A lattice-based approach for updating access control policies in real-time Fulltext Access 18 Pages 2007
Security Attack Testing (SAT)—testing the security of information systems at design time Fulltext Access 18 Pages 2007
Exploring phrasal context and error correction heuristics in bootstrapping for geographic named entity annotation Fulltext Access 18 Pages 2007
On the combination and normalization of interval-valued belief structures Fulltext Access 18 Pages 2007
Łukasiewicz transform and its application to compression and reconstruction of digital images Fulltext Access 18 Pages 2007
Chaining watermarks for detecting malicious modifications to streaming data Fulltext Access 18 Pages 2007
Delivery Massager: A tool for propagating seismic inversion information into reservoir models Fulltext Access 19 Pages 2007
A GIS tool for the evaluation of the precipitation forecasts of a numerical weather prediction model using satellite data Fulltext Access 19 Pages 2007
Search and browse services for heterogeneous collections with the peer-to-peer network Pepper Fulltext Access 19 Pages 2007
1D vertical model for suspended sediment transport in turbulent tidal flow: Application to the English Channel Fulltext Access 19 Pages 2007
The Data Uncertainty Engine (DUE): A software tool for assessing and simulating uncertain environmental variables Fulltext Access 19 Pages 2007
Nearest neighbor search in metric spaces through Content-Addressable Networks Fulltext Access 19 Pages 2007
An effective and efficient code generation algorithm for uniform loops on non-orthogonal DSP architecture Fulltext Access 19 Pages 2007
Comprehension strategies and difficulties in maintaining object-oriented systems: An explorative study Fulltext Access 19 Pages 2007
Probabilistic independence with respect to upper and lower conditional probabilities assigned by Hausdorff outer and inner measures Fulltext Access 19 Pages 2007
Interaction tree algorithms to extract effective architecture and layered performance models from traces Fulltext Access 19 Pages 2007
DOLCE ergo SUMO: On foundational and domain models in the SmartWeb Integrated Ontology (SWIntO) Fulltext Access 19 Pages 2007
Correction of laser scanning intensity data: Data and model-driven approaches Fulltext Access 19 Pages 2007
Technology policy for the knowledge economy: Public support to young ICT service firms Fulltext Access 19 Pages 2007
ERP systems as an enabler of sustained business process innovation: A knowledge-based view Fulltext Access 19 Pages 2007
An examination of the trade-off between internal and external IT capabilities Fulltext Access 19 Pages 2007
Agile Integration Modeling Language (AIML): A conceptual modeling grammar for agile integrative business information systems Fulltext Access 19 Pages 2007
An intelligent agent-assisted decision support system for family financial planning Fulltext Access 19 Pages 2007
An investigation of factors that influence the duration of IT outsourcing relationships Fulltext Access 19 Pages 2007
Exploring the influence of perceptual factors in the success of web-based spatial DSS Fulltext Access 19 Pages 2007
Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: An exploratory study of government–citizens online interactions in a turbulent environment Fulltext Access 19 Pages 2007
Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining Fulltext Access 19 Pages 2007
Complete graphs and bibliographic coupling: A test of the applicability of bibliographic coupling for the identification of cognitive cores on the field level Fulltext Access 19 Pages 2007
Information requirements of cancer center researchers focusing on human biological samples and associated data Fulltext Access 19 Pages 2007
Technology survey and invalidity search: A comparative study of different tasks for Japanese patent document retrieval Fulltext Access 19 Pages 2007
A new approach to attribute reduction of consistent and inconsistent covering decision systems with covering rough sets Fulltext Access 19 Pages 2007
Using the analytic network process (ANP) in a SWOT analysis – A case study for a textile firm Fulltext Access 19 Pages 2007
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement Fulltext Access 19 Pages 2007
A UML 2.0 profile to design Association Rule mining models in the multidimensional conceptual modeling of data warehouses Fulltext Access 19 Pages 2007
Evolutionary stratified training set selection for extracting classification rules with trade off precision-interpretability Fulltext Access 19 Pages 2007
On new scheduling policy for the improvement of firm RTDBSs performances Fulltext Access 19 Pages 2007
DR-NEGOTIATE – A system for automated agent negotiation with defeasible logic-based strategies Fulltext Access 19 Pages 2007
Compact access control labeling for efficient secure XML query evaluation Fulltext Access 19 Pages 2007
Approaches to the representations and logic operations of fuzzy concepts in the framework of axiomatic fuzzy set theory II Fulltext Access 19 Pages 2007
Fuzzy nonparametric regression based on local linear smoothing technique Fulltext Access 19 Pages 2007
Design of mixed H2/H∞H2/H∞ control systems using algorithms inspired by the immune system Fulltext Access 19 Pages 2007
A self-adaptive migration model genetic algorithm for data mining applications Fulltext Access 19 Pages 2007
A hybrid multi-objective immune algorithm for a flow shop scheduling problem with bi-objectives: Weighted mean completion time and weighted mean tardiness Fulltext Access 19 Pages 2007
A quality framework for developing and evaluating original software components Fulltext Access 20 Pages 2007
Management competences, not tools and techniques: A grounded examination of software project management at WM-data Fulltext Access 20 Pages 2007
Search history support for finding and using information: User interface design recommendations from a user study Fulltext Access 20 Pages 2007