Missing value imputation using a novel grey based fuzzy c-means, mutual information based feature selection, and regression model Fulltext Access 61 Pages 2019
Social informatics of intelligent manufacturing ecosystems: A case study of KuteSmart Fulltext Access 4 Pages 2018
Synthesis of event-triggered dynamic quantizers for networked control systems Fulltext Access 7 Pages 2018
Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method Fulltext Access 7 Pages 2018
Social media metrics and analytics in marketing - S3M: A mapping literature review Fulltext Access 7 Pages 2018
Alexa, did you get that? Determining the evidentiary value of data stored by the Amazon® Echo Fulltext Access 7 Pages 2018
A unified framework for detecting author spamicity by modeling review deviation Fulltext Access 8 Pages 2018
Curriculum learning based approach for noise robust language identification using DNN with attention Fulltext Access 8 Pages 2018
Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit Fulltext Access 9 Pages 2018
Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge Fulltext Access 9 Pages 2018
Leveraging relocations in ELF-binaries for Linux kernel version identification Fulltext Access 9 Pages 2018
OpenForensics: A digital forensics GPU pattern matching approach for the 21st century Fulltext Access 9 Pages 2018
Multi-kernel extreme learning machine for EEG classification in brain-computer interfaces Fulltext Access 9 Pages 2018
Democratic transition and transparency reform: An fsQCA analysis of access to information laws in twenty-three countries Fulltext Access 9 Pages 2018
Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users Fulltext Access 9 Pages 2018
Rough fuzzy joint probabilistic association for tracking multiple targets in the presence of ECM Fulltext Access 9 Pages 2018
Analyzing the scientific evolution and impact of e-Participation research in JCR journals using science mapping Fulltext Access 9 Pages 2018
Balance of payment constrained economic growth in Nigeria: How useful is the Thirlwall's hypothesis? Fulltext Access 9 Pages 2018
DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps Fulltext Access 10 Pages 2018
An on-line VAD based on Multi-Normalisation Scoring (MNS) of observation likelihoods Fulltext Access 10 Pages 2018
Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding Fulltext Access 10 Pages 2018
ExUP recommendations: Inferring user's product metadata preferences from single-criterion rating systems Fulltext Access 10 Pages 2018
Data analytics and firm performance: An empirical study in an online B2C platform Fulltext Access 10 Pages 2018
Connecto ergo sum! an exploratory study of the motivations behind the usage of connected objects Fulltext Access 10 Pages 2018
A sequential search-space shrinking using CNN transfer learning and a Radon projection pool for medical image retrieval Fulltext Access 10 Pages 2018
Improving early OSV design robustness by applying 'Multivariate Big Data Analytics' on a ship's life cycle Fulltext Access 10 Pages 2018
Customer's reaction to cross-channel integration in omnichannel retailing: The mediating roles of retailer uncertainty, identity attractiveness, and switching costs Fulltext Access 11 Pages 2018
A novel similarity classifier with multiple ideal vectors based on k-means clustering Fulltext Access 11 Pages 2018
Workforce management in omnichannel service centers with heterogeneous channel response urgencies Fulltext Access 11 Pages 2018
Extending the model of internet standards adoption: A cross-country comparison of IPv6 adoption Fulltext Access 11 Pages 2018
Enhancing team creative performance through social media and transactive memory system Fulltext Access 11 Pages 2018
Identifying reputation collectors in community question answering (CQA) sites: Exploring the dark side of social media Fulltext Access 11 Pages 2018
Third-party apps (TPAs) and software platform performance: The moderating role of competitive entry Fulltext Access 11 Pages 2018
Impact of ESN implementation on communication and knowledge-sharing in a multi-national organization Fulltext Access 11 Pages 2018
Predicting interpurchase time in a retail environment using customer-product networks: An empirical study and evaluation Fulltext Access 11 Pages 2018
Amended fused TOPSIS-VIKOR for classification (ATOVIC) applied to some UCI data sets Fulltext Access 11 Pages 2018
Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling Fulltext Access 11 Pages 2018
Remediating critical cause-effect situations with an extended BDI architecture Fulltext Access 11 Pages 2018
A multi-class EEG-based BCI classification using multivariate empirical mode decomposition based filtering and Riemannian geometry Fulltext Access 11 Pages 2018
Trustor clustering with an improved recommender system based on social relationships Fulltext Access 11 Pages 2018
An advanced GRASP-HGA combination to solve a multi-period Pickup and Delivery Problem Fulltext Access 11 Pages 2018
ECG classification using three-level fusion of different feature descriptors Fulltext Access 11 Pages 2018
Subsequence dynamic time warping for charting: Bullish and bearish class predictions for NYSE stocks Fulltext Access 12 Pages 2018
MalDozer: Automatic framework for android malware detection using deep learning Fulltext Access 12 Pages 2018
Customer agility and responsiveness through big data analytics for public value creation: A case study of Houston 311 on-demand services Fulltext Access 12 Pages 2018
New Deterministic Solution to a chance constrained linear programming model with Weibull Random Coefficients Fulltext Access 12 Pages 2018
Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time Fulltext Access 12 Pages 2018
Cyber-analytics: Modeling factors associated with healthcare data breaches Fulltext Access 12 Pages 2018
Exploring ideation and implementation openness in open innovation projects: IT-enabled absorptive capacity perspective Fulltext Access 12 Pages 2018
Multimodal sensor-based semantic 3D mapping for a large-scale environment Fulltext Access 13 Pages 2018
Affordances for sharing domain-specific and complex knowledge on enterprise social media Fulltext Access 13 Pages 2018
Analyzing the impact of industry sectors on the composition of business ecosystem: A combined approach using ARM and DEMATEL Fulltext Access 13 Pages 2018
A hybrid crow search algorithm for solving the DNA fragment assembly problem Fulltext Access 13 Pages 2018
Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm Fulltext Access 13 Pages 2018
The α-reliable path problem in stochastic road networks with link correlations: A moment-matching-based path finding algorithm Fulltext Access 13 Pages 2018
Gender classification from offline multi-script handwriting images using oriented Basic Image Features (oBIFs) Fulltext Access 13 Pages 2018
Demand Side Management using a multi-criteria ϵ-constraint based exact approach Fulltext Access 13 Pages 2018
Source camera identification using Photo Response Non-Uniformity on WhatsApp Fulltext Access 13 Pages 2018
To regularize or not: Revisiting SGD with simple algorithms and experimental studies Fulltext Access 14 Pages 2018
CloudChain: A novel distribution model for digital products based on supply chain principles Fulltext Access 14 Pages 2018
A Fuel Efficient Green Vehicle Routing Problem with varying speed constraint (F-GVRP) Fulltext Access 14 Pages 2018
Niching genetic network programming with rule accumulation for decision making: An evolutionary rule-based approach Fulltext Access 14 Pages 2018
From textual reviews to Individual Reputation Rankings: Leaving ratings aside solving MPC task Fulltext Access 14 Pages 2018
Incorporating polarity of relationships in ISM and TISM for theory building in information and organization management Fulltext Access 14 Pages 2018
All hands on deck to tweet #sandy: Networked governance of citizen coproduction in turbulent times Fulltext Access 14 Pages 2018
What determines success of an e-government service? Validation of an integrative model of e-filing continuance usage Fulltext Access 14 Pages 2018
Can XBRL detailed tagging of footnotes improve financial analysts' information environment? Fulltext Access 14 Pages 2018
Quad-RRT: A real-time GPU-based global path planner in large-scale real environments Fulltext Access 14 Pages 2018
A Tabu search heuristic for smoke term curation in safety defect discovery Fulltext Access 14 Pages 2018
Picking on the family: Disrupting android malware triage by forcing misclassification Fulltext Access 14 Pages 2018
A stop-and-start adaptive cellular genetic algorithm for mobility management of GSM-LTE cellular network users Fulltext Access 15 Pages 2018
Laying foundations for effective machine learning in law enforcement. Majura - A labelling schema for child exploitation materials Fulltext Access 15 Pages 2018