When do I profit? Uncovering boundary conditions on reputation effects in online auctions Fulltext Access 12 Pages 2017
Psychological needs as motivators for security and privacy actions on smartphones Fulltext Access 12 Pages 2017
Cartographic continuum rendering based on color and texture interpolation to enhance photo-realism perception Fulltext Access 12 Pages 2017
Information system for image classification based on frequency curve proximity Fulltext Access 12 Pages 2017
Toward a holistic understanding of continued use of social networking tourism: A mixed-methods approach Fulltext Access 12 Pages 2017
Digitally enabled crime-fighting communities: Harnessing the boundary spanning competence of social media for civic engagement Fulltext Access 12 Pages 2017
Subject-enabled analytics model on measurement statistics in health risk expert system for public health informatics Fulltext Access 12 Pages 2017
Adaptive compensation for infinite number of actuator failures/faults using output feedback control Fulltext Access 12 Pages 2017
Two-class support vector machine with new kernel function based on paths of features for predicting chemical activity Fulltext Access 12 Pages 2017
Development and evaluation of a continuous-time Markov chain model for detecting and handling data currency declines Fulltext Access 12 Pages 2017
Direct adaptive compensation for actuator failures and dead-Zone constraints in tracking control of uncertain nonlinear systems Fulltext Access 12 Pages 2017
Artificial neural networks for automatic segmentation and identification of nasopharyngeal carcinoma Fulltext Access 12 Pages 2017
Multi-sensor fusion in body sensor networks: State-of-the-art and research challenges Fulltext Access 13 Pages 2017
Mobile instant messaging use and social capital: Direct and indirect associations with employee outcomes Fulltext Access 13 Pages 2017
Beyond likes and tweets: Consumer engagement behavior and movie box office in social media Fulltext Access 13 Pages 2017
Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace Fulltext Access 13 Pages 2017
A categorization of arguments for counting methods for publication and citation indicators Fulltext Access 13 Pages 2017
An analysis of the foreign-educated elite academics in the United States Fulltext Access 13 Pages 2017
A remarkable example in three-dimensional informetrics. The geometric law: Distribution of use or distribution of structure? Fulltext Access 13 Pages 2017
Scoping review and evaluation of SMS/text messaging platforms for mHealth projects or clinical interventions Fulltext Access 13 Pages 2017
Perceived critical success factors of electronic health record system implementation in a dental clinic context: An organisational management perspective Fulltext Access 13 Pages 2017
A balanced modularity maximization link prediction model in social networks Fulltext Access 13 Pages 2017
Breaking new ground in mapping human settlements from space - The Global Urban Footprint Fulltext Access 13 Pages 2017
Healthcare financialisation and the digital divide in the European Union: Narrative and numbers Fulltext Access 13 Pages 2017
A density based algorithm to detect cavities and holes from planar points Fulltext Access 13 Pages 2017
Sensitivity analysis approach to model epistemic and aleatory imperfection: Application to Land Cover Change prediction model Fulltext Access 13 Pages 2017
Privacy preserving mechanisms for optimizing cross-organizational collaborative decisions based on the Karmarkar algorithm Fulltext Access 13 Pages 2017
Analysis of consumer preferences for mobile telecom plans using a discrete choice experiment Fulltext Access 13 Pages 2017
The impact of spectrum policies on the secondary spectrum market: A system dynamics approach Fulltext Access 13 Pages 2017
Cloud computing, capabilities and intercultural ethics: Implications for Africa Fulltext Access 13 Pages 2017
Understanding factors affecting users' social networking site continuance: A gender difference perspective Fulltext Access 13 Pages 2017
Multi-source remotely sensed data fusion for improving land cover classification Fulltext Access 13 Pages 2017
Estimating urban vegetation fraction across 25 cities in pan-Pacific using Landsat time series data Fulltext Access 13 Pages 2017
A voting-based statistical cylinder detection framework applied to fallen tree mapping in terrestrial laser scanning point clouds Fulltext Access 13 Pages 2017
Estimating rice yield related traits and quantitative trait loci analysis under different nitrogen treatments using a simple tower-based field phenotyping system with modified single-lens reflex cameras Fulltext Access 13 Pages 2017
Contextually guided very-high-resolution imagery classification with semantic segments Fulltext Access 13 Pages 2017
Home infusion: Safe, clinically effective, patient preferred, and cost saving Fulltext Access 13 Pages 2017
Multi-granularity sequence labeling model for acronym expansion identification Fulltext Access 13 Pages 2017
Secure authentication in motion: A novel online payment framework for drive-thru Internet Fulltext Access 13 Pages 2017
Predicting provisioning and booting times in a Metal-as-a-service system Fulltext Access 13 Pages 2017
Self-dual operators and a general framework for weighted nilpotent operators Fulltext Access 13 Pages 2017
Notes on covering-based rough sets from topological point of view: Relationships with general framework of dual approximation operators Fulltext Access 13 Pages 2017
Multi-source uncertain entity resolution: Transforming holocaust victim reports into people Fulltext Access 13 Pages 2017
An evaluation of combinations of lossy compression and change-detection approaches for time-series data Fulltext Access 13 Pages 2017
The privacy preserving method for dynamic trajectory releasing based on adaptive clustering Fulltext Access 13 Pages 2017
Combining tag correlation and user social relation for microblog recommendation Fulltext Access 13 Pages 2017
Intelligent cryptography approach for secure distributed big data storage in cloud computing Fulltext Access 13 Pages 2017
Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method Fulltext Access 13 Pages 2017
Delay-introducing method to improve the dynamical degradation of a digital chaotic map Fulltext Access 13 Pages 2017
Person recognition based on touch screen gestures using computational intelligence methods Fulltext Access 13 Pages 2017
Combinatorial analysis of the subsystem reliability of the split-star network Fulltext Access 13 Pages 2017
Robust stochastic configuration networks with kernel density estimation for uncertain data regression Fulltext Access 13 Pages 2017
Detection of attacks based on known vulnerabilities in industrial networked systems Fulltext Access 13 Pages 2017
Three-layer granular structures and three-way informational measures of a decision table Fulltext Access 13 Pages 2017
Fast hyperbolic Radon transform represented as convolutions in log-polar coordinates Fulltext Access 13 Pages 2017
Fast automated airborne electromagnetic data interpretation using parallelized particle swarm optimization Fulltext Access 13 Pages 2017
Let's talk in groups: A distributed bursting scheme for cluster-based vehicular applications Fulltext Access 13 Pages 2017
Adapting collections and arrays: Another step towards the automated adaptation of object ensembles Fulltext Access 13 Pages 2017
Environmental factors analysis and comparison affecting software reliability in development of multi-release software Fulltext Access 13 Pages 2017
A search engine for finding and reusing architecturally significant code Fulltext Access 13 Pages 2017
Paraphrase identification and semantic text similarity analysis in Arabic news tweets using lexical, syntactic, and semantic features Fulltext Access 13 Pages 2017
Sequence aware functional encryption and its application in searchable encryption Fulltext Access 13 Pages 2017
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool Fulltext Access 13 Pages 2017
The role of information security learning and individual factors in disclosing patients' health information Fulltext Access 13 Pages 2017
Investigation into the formation of information security influence: Network analysis of an emerging organisation Fulltext Access 13 Pages 2017
Multi-agent simulation of benthic foraminifera response to annual variability of feeding fluxes Fulltext Access 13 Pages 2017
An efficient online direction-preserving compression approach for trajectory streaming data Fulltext Access 13 Pages 2017
Improving the gossiping effectiveness with distributed strategic learning (Invited paper) Fulltext Access 13 Pages 2017