Dynamic representation of fuzzy knowledge based on fuzzy petri net and genetic-particle swarm optimization Fulltext Access 8 Pages 2014
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics Fulltext Access 8 Pages 2014
Novel Adaptive Charged System Search algorithm for optimal tuning of fuzzy controllers Fulltext Access 8 Pages 2014
Employees’ adherence to information security policies: An exploratory field study Fulltext Access 8 Pages 2014
Towards an implementation framework for business intelligence in healthcare Fulltext Access 8 Pages 2014
Out of sight, but not out of mind: Traces of nearby devices' wireless transmissions in volatile memory Fulltext Access 8 Pages 2014
If it's fair, I’ll share: The effect of perceived knowledge validation justice on contributions to an organizational knowledge repository Fulltext Access 9 Pages 2014
An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital Fulltext Access 9 Pages 2014
Effects of cognitive and social factors on system utilization and performance outcomes Fulltext Access 9 Pages 2014
Determinants of users’ continuance of social networking sites: A self-regulation perspective Fulltext Access 9 Pages 2014
Understanding the role of consistency during web–mobile service transition: Dimensions and boundary conditions Fulltext Access 9 Pages 2014
Developing a competitive edge in electronic markets via institutional and social based quality signaling mechanisms Fulltext Access 9 Pages 2014
Performance implications of stage-wise lead user participation in software development problem solving Fulltext Access 9 Pages 2014
A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites Fulltext Access 9 Pages 2014
Why do users switch to a disruptive technology? An empirical study based on expectation-disconfirmation theory Fulltext Access 9 Pages 2014
Social structural behavior of deception in computer-mediated communication Fulltext Access 9 Pages 2014
A real-time personalized route recommendation system for self-drive tourists based on vehicle to vehicle communication Fulltext Access 9 Pages 2014
A set of ethical principles for design science research in information systems Fulltext Access 9 Pages 2014
Practical use of Approximate Hash Based Matching in digital investigations Fulltext Access 9 Pages 2014
A parameter selection strategy for particle swarm optimization based on particle positions Fulltext Access 9 Pages 2014
An application of case-based reasoning with machine learning for forensic autopsy Fulltext Access 9 Pages 2014
Finding disseminators via electronic word of mouth message for effective marketing communications Fulltext Access 9 Pages 2014
A new type-2 fuzzy set of linguistic variables for the fuzzy analytic hierarchy process Fulltext Access 9 Pages 2014
Document clustering method using dimension reduction and support vector clustering to overcome sparseness Fulltext Access 9 Pages 2014
A decision-making algorithm for automatic flow pattern identification in high-speed imaging Fulltext Access 9 Pages 2014
Online dictionary learning algorithm with periodic updates and its application to image denoising Fulltext Access 9 Pages 2014
Integration of feedforward neural network and finite element in the draw-bend springback prediction Fulltext Access 9 Pages 2014
The double layer optimization problem to express logistics systems and its heuristic algorithm Fulltext Access 9 Pages 2014
A robust hybrid multi-criteria decision making methodology for contractor evaluation and selection in third-party reverse logistics Fulltext Access 9 Pages 2014
Exploring the economic value of personal information from firms' financial statements Fulltext Access 9 Pages 2014
Work-related factors influencing doctors search behaviors and trust toward medical information resources Fulltext Access 9 Pages 2014
Do actions speak louder than voices? The signaling role of social information cues in influencing consumer purchase decisions Fulltext Access 9 Pages 2014
Discrete techniques applied to low-energy mobile human activity recognition. A new approach Fulltext Access 9 Pages 2014
Knowledge spaces and places: From the perspective of a “born-global” start-up in the field of urban technology Fulltext Access 9 Pages 2014
Migrant knowledge workers: An empirical study of global Sydney as a knowledge city Fulltext Access 9 Pages 2014
Indirect immunofluorescence image classification using texture descriptors Fulltext Access 9 Pages 2014
An improved boosting based on feature selection for corporate bankruptcy prediction Fulltext Access 9 Pages 2014
Power coefficient as a similarity measure for memory-based collaborative recommender systems Fulltext Access 9 Pages 2014
An agent-based simulation system for concert venue crowd evacuation modeling in the presence of a fire disaster Fulltext Access 9 Pages 2014
Weighted archetypal analysis of the multi-element graph for query-focused multi-document summarization Fulltext Access 9 Pages 2014
A decomposition method to analyze the performance of frame bridge based automated container terminal Fulltext Access 9 Pages 2014
A hybrid particle swarm optimization algorithm for satisficing data envelopment analysis under fuzzy chance constraints Fulltext Access 9 Pages 2014
Extending market basket analysis with graph mining techniques: A real case Fulltext Access 9 Pages 2014
A variable size mechanism of distributed graph programs and its performance evaluation in agent control problems Fulltext Access 9 Pages 2014
Multi-criteria group decision making under uncertainty with application to air traffic safety Fulltext Access 9 Pages 2014
Quantitative analysis of morphological techniques for automatic classification of micro-calcifications in digitized mammograms Fulltext Access 9 Pages 2014
Optimal Fuzzy Inference System incorporated with stability index tracing: An application for effective load shedding Fulltext Access 9 Pages 2014
Event-driven agility of interoperability during the Run-time of collaborative processes Fulltext Access 9 Pages 2014
Using a transactor/revolver scorecard to make credit and pricing decisions Fulltext Access 9 Pages 2014
An application of capital allocation principles to operational risk and the cost of fraud Fulltext Access 9 Pages 2014
Development and validation of instruments of information security deviant behavior Fulltext Access 9 Pages 2014
Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings Fulltext Access 9 Pages 2014
Evaluating detection error trade-offs for bytewise approximate matching algorithms Fulltext Access 9 Pages 2014
Facilitating representation and retrieval of structured cases: Principles and toolkit Fulltext Access 9 Pages 2014
A misclassification cost risk bound based on hybrid particle swarm optimization heuristic Fulltext Access 9 Pages 2014
Self-adaptive obtaining water-supply reservoir operation rules: Co-evolution artificial immune system Fulltext Access 9 Pages 2014
Coalition formation based on marginal contributions and the Markov process Fulltext Access 9 Pages 2014
Hesitant triangular fuzzy information aggregation based on Einstein operations and their application to multiple attribute decision making Fulltext Access 9 Pages 2014
A novel intrusion detection system based on feature generation with visualization strategy Fulltext Access 9 Pages 2014
Combining additive input noise annealing and pattern transformations for improved handwritten character recognition Fulltext Access 9 Pages 2014
Evolutionary assembled neural networks for making medical decisions with minimal regret: Application for predicting advanced bladder cancer outcome Fulltext Access 9 Pages 2014
Determination of temporal information granules to improve forecasting in fuzzy time series Fulltext Access 9 Pages 2014
A modified particle swarm optimization for aggregate production planning Fulltext Access 9 Pages 2014