Doing Family und Social Media. (Re-)Konstruktionspraktiken von Familie im Spannungsfeld von Vergemeinschaftung und Abgrenzung Fulltext Access 8 Pages 2016
Tracing interorganizational information networks during emergency response period: A webometric approach to the 2012 Gumi chemical spill in South Korea Fulltext Access 9 Pages 2016
“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels Fulltext Access 9 Pages 2016
Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling and re-soldering Fulltext Access 9 Pages 2016
A garbage can model of government IT project failures in developing countries: The effects of leadership, decision structure and team competence Fulltext Access 9 Pages 2016
Intuitionistic fuzzy C-regression by using least squares support vector regression Fulltext Access 9 Pages 2016
Ridders algorithm in approximate inversion of fuzzy model with parametrized consequences Fulltext Access 10 Pages 2016
Connected-component labeling based on hypercubes for memory constrained scenarios Fulltext Access 10 Pages 2016
OCPAD: One class Naive Bayes classifier for payload based anomaly detection Fulltext Access 10 Pages 2016
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy Fulltext Access 10 Pages 2016
Comparison between Bayesian network classifiers and SVMs for semantic localization Fulltext Access 10 Pages 2016
Sustainable eGovernance? Practices, problems and beliefs about the future in Swedish eGov practice Fulltext Access 10 Pages 2016
Measuring actual daily volatility from high frequency intraday returns of the S&P futures and index observations Fulltext Access 10 Pages 2016
A discriminative subject-specific spatio-spectral filter selection approach for EEG based motor-imagery task classification Fulltext Access 10 Pages 2016
FoIA in the age of “Open. Gov”: An analysis of the performance of the Freedom of Information Act under the Obama and Bush administrations Fulltext Access 10 Pages 2016
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication Fulltext Access 10 Pages 2016
Off-line PID control tuning for a planar parallel robot using DE variants Fulltext Access 11 Pages 2016
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists Fulltext Access 11 Pages 2016
A semi-supervised fuzzy GrowCut algorithm to segment and classify regions of interest of mammographic images Fulltext Access 11 Pages 2016
i-RM: An intelligent risk management framework for context-aware ubiquitous cold chain logistics Fulltext Access 11 Pages 2016
Resistance and power in a security certification scheme: The case of c:cure Fulltext Access 11 Pages 2016
Implementation of SCADA/HMI system for real-time controlling and performance monitoring of SDR based flight termination system Fulltext Access 11 Pages 2016
A near field communication adoption and its impact on Expo visitors' behavior Fulltext Access 12 Pages 2016
Access to and adoption of a municipal broadband middle-mile network: The case of the Community Access Network in Washington, D.C. Fulltext Access 12 Pages 2016
The impact of technology type and life cycle on IT productivity variance: A contingency theoretical perspective Fulltext Access 12 Pages 2016
A novel Genetic Algorithms and SURF-Based approach for image retargeting Fulltext Access 12 Pages 2016
Thread-based probabilistic models for expert finding in enterprise Microblogs Fulltext Access 12 Pages 2016
GRASP with path relinking for the selective pickup and delivery problem Fulltext Access 12 Pages 2016
GACE: A meta-heuristic based in the hybridization of Genetic Algorithms and Cross Entropy methods for continuous optimization Fulltext Access 12 Pages 2016
A hybrid model of fuzzy ARTMAP and genetic algorithm for data classification and rule extraction Fulltext Access 12 Pages 2016
An integrated algorithm for performance optimization of neurosurgical ICUs Fulltext Access 12 Pages 2016
Harmony-search algorithm for 2D nearest neighbor quantum circuits realization Fulltext Access 12 Pages 2016
Adaptive semi-unsupervised weighted oversampling (A-SUWO) for imbalanced datasets Fulltext Access 12 Pages 2016
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs) Fulltext Access 12 Pages 2016
Why e-government projects fail? An analysis of the Healthcare.gov website Fulltext Access 13 Pages 2016
Fingerprinting Android packaging: Generating DNAs for malware detection Fulltext Access 13 Pages 2016
How business lobby networks shaped the U.S. Freedom of Information Act: An examination of 60Â years of congressional testimony Fulltext Access 13 Pages 2016
Exchange rate volatility and private consumption in Sub-Saharan African countries: A system-GMM dynamic panel analysis Fulltext Access 13 Pages 2016
Transactional quality, relational quality, and consumer e-loyalty: Evidence from SEM and fsQCA Fulltext Access 13 Pages 2016
The integration effort and E-health compatibility effect and the mediating role of E-health synergy on hospital performance Fulltext Access 13 Pages 2016
Imperceptibility—Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization Fulltext Access 13 Pages 2016
An efficient incremental evaluation function for optimizing truck scheduling in a resource-constrained crossdock using metaheuristics Fulltext Access 13 Pages 2016
A novel Vickers hardness measurement technique based on Adaptive Balloon Active Contour Method Fulltext Access 13 Pages 2016
Two inventory systems with trapezoidal-type demand rate and time-dependent deterioration and backlogging Fulltext Access 13 Pages 2016
Development and validation of a rule-based time series complexity scoring technique to support design of adaptive forecasting DSS Fulltext Access 13 Pages 2016
How the user liaison's understanding of development processes moderates the effects of user-related and project management risks on IT project performance Fulltext Access 13 Pages 2016
ε constrained differential evolution with pre-estimated comparison using gradient-based approximation for constrained optimization problems Fulltext Access 13 Pages 2016
GMMs similarity measure based on LPP-like projection of the parameter space Fulltext Access 13 Pages 2016
Comparative study of data mining techniques for the authentication of organic grape juice based on ICP-MS analysis Fulltext Access 14 Pages 2016
Top corporate brands and the global structure of country brand positioning: An AutoCM ANN approach Fulltext Access 14 Pages 2016
A steganography embedding method based on edge identification and XOR coding Fulltext Access 14 Pages 2016
A Stackelberg game for distributed formation of business-driven services communities Fulltext Access 14 Pages 2016
Evaluation of semantic similarity metrics applied to the automatic retrieval of medical documents: An UMLS approach Fulltext Access 14 Pages 2016
A multi-objective meta-heuristic approach for the design and planning of green supply chains - MBSA Fulltext Access 14 Pages 2016
Outlier detection in healthcare fraud: A case study in the Medicaid dental domain Fulltext Access 14 Pages 2016
SNCStream+: Extending a high quality true anytime data stream clustering algorithm Fulltext Access 14 Pages 2016
A hybrid fuzzy evaluation method for curtain grouting efficiency assessment based on an AHP method extended by D numbers Fulltext Access 15 Pages 2016
A two-echelon location-routing model for designing recycling logistics networks with profit: MILP and heuristic approach Fulltext Access 15 Pages 2016
CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks Fulltext Access 15 Pages 2016
CyLog/Game aspect: An approach to separation of concerns in crowdsourced data management Fulltext Access 15 Pages 2016
Juicio profesional en la selección de jerarquía de valor razonable en empresas de América Latina Fulltext Access 15 Pages 2016
A hybridisation of adaptive variable neighbourhood search and large neighbourhood search: Application to the vehicle routing problem Fulltext Access 15 Pages 2016
Factorial design analysis applied to the performance of SMS anti-spam filtering systems Fulltext Access 16 Pages 2016
Turning from TF-IDF to TF-IGM for term weighting in text classification Fulltext Access 16 Pages 2016
Lexicographic bottleneck mixed-model assembly line balancing problem: Artificial bee colony and tabu search approaches with optimised parameters Fulltext Access 16 Pages 2016
Riesgo de precio en commodities: ¿profundización en la sensibilidad de precios agrícolas ante shocks de tasa de interés? Fulltext Access 16 Pages 2016
SHyFTA, a Stochastic Hybrid Fault Tree Automaton for the modelling and simulation of dynamic reliability problems Fulltext Access 16 Pages 2016
Bankruptcy forecasting using case-based reasoning: The CRePERIE approach Fulltext Access 16 Pages 2016
Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility Fulltext Access 16 Pages 2016
Multi-stage design space reduction and metamodeling optimization method based on self-organizing maps and fuzzy clustering Fulltext Access 16 Pages 2016
Intelligent bearing fault signature extraction via iterative oscillatory behavior based signal decomposition (IOBSD) Fulltext Access 16 Pages 2016
Measuring efficiencies of multi-period and multi-division systems associated with DEA: An application to OECD countries’ national innovation systems Fulltext Access 17 Pages 2016
Machine learning methods for predicting the outcome of hypervelocity impact events Fulltext Access 17 Pages 2016