Novel intuitionistic fuzzy decision making models in the framework of decision field theory Fulltext Access 46 Pages 2017
An associative engines based approach supporting collaborative analytics in the Internet of cultural things Fulltext Access 46 Pages 2017
Using argumentation theory to analyse software practitioners' defeasible evidence, inference and belief Fulltext Access 46 Pages 2017
Towards collaborative storage scheduling using alternating direction method of multipliers for mobile edge cloud Fulltext Access 46 Pages 2017
Factors influencing online shoppers' repurchase intentions: The roles of satisfaction and regret Fulltext Access 46 Pages 2017
Context-aware recommender systems in mobile environment: On the road of future research Fulltext Access 46 Pages 2017
Transition of organizational roles in Agile transformation process: A grounded theory approach Fulltext Access 47 Pages 2017
Secure group communication schemes for dynamic heterogeneous distributed computing Fulltext Access 47 Pages 2017
Enhancing developer recommendation with supplementary information via mining historical commits Fulltext Access 47 Pages 2017
Unified authentication factors and fuzzy service access using interaction provenance Fulltext Access 47 Pages 2017
A new efficient approach for mining uncertain frequent patterns using minimum data structure without false positives Fulltext Access 47 Pages 2017
Defining and identifying dominant information security cultures and subcultures Fulltext Access 47 Pages 2017
Incorporating user preferences in search-based software engineering: A systematic mapping study Fulltext Access 47 Pages 2017
Minimizing the stakeholder dissatisfaction risk in requirement selection for next release planning Fulltext Access 47 Pages 2017
Automated refactoring of super-class method invocations to the Template Method design pattern Fulltext Access 47 Pages 2017
Combining trust and skills evaluation to form e-Learning classes in online social networks Fulltext Access 47 Pages 2017
Linguistic geometry approach for solving the Cops and Robber problem in grid environments Fulltext Access 47 Pages 2017
Automated discovery of safety and efficacy concerns for joint & muscle pain relief treatments from online reviews Fulltext Access 48 Pages 2017
Introducing continuous experimentation in large software-intensive product and service organisations Fulltext Access 48 Pages 2017
Be more familiar with our enemies and pave the way forward: A review of the roles bugs played in software failures Fulltext Access 48 Pages 2017
Improving modular structure of software system using structural and lexical dependency Fulltext Access 48 Pages 2017
An industrial case study on an architectural assumption documentation framework Fulltext Access 48 Pages 2017
Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory Fulltext Access 48 Pages 2017
Semi-supervised cross-entropy clustering with information bottleneck constraint Fulltext Access 48 Pages 2017
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption Fulltext Access 49 Pages 2017
A decision support framework for identifying novel ideas in new product development from cross-domain analysis Fulltext Access 49 Pages 2017
The impact of mobile Internet on mobile voice usage: A two-level analysis of mobile communications customers in a GCC country Fulltext Access 49 Pages 2017
An integrated workflow for stress and flow modelling using outcrop-derived discrete fracture networks Fulltext Access 49 Pages 2017
Nature-inspired metaheuristic optimization in least squares support vector regression for obtaining bridge scour information Fulltext Access 49 Pages 2017
On small-scale IT users' system architectures and cyber security: A UK case study Fulltext Access 50 Pages 2017
Taxonomy of workflow partitioning problems and methods in distributed environments Fulltext Access 50 Pages 2017
Scheduling deadline constrained scientific workflows on dynamically provisioned cloud resources Fulltext Access 50 Pages 2017
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios Fulltext Access 50 Pages 2017
Application of swarm based intelligent computing algorithms for dynamic evaluation of maximum loadability of transmission network Fulltext Access 50 Pages 2017
Animated conversational agents and e-consumer productivity: The roles of agents and individual characteristics Fulltext Access 51 Pages 2017
Making electronic health records support quality management: A narrative review Fulltext Access 51 Pages 2017
Technology meets tradition: The perceived impact of the introduction of information and communication technology on ward rounds in the intensive care unit Fulltext Access 51 Pages 2017
To use or not to use: Modelling end user grumbling as user resistance in pre-implementation stage of enterprise resource planning system Fulltext Access 51 Pages 2017
Faster compression methods for a weighted graph using locality sensitive hashing Fulltext Access 51 Pages 2017
Privacy concerns for mobile app download: An elaboration likelihood model perspective Fulltext Access 51 Pages 2017
An approach to characterize graded entailment of arguments through a label-based framework Fulltext Access 52 Pages 2017
Data-driven optimization approach for mass-spring models parametrization based on isogeometric analysis Fulltext Access 52 Pages 2017
A method to generate reusable safety case argument-fragments from compositional safety analysis Fulltext Access 52 Pages 2017
Extending the framework for mobile health information systems Research: A content analysis Fulltext Access 52 Pages 2017
Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks Fulltext Access 52 Pages 2017
Discovering socio-spatio-temporal important locations of social media users Fulltext Access 52 Pages 2017
Conceptualizing and measuring quality of experience of the internet of things: Exploring how quality is perceived by users Fulltext Access 52 Pages 2017
Data-driven analytics for cyber-threat intelligence and information sharing Fulltext Access 53 Pages 2017
Identification and analysis of the elements required to manage technical debt by means of a systematic mapping study Fulltext Access 53 Pages 2017
Distributed clustering of categorical data using the information bottleneck framework Fulltext Access 53 Pages 2017
A survey on feature drift adaptation: Definition, benchmark, challenges and future directions Fulltext Access 54 Pages 2017
Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context Fulltext Access 54 Pages 2017
A new method for classification of imprecise data using fuzzy rough fuzzification Fulltext Access 54 Pages 2017
Smart tourism technologies in travel planning: The role of exploration and exploitation Fulltext Access 55 Pages 2017
From traditional education technologies to student satisfaction in Management education: A theory of the role of social media applications Fulltext Access 55 Pages 2017
Investigating styles in variability modeling: Hierarchical vs. constrained styles Fulltext Access 56 Pages 2017
A systematic literature review on methods that handle multiple quality attributes in architecture-based self-adaptive systems Fulltext Access 56 Pages 2017
Continued use of an interactive computer game-based visual perception learning system in children with developmental delay Fulltext Access 56 Pages 2017
A large-scale study of cultural differences using urban data about eating and drinking preferences Fulltext Access 56 Pages 2017
Who needs to be more visible online? The value implications of web visibility and firm heterogeneity Fulltext Access 57 Pages 2017
A review of natural language processing techniques for opinion mining systems Fulltext Access 57 Pages 2017
Reusing business components and objects for modeling business systems: The influence of decomposition characteristics and analyst experience Fulltext Access 57 Pages 2017
Inconsistency-tolerant reasoning over linear probabilistic knowledge bases Fulltext Access 58 Pages 2017
Towards a secure service provisioning framework in a Smart city environment Fulltext Access 59 Pages 2017
Field effects of social media platforms on information-sharing continuance: Do reach and richness matter? Fulltext Access 60 Pages 2017
Quality attributes and quality models for ambient assisted living software systems: A systematic mapping Fulltext Access 60 Pages 2017
A value-oriented approach to business process specialization: Principles, proof-of-concept, and validation Fulltext Access 62 Pages 2017
Design and evaluation of virtual environments mechanisms to support remote collaboration on complex process diagrams Fulltext Access 62 Pages 2017
Optimal allocation of virtual machines in multi-cloud environments with reserved and on-demand pricing Fulltext Access 62 Pages 2017