SuperedgeRank algorithm and its application in identifying opinion leader of online public opinion supernetwork Fulltext Access 12 Pages 2014
An ELECTRE-based decision aid tool for stepwise benchmarking: An application over EU Digital Agenda targets Fulltext Access 12 Pages 2014
IT governance and business value in the public sector organizations — The role of elected representatives in IT governance and its impact on IT value in U.S. state governments Fulltext Access 12 Pages 2014
Robust Kinect-based guidance and positioning of a multidirectional robot by Log-ab recognition Fulltext Access 12 Pages 2014
Artificial neural networks and physical modeling for determination of baseline consumption of CHP plants Fulltext Access 12 Pages 2014
iSurveillance: Intelligent framework for multiple events detection in surveillance videos Fulltext Access 12 Pages 2014
Coupling dynamic simulation and interactive multiobjective optimization for complex problems: An APROS-NIMBUS case study Fulltext Access 13 Pages 2014
Implications for strategic IS research of the resource-based theory of the firm: A reflection Fulltext Access 13 Pages 2014
A tie strength based model to socially-enhance applications and its enabling implementation: mySocialSphere Fulltext Access 13 Pages 2014
Wi-Fi multi-floor indoor positioning considering architectural aspects and controlled computational complexity Fulltext Access 13 Pages 2014
Artificial immune network-based anti-collision algorithm for dense RFID readers Fulltext Access 13 Pages 2014
A genetic algorithm approach for SMEs bankruptcy prediction: Empirical evidence from Italy Fulltext Access 13 Pages 2014
Automated exploration of datapath and unrolling factor during power–performance tradeoff in architectural synthesis using multi-dimensional PSO algorithm Fulltext Access 13 Pages 2014
Understanding group maintenance behavior in Free/Libre Open-Source Software projects: The case of Fire and Gaim Fulltext Access 13 Pages 2014
Human mobility discovering and movement intention detection with GPS trajectories Fulltext Access 13 Pages 2014
TOM: Twitter opinion mining framework using hybrid classification scheme Fulltext Access 13 Pages 2014
An examination of negative e-WOM adoption: Brand commitment as a moderator Fulltext Access 13 Pages 2014
Credal-C4.5: Decision tree based on imprecise probabilities to classify noisy data Fulltext Access 13 Pages 2014
Unsupervised analysis of top-k core members in poly-relational networks Fulltext Access 13 Pages 2014
Predicting e-readiness at firm-level: An analysis of technological, organizational and environmental (TOE) effects on e-maintenance readiness in manufacturing firms Fulltext Access 13 Pages 2014
Capturing scholar’s knowledge from heterogeneous resources for profiling in recommender systems Fulltext Access 13 Pages 2014
Enhancement of Mahalanobis–Taguchi System via Rough Sets based Feature Selection Fulltext Access 13 Pages 2014
BizPro: Extracting and categorizing business intelligence factors from textual news articles Fulltext Access 13 Pages 2014
Inversion mechanism with functional extrema model for identification incommensurate and hyper fractional chaos via differential evolution Fulltext Access 13 Pages 2014
A strategic solution to optimize molecular docking simulations using Fully-Flexible Receptor models Fulltext Access 13 Pages 2014
Feature extraction in Brazilian Sign Language Recognition based on phonological structure and using RGB-D sensors Fulltext Access 13 Pages 2014
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families Fulltext Access 14 Pages 2014
A fuzzy DEA model with undesirable fuzzy outputs and its application to the banking sector in India Fulltext Access 14 Pages 2014
A data mining approach to identify cognitive NeuroRehabilitation Range in Traumatic Brain Injury patients Fulltext Access 14 Pages 2014
A weighted multivariate Fuzzy C-Means method in interval-valued scientific production data Fulltext Access 14 Pages 2014
An effective node-selection scheme for the energy efficiency of solar-powered WSNs in a stream environment Fulltext Access 14 Pages 2014
RFID technology investment evaluation model for the stochastic joint replenishment and delivery problem Fulltext Access 14 Pages 2014
Modeling and verifying probabilistic Multi-Agent Systems using knowledge and social commitments Fulltext Access 14 Pages 2014
COBRA framework to evaluate e-government services: A citizen-centric perspective Fulltext Access 14 Pages 2014
Integration of Adaptive Neuro Fuzzy Inference Systems and principal component analysis for the control of tertiary scale formation on tinplate at a hot mill Fulltext Access 14 Pages 2014
SCaNME: Location tracking system in large-scale campus Wi-Fi environment using unlabeled mobility map Fulltext Access 15 Pages 2014
Extending the understanding of mobile banking adoption: When UTAUT meets TTF and ITM Fulltext Access 15 Pages 2014
Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts Fulltext Access 15 Pages 2014
Investigating the effects of IS strategic leadership on organizational benefits from the perspective of CIO strategic roles Fulltext Access 15 Pages 2014
Multi-objective PSO algorithm for mining numerical association rules without a priori discretization Fulltext Access 15 Pages 2014
Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking Fulltext Access 15 Pages 2014
Novel Adaptive Balloon Active Contour Method based on internal force for image segmentation – A systematic evaluation on synthetic and real images Fulltext Access 15 Pages 2014
Integration of semi-fuzzy SVDD and CC-Rule method for supplier selection Fulltext Access 15 Pages 2014
A fuzzy AHP-TOPSIS framework for ranking the solutions of Knowledge Management adoption in Supply Chain to overcome its barriers Fulltext Access 15 Pages 2014
Modeling and optimization for microstructural properties of Al/SiC nanocomposite by artificial neural network and genetic algorithm Fulltext Access 15 Pages 2014
Novel active learning methods for enhanced PC malware detection in windows OS Fulltext Access 15 Pages 2014
A prior-knowledge input LSSVR metamodeling method with tuning based on cellular particle swarm optimization for engineering design Fulltext Access 15 Pages 2014
Automatic dynamic generation of likely invariants for WS-BPEL compositions Fulltext Access 15 Pages 2014
Data-mining based SQL injection attack detection using internal query trees Fulltext Access 15 Pages 2014
Applying Ant Colony Optimization to configuring stacking ensembles for data mining Fulltext Access 15 Pages 2014
Fuzzy MaxGWMA chart for identifying abnormal variations of on-line manufacturing processes with imprecise information Fulltext Access 15 Pages 2014
Prediction of shear strength of FRP reinforced concrete beams using fuzzy inference system Fulltext Access 15 Pages 2014
Supplier selection in the airline retail industry using a funnel methodology: Conjunctive screening method and fuzzy AHP Fulltext Access 15 Pages 2014
Integrating the IS functions after mergers and acquisitions: Analyzing business-IT alignment Fulltext Access 16 Pages 2014
SCOlog: A logic-based approach to analysing supply chain operation dynamics Fulltext Access 16 Pages 2014
The moderating effect of experience in the adoption of mobile payment tools in Virtual Social Networks: The m-Payment Acceptance Model in Virtual Social Networks (MPAM-VSN) Fulltext Access 16 Pages 2014
Performance analysis of fractional order fuzzy PID controllers applied to a robotic manipulator Fulltext Access 16 Pages 2014
An explorative study of shopper-based salient e-servicescape attributes: A Means-End Chain approach Fulltext Access 16 Pages 2014
Processing k-skyband, constrained skyline, and group-by skyline queries on incomplete data Fulltext Access 16 Pages 2014
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust Fulltext Access 16 Pages 2014
Top-n query processing in spatial databases considering bi-chromatic reverse k-nearest neighbors Fulltext Access 16 Pages 2014
Financial forecasting using ANFIS networks with Quantum-behaved Particle Swarm Optimization Fulltext Access 16 Pages 2014
QoS multicast routing protocol oriented to cognitive network using competitive coevolutionary algorithm Fulltext Access 16 Pages 2014
FLOPPIES: A Framework for Large-Scale Ontology Population of Product Information from Tabular Data in E-commerce Stores Fulltext Access 16 Pages 2014
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications Fulltext Access 16 Pages 2014
Selective Smooth Fictitious Play: An approach based on game theory for patrolling infrastructures with a multi-robot system Fulltext Access 17 Pages 2014
Histogram-based gravitational optimization algorithm on single MR modality for automatic brain lesion detection and segmentation Fulltext Access 17 Pages 2014
A novel hybrid MCDM model based on fuzzy DEMATEL, fuzzy ANP and fuzzy VIKOR for city logistics concept selection Fulltext Access 17 Pages 2014
A knowledge and collaboration-based CBR process to improve network performance-related support activities Fulltext Access 17 Pages 2014
Optimisation of partner selection and collaborative transportation scheduling in Virtual Enterprises using GA Fulltext Access 17 Pages 2014
Identifying back doors, attack points, and surveillance mechanisms in iOS devices Fulltext Access 17 Pages 2014
Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the Technology Organization Environment framework Fulltext Access 17 Pages 2014
Comparative analysis of MCDM methods for pipe material selection in sugar industry Fulltext Access 17 Pages 2014