Fusion of Band Limited Phase Only Correlation and Width Centroid Contour Distance for finger based biometrics Fulltext Access 16 Pages 2014
Dynamic clustering of histogram data based on adaptive squared Wasserstein distances Fulltext Access 16 Pages 2014
Fabrication process suitability ranking for micro-electro-mechanical systems using a fuzzy inference system Fulltext Access 16 Pages 2014
Site-shifting as the source of ambidexterity: Empirical insights from the field of ticketing Fulltext Access 16 Pages 2014
A novel evidence based model for detecting dangerous situations in level crossing environments Fulltext Access 16 Pages 2014
Assessing single-pair similarity over graphs by aggregating first-meeting probabilities Fulltext Access 16 Pages 2014
The impact of multinationality on firm value: A comparative analysis of machine learning techniques Fulltext Access 16 Pages 2014
A social appraisal mechanism for online purchase decision support in the micro-blogosphere Fulltext Access 16 Pages 2014
Intelligent business processes composition based on multi-agent systems Fulltext Access 17 Pages 2014
Modeling and execution of event stream processing in business processes Fulltext Access 17 Pages 2014
A game-based approach towards facilitating decision making for perishable products: An example of blood supply chain Fulltext Access 17 Pages 2014
Controlled automated discovery of collections of business process models Fulltext Access 17 Pages 2014
Developing a maturity model for service systems in heavy equipment manufacturing enterprises Fulltext Access 17 Pages 2014
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders Fulltext Access 17 Pages 2014
Validation of user intentions in process orchestration and choreography Fulltext Access 17 Pages 2014
Experimental evaluation of user performance on two-dimensional and three-dimensional perspective displays in discrete-event simulation Fulltext Access 17 Pages 2014
Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use Fulltext Access 17 Pages 2014
A knowledge based reliability engineering approach to manage product safety and recalls Fulltext Access 17 Pages 2014
Bivariate quality control using two-stage intelligent monitoring scheme Fulltext Access 17 Pages 2014
A new Probe Guided Mutation operator and its application for solving the cardinality constrained portfolio optimization problem Fulltext Access 17 Pages 2014
Modeling and verifying choreographed multi-agent-based web service compositions regulated by commitment protocols Fulltext Access 17 Pages 2014
A fuzzy nearest neighbor neural network statistical model for predicting demand for natural gas and energy cost savings in public buildings Fulltext Access 17 Pages 2014
A new multi-objective multi-mode model for solving preemptive time–cost–quality trade-off project scheduling problems Fulltext Access 17 Pages 2014
From blurry numbers to clear preferences: A mechanism to extract reputation in social networks Fulltext Access 17 Pages 2014
A decision support system for optimizing dynamic courier routing operations Fulltext Access 17 Pages 2014
Business ecosystem and stakeholders’ role transformation: Evidence from Chinese emerging electric vehicle industry Fulltext Access 17 Pages 2014
Solving system-level synthesis problem by a multi-objective estimation of distribution algorithm Fulltext Access 18 Pages 2014
Information systems strategizing, organizational sub-communities, and the emergence of a sustainability strategy Fulltext Access 18 Pages 2014
How anchoring and adjusting influence citizens’ acceptance of video-mediated crime reporting: A narrative approach Fulltext Access 18 Pages 2014
Incorporating trust-in-technology into Expectation Disconfirmation Theory Fulltext Access 18 Pages 2014
A hybrid algorithm for Bayesian network structure learning with application to multi-label learning Fulltext Access 18 Pages 2014
The interface between technology and customer cyberbullying: Evidence from India Fulltext Access 18 Pages 2014
A modified Covariance Matrix Adaptation Evolution Strategy with adaptive penalty function and restart for constrained optimization Fulltext Access 18 Pages 2014
One-Class Classification based on searching for the problem features limits Fulltext Access 18 Pages 2014
Intelligent forecasting system based on integration of electromagnetism-like mechanism and fuzzy neural network Fulltext Access 18 Pages 2014
Object clustering and recognition using multi-finite mixtures for semantic classes and hierarchy modeling Fulltext Access 18 Pages 2014
Automated generation of computationally hard feature models using evolutionary algorithms Fulltext Access 18 Pages 2014
High utility itemset mining with techniques for reducing overestimated utilities and pruning candidates Fulltext Access 18 Pages 2014
Simplifying process model abstraction: Techniques for generating model names Fulltext Access 18 Pages 2014
Application of a Fuzzy Feasibility Bayesian Probabilistic Estimation of supply chain backorder aging, unfilled backorders, and customer wait time using stochastic simulation with Markov blankets Fulltext Access 18 Pages 2014
Behavioral modeling and formal verification of a resource discovery approach in Grid computing Fulltext Access 19 Pages 2014
The impact of information technology on performance in the not-for-profit sector Fulltext Access 19 Pages 2014
Embedded devices for supply chain applications: Towards hardware integration of disparate technologies Fulltext Access 19 Pages 2014
An agent-based distributed computational experiment framework for virtual supply chain network development Fulltext Access 19 Pages 2014
Understanding the effect of knowledge management strategies on knowledge management performance: A contingency perspective Fulltext Access 19 Pages 2014
Behavior monitoring under uncertainty using Bayesian surprise and optimal action selection Fulltext Access 19 Pages 2014
An efficient algorithm for computing safe exit points of moving range queries in directed road networks Fulltext Access 19 Pages 2014
Organizational responsiveness to anti-offshoring institutional pressures Fulltext Access 20 Pages 2014
Felt quality of sociomaterial relations: Introducing emotions into sociomaterial theorizing Fulltext Access 20 Pages 2014
Efficient processing of label-constraint reachability queries in large graphs Fulltext Access 20 Pages 2014
Nonprofessional investors' perceptions of the incremental value of continuous auditing and continuous controls monitoring: An experimental investigation Fulltext Access 20 Pages 2014
A semantic interoperability framework for software as a service systems in cloud computing environments Fulltext Access 20 Pages 2014
Utilizing contextual ontological user profiles for personalized recommendations Fulltext Access 21 Pages 2014
Fault diagnosis of rolling element bearings via discriminative subspace learning: Visualization and classification Fulltext Access 21 Pages 2014
An event-based platform for collaborative threats detection and monitoring Fulltext Access 21 Pages 2014
What stakeholders will or will not say: A theoretical and empirical study of topic importance in Requirements Engineering elicitation interviews Fulltext Access 21 Pages 2014
Dynamic immigration control improving inverse old-age dependency ratio in a pay-as-you-go pension system Fulltext Access 21 Pages 2014
Modern information technology in an old workforce: Toward a strategic research agenda Fulltext Access 21 Pages 2014
An efficient hybrid genetic algorithm to design finite impulse response filters Fulltext Access 21 Pages 2014
Using a knowledge learning framework to predict errors in database design Fulltext Access 21 Pages 2014
IT infusion within the audit process: Spreadsheet use in small audit firms Fulltext Access 21 Pages 2014
A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis Fulltext Access 21 Pages 2014
Dynamic estimation of worker reliability in crowdsourcing for regression tasks: Making it work Fulltext Access 21 Pages 2014