User awareness and attitude to home WLAN security
|
2008 |
Sandnes, Frode Eika |
The role of third party trust mechanisms under C2C environment in China
|
2008 |
Zhou, Tao |
A concept for applying model-driven engineering to application integration
|
2008 |
Dorda, Clemens |
Improved data mining algorithms for frequent patterns with composite items
|
2008 |
Wang, Ke |
Ontology matching approach based of triangle fuzzy expression
|
2008 |
Qian, Pengfei |
Towards building semantic decision tables with domain ontologies
|
2008 |
Tang, Yan |
Determining batch size in a supply chain
|
2008 |
Masuchun, Ruedee |
An online frequency rate based algorithm for mining frequent sequences in evolving data streams
|
2008 |
Barouni-Ebrahimi, M. |
Making folksonomy machine-understandable
|
2008 |
Shrestha, Prabodh |
Study KM systems from CAS perspective
|
2008 |
Fang, Meiqi |
Financial performance and enterprise resource planning implementation : a study of manufacturers in Taiwan
|
2008 |
Shen, Chien-wen |
Multi-agent-based system for logistics service process
|
2008 |
He, Feng |
Parallel local search to improve the performance of genetic algorithms
|
2008 |
Zheng, Youzhi |
Formal negotiations model for automated agents in e-commerce systems
|
2008 |
Kijthaweesingpoon, T. |
Study on the theory of using SDN to solve a supply chain bottleneck problem
|
2008 |
He, Jing |
SAP business one and SIMERP : differences, similarities, and applications
|
2008 |
Yang, Mingyang |
Jointly managed inventory model and implement analysis
|
2008 |
Lao, Guoling |
Dynamic cooperation design of supply chain based on reputation
|
2008 |
Qi, Guiqing |
An integrated distributed system for web news retrieval
|
2008 |
Chan, Man-chung |
FSAM : a fuzzy-based middleware framework for context-aware adaptive services
|
2008 |
Cheung, Ronnie |