From benchmarks to real apps: Exploring the energy impacts of performance-directed changes Fulltext Access 10 Pages 2016
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph Fulltext Access 10 Pages 2016
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows Fulltext Access 10 Pages 2016
Reliability guaranteed energy minimization on mixed-criticality systems Fulltext Access 10 Pages 2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability Fulltext Access 10 Pages 2016
Forecasting movements of health-care stock prices based on different categories of news articles using multiple kernel learning Fulltext Access 10 Pages 2016
Towards field-adjusted production: Estimating research productivity from a zero-truncated distribution Fulltext Access 10 Pages 2016
A method for large group decision-making based on evaluation information provided by participators from multiple groups Fulltext Access 10 Pages 2016
Modeling and enhancing infotainment service access in vehicular networks with dual-radio devices Fulltext Access 10 Pages 2016
Information revelation and customer decision-making process of repeat-bidding name-your-own-price auction Fulltext Access 10 Pages 2016
The effects of general privacy concerns and transactional privacy concerns on Facebook apps usage Fulltext Access 10 Pages 2016
Development and technical functionality of an Internet-based intervention for tinnitus in the UK Fulltext Access 10 Pages 2016
Google analytics of a pilot mass and social media campaign targeting Hispanics about living kidney donation Fulltext Access 10 Pages 2016
Characterizing major agricultural land change trends in the Western Corn Belt Fulltext Access 10 Pages 2016
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history Fulltext Access 10 Pages 2016
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis Fulltext Access 10 Pages 2016
Digital evidence, 'absence' of data and ambiguous patterns of reasoning Fulltext Access 10 Pages 2016
Evaluating atomicity, and integrity of correct memory acquisition methods Fulltext Access 10 Pages 2016
Mixed factorization for collaborative recommendation with heterogeneous explicit feedbacks Fulltext Access 10 Pages 2016
Automatic memory-based vertical elasticity and oversubscription on cloud platforms Fulltext Access 10 Pages 2016
Improving reliability and performances in large scale distributed applications with erasure codes and replication Fulltext Access 10 Pages 2016
An algorithm for efficient privacy-preserving item-based collaborative filtering Fulltext Access 10 Pages 2016
Impact of user patience on auto-scaling resource capacity for cloud services Fulltext Access 10 Pages 2016
Drivers of academic performance in a Brazilian university under a government-restructuring program Fulltext Access 11 Pages 2016
Applying Gaussian distributed constraints to Gaussian distributed variables Fulltext Access 11 Pages 2016
Mobile and more productive? Firm-level evidence on the productivity effects of mobile internet use Fulltext Access 11 Pages 2016
Competition effect of a new mobile technology on an incumbent technology: An Indian case study Fulltext Access 11 Pages 2016
Computing sets of graded attribute implications with witnessed non-redundancy Fulltext Access 11 Pages 2016
Continuous additive generators of continuous, conditionally cancellative triangular subnorms Fulltext Access 11 Pages 2016
Extension of bivariate means to weighted means of several arguments by using binary trees Fulltext Access 11 Pages 2016
A geodata warehouse: Using denormalisation techniques as a tool for delivering spatially enabled integrated geological information to geologists Fulltext Access 11 Pages 2016
Solid images for geostructural mapping and key block modeling of rock discontinuities Fulltext Access 11 Pages 2016
Computational challenges in the analyses of petrophysics using microtomography and upscaling: A review Fulltext Access 11 Pages 2016
Improving assessment of geological structure interpretation of magnetic data: An advanced data analytics approach Fulltext Access 11 Pages 2016
Neuro-evolutionary event detection technique for downhole microseismic surveys Fulltext Access 11 Pages 2016
Fast multiple-point simulation using a data-driven path and an efficient gradient-based search Fulltext Access 11 Pages 2016
A Survey of event extraction methods from text for decision support systems Fulltext Access 11 Pages 2016
Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews Fulltext Access 11 Pages 2016
Database image content explorer: Carving data that does not officially exist Fulltext Access 11 Pages 2016
The development and use of a new methodology to reconstruct courses of admission and ambulatory care based on the Danish National Patient Registry Fulltext Access 11 Pages 2016
Target detection in hyperspectral imagery using forward modeling and in-scene information Fulltext Access 11 Pages 2016
Right way wrong way: The fading legal justifications for telecommunications infrastructure rights-of-way Fulltext Access 11 Pages 2016
Taking account of service externalities when spectrum is allocated and assigned Fulltext Access 11 Pages 2016
Estimation, filtering and fusion for networked systems with network-induced phenomena: New progress and prospects Fulltext Access 11 Pages 2016
An integrated index for identification of fatty liver disease using radon transform and discrete cosine transform features in ultrasound images Fulltext Access 11 Pages 2016
The joint optimal filtering and fault detection for multi-rate sensor fusion under unknown inputs Fulltext Access 11 Pages 2016
Evaluation of an intravenous preparation information system for improving the reconstitution and dilution process Fulltext Access 11 Pages 2016
Understanding information security stress: Focusing on the type of information security compliance activity Fulltext Access 11 Pages 2016
Posynomial geometric programming problem subject to max–min fuzzy relation equations Fulltext Access 11 Pages 2016
Evaluating overall quality of graph visualizations based on aesthetics aggregation Fulltext Access 11 Pages 2016
Granular-computing based hybrid collaborative fuzzy clustering for long-term prediction of multiple gas holders levels Fulltext Access 11 Pages 2016
Is business domain language support beneficial for creating test case specifications: A controlled experiment Fulltext Access 11 Pages 2016
A partial index for distributed broadcasting in wireless mobile networks Fulltext Access 11 Pages 2016
Multi-consensus of multi-agent systems with various intelligences using switched impulsive protocols Fulltext Access 11 Pages 2016
State feedback based output tracking control of probabilistic Boolean networks Fulltext Access 11 Pages 2016
Input-to-state stability for discrete-time nonlinear switched singular systems Fulltext Access 11 Pages 2016
A robust bi-sparsity model with non-local regularization for mixed noise reduction Fulltext Access 11 Pages 2016
Mining online political opinion surveys for suspect entries: An interdisciplinary comparison Fulltext Access 11 Pages 2016
Judging online peer-to-peer lending behavior: A comparison of first-time and repeated borrowing requests Fulltext Access 11 Pages 2016
Employees' information security policy compliance: A norm activation perspective Fulltext Access 11 Pages 2016
The emergence and effects of fake social information: Evidence from crowdfunding Fulltext Access 11 Pages 2016
The complementarity and substitutability relationships between information technology and benefits and duration of unemployment Fulltext Access 11 Pages 2016
Question-driven topic-based extraction of Protein–Protein Interaction Methods from biomedical literature Fulltext Access 11 Pages 2016
Research of a resource-efficient, real-time and fault-tolerant wireless sensor network system Fulltext Access 11 Pages 2016
Development of an improved urban emissivity model based on sky view factor for retrieving effective emissivity and surface temperature over urban areas Fulltext Access 11 Pages 2016
Wavelet decomposition of software entropy reveals symptoms of malicious code Fulltext Access 11 Pages 2016
Two-phase flow analogy as an effective boundary condition for modelling liquids at atomistic resolution Fulltext Access 11 Pages 2016
Boosted random contextual semantic space based representation for visual recognition Fulltext Access 11 Pages 2016
A general variational framework considering cast shadows for the topographic correction of remote sensing imagery Fulltext Access 11 Pages 2016
Self-calibration of digital aerial camera using combined orthogonal models Fulltext Access 11 Pages 2016