Symmetry and other transformation features of Lorenz/Leimkuhler representations of informetric data Fulltext Access 13 Pages 2005
A GIS tool for hydrogeological water balance evaluation on a regional scale in semi-arid environments Fulltext Access 13 Pages 2005
Multiple indicator cokriging with application to optimal sampling for environmental monitoring Fulltext Access 13 Pages 2005
LUMPED Unsteady: a Visual Basic® code of unsteady-state lumped-parameter models for mean residence time analyses of groundwater systems Fulltext Access 13 Pages 2005
Lithology identification of aquifers from geophysical well logs and fuzzy logic analysis: Shui-Lin Area, Taiwan Fulltext Access 13 Pages 2005
MAXENPER: a program for maximum entropy spectral estimation with assessment of statistical significance by the permutation test Fulltext Access 13 Pages 2005
Localising missing plants in squared-grid patterns of discontinuous crops from remotely sensed imagery Fulltext Access 13 Pages 2005
A new multi-secret images sharing scheme using Largrange's interpolation Fulltext Access 13 Pages 2005
Implementation of wireless network environments supporting inter access point protocol and dual packet filtering Fulltext Access 13 Pages 2005
OPERA: An open-source extensible router architecture for adding new network services and protocols Fulltext Access 13 Pages 2005
Adaptive row major order: a new space filling curve for efficient spatial join processing in the transform space Fulltext Access 13 Pages 2005
Evolving car designs using model-based automated safety analysis and optimisation techniques Fulltext Access 13 Pages 2005
Trusted computing using AMD “Pacifica” and “Presidio” secure virtual machine technology Fulltext Access 13 Pages 2005
Software development productivity on a new platform: an industrial case study Fulltext Access 13 Pages 2005
An experimental investigation of the impact of aggregation on the performance of data mining with logistic regression Fulltext Access 13 Pages 2005
Something for nothing: management rejection of open source software in Australia's top firms Fulltext Access 13 Pages 2005
Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore Fulltext Access 13 Pages 2005
Individual, social and situational determinants of telecommuter productivity Fulltext Access 13 Pages 2005
Web services and flexible business processes: towards the adaptive enterprise Fulltext Access 13 Pages 2005
Business-oriented process improvement: practices and experiences at Thales Naval The Netherlands (TNNL) Fulltext Access 13 Pages 2005
TA-clustering: Cluster analysis of gene expression profiles through Temporal Abstractions Fulltext Access 13 Pages 2005
Automatic implementation of constraints in component based applications Fulltext Access 13 Pages 2005
Assessing effort estimation models for corrective maintenance through empirical studies Fulltext Access 13 Pages 2005
Fusion of infrared vision and radar for estimating the lateral dynamics of obstacles Fulltext Access 13 Pages 2005
Empirical studies on the impact of lexical resources on CLIR performance Fulltext Access 13 Pages 2005
A modeling approach to uncover hyperlink patterns: the case of Canadian universities Fulltext Access 13 Pages 2005
Towards multilaterally secure computing platforms-with open source and trusted computing Fulltext Access 13 Pages 2005
ConsDiff: an algorithm for the detection of conserved differences between protein sequences Fulltext Access 13 Pages 2005
Flink: Semantic Web technology for the extraction and analysis of social networks Fulltext Access 13 Pages 2005
Telecommunications infrastructure facilitating sustainable development of rural and remote communities in Northern Australia Fulltext Access 13 Pages 2005
Regulatory factors influencing Internet access in Australia and China: a comparative analysis Fulltext Access 13 Pages 2005
Monitoring the morphological evolution of the Sciara del Fuoco during the 2002-2003 Stromboli eruption using multi-temporal photogrammetry Fulltext Access 13 Pages 2005
Rice crop parameter retrieval using multi-temporal, multi-incidence angle Radarsat SAR data Fulltext Access 13 Pages 2005
Internet use by a referral gastroenterology clinic population and their medical information preferences Fulltext Access 13 Pages 2005
Clinical information technology in hospitals: A comparison between the state of Iowa and two provinces in Canada Fulltext Access 13 Pages 2005
Nurses' information management across complex health care organizations Fulltext Access 13 Pages 2005
Nursing constraint models for electronic health records: A vision for domain knowledge governance Fulltext Access 13 Pages 2005
Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework Fulltext Access 13 Pages 2005
Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems Fulltext Access 13 Pages 2005
A fuzzy-based tool for modelization and analysis of the vulnerability of aquifers: a case study Fulltext Access 13 Pages 2005
Regularity and stopping theorem for fuzzy martingales with continuous parameters Fulltext Access 13 Pages 2005
A hybrid search algorithm with heuristics for resource allocation problem Fulltext Access 13 Pages 2005
Impact of CPOE on doctor–nurse cooperation for the medication ordering and administration process Fulltext Access 13 Pages 2005
Effects of information and machine learning algorithms on word sense disambiguation with small datasets Fulltext Access 13 Pages 2005
GEMS: A system for automated cancer diagnosis and biomarker discovery from microarray gene expression data Fulltext Access 13 Pages 2005
Reactions in complex biologically relevant systems: challenges for computational approaches Fulltext Access 13 Pages 2005
The insider threat to information systems and the effectiveness of ISO17799 Fulltext Access 13 Pages 2005
A multinomial logistic regression modeling approach for anomaly intrusion detection Fulltext Access 13 Pages 2005
Future trends in distributed applications and problem-solving environments Fulltext Access 13 Pages 2005
Controlling a complex electromechanical process on the basis of a neurofuzzy approach Fulltext Access 13 Pages 2005
Validating key constraints over XML document using XPath and structure checking Fulltext Access 13 Pages 2005
Making automatic differentiation truly automatic: coupling PETSc with ADIC Fulltext Access 13 Pages 2005
Two controlled experiments concerning the comparison of pair programming to peer review Fulltext Access 14 Pages 2005
An agent based adaptive bandwidth allocation scheme for multimedia applications Fulltext Access 14 Pages 2005
Performance analysis of software reliability growth models with testing-effort and change-point Fulltext Access 14 Pages 2005
ECEM: an event correlation based event manager for an I/O-intensive application Fulltext Access 14 Pages 2005
Entity identification for heterogeneous database integration-a multiple classifier system approach and empirical evaluation Fulltext Access 14 Pages 2005