DFRWS 2017 USA - Proceedings of the Seventeenth Annual DFRWS USASCADA network forensics of the PCCC protocol Fulltext Access 9 Pages 2017
DFRWS 2017 Europe - Proceedings of the Fourth Annual DFRWS EuropeBehavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections Fulltext Access 9 Pages 2017
Kernel-based features for predicting population health indices from geocoded social media data Fulltext Access 10 Pages 2017
A multi-start algorithm to design a multi-class classifier for a multi-criteria ABC inventory classification problem Fulltext Access 10 Pages 2017
Multi-view fuzzy clustering with minimax optimization for effective clustering of data from multiple sources Fulltext Access 10 Pages 2017
Daily prediction of ICU readmissions using feature engineering and ensemble fuzzy modeling Fulltext Access 10 Pages 2017
Understanding the formation of reciprocal hyperlinks between e-marketplace sellers Fulltext Access 10 Pages 2017
The BIG CHASE: A decision support system for client acquisition applied to financial networks Fulltext Access 10 Pages 2017
Insights from a machine learning model for predicting the hospital Length of Stay (LOS) at the time of admission Fulltext Access 10 Pages 2017
Automatic tumor segmentation in single-spectral MRI using a texture-based and contour-based algorithm Fulltext Access 10 Pages 2017
DFRWS 2017 USA - Proceedings of the Seventeenth Annual DFRWS USAExtending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis Fulltext Access 10 Pages 2017
A pragmatic approach to managing enterprise IT infrastructures in the era of consumerization and individualization of IT Fulltext Access 10 Pages 2017
An intelligent scheduling scheme for real-time traffic management using Cooperative Game Theory and AHP-TOPSIS methods for next generation telecommunication networks Fulltext Access 10 Pages 2017
The effects of successful ICT-based smart city services: From citizens' perspectives Fulltext Access 10 Pages 2017
A new method to find neighbor users that improves the performance of Collaborative Filtering Fulltext Access 10 Pages 2017
A methodology for the security evaluation within third-party Android Marketplaces Fulltext Access 10 Pages 2017
GRASP and hybrid GRASP-Tabu heuristics to solve a maximal covering location problem with customer preference ordering Fulltext Access 10 Pages 2017
Dynamically identifying relevant EEG channels by utilizing channels classification behaviour Fulltext Access 10 Pages 2017
Impact of emotional intelligence on teacher׳s performance in higher education institutions of Pakistan Fulltext Access 11 Pages 2017
Improving the reliability of chip-off forensic analysis of NAND flash memory devices Fulltext Access 11 Pages 2017
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics Fulltext Access 11 Pages 2017
Study on the tracking revision history of MS Word files for forensic investigation Fulltext Access 11 Pages 2017
A SEM-neural network approach for predicting antecedents of m-commerce acceptance Fulltext Access 11 Pages 2017
QPLAN: Decision support for evaluating planning quality in software development projects Fulltext Access 11 Pages 2017
Service quality explains why people use freemium services but not if they go premium: An empirical study in free-to-play games Fulltext Access 11 Pages 2017
On the integration of model-based feature information in Product Lifecycle Management systems Fulltext Access 11 Pages 2017
The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context Fulltext Access 11 Pages 2017
Information attacks and security in wireless sensor networks of industrial SCADA systems Fulltext Access 11 Pages 2017
Detecting unseen falls from wearable devices using channel-wise ensemble of autoencoders Fulltext Access 11 Pages 2017
Upscaledb: Efficient integer-key compression in a key-value store using SIMD instructions Fulltext Access 11 Pages 2017
Distributed snapshot maintenance in wide-column NoSQL databases using partitioned incremental ETL pipelines Fulltext Access 11 Pages 2017
Convolutional Neural Network approaches to granite tiles classification Fulltext Access 11 Pages 2017
Electrically conductive adhesives, thermally conductive adhesives and UV adhesives in data extraction forensics Fulltext Access 12 Pages 2017
Automated detection of circular marker particles in synchrotron phase contrast X-ray images of live mouse nasal airways for mucociliary transit assessment Fulltext Access 12 Pages 2017
Breakdowns in internal controls in bank trading information systems: The case of the fraud at Société Générale Fulltext Access 12 Pages 2017
Factors associated with internal audit function involvement with XBRL implementation in public companies: An international study Fulltext Access 12 Pages 2017
A usability study of the obamacare website: Evaluation and recommendations Fulltext Access 12 Pages 2017
Factors influencing adoption of mobile banking by Jordanian bank customers: Extending UTAUT2 with trust Fulltext Access 12 Pages 2017
CBR-based negotiation RBAC model for enhancing ubiquitous resources management Fulltext Access 12 Pages 2017
Real-time gait subphase detection using an EMG signal graph matching (ESGM) algorithm based on EMG signals Fulltext Access 12 Pages 2017
SecureNoSQL: An approach for secure search of encrypted NoSQL databases in the public cloud Fulltext Access 12 Pages 2017
Motorcycle detection for ADAS through camera and V2V Communication, a comparative analysis of two modern technologies Fulltext Access 12 Pages 2017
The added value of social media data in B2B customer acquisition systems: A real-life experiment Fulltext Access 12 Pages 2017
Public deliberation on government-managed social media: A study on Weibo users in China Fulltext Access 12 Pages 2017
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III Fulltext Access 12 Pages 2017
Live acquisition of main memory data from Android smartphones and smartwatches Fulltext Access 13 Pages 2017
On a participation structure that ensures representative prices in prediction markets Fulltext Access 13 Pages 2017
Automatic trading method based on piecewise aggregate approximation and multi-swarm of improved self-adaptive particle swarm optimization with validation Fulltext Access 13 Pages 2017
Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30 Fulltext Access 13 Pages 2017
Boundary permeability and online-offline hybrid organization: A case study of Suning, China Fulltext Access 13 Pages 2017
How e-WOM and local competition drive local retailers' decisions about daily deal offerings Fulltext Access 13 Pages 2017
On computing probabilities of dismissal of 10b-5 securities class-action cases Fulltext Access 13 Pages 2017
How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework Fulltext Access 13 Pages 2017
Decision support system (DSS) use and decision performance: DSS motivation and its antecedents Fulltext Access 14 Pages 2017
Classify epileptic EEG signals using weighted complex networks based community structure detection Fulltext Access 14 Pages 2017
Comparing columnar, row and array DBMSs to process recursive queries on graphs Fulltext Access 14 Pages 2017
Design and implementation of UPnP-based energy gateway for demand side management in smart grid Fulltext Access 14 Pages 2017
A novel anomaly detection approach to identify intentional AIS on-off switching Fulltext Access 14 Pages 2017
Reflexivity: A third essential 'R' to enhance interpretive field studies Fulltext Access 14 Pages 2017
Using information systems to achieve complementarity in SME innovation networks Fulltext Access 14 Pages 2017
An antinoise sparse representation method for robust face recognition via joint l1 and l2 regularization Fulltext Access 14 Pages 2017
White space and digital remediation of design practice in architecture: A case study of Frank O. Gehry Fulltext Access 14 Pages 2017
Generalized exponential moving average (EMA) model with particle filtering and anomaly detection Fulltext Access 14 Pages 2017
Optimal experience of flow enhanced by telepresence: Evidence from social media use Fulltext Access 14 Pages 2017
A Biological Immune System (BIS) inspired Mobile Agent Platform (MAP) security architecture Fulltext Access 14 Pages 2017
Feature selection based on FDA and F-score for multi-class classification Fulltext Access 14 Pages 2017
Multi-view collaborative locally adaptive clustering with Minkowski metric Fulltext Access 14 Pages 2017
Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use Fulltext Access 15 Pages 2017
Whale Optimization Algorithm and Moth-Flame Optimization for multilevel thresholding image segmentation Fulltext Access 15 Pages 2017
Effects of decision space information on MAUT-based systems that support purchase decision processes Fulltext Access 15 Pages 2017
Contratos de riesgo de petróleo, patrones de conducta y desempeño de empresas: Análisis de panel de datos Fulltext Access 15 Pages 2017
On the contingent value of IT-based capabilities for the competitive advantage of SMEs: Mechanisms and empirical evidence Fulltext Access 15 Pages 2017
ProcessProfiler3D: A visualisation framework for log-based process performance comparison Fulltext Access 16 Pages 2017
Appraising the impact and role of platform models and Government as a Platform (GaaP) in UK Government public service reform: Towards a Platform Assessment Framework (PAF) Fulltext Access 16 Pages 2017