Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations Fulltext Access 12 Pages 2014
Efficient execution of speculative threads and transactions with hardware transactional memory Fulltext Access 12 Pages 2014
Efficient multi-keyword ranked query over encrypted data in cloud computing Fulltext Access 12 Pages 2014
Architectural investigation of matrix data layout on multicore processors Fulltext Access 12 Pages 2014
A reconfigurable, regular-topology cluster/datacenter network using commodity optical switches Fulltext Access 12 Pages 2014
Towards understanding the runtime configuration management of do-it-yourself content delivery network applications over public clouds Fulltext Access 12 Pages 2014
Governance–knowledge fit and strategic risk taking in supply chain digitization Fulltext Access 12 Pages 2014
Parameter adaptive harmony search algorithm for unimodal and multimodal optimization problems Fulltext Access 12 Pages 2014
The impact of breakdowns disciplines and repeated attempts on performances of Small Cell Networks Fulltext Access 12 Pages 2014
A typed applicative system for a language and text processing engineering Fulltext Access 12 Pages 2014
Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters Fulltext Access 12 Pages 2014
Propagation model of smartphone worms based on semi-Markov process and social relationship graph Fulltext Access 12 Pages 2014
I shop online – recreationally! Internet anonymity and Silk Road enabling drug use in Australia Fulltext Access 12 Pages 2014
The evaluation of massive multiplayer online role-playing games based on expanded dependency graph Fulltext Access 12 Pages 2014
Creating a semantically-enhanced cloud services environment through ontology evolution Fulltext Access 12 Pages 2014
Dealing with uncertainty and imprecision in image segmentation using belief function theory Fulltext Access 12 Pages 2014
A frequent itemset mining algorithm based on the Principle of Inclusion-Exclusion and transaction mapping Fulltext Access 12 Pages 2014
A multi-population harmony search algorithm with external archive for dynamic optimization problems Fulltext Access 12 Pages 2014
Resource allocation with multi-factor node ranking in data center networks Fulltext Access 12 Pages 2014
Modeling method of cascading crisis events based on merging Bayesian Network Fulltext Access 12 Pages 2014
Computational evaluation of micro-scale and macro-scale error sources in a thermodiffusive cell Fulltext Access 12 Pages 2014
Flexible composition and execution of large scale applications on distributed e-infrastructures Fulltext Access 12 Pages 2014
Investigating communication and step-size behaviour for co-simulation of hybrid physical systems Fulltext Access 12 Pages 2014
Multi-site data distribution for disaster recovery—A planning framework Fulltext Access 12 Pages 2014
Best basis for joint representation: The median of marginal best bases for low cost information exchanges in distributed signal representation Fulltext Access 12 Pages 2014
An entropy-based uncertainty measurement approach in neighborhood systems Fulltext Access 12 Pages 2014
Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks Fulltext Access 12 Pages 2014
Enhancing diversity and coverage of document summaries through subspace clustering and clustering-based optimization Fulltext Access 12 Pages 2014
A novel non-functional matchmaking approach between fuzzy user queries and real world web services based on rough sets Fulltext Access 12 Pages 2014
A platform for secure monitoring and sharing of generic health data in the Cloud Fulltext Access 12 Pages 2014
Latency based group discovery algorithm for network aware cloud scheduling Fulltext Access 12 Pages 2014
A simple two-band semi-analytical model for retrieval of specific absorption coefficients in coastal waters Fulltext Access 13 Pages 2014
Failure factors of small software projects at a global outsourcing marketplace Fulltext Access 13 Pages 2014
Business-driven management of infrastructure-level risks in Cloud providers Fulltext Access 13 Pages 2014
Developing resource consolidation frameworks for moldable virtual machines in clouds Fulltext Access 13 Pages 2014
Memory leak detection in Java: Taxonomy and classification of approaches Fulltext Access 13 Pages 2014
Accurate sub-swarms particle swarm optimization algorithm for service composition Fulltext Access 13 Pages 2014
An evaluation model for dependability of Internet-scale software on basis of Bayesian Networks and trustworthiness Fulltext Access 13 Pages 2014
An approach to finding the cost-effective immunization targets for information assurance Fulltext Access 13 Pages 2014
Knowledge withholding intentions in teams: The roles of normative conformity, affective bonding, rational choice and social cognition Fulltext Access 13 Pages 2014
An effective approach for gap-filling continental scale remotely sensed time-series Fulltext Access 13 Pages 2014
Job performance through mobile enterprise systems: The role of organizational agility, location independence, and task characteristics Fulltext Access 13 Pages 2014
The contours of a human individual model based empathetic u-pillbox system for humanistic geriatric healthcare Fulltext Access 13 Pages 2014
Likelihood-based belief function: Justification and some extensions to low-quality data Fulltext Access 13 Pages 2014
A graph-based approach for interference free integration of commercial off-the-shelf elements in pervasive computing systems Fulltext Access 13 Pages 2014
A resource intensive traffic-aware scheme using energy-aware routing in cognitive radio networks Fulltext Access 13 Pages 2014
Coordinating self-sizing and self-repair managers for multi-tier systems Fulltext Access 13 Pages 2014
An energy-saving routing architecture with a uniform clustering algorithm for wireless body sensor networks Fulltext Access 13 Pages 2014
Using hybrid scheduling for the semi-autonomous formation of expert teams Fulltext Access 13 Pages 2014
Two new fast heuristics for mapping parallel applications on cloud computing Fulltext Access 13 Pages 2014
Dynamic power management in energy-aware computer networks and data intensive computing systems Fulltext Access 13 Pages 2014
Different units of measurement of carotenoids estimation in cotton using hyperspectral indices and partial least square regression Fulltext Access 13 Pages 2014
Ontological user modelling and semantic rule-based reasoning for personalisation of Help-On-Demand services in pervasive environments Fulltext Access 13 Pages 2014
Factors that motivate software engineering teams: A four country empirical study Fulltext Access 13 Pages 2014
Empirical research methods for technology validation: Scaling up to practice Fulltext Access 13 Pages 2014
Beam hardening correction for X-ray computed tomography of heterogeneous natural materials Fulltext Access 13 Pages 2014
Modeling of the seismotectonic provinces of Iran using the self-organizing map algorithm Fulltext Access 13 Pages 2014
Numerical evaluation of the wave energy resource along the Atlantic European coast Fulltext Access 13 Pages 2014
Information technology and knowledge in software development teams: The role of project uncertainty Fulltext Access 13 Pages 2014
Routine reconfiguration in traditional companies’ e-commerce strategy implementation: A trajectory perspective Fulltext Access 13 Pages 2014
Coping knowledge boundaries between information system and business disciplines: An intellectual capital perspective Fulltext Access 13 Pages 2014
Applying object-based segmentation in the temporal domain to characterise snow seasonality Fulltext Access 13 Pages 2014
Task-driven learning: The antecedents and outcomes of internal and external knowledge sourcing Fulltext Access 13 Pages 2014
Imaginal and emotional experiences in pleasure-oriented IT usage: A hedonic consumption perspective Fulltext Access 13 Pages 2014
Toward an understanding of the nature and conceptualization of outsourcing success Fulltext Access 13 Pages 2014