A framework for state attraction of discrete event systems under partial observation Fulltext Access 16 Pages 2014
A prioritized aggregation operator-based approach to multiple criteria decision making using interval-valued intuitionistic fuzzy sets: A comparative perspective Fulltext Access 16 Pages 2014
Derivation digraphs for dependencies in ordinal and similarity-based data Fulltext Access 16 Pages 2014
A fuzzy multi-criteria decision-making model by associating technique for order preference by similarity to ideal solution with relative preference relation Fulltext Access 16 Pages 2014
How to adjust the distribution of nonzero elements in sparse representation: A granular locality-preserving approach Fulltext Access 16 Pages 2014
A two-stage stochastic mixed-integer program modelling and hybrid solution approach to portfolio selection problems Fulltext Access 16 Pages 2014
Adaptive fuzzy decentralized tracking fault-tolerant control for stochastic nonlinear large-scale systems with unmodeled dynamics Fulltext Access 16 Pages 2014
Data-based analysis of discrete-time linear systems in noisy environment: Controllability and observability Fulltext Access 16 Pages 2014
Personlized English reading sequencing based on learning portfolio analysis Fulltext Access 16 Pages 2014
Robust control on saturated Markov jump systems with missing information Fulltext Access 16 Pages 2014
Evaluating the educational effectiveness of simulation games: A value generation model Fulltext Access 16 Pages 2014
An axiomatizable logical foundation for lattice-ordered qualitative linguistic approach for reasoning with words Fulltext Access 16 Pages 2014
Shape classification by manifold learning in multiple observation spaces Fulltext Access 16 Pages 2014
Runtime analysis of a multi-objective evolutionary algorithm for obtaining finite approximations of Pareto fronts Fulltext Access 16 Pages 2014
A comparative study of variation operators used for evolutionary multi-objective optimization Fulltext Access 16 Pages 2014
Constructing ordinary sum differential equations using polynomial networks Fulltext Access 16 Pages 2014
Bayesian network approach to multinomial parameter learning using data and expert judgments Fulltext Access 17 Pages 2014
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems Fulltext Access 17 Pages 2014
Performance optimization of deployed software-as-a-service applications Fulltext Access 17 Pages 2014
A multi-level approach to understanding the impact of cyber crime on the financial sector Fulltext Access 17 Pages 2014
A comparative analysis of net neutrality: Insights gained by juxtaposing the U.S. and Korea Fulltext Access 17 Pages 2014
Music genre classification based on local feature selection using a self-adaptive harmony search algorithm Fulltext Access 17 Pages 2014
The role of handbooks in knowledge creation and diffusion: A case of science and technology studies Fulltext Access 17 Pages 2014
Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use Fulltext Access 17 Pages 2014
Data matching of building polygons at multiple map scales improved by contextual information and relaxation Fulltext Access 17 Pages 2014
Experimental evaluation of user performance on two-dimensional and three-dimensional perspective displays in discrete-event simulation Fulltext Access 17 Pages 2014
Validation of user intentions in process orchestration and choreography Fulltext Access 17 Pages 2014
Telecommunications reform and efficiency performance: Do good institutions matter? Fulltext Access 17 Pages 2014
Regulating a monopoly with universal service obligations: The role of flexible tariff schemes Fulltext Access 17 Pages 2014
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders Fulltext Access 17 Pages 2014
Developing a maturity model for service systems in heavy equipment manufacturing enterprises Fulltext Access 17 Pages 2014
Individual empowerment of agile and non-agile software developers in small teams Fulltext Access 17 Pages 2014
Automatic test case generation for structural testing of function block diagrams Fulltext Access 17 Pages 2014
On strategies for testing software product lines: A systematic literature review Fulltext Access 17 Pages 2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model Fulltext Access 17 Pages 2014
A hybrid model through the fusion of type-2 fuzzy logic systems and extreme learning machines for modelling permeability prediction Fulltext Access 17 Pages 2014
Visual topical analysis of Chinese and American Library and Information Science research institutions Fulltext Access 17 Pages 2014
Parallel-machine scheduling to minimize makespan with fuzzy processing times and learning effects Fulltext Access 17 Pages 2014
A human-centric framework for context-aware flowable services in cloud computing environments Fulltext Access 17 Pages 2014
Allowing agents to be imprecise: A proposal using multiple linguistic terms Fulltext Access 17 Pages 2014
Linear estimation for networked control systems with random transmission delays and packet dropouts Fulltext Access 17 Pages 2014
Modelling and controller design for discrete-time networked control systems with limited channels and data drift Fulltext Access 17 Pages 2014
An efficient and reliable approach for quality-of-service-aware service composition Fulltext Access 17 Pages 2014
Reversible data hiding for depth maps using the depth no-synthesis-error model Fulltext Access 17 Pages 2014
Modeling and controller design for complex flexible nonlinear systems via a fuzzy singularly perturbed approach Fulltext Access 17 Pages 2014
Mining incomplete data with singleton, subset and concept probabilistic approximations Fulltext Access 17 Pages 2014
Particle swarm optimization of ensemble neural networks with fuzzy aggregation for time series prediction of the Mexican Stock Exchange Fulltext Access 17 Pages 2014
Disclosed: An efficient depth-first, top-down algorithm for mining disjunctive closed itemsets in high-dimensional data Fulltext Access 17 Pages 2014
Lagrange stability of neural networks with memristive synapses and multiple delays Fulltext Access 17 Pages 2014
Communication-efficient processing of multiple continuous aggregate queries Fulltext Access 17 Pages 2014
Reducing the bottleneck of graph-based data mining by improving the efficiency of labeled graph isomorphism testing Fulltext Access 17 Pages 2014
A concurrently updatable index structure for predicted paths of moving objects Fulltext Access 17 Pages 2014
Maximally permissive liveness-enforcing supervisor with lowest implementation cost for flexible manufacturing systems Fulltext Access 17 Pages 2014
Evolution of knowledge sharing behavior in social commerce: An agent-based computational approach Fulltext Access 17 Pages 2014
Clustering of web search results based on the cuckoo search algorithm and Balanced Bayesian Information Criterion Fulltext Access 17 Pages 2014
A single-machine scheduling with a truncated linear deterioration and ready times Fulltext Access 17 Pages 2014
A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis Fulltext Access 17 Pages 2014
An active contour model and its algorithms with local and global Gaussian distribution fitting energies Fulltext Access 17 Pages 2014
Markov-binary visibility graph: A new method for analyzing complex systems Fulltext Access 17 Pages 2014
Information acquisition processes and their continuity: Transforming uncertainty into risk Fulltext Access 17 Pages 2014
Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation Fulltext Access 17 Pages 2014
Ant intelligence inspired blind data detection for ultra-wideband radar sensors Fulltext Access 17 Pages 2014