and artificial neural network techniques Fulltext Access 9 Pages 2009
CAIDSA: Computer-aided intelligent diagnostic system for bronchial asthma Fulltext Access 9 Pages 2009
Automatic online news monitoring and classification for syndromic surveillance Fulltext Access 10 Pages 2009
Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers Fulltext Access 10 Pages 2009
Surveying stock market forecasting techniques – Part II: Soft computing methods Fulltext Access 10 Pages 2009
The business value of information technology as measured by technical efficiency: Evidence from country-level data Fulltext Access 10 Pages 2009
A decision support system for detecting products missing from the shelf based on heuristic rules Fulltext Access 10 Pages 2009
An improved method for forecasting enrollments based on fuzzy time series and particle swarm optimization Fulltext Access 10 Pages 2009
Online-SVR for short-term traffic flow prediction under typical and atypical traffic conditions Fulltext Access 10 Pages 2009
Bringing science to digital forensics with standardized forensic corpora Fulltext Access 10 Pages 2009
Ontological analysis of web surf history to maximize the click-through probability of web advertisements Fulltext Access 10 Pages 2009
Portfolios of buyer–supplier exchange relationships in an online marketplace for IT services Fulltext Access 10 Pages 2009
The sustainability of B2B e-marketplaces: Ownership structure, market competition, and prior buyer–seller connections Fulltext Access 10 Pages 2009
Predicting and explaining the adoption of online trading: An empirical study in Taiwan Fulltext Access 10 Pages 2009
Discovery of unapparent association rules based on extracted probability Fulltext Access 10 Pages 2009
Genetic-based approaches in ranking function discovery and optimization in information retrieval — A framework Fulltext Access 10 Pages 2009
Intellectual Property Bundle (IPB) theory: Managing transaction costs in technology development through network governance Fulltext Access 10 Pages 2009
Adaptability in smart business networks: An exploratory case in the insurance industry Fulltext Access 10 Pages 2009
Exploring optimization of semantic relationship graph for multi-relational Bayesian classification Fulltext Access 10 Pages 2009