Analysing knowledge capture mechanisms: Methods and a stylised bioventure case Fulltext Access 14 Pages 2014
A comparison of journal similarity across six disciplines using citing discipline analysis Fulltext Access 14 Pages 2014
The effects of personalization on user continuance in social networking sites Fulltext Access 14 Pages 2014
Generating pseudo-random numbers by combining two systems with complex behaviors Fulltext Access 14 Pages 2014
Complexity is dead, long live complexity! How software can help service providers manage security and compliance Fulltext Access 14 Pages 2014
A label field fusion model with a variation of information estimator for image segmentation Fulltext Access 14 Pages 2014
Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing Fulltext Access 14 Pages 2014
Covert Computation — Hiding code in code through compile-time obfuscation Fulltext Access 14 Pages 2014
A bi-objective cost model for optimizing database queries in a multi-cloud environment Fulltext Access 14 Pages 2014
A new genetic algorithm for global optimization of multimodal continuous functions Fulltext Access 14 Pages 2014
Improving the non-dominated sorting genetic algorithm using a gene-therapy method for multi-objective optimization Fulltext Access 14 Pages 2014
A three-stage unsupervised dimension reduction method for text clustering Fulltext Access 14 Pages 2014
Enhancing sentence-level clustering with ranking-based clustering framework for theme-based summarization Fulltext Access 14 Pages 2014
A multi-criteria ranking framework for partner selection in scientific collaboration environments Fulltext Access 14 Pages 2014
Model-based requirements verification method: Conclusions from two controlled experiments Fulltext Access 14 Pages 2014
Factors influencing acceptance of technology for aging in place: A systematic review Fulltext Access 14 Pages 2014
Virtualized healthcare delivery: Understanding users and their usage patterns of online medical consultations Fulltext Access 14 Pages 2014
A characterization of hierarchical computable distance functions for data warehouse systems Fulltext Access 14 Pages 2014
Understanding the paradigm shift to computational social science in the presence of big data Fulltext Access 14 Pages 2014
An empirical study of sentence features for subjectivity and polarity classification Fulltext Access 14 Pages 2014
The effects of customer relationship management relational information processes on customer-based performance Fulltext Access 14 Pages 2014
Investigating dependencies in software requirements for change propagation analysis Fulltext Access 14 Pages 2014
Global software testing under deadline pressure: Vendor-side experiences Fulltext Access 14 Pages 2014
Analyzing the relationships between inspections and testing to provide a software testing focus Fulltext Access 14 Pages 2014
Model-based testing of global properties on large-scale distributed systems Fulltext Access 14 Pages 2014
Generating profile-based signatures for online intrusion and failure detection Fulltext Access 14 Pages 2014
A consensus framework for multiple attribute group decision analysis in an evidential reasoning context Fulltext Access 14 Pages 2014
Intelligent jamming region division with machine learning and fuzzy optimization for control of robot’s part micro-manipulative task Fulltext Access 14 Pages 2014
A new adaptive decentralized soft decision combining rule for distributed sensor systems with data fusion Fulltext Access 14 Pages 2014
Nonparallel hyperplane support vector machine for binary classification problems Fulltext Access 14 Pages 2014
Safe science classrooms: Teacher training through serious educational games Fulltext Access 14 Pages 2014
Development of multidimensional academic information networks with a novel data cube based modeling method Fulltext Access 14 Pages 2014
An efficient Particle Swarm Optimization approach to cluster short texts Fulltext Access 14 Pages 2014
Acceleration of decision making in sound event recognition employing supercomputing cluster Fulltext Access 14 Pages 2014
Exponential stability of descriptor systems with large delay period based on a switching method Fulltext Access 14 Pages 2014
Type-2 fuzzy tool condition monitoring system based on acoustic emission in micromilling Fulltext Access 14 Pages 2014
Reliable classification: Learning classifiers that distinguish aleatoric and epistemic uncertainty Fulltext Access 14 Pages 2014
Combining supervised and unsupervised models via unconstrained probabilistic embedding Fulltext Access 14 Pages 2014
A new linguistic computational model based on discrete fuzzy numbers for computing with words Fulltext Access 14 Pages 2014
A discrete gravitational search algorithm for solving combinatorial optimization problems Fulltext Access 14 Pages 2014
Integrating the artificial bee colony and bees algorithm to face constrained optimization problems Fulltext Access 14 Pages 2014
Competitive ratios for preemptive and non-preemptive online scheduling with nondecreasing concave machine cost Fulltext Access 14 Pages 2014
An outranking approach for multi-criteria decision-making with hesitant fuzzy linguistic term sets Fulltext Access 14 Pages 2014
Facial-feature detection and localization based on a hierarchical scheme Fulltext Access 14 Pages 2014
Alternative second-order cone programming formulations for support vector classification Fulltext Access 14 Pages 2014
A novel segmentation based video-denoising method with noise level estimation Fulltext Access 14 Pages 2014
A group decision-making approach using a method for constructing a linguistic scale Fulltext Access 14 Pages 2014
Recognizing architecture styles by hierarchical sparse coding of blocklets Fulltext Access 14 Pages 2014
Cooperation of multiple mobile sensors with minimum energy cost for mobility and communication Fulltext Access 14 Pages 2014
A seven-dimensional flow analysis to help autonomous network management Fulltext Access 14 Pages 2014
Evaluating and comparing the quality of access control in different operating systems Fulltext Access 15 Pages 2014
Static analysis based invariant detection for commodity operating systems Fulltext Access 15 Pages 2014
Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union Fulltext Access 15 Pages 2014
A comprehensive and efficacious architecture for detecting phishing webpages Fulltext Access 15 Pages 2014
Towards a distributed secure in-vehicle communication architecture for modern vehicles Fulltext Access 15 Pages 2014
A new chaotic map based image encryption schemes for several image formats Fulltext Access 15 Pages 2014
Efficient distributed skyline computation using dependency-based data partitioning Fulltext Access 15 Pages 2014
Estimating confidence interval of software reliability with adaptive testing strategy Fulltext Access 15 Pages 2014
A methodology to automatically optimize dynamic memory managers applying grammatical evolution Fulltext Access 15 Pages 2014
Efficient customization of multi-tenant Software-as-a-Service applications with service lines Fulltext Access 15 Pages 2014