Game-theoretic modeling and control of military operations with partially emotional civilian players

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Decision support systems
Weitere Verfasser: Wei, Mo (BerichterstatterIn), Chen, Genshe (BerichterstatterIn), Cruz, Jose B. (BerichterstatterIn), Hayes, Leonard (BerichterstatterIn), Kruger, Martin (BerichterstatterIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2008
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Identification of fraudulent financial statements using linguistic credibility analysis 2011
Predicting consumer sentiments from online text 2011 Bai, Xue
Understanding anti-plagiarism software adoption : an extended protection motivation theory perspective 2011 Lee, Younghwa
Representing perceived tradeoffs in defining disaster resilience 2011 Zobel, Christopher W.
An ANN-based auditor decision support system using Benford's law 2011 Bhattacharya, Sukanto
Conceptual model for online auditing 2011
Firms' information security investment decisions : stock market evidence of investors' behavior 2011 Chai, Sangmi
Giving context to accounting numbers : the role of news coverage 2011
Building the evaluation model of the IT general control for CPAs under enterprise risk management 2011
Detecting complex account fraud in the enterprise : the role of technical and non-technical controls 2011 Goode, Sigi
Biometric keypads : improving accuracy through optimal PIN selection 2011 Ngugi, Benjamin
An intraday market risk management approach based on textual analysis 2011 Groth, Sven S.
A new role mining framework to elicit business roles and to mitigate enterprise risk 2011
Mining comparative opinions from customer reviews for competitive intelligence 2011
Detecting evolutionary financial statement fraud 2011 Zhou, Wei
A computational model for financial reporting fraud detection 2011 Glancy, Fletcher H.
Data mining for credit card fraud : a comparative study 2011
Fraud detection in online consumer reviews 2011 Hu, Nan
Mining group-based knowledge flows for sharing task knowledge 2011 Liu, Duen-ren
RFID mutual authentication protocols 2011 Piramuthu, Selwyn
Alle Artikel auflisten