Two-level trust-based decision model for information assurance in a virtual organization Fulltext Access 19 Pages 2008
Hierarchical multi-pattern matching algorithm for network content inspection Fulltext Access 19 Pages 2008
On technology for functional requirement-based reference design retrieval in engineering knowledge management Fulltext Access 19 Pages 2008
Formalizing argumentative reasoning in a possibilistic logic programming setting with fuzzy unification Fulltext Access 19 Pages 2008
Gridification of collaborative audiovisual organizations through the MediaGrid framework Fulltext Access 19 Pages 2008
From conceptual process models to running systems: A holistic approach for the configuration of enterprise system processes Fulltext Access 19 Pages 2008
Resource management using multiple feedback loops in soft real-time distributed object systems Fulltext Access 19 Pages 2008
Systematic approaches to understanding and evaluating design trade-offs Fulltext Access 19 Pages 2008
Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles Fulltext Access 19 Pages 2008
Decision support for team staffing: An automated relational recommendation approach Fulltext Access 19 Pages 2008
Do secure information system design methods provide adequate modeling support? Fulltext Access 19 Pages 2008
Enhancing conflict detecting mechanism for Web Services composition: A business process flow model transformation approach Fulltext Access 19 Pages 2008
A Bayesian approach to fusing uncertain, imprecise and conflicting information Fulltext Access 19 Pages 2008
Using dynamic time warping for online temporal fusion in multisensor systems Fulltext Access 19 Pages 2008
Nearest neighbor search in metric spaces through Content-Addressable Networks Fulltext Access 19 Pages 2008
Modeling temporal variations in multipolarized radar scattering from intertidal coastal wetlands Fulltext Access 19 Pages 2008
Towards a Wi-Fi ecosystem: Technology integration and emerging service models Fulltext Access 19 Pages 2008
Innovation patterns and policy implications of ADSL penetration in Korea: A case study Fulltext Access 19 Pages 2008
Control, trust, power, and the dynamics of information system outsourcing relationships: A process study of contractual software development Fulltext Access 19 Pages 2008
Obtaining transparent models of chaotic systems with multi-objective simulated annealing algorithms Fulltext Access 19 Pages 2008
Designing a core IT artefact for Knowledge Management Systems using participatory action research in a government and a non-government organisation Fulltext Access 19 Pages 2008
A hybrid fuzzy adaptive sampling – Run rules for Shewhart control charts Fulltext Access 19 Pages 2008
Urban-trees extraction from Quickbird imagery using multiscale spectex-filtering and non-parametric classification Fulltext Access 19 Pages 2008
Fuzzy linear optimization in the presence of the fuzzy relation inequality constraints with max–min composition Fulltext Access 19 Pages 2008
A fuzzy quantified SWOT procedure for environmental evaluation of an international distribution center Fulltext Access 19 Pages 2008
Design of hybrid differential evolution and group method of data handling networks for modeling and prediction Fulltext Access 19 Pages 2008
Google home: Experience, support and re-experience of social home activities Fulltext Access 19 Pages 2008
Aspects of generating precise digital terrain models in the Wadden Sea from lidar–water classification and structure line extraction Fulltext Access 19 Pages 2008
Simultaneous determination of view selection and update policy with stochastic query and response time constraints Fulltext Access 19 Pages 2008
A method for the mapping of conceptual designs to logical blueprints for ETL processes Fulltext Access 19 Pages 2008
A diversity maintaining population-based incremental learning algorithm Fulltext Access 19 Pages 2008
A comparison between ATNoSFERES and Learning Classifier Systems on non-Markov problems Fulltext Access 19 Pages 2008
Routine high-return human-competitive automated problem-solving by means of genetic programming Fulltext Access 19 Pages 2008
A classifier learning system using a coevolution method for deflection yoke misconvergence pattern classification problem Fulltext Access 19 Pages 2008
A hybrid artificial immune system and Self Organising Map for network intrusion detection Fulltext Access 19 Pages 2008
Design and implementation of a decision support system for competitive electricity markets Fulltext Access 20 Pages 2008
A combinatorial procurement auction featuring bundle price revelation without free-riding Fulltext Access 20 Pages 2008
Web proxy cache replacement scheme based on back-propagation neural network Fulltext Access 20 Pages 2008
Achieving Mobile Agent Systems interoperability through software layering Fulltext Access 20 Pages 2008
A test driven approach for aspectualizing legacy software using mock systems Fulltext Access 20 Pages 2008
Populating a building Multi Representation Data Base with photogrammetric tools: Recent progress Fulltext Access 20 Pages 2008
Methods for person identification on a pressure-sensitive floor: Experiments with multiple classifiers and reject option Fulltext Access 20 Pages 2008
Web Service aggregation with string distance ensembles and active probe selection Fulltext Access 20 Pages 2008
Internet privacy concerns and beliefs about government surveillance – An empirical investigation Fulltext Access 20 Pages 2008
Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information Fulltext Access 20 Pages 2008
Source preferences in the context of seeking problem-specific information Fulltext Access 20 Pages 2008
Inference in directed evidential networks based on the transferable belief model Fulltext Access 20 Pages 2008
A multiview approach for intelligent data analysis based on data operators Fulltext Access 20 Pages 2008
Privacy preserving data mining of sequential patterns for network traffic data Fulltext Access 20 Pages 2008
Analysis and approximation of performance bound for two-observer bearings-only tracking Fulltext Access 20 Pages 2008
Hierarchical fusion of expert opinions in the Transferable Belief Model, application to climate sensitivity Fulltext Access 20 Pages 2008
Using space windowing for a preliminary analysis of complex time data in human component system studies. Examples with eye-tracking in advertising and car/head movements in driving Fulltext Access 20 Pages 2008
Isolated items discarding strategy for discovering high utility itemsets Fulltext Access 20 Pages 2008
A self-adaptable scheduler for synchronizing transactions in dynamically configurable environments Fulltext Access 20 Pages 2008
Minimize presentation lag by sequencing media objects for auto-assembled presentations from digital libraries Fulltext Access 20 Pages 2008
Integrating a software architecture-centric method into object-oriented analysis and design Fulltext Access 20 Pages 2008
A syntactically-based query reformulation technique for information retrieval Fulltext Access 20 Pages 2008
Questionnaire mode effects in interactive information retrieval experiments Fulltext Access 20 Pages 2008
A results merging algorithm for distributed information retrieval environments that combines regression methodologies with a selective download phase Fulltext Access 20 Pages 2008
Response of the Rhône deltaic margin to loading and subsidence during the last climatic cycle Fulltext Access 20 Pages 2008
Calculating wave-generated bottom orbital velocities from surface-wave parameters Fulltext Access 20 Pages 2008
Sedtrans05: An improved sediment-transport model for continental shelves and coastal waters with a new algorithm for cohesive sediments Fulltext Access 20 Pages 2008
Timed Behavior Trees for Failure Mode and Effects Analysis of time-critical systems Fulltext Access 20 Pages 2008
Constructing consonant belief functions from sample data using confidence sets of pignistic probabilities Fulltext Access 20 Pages 2008
An XML-based methodology for parametric temporal database model implementation Fulltext Access 20 Pages 2008
Machine learning-based receiver operating characteristic (ROC) curves for crisp and fuzzy classification of DNA microarrays in cancer research Fulltext Access 20 Pages 2008
Photogrammetric processing of rover imagery of the 2003 Mars Exploration Rover mission Fulltext Access 21 Pages 2008