Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             32 results found
no title author magazine year volume issue page(s) type
1 A bio-inspired crime simulation model Furtado, Vasco
2009
48 1 p. 282-292
11 p.
article
2 A framework for context sensitive services: A knowledge discovery based approach Bose, Indranil
2009
48 1 p. 158-168
11 p.
article
3 An analytical approach to bundling in the presence of customer transition effects Chang, Seokjoo Andrew
2009
48 1 p. 122-132
11 p.
article
4 An exploratory study of cognitive effort involved in decision under Framing—an application of the eye-tracking technology Kuo, Feng-Yang
2009
48 1 p. 81-91
11 p.
article
5 Are online auction markets efficient? An empirical study of market liquidity and abnormal returns Kauffman, Robert J.
2009
48 1 p. 3-13
11 p.
article
6 Contents 2009
48 1 p. III-IV
nvt p.
article
7 Critical functionalities of a successful e-learning system — An analysis from instructors' cognitive structure toward system usage Sun, Pei-chen
2009
48 1 p. 293-302
10 p.
article
8 Data quality assessment in context: A cognitive perspective Watts, Stephanie
2009
48 1 p. 202-211
10 p.
article
9 Designing markets for co-production of digital culture goods Lang, Karl R.
2009
48 1 p. 33-45
13 p.
article
10 Editorial Board 2009
48 1 p. IFC-
1 p.
article
11 Efficiency of influence diagram models with continuous decision variables Cobb, Barry R.
2009
48 1 p. 257-266
10 p.
article
12 Exploring optimization of semantic relationship graph for multi-relational Bayesian classification Chen, Hailiang
2009
48 1 p. 112-121
10 p.
article
13 Failure mode and effects analysis by data envelopment analysis Chin, Kwai-Sang
2009
48 1 p. 246-256
11 p.
article
14 Hedging risks with interruptible load programs for a load serving entity Hatami, A.R.
2009
48 1 p. 150-157
8 p.
article
15 Histogram distance-based Bayesian Network structure learning: A supervised classification specific approach Sierra, B.
2009
48 1 p. 180-190
11 p.
article
16 Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining Zhu, Dan
2009
48 1 p. 133-140
8 p.
article
17 Improving efficiency in multiple-unit combinatorial auctions: Bundling bids from multiple bidders Köksalan, Murat
2009
48 1 p. 103-111
9 p.
article
18 Intellectual Property Bundle (IPB) theory: Managing transaction costs in technology development through network governance Aggarwal, Nitin
2009
48 1 p. 23-32
10 p.
article
19 Introduction to the special section on information product markets Lang, Karl R.
2009
48 1 p. 1-2
2 p.
article
20 Machine learning and genetic algorithms in pharmaceutical development and manufacturing processes Chi, Hoi-Ming
2009
48 1 p. 69-80
12 p.
article
21 On strategies for imbalanced text classification using SVM: A comparative study Sun, Aixin
2009
48 1 p. 191-201
11 p.
article
22 Policy-Driven Process Mapping (PDPM): Discovering process models from business policies Wang, Harry Jiannan
2009
48 1 p. 267-281
15 p.
article
23 Recommender system based on workflow Zhen, Lu
2009
48 1 p. 237-245
9 p.
article
24 RFID-enabled item-level retail pricing Zhou, Wei
2009
48 1 p. 169-179
11 p.
article
25 Sampling of information goods Wang, Chong (Alex)
2009
48 1 p. 14-22
9 p.
article
26 Short-term prediction models for server management in Internet-based contexts Casolari, Sara
2009
48 1 p. 212-223
12 p.
article
27 Steal my idea! Organizational adoption of user innovations from a user innovation community: A case study of Dell IdeaStorm Di Gangi, Paul M.
2009
48 1 p. 303-312
10 p.
article
28 The complex problem of monetizing virtual electronic social networks Clemons, Eric K.
2009
48 1 p. 46-56
11 p.
article
29 The impact of corporate social responsibility in supply chain management: Multicriteria decision-making approach Cruz, Jose M.
2009
48 1 p. 224-236
13 p.
article
30 To theme or not to theme: Can theme strength be the music industry's “killer app”? Bhattacharjee, Sudip
2009
48 1 p. 141-149
9 p.
article
31 Towards controlling virus propagation in information systems with point-to-group information sharing Yuan, Hua
2009
48 1 p. 57-68
12 p.
article
32 Visual e-mail authentication and identification services: An investigation of the effects on e-mail use Wang, Jingguo
2009
48 1 p. 92-102
11 p.
article
                             32 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands