Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit Fulltext Access 8 Pages 2008
Training as regulation and development: An exploration of the needs of enterprise systems users Fulltext Access 8 Pages 2008
The potential of synchronous communication to enhance participation in online discussions: A case study of two e-learning courses Fulltext Access 8 Pages 2008
The role of readiness for change in ERP implementation: Theoretical bases and empirical validation Fulltext Access 8 Pages 2008
Social network, social trust and shared goals in organizational knowledge sharing Fulltext Access 8 Pages 2008
Exploring the effects of direct experience on IT use: An organizational field study Fulltext Access 8 Pages 2008
The impacts of user review on software responsiveness: Moderating requirements uncertainty Fulltext Access 8 Pages 2008
Entity matching in heterogeneous databases: A logistic regression approach Fulltext Access 8 Pages 2008
Exploring the relationship between software project duration and risk exposure: A cluster analysis Fulltext Access 8 Pages 2008
How to detect indications of potential sources of bias in peer review: A generalized latent variable modeling approach exemplified by a gender study Fulltext Access 8 Pages 2008
Combining mapping and citation network analysis for a better understanding of the scientific development: The case of the absorptive capacity field Fulltext Access 8 Pages 2008
Product lifecycle management in aviation maintenance, repair and overhaul Fulltext Access 8 Pages 2008
Product lifecycle management for automotive development focusing on supplier integration Fulltext Access 8 Pages 2008
A web-based machining parameter selection system for life cycle cost reduction and product quality enhancement Fulltext Access 8 Pages 2008
Modeling an e-based real-time quality control information system in distributed manufacturing shops Fulltext Access 8 Pages 2008
Simulation based considerations in placement of capacitors near a dynamic voltage restorer Fulltext Access 8 Pages 2008
Characterization of server performance bottlenecks in distributed interactive simulation environments Fulltext Access 8 Pages 2008
Solution of the heat equation with variable properties by two-step Adomian decomposition method Fulltext Access 8 Pages 2008
New results on the existence and uniqueness of periodic solutions for Liénard type p-Laplacian equation Fulltext Access 8 Pages 2008
Delay independent stability criteria of impulsive switched systems with time-invariant delays Fulltext Access 8 Pages 2008
Positive solution to a special singular second-order boundary value problem Fulltext Access 8 Pages 2008
Quality management systems from the perspective of organization of complex systems Fulltext Access 8 Pages 2008
On stability of linear and weakly nonlinear switched systems with time delay Fulltext Access 8 Pages 2008
On the kinetic and stochastic games theory for active particles: Some reasonings on open large living systems Fulltext Access 8 Pages 2008
Fixed-point solutions of variational inequalities for nonexpansive semigroups in Hilbert spaces Fulltext Access 8 Pages 2008
Wave diffraction by a 45 degree wedge sector with Dirichlet and Neumann boundary conditions Fulltext Access 8 Pages 2008
Pricing in multiple-item procurement auctions with a common to all items fixed cost Fulltext Access 8 Pages 2008
How to better identify the true managerial performance: State of the art using DEA Fulltext Access 8 Pages 2008
The use of information systems for logistics and supply chain management in South East Europe: Current status and future direction Fulltext Access 8 Pages 2008
The link between residual income and value created for levered firms: A note Fulltext Access 8 Pages 2008
Why interdisciplinary accounting research tends not to impact most North American academic accountants Fulltext Access 8 Pages 2008
Value creation in information-based industries through convergence: A study of U.S. mergers and acquisitions between 1993 and 2005 Fulltext Access 8 Pages 2008
Understanding Web-based learning continuance intention: The role of subjective task value Fulltext Access 8 Pages 2008
New delay-dependent non-fragile H∞ observer-based control for continuous time-delay systems Fulltext Access 8 Pages 2008
Fuzzy filters and fuzzy prime filters of bounded RℓRℓ-monoids and pseudo BL-algebras Fulltext Access 8 Pages 2008
Optimal models for single-period supply chain problems with fuzzy demand Fulltext Access 8 Pages 2008
A note on information entropy measures for vague sets and its applications Fulltext Access 8 Pages 2008
A quasi-synchronous checkpointing algorithm that prevents contention for stable storage Fulltext Access 8 Pages 2008
Bayesian networks with a logistic regression model for the conditional probabilities Fulltext Access 8 Pages 2008
On reciprocity indexes in the aggregation of fuzzy preference relations using the OWA operator Fulltext Access 8 Pages 2008
An efficient algorithm for minimizing earliness, tardiness, and due-date costs for equal-sized jobs Fulltext Access 8 Pages 2008
Assessing gender and top-management-team pay in the S&P Mid-Cap and Small-Cap companies using data envelopment analysis Fulltext Access 8 Pages 2008
Functional data analysis for cash flow and transactions intensity continuous-time prediction using Hilbert-valued autoregressive processes Fulltext Access 8 Pages 2008
Extended use of the cards procedure as a simple elicitation technique for MAVT. Application to public procurement in Switzerland Fulltext Access 8 Pages 2008
Analysis of an MMPP/G/1/K queue with queue length dependent arrival rates, and its application to preventive congestion control in telecommunication networks Fulltext Access 8 Pages 2008
Analysis of the impact of price-sensitivity factors on the returns policy in coordinating supply chain Fulltext Access 8 Pages 2008
Retrieving seasonally adjusted quarterly growth rates from annual growth rates that are reported quarterly Fulltext Access 8 Pages 2008
A two-machine flowshop scheduling problem with a separated maintenance constraint Fulltext Access 8 Pages 2008
An efficient simple metaheuristic for minimizing the makespan in two-machine no-wait job shops Fulltext Access 8 Pages 2008
A privacy aware and efficient security infrastructure for vehicular ad hoc networks Fulltext Access 8 Pages 2008
Advanced steps with standardized languages in the re-engineering process Fulltext Access 8 Pages 2008
Dependence-space-based attribute reductions in inconsistent decision information systems Fulltext Access 8 Pages 2008