An efficacious method for detecting phishing webpages through target domain identification Fulltext Access 11 Pages 2014
Optimal information security investment in a Healthcare Information Exchange: An economic analysis Fulltext Access 11 Pages 2014
Enhancing e-learning effectiveness using an intelligent agent-supported personalized virtual learning environment: An empirical investigation Fulltext Access 11 Pages 2014
Factors influencing online health information search: An empirical analysis of a national cancer-related survey Fulltext Access 11 Pages 2014
A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes Fulltext Access 11 Pages 2014
Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract Fulltext Access 11 Pages 2014
Role of acquisition intervals in private and public cloud storage costs Fulltext Access 11 Pages 2014
A link-focused methodology for evaluating accessibility to emergency services Fulltext Access 11 Pages 2014
A decision support system for mean–variance analysis in multi-period inventory control Fulltext Access 11 Pages 2014
Efficient maintenance of basic statistical functions in data warehouses Fulltext Access 11 Pages 2014
Networked individuals predict a community wide outcome from their local information Fulltext Access 11 Pages 2014
A decision support system for public logistics information service management and optimization Fulltext Access 11 Pages 2014
Understanding the role of satisfaction in the formation of perceived switching value Fulltext Access 11 Pages 2014
A decision support system for stock investment recommendations using collective wisdom Fulltext Access 11 Pages 2014
Generating information for small data sets with a multi-modal distribution Fulltext Access 11 Pages 2014
Analysis of process model reuse: Where are we now, where should we go from here? Fulltext Access 11 Pages 2014
Evaluating performance in the development of software-intensive products Fulltext Access 11 Pages 2014
Citation impact analysis of top ranked computer science journals and their rankings Fulltext Access 11 Pages 2014
Calibration of area based diameter distribution with individual tree based diameter estimates using airborne laser scanning Fulltext Access 11 Pages 2014
A global optimization approach to roof segmentation from airborne lidar point clouds Fulltext Access 11 Pages 2014
The effect of short ground vegetation on terrestrial laser scans at a local scale Fulltext Access 11 Pages 2014
Comparison of airborne laser scanning methods for estimating forest structure indicators based on Lorenz curves Fulltext Access 11 Pages 2014
Accurate mapping of forest types using dense seasonal Landsat time-series Fulltext Access 11 Pages 2014
Remotely sensed surface temperature variation of an inland saline lake over the central Qinghai-Tibet Plateau Fulltext Access 11 Pages 2014
A dynamic code coverage approach to maximize fault localization efficiency Fulltext Access 11 Pages 2014
Standing out in the crowd: How unique are the lobbying patterns of the broadcast and wireless industries? Fulltext Access 11 Pages 2014
Understanding agile software development practices using shared mental models theory Fulltext Access 11 Pages 2014
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition Fulltext Access 11 Pages 2014
How to facilitate inter-organizational knowledge sharing: The impact of trust Fulltext Access 11 Pages 2014
The impact of technological, organizational and environmental characteristics on electronic collaboration and relationship performance in international customer–supplier relationships Fulltext Access 11 Pages 2014
The impact of guidance on Internet-based mental health interventions — A systematic review Fulltext Access 11 Pages 2014
Sequential digital elevation models of active lava flows from ground-based stereo time-lapse imagery Fulltext Access 11 Pages 2014
Multi-lingual support for lexicon-based sentiment analysis guided by semantics Fulltext Access 11 Pages 2014
How to enable automated trading engines to cope with news-related liquidity shocks? Extracting signals from unstructured data Fulltext Access 11 Pages 2014
Designing technology for managing the information exchange of decision making teams Fulltext Access 11 Pages 2014
Group preference modeling for intelligent shared environments: Social welfare beyond the sum Fulltext Access 11 Pages 2014
A novel approach for fault diagnosis of induction motor with invariant character vectors Fulltext Access 11 Pages 2014
Employing a novel cross-diamond search in a modified hierarchical search motion estimation algorithm for video compression Fulltext Access 11 Pages 2014
Statistical analysis of the moving least-squares method with unbounded sampling Fulltext Access 11 Pages 2014
Assessing the level of difficulty of fingerprint datasets based on relative quality measures Fulltext Access 11 Pages 2014
Memory and forgetting: An improved dynamic maintenance method for case-based reasoning Fulltext Access 11 Pages 2014
Calibration of the agent-based continuous double auction stock market by scaling analysis Fulltext Access 11 Pages 2014
On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives Fulltext Access 11 Pages 2014
Modular Neural Networks architecture optimization with a new nature inspired method using a fuzzy combination of Particle Swarm Optimization and Genetic Algorithms Fulltext Access 11 Pages 2014
An adaptive robust fuzzy beamformer for steering vector mismatch and reducing interference and noise Fulltext Access 11 Pages 2014
A unified approach to asymptotic behaviors for the autoregressive model with fuzzy data Fulltext Access 11 Pages 2014
Kernel self-optimization learning for kernel-based feature extraction and recognition Fulltext Access 11 Pages 2014
Linguistic multi-criteria decision making for energy and environmental corporate policy Fulltext Access 11 Pages 2014
A linguistic multi-criteria decision making approach based on logical reasoning Fulltext Access 11 Pages 2014
Hydro-mechanical model for wetting/drying and fracture development in geomaterials Fulltext Access 11 Pages 2014
Some hybrid weighted averaging operators and their application to decision making Fulltext Access 11 Pages 2014
Automatic evaluation of air mission routes with respect to combat survival Fulltext Access 11 Pages 2014
Efficiency, unused capacity and transmission power as indicators of the Triple Helix of university–industry–government relationships Fulltext Access 11 Pages 2014
Technological impact factor: An indicator to measure the impact of academic publications on practical innovation Fulltext Access 11 Pages 2014
Regularity in the time-dependent distribution of the percentage of never-cited papers: An empirical pilot study based on the six journals Fulltext Access 11 Pages 2014
Multi-step change of scale approach for deriving coarse-resolution flow directions Fulltext Access 11 Pages 2014
Real-time query processing optimization for cloud-based wireless body area networks Fulltext Access 11 Pages 2014
A generalization of the local gradual deformation method using domain parameterization Fulltext Access 11 Pages 2014
A hierarchical network-based algorithm for multi-scale watershed delineation Fulltext Access 11 Pages 2014
Improved sea level anomaly prediction through combination of data relationship analysis and genetic programming in Singapore Regional Waters Fulltext Access 11 Pages 2014
Semi-automatic mapping of geological Structures using UAV-based photogrammetric data: An image analysis approach Fulltext Access 11 Pages 2014
Database versioning and its implementation in geoscience information systems Fulltext Access 11 Pages 2014
Time-varying channel estimation through optimal piece-wise time-invariant approximation for high-speed train wireless communications Fulltext Access 11 Pages 2014
Distributed collaborative filtering with singular ratings for large scale recommendation Fulltext Access 11 Pages 2014
Measure-independent characterization of contrast optimal visual cryptography schemes Fulltext Access 11 Pages 2014
A high capacity data hiding scheme for binary images based on block patterns Fulltext Access 11 Pages 2014