Quantifying distances from points to polygons—applications in determining fetch in coastal environments Fulltext Access 10 Pages 2007
Neural-network-based approaches for software reliability estimation using dynamic weighted combinational models Fulltext Access 10 Pages 2007
Software development risk and project performance measurement: Evidence in Korea Fulltext Access 10 Pages 2007
Transformation of HDF-EOS metadata from the ECS model to ISO 19115-based XML Fulltext Access 10 Pages 2007
A general framework for component substitution image fusion: An implementation using the fast image fusion method Fulltext Access 10 Pages 2007
Identifying patterns of correspondence between modeled flow directions and field evidence: An automated flow direction analysis Fulltext Access 10 Pages 2007
Historical seismometry database project: A comprehensive relational database for historical seismic records Fulltext Access 10 Pages 2007
SRTM-based morphotectonic analysis of the Poços de Caldas Alkaline Massif, southeastern Brazil Fulltext Access 10 Pages 2007
PGO: A parallel computing platform for global optimization based on genetic algorithm Fulltext Access 10 Pages 2007
Fast algorithms using minimal data structures for common topological relationships in large, irregularly spaced topographic data sets Fulltext Access 10 Pages 2007
A2M—A program to compute all possible mineral modes from geochemical analyses Fulltext Access 10 Pages 2007
An algorithm for polygon clipping, and for determining polygon intersections and unions Fulltext Access 10 Pages 2007
Use of Walsh transforms in estimation of depths of idealized sources from total-field magnetic anomalies Fulltext Access 10 Pages 2007
SUSIE: A program for inverse strain estimation from magnetic susceptibility Fulltext Access 11 Pages 2007
Internet anxiety: An empirical study of the effects of personality, beliefs, and social support Fulltext Access 11 Pages 2007
Evaluating the supply chain performance of IT-based inter-enterprise collaboration Fulltext Access 11 Pages 2007
Antecedents and consequences of team potency in software development projects Fulltext Access 11 Pages 2007
New methods for imputation of missing genotype using linkage disequilibrium and haplotype information Fulltext Access 11 Pages 2007
A profile of information systems research published in Information & Management Fulltext Access 11 Pages 2007
An enhanced technique in construction of the discrete drainage network from low-resolution spatial database Fulltext Access 11 Pages 2007
Unified forms of fully implicational restriction methods for fuzzy reasoning Fulltext Access 11 Pages 2007
Static output feedback controller design for fuzzy systems: An ILMI approach Fulltext Access 11 Pages 2007
Wavelet and rescaled range approach for the Hurst coefficient for short and long time series Fulltext Access 11 Pages 2007
A data mining approach for heavy rainfall forecasting based on satellite image sequence analysis Fulltext Access 11 Pages 2007
A self-organizing map with twin units capable of describing a nonlinear input–output relation applied to speech code vector mapping Fulltext Access 11 Pages 2007
Fault-free Hamiltonian cycles in crossed cubes with conditional link faults Fulltext Access 11 Pages 2007
A new perspective for optimal portfolio selection with random fuzzy returns Fulltext Access 11 Pages 2007
The drainage network extraction from contour lines for contour line generalization Fulltext Access 11 Pages 2007
Solution sets of inf-αTinf-αT fuzzy relational equations on complete Brouwerian lattices Fulltext Access 11 Pages 2007
Prediction of sweetness and amino acid content in soybean crops from hyperspectral imagery Fulltext Access 11 Pages 2007
A contingency model for the allocation of media content in publishing companies Fulltext Access 11 Pages 2007
Students’ participation intention in an online discussion forum: Why is computer-mediated interaction attractive? Fulltext Access 11 Pages 2007
Information technology (IT) in Saudi Arabia: Culture and the acceptance and use of IT Fulltext Access 11 Pages 2007
Evolution of e-commerce Web sites: A conceptual framework and a longitudinal study Fulltext Access 11 Pages 2007
Determinants of adoption of mobile games under mobile broadband wireless access environment Fulltext Access 11 Pages 2007
User acceptance of wireless short messaging services: Deconstructing perceived value Fulltext Access 11 Pages 2007
Performance effective pre-scheduling strategy for heterogeneous grid systems in the master slave paradigm Fulltext Access 11 Pages 2007
Retraining a keystroke dynamics-based authenticator with impostor patterns Fulltext Access 11 Pages 2007
ROST: Remote and hot service deployment with trustworthiness in CROWN Grid Fulltext Access 11 Pages 2007
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups Fulltext Access 11 Pages 2007
An optimized two-tier P2P architecture for contextualized keyword searches Fulltext Access 11 Pages 2007
A high performance grid-web service framework for the identification of ‘conserved sequence tags’ Fulltext Access 11 Pages 2007
Grid organizational memory—provision of a high-level Grid abstraction layer supported by ontology alignment Fulltext Access 11 Pages 2007
A grid-enabled software distributed shared memory system on a wide area network Fulltext Access 11 Pages 2007
Stability analysis for a class of Takagi–Sugeno fuzzy control systems with PID controllers Fulltext Access 11 Pages 2007
Determination of the degrees of P-property and nonnegative invertibility for a fuzzy matrix Fulltext Access 11 Pages 2007
Efficient elliptic curve scalar multiplication algorithms resistant to power analysis Fulltext Access 11 Pages 2007
Intrusion detection aware component-based systems: A specification-based framework Fulltext Access 11 Pages 2007
Newspaper demand prediction and replacement model based on fuzzy clustering and rules Fulltext Access 11 Pages 2007
On-line algorithms for computing mean and variance of interval data, and their use in intelligent systems Fulltext Access 11 Pages 2007
Computational aspects of the coarsening at random model and the Shapley value Fulltext Access 11 Pages 2007
Implementation of a parallel high-performance visualization technique in GRASS GIS Fulltext Access 11 Pages 2007
A steganographic method based upon JPEG and particle swarm optimization algorithm Fulltext Access 11 Pages 2007
Warning signals for potential accounting frauds in blue chip companies – An application of adaptive resonance theory Fulltext Access 11 Pages 2007
On the transformation of sentences with genitive relations to SQL queries Fulltext Access 11 Pages 2007
A hierarchical key management scheme for secure group communications in mobile ad hoc networks Fulltext Access 11 Pages 2007
Identifying and characterizing change-prone classes in two large-scale open-source products Fulltext Access 11 Pages 2007
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy Fulltext Access 11 Pages 2007
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head Fulltext Access 11 Pages 2007