Examining the growth of digital wireless phone technology: A take-off theory analysis Fulltext Access 15 Pages 2014
Application discoverability and user satisfaction in mobile application stores: An environmental psychology perspective Fulltext Access 15 Pages 2014
The value of information sharing in a multi-product, multi-level supply chain: Impact of product substitution, demand correlation, and partial information sharing Fulltext Access 16 Pages 2014
A developmental approach to robotic pointing via human-robot interaction Fulltext Access 16 Pages 2014
Ex ante margin squeeze tests in the telecommunications industry: What is a reasonably efficient operator? Fulltext Access 16 Pages 2014
Decomposition analysis of the telecommunications sector in Indonesia: What does the cellular era shed light on? Fulltext Access 16 Pages 2014
How advanced are Italian regions in terms of public e-services? The construction of a composite indicator to analyze patterns of innovation diffusion in the public sector Fulltext Access 16 Pages 2014
Novel transport delay problem solutions for gas plant inlet pressure control Fulltext Access 16 Pages 2014
Determinants of e-consumer productivity in product retrieval on a commercial website: An experimental approach Fulltext Access 16 Pages 2014
An empirical investigation into factors affecting patient cancellations and no-shows at outpatient clinics Fulltext Access 16 Pages 2014
An intelligent situation awareness support system for safety-critical environments Fulltext Access 16 Pages 2014
A social appraisal mechanism for online purchase decision support in the micro-blogosphere Fulltext Access 16 Pages 2014
The impact of multinationality on firm value: A comparative analysis of machine learning techniques Fulltext Access 16 Pages 2014
Partial order relation for approximation operators in covering based rough sets Fulltext Access 16 Pages 2014
A mixed integer programming formulation and solution for traffic analysis zone delineation considering zone amount decision Fulltext Access 16 Pages 2014
Understanding replication of experiments in software engineering: A classification Fulltext Access 16 Pages 2014
A recommendation framework for remote sensing images by spatial relation analysis Fulltext Access 16 Pages 2014
Understanding reuse of software examples: A case study of prejudice in a community of practice Fulltext Access 16 Pages 2014
How are software defects found? The role of implicit defect detection, individual responsibility, documents, and knowledge Fulltext Access 16 Pages 2014
How good is a model based on bibliometric indicators in predicting the final decisions made by peers? Fulltext Access 16 Pages 2014
A regression analysis of researchers' social network metrics on their citation performance in a college of engineering Fulltext Access 16 Pages 2014
Expanding mobile wireless capacity: The challenges presented by technology and economics Fulltext Access 16 Pages 2014
Site-shifting as the source of ambidexterity: Empirical insights from the field of ticketing Fulltext Access 16 Pages 2014
A graph edit dictionary for correcting errors in roof topology graphs reconstructed from point clouds Fulltext Access 16 Pages 2014
Tensor-Cuts: A simultaneous multi-type feature extractor and classifier and its application to road extraction from satellite images Fulltext Access 16 Pages 2014
Comparing large number of metaheuristics for artificial neural networks training to predict water temperature in a natural river Fulltext Access 16 Pages 2014
Data stream mining for predicting software build outcomes using source code metrics Fulltext Access 16 Pages 2014
Combining mutation and fault localization for automated program debugging Fulltext Access 16 Pages 2014
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems Fulltext Access 16 Pages 2014
Reusing design experiences to materialize software architectures into object-oriented designs Fulltext Access 16 Pages 2014
Observer-based adaptive fuzzy decentralized control for stochastic large-scale nonlinear systems with unknown dead-zones Fulltext Access 16 Pages 2014
Anonymous spatial encryption under affine space delegation functionality with full security Fulltext Access 16 Pages 2014
On the periodic dynamics of memristor-based neural networks with time-varying delays Fulltext Access 16 Pages 2014
The consensus problem with dual failure nodes in a cloud computing environment Fulltext Access 16 Pages 2014
Multi-objective energy-efficient workflow scheduling using list-based heuristics Fulltext Access 16 Pages 2014
Performance evaluation of anomaly-detection algorithms for mouse dynamics Fulltext Access 16 Pages 2014
Information security incident management: Current practice as reported in the literature Fulltext Access 16 Pages 2014
Evaluation model for knowledge sharing in information security professional virtual community Fulltext Access 16 Pages 2014
Toward a secure and usable cloud-based password manager for web browsers Fulltext Access 16 Pages 2014
Dynamic tuning of the workload partition factor and the resource utilization in data-intensive applications Fulltext Access 16 Pages 2014
Giving form to social cloud storage through experimentation: Issues and insights Fulltext Access 16 Pages 2014
Security, energy, and performance-aware resource allocation mechanisms for computational grids Fulltext Access 16 Pages 2014
Consistency and enforcement of access rules in cooperative data sharing environment Fulltext Access 16 Pages 2014
Evidence-theory-based numerical algorithms of attribute reduction with neighborhood-covering rough sets Fulltext Access 16 Pages 2014
Learning from imprecise and fuzzy observations: Data disambiguation through generalized loss minimization Fulltext Access 16 Pages 2014
Forecasting using belief functions: An application to marketing econometrics Fulltext Access 16 Pages 2014
Identification of ontologies to support information systems development Fulltext Access 16 Pages 2014
Assessing single-pair similarity over graphs by aggregating first-meeting probabilities Fulltext Access 16 Pages 2014
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Fulltext Access 16 Pages 2014
A linguistic decision making approach to assess the quality of volunteer geographic information for citizen science Fulltext Access 16 Pages 2014
Adaptive neural tracking control for stochastic nonlinear strict-feedback systems with unknown input saturation Fulltext Access 16 Pages 2014
Bid keyword suggestion in sponsored search based on competitiveness and relevance Fulltext Access 16 Pages 2014
A Lattice-Computing ensemble for reasoning based on formal fusion of disparate data types, and an industrial dispensing application Fulltext Access 16 Pages 2014
Fusing navigation and vision information with the Transferable Belief Model: Application to an intelligent speed limit assistant Fulltext Access 16 Pages 2014
A localized algorithm for Structural Health Monitoring using wireless sensor networks Fulltext Access 16 Pages 2014
Conceptualizing the interdisciplinary diffusion and evolution of emerging fields: The case of systems biology Fulltext Access 16 Pages 2014
The determinants of home healthcare robots adoption: An empirical investigation Fulltext Access 16 Pages 2014
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy Fulltext Access 16 Pages 2014
Segmentation of thin section images for grain size analysis using region competition and edge-weighted region merging Fulltext Access 16 Pages 2014
Verifying the high-order consistency of training images with data for multiple-point geostatistics Fulltext Access 16 Pages 2014
GIS development to monitor climate change and its geohydrological consequences on non-monsoon crop pattern in Himalaya Fulltext Access 16 Pages 2014
Supporting augmented floating car data through smartphone-based crowd-sensing Fulltext Access 16 Pages 2014
Processes versus people: How should agile software development maturity be defined? Fulltext Access 16 Pages 2014
Architectural reliability analysis of framework-intensive applications: A web service case study Fulltext Access 16 Pages 2014
Anonymity and closely related terms in the cyberspace: An analysis by example Fulltext Access 16 Pages 2014