A computer-aided bibliometric system to generate core article ranked lists in interdisciplinary subjects Fulltext Access 18 Pages 2007
A lattice-based approach for updating access control policies in real-time Fulltext Access 18 Pages 2007
Security Attack Testing (SAT)—testing the security of information systems at design time Fulltext Access 18 Pages 2007
Performance bottleneck of subsequence matching in time-series databases: Observation, solution, and performance evaluation Fulltext Access 18 Pages 2007
A multi-dimensional indexing approach for timestamped event sequence matching Fulltext Access 18 Pages 2007
Exploring phrasal context and error correction heuristics in bootstrapping for geographic named entity annotation Fulltext Access 18 Pages 2007
A factoring approach for the Steiner tree problem in undirected networks Fulltext Access 18 Pages 2007
Energy and quality aware query processing in wireless sensor database systems Fulltext Access 18 Pages 2007
On the combination and normalization of interval-valued belief structures Fulltext Access 18 Pages 2007
Łukasiewicz transform and its application to compression and reconstruction of digital images Fulltext Access 18 Pages 2007
Chaining watermarks for detecting malicious modifications to streaming data Fulltext Access 18 Pages 2007
Assessing international accounting harmonization using Hegelian dialectic, isomorphism and Foucault Fulltext Access 19 Pages 2007
Evolutionary algorithms in multiply-specified engineering. The MOEAs and WCES strategies Fulltext Access 19 Pages 2007
Rough set-based approach to feature selection in customer relationship management Fulltext Access 19 Pages 2007
Aggregation of aggregating modes in MCDM: Synthesis of Type 2 and Level 2 fuzzy sets Fulltext Access 19 Pages 2007
Can information technology enable profitable diversification? An empirical examination Fulltext Access 19 Pages 2007
Absorptive and transformative capacities in nanotechnology innovation systems Fulltext Access 19 Pages 2007
Can computerized decision aids do “damage”? A case for tailoring feedback and task complexity based on task experience Fulltext Access 19 Pages 2007
Rationalization of financial statement fraud in government: An Austrian perspective Fulltext Access 19 Pages 2007
Interactive fuzzy programming for decentralized two-level linear fractional programming (DTLLFP) problems Fulltext Access 19 Pages 2007
Corporate social reporting and stakeholder accountability: The missing link Fulltext Access 19 Pages 2007
Bi-criteria scheduling problems: Number of tardy jobs and maximum weighted tardiness Fulltext Access 19 Pages 2007
Developing effective meta-heuristics for a probabilistic location model via experimental design Fulltext Access 19 Pages 2007
Evaluating the effect of sourcing decisions on e-commerce process operations risk Fulltext Access 19 Pages 2007
Algorithms and the calculation of Nash equilibria for multi-objective control of time-discrete systems and polynomial-time algorithms for dynamic c-games on networks Fulltext Access 19 Pages 2007
Applying self-adaptive evolutionary algorithms to two-dimensional packing problems using a four corners’ heuristic Fulltext Access 19 Pages 2007
Strategies for detecting fraudulent claims in the automobile insurance industry Fulltext Access 19 Pages 2007
A Lagrangian relaxation-based heuristic for the vehicle routing with full container load Fulltext Access 19 Pages 2007
A UML 2.0 profile to design Association Rule mining models in the multidimensional conceptual modeling of data warehouses Fulltext Access 19 Pages 2007
Some properties of the variations of non-additive set functions on T-tribes Fulltext Access 19 Pages 2007
Application of hybrid system control method for real-time power system stabilization Fulltext Access 19 Pages 2007
Recurrent neuro-fuzzy hybrid-learning approach to accurate system modeling Fulltext Access 19 Pages 2007
Inferring operating rules for reservoir operations using fuzzy regression and ANFIS Fulltext Access 19 Pages 2007
Evolutionary stratified training set selection for extracting classification rules with trade off precision-interpretability Fulltext Access 19 Pages 2007
On new scheduling policy for the improvement of firm RTDBSs performances Fulltext Access 19 Pages 2007
DR-NEGOTIATE – A system for automated agent negotiation with defeasible logic-based strategies Fulltext Access 19 Pages 2007
Compact access control labeling for efficient secure XML query evaluation Fulltext Access 19 Pages 2007
Scientific research ontology to support systematic review in software engineering Fulltext Access 19 Pages 2007
Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory II Fulltext Access 19 Pages 2007
Fuzzy nonparametric regression based on local linear smoothing technique Fulltext Access 19 Pages 2007
Design of mixed H2/H∞H2/H∞ control systems using algorithms inspired by the immune system Fulltext Access 19 Pages 2007
A self-adaptive migration model genetic algorithm for data mining applications Fulltext Access 19 Pages 2007
A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness Fulltext Access 19 Pages 2007
A new approach to attribute reduction of consistent and inconsistent covering decision systems with covering rough sets Fulltext Access 19 Pages 2007
Using the analytic network process (ANP) in a SWOT analysis – A case study for a textile firm Fulltext Access 19 Pages 2007
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement Fulltext Access 19 Pages 2007