default search action
Decision Support Systems, Volume 51
Volume 51, Number 1, April 2011
- Luís Santos, João Manuel Coutinho-Rodrigues, Carlos Henggeler Antunes:
A web spatial decision support system for vehicle routing using Google Maps. 1-9 - Edoardo M. Airoldi, Xue Bai, Bradley A. Malin:
An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains. 10-20 - Margaret Meiling Luo, Sophea Chea, Jashen Chen:
Web-based information service adoption: A comparison of the motivational model and the uses and gratifications theory. 21-30 - Lauri Puro, Jeffrey E. Teich, Hannele Wallenius, Jyrki Wallenius:
Bidding strategies for real-life small loan auctions. 31-41 - Heng Xu, Xin (Robert) Luo, John M. Carroll, Mary Beth Rosson:
The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing. 42-52 - Durk-Jouke van der Zee:
Building insightful simulation models using Petri Nets - A structured approach. 53-64 - Vidhyacharan Bhaskar, Patrick Lallement:
Queuing network model of uniformly distributed arrivals in a distributed supply chain using subcontracting. 65-76 - Edward Hartono, Clyde W. Holsapple, Haihao Jin:
The role of technological know-how in c-commerce success. 77-87 - Jianping Peng, Guoying Zhang, Rui Chen, Yong Tan:
Impacts of essential elements of management on IT application maturity - A perspective from firms in China. 88-98 - Yipeng Liu, Hsing Kenneth Cheng, Qian Candy Tang, Enes Eryarsoy:
Optimal software pricing in the presence of piracy and word-of-mouth effect. 99-107 - Petr Hájek:
Municipal credit rating modelling by neural networks. 108-118 - Stephen X. Zhang, Vladan Babovic:
An evolutionary real options framework for the design and management of projects and systems with complex real options and exercising conditions. 119-129 - Tsan-Ming Choi, Yong Yu, Kin-Fan Au:
A hybrid SARIMA wavelet transform method for sales forecasting. 130-140 - Johan Huysmans, Karel Dejaeger, Christophe Mues, Jan Vanthienen, Bart Baesens:
An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. 141-154 - Asil Oztekin, Zhenyu James Kong, Dursun Delen:
Development of a structural equation modeling-based decision tree methodology for the analysis of lung transplantations. 155-166 - Michael Bruhn Barfod, Kim Bang Salling, Steen Leleur:
Composite decision support by combining cost-benefit and multi-criteria decision analysis. 167-175 - Sean R. Marston, Zhi Li, Subhajyoti Bandyopadhyay, Juheng Zhang, Anand Ghalsasi:
Cloud computing - The business perspective. 176-189 - Feng Li, Timon C. Du:
Who is talking? An ontology-based opinion leader identification framework for word-of-mouth marketing in online social blogs. 190-197 - Yannick Meiller, Sylvain Bureau, Wei Zhou, Selwyn Piramuthu:
Adaptive knowledge-based system for health care applications with RFID-generated information. 198-207 - Rita Almeida Ribeiro, Ana M. D. Moreira, Pim van den Broek, Afonso Pimentel:
Hybrid assessment method for software engineering decisions. 208-219 - Kholekile L. Gwebu, Jing Wang:
Adoption of Open Source Software: The role of social identification. 220-229 - In Lee:
Modeling the benefit of e-recruiting process integration. 230-239 - Ignacio Contreras:
Emphasizing the rank positions in a distance-based aggregation procedure. 240-245
Volume 51, Number 2, May 2011
- Gang Kou, Yong Shi, Shouyang Wang:
Multiple criteria decision making and decision support systems - Guest editor's introduction. 247-249 - Ralph E. Steuer, Yue Qi, Markus Hirschberger:
Comparative issues in large-scale mean-variance efficient frontier computation. 250-255 - Akram Dehnokhalaji, Pekka J. Korhonen, Murat Köksalan, Nasim Nasrabadi, Jyrki Wallenius:
Convex cone-based partial order for multiple criteria alternatives. 256-261 - Fan Wang, Xiaofan Lai, Ning Shi:
A multi-objective optimization for green supply chain network design. 262-269 - Ying-Hsun Hung, Seng-cho Timothy Chou, Gwo-Hshiung Tzeng:
Knowledge management adoption and assessment for SMEs by a novel MCDM approach. 270-291 - Jianping Li, Liwei Wei, Gang Li, Weixuan Xu:
An evolution strategy-based multiple kernels multi-criteria programming approach: The case of credit decision making. 292-298 - Gülsah Karakaya, Murat Köksalan:
An interactive approach for multi-attribute auctions. 299-306 - Lean Yu, Kin Keung Lai:
A distance-based group decision-making methodology for multi-person multi-criteria emergency decision support. 307-315 - Yi Peng, Yong Zhang, Yu Tang, Shiming Li:
An incident information management framework based on data integration, data mining, and multi-criteria decision making. 316-327 - Jussi Hakanen, Kaisa Miettinen, Kristian Sahlstedt:
Wastewater treatment: New insight provided by interactive multiobjective optimization. 328-337
Volume 51, Number 3, June 2011
- Hajo A. Reijers, Thomas Freytag, Jan Mendling, Andreas Eckleder:
Syntax highlighting in business process models. 339-349 - Xin Tan, Steven Alter, Keng Siau:
Using service responsibility tables to supplement UML in analyzing e-service systems. 350-360 - Torsten Dierkes, Martin Bichler, Ramayya Krishnan:
Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks. 361-371 - Huimin Zhao, Atish P. Sinha, Gaurav Bansal:
An extended tuning method for cost-sensitive regression and forecasting. 372-383 - Gang Peng, Ming Fan, Debabrata Dey:
Impact of network effects and diffusion channels on home computer adoption. 384-393 - Kemal Altinkemer, Tawei Wang:
Cost and benefit analysis of authentication systems. 394-404 - Aimin Yu, Yong Hu, Ming Fan:
Pricing strategies for tied digital contents and devices. 405-412 - G. Alan Wang, Homa Atabakhsh, Hsinchun Chen:
A hierarchical Naïve Bayes model for approximate identity matching. 413-423 - Francesc Carreras, Josep Freixas, María Albina Puente:
A note on decisive symmetric games. 424-433 - Han Li, Rathindra Sarathy, Heng Xu:
The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. 434-445 - Alfonso Rodríguez, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini:
Secure business process model specification through a UML 2.0 activity diagram profile. 446-465 - Jung Lee, Jae-Nam Lee, Hojung Shin:
The long tail or the short tail: The category-specific impact of eWOM on sales distribution. 466-479 - Jian Chen, He Huang, Robert J. Kauffman:
A public procurement combinatorial auction mechanism with quality assignment. 480-492 - Loren Paul Rees, Jason K. Deane, Terry R. Rakes, Wade H. Baker:
Decision support for Cybersecurity risk planning. 493-505 - Edoardo M. Airoldi, Xue Bai, Kathleen M. Carley:
Network sampling and classification: An investigation of network model representations. 506-518 - Heung-Nam Kim, Abdulmotaleb El-Saddik, GeunSik Jo:
Collaborative error-reflected models for cold-start recommender systems. 519-531 - Ariel Monteserin, Analía Amandi:
Argumentation-based negotiation planning for autonomous agents. 532-548 - Patrizia Beraldi, Antonio Violi, Francesco De Simone:
A decision support system for strategic asset allocation. 549-561 - Harry Jiannan Wang, J. Leon Zhao:
Constraint-centric workflow change analytics. 562-575 - Arun Vishwanath, Tejaswini C. Herath, Rui Chen, Jingguo Wang, H. Raghav Rao:
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. 576-586 - Ing-Long Wu, Jhao-Yin Li, Chu-Ying Fu:
The adoption of mobile healthcare by hospital's professionals: An integrative perspective. 587-596 - Muhammad Adeel Zaffar, Ram L. Kumar, Kexin Zhao:
Diffusion dynamics of open source software: An agent-based computational economics (ACE) approach. 597-608 - Arun Sen, Atish P. Sinha:
IT alignment strategies for customer relationship management. 609-619 - Sascha Dahl, Ulrich Derigs:
Cooperative planning in express carrier networks - An empirical study on the effectiveness of a real-time Decision Support System. 620-626 - Yabing Jiang, Abraham Seidmann:
Integrated capacity and marketing incentive contracting for capital-intensive service systems. 627-637 - Franz Schober, Judith Gebauer:
How much to spend on flexibility? Determining the value of information system flexibility. 638-647 - Yevgeniy Vorobeychik, Yagil Engel:
Average-case analysis of VCG with approximate resource allocation algorithms. 648-656 - Prashant Palvia, Praveen Pinjani, Sherrie Cannoy, Tim Jacks:
Contextual constraints in media choice: Beyond information richness. 657-670 - Zhongsheng Hua, Yanhong Sun, Xiaoyan Xu:
Operational causes of bankruptcy propagation in supply chain. 671-681 - Tony Bellotti, Roman Matousek, Chris Stewart:
A note comparing support vector machines and ordered choice models' predictions of international banks' ratings. 682-687 - Yucong Liu, Younghwa Lee, Andrew N. K. Chen:
Evaluating the effects of task-individual-technology fit in multi-DSS models context: A two-phase view. 688-700 - Philippe du Jardin, Eric Séverin:
Predicting corporate bankruptcy using a self-organizing map: An empirical study to improve the forecasting horizon of a financial failure model. 701-711 - Li-Ching Ma, Han-Lin Li:
Using Gower Plots and Decision Balls to rank alternatives involving inconsistent preferences. 712-719
- João Manuel Coutinho-Rodrigues, Ana Simão, Carlos Henggeler Antunes:
A GIS-based multicriteria spatial decision support system for planning urban infrastructures. 720-726
Volume 51, Number 4, November 2011
- Ram D. Gopal, James R. Marsden, Jan Vanthienen:
Information mining - Reflections on recent advancements and the road ahead in data, text, and media mining. 727-731 - Nicole Lang Beebe, Jan Guynes Clark, Glenn B. Dietrich, Myung S. Ko, Daijin Ko:
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies. 732-744 - Lara Khansa, Divakaran Liginlal:
Predicting stock market returns from malicious attacks: A comparative analysis of vector autoregression and time-delayed neural networks. 745-759 - Jiangtao Qiu, Zhangxi Lin:
A framework for exploring organizational structure in dynamic social networks. 760-771 - Heung-Nam Kim, Inay Ha, Kee-Sung Lee, GeunSik Jo, Abdulmotaleb El-Saddik:
Collaborative user modeling for enhanced content filtering in recommender systems. 772-781 - David Martens, Jan Vanthienen, Wouter Verbeke, Bart Baesens:
Performance of classification models from a user perspective. 782-793 - André L. V. Coelho, Everlândio Fernandes, Katti Faceli:
Multi-objective design of hierarchical consensus functions for clustering ensembles via genetic programming. 794-809 - Sérgio Francisco da Silva, Marcela Xavier Ribeiro, João do E. S. Batista Neto, Caetano Traina Jr., Agma J. M. Traina:
Improving the ranking quality of medical image retrieval using a genetic feature selection method. 810-820 - Daniel E. O'Leary:
Blog mining-review and extensions: "From each according to his opinion". 821-830
- Abraham Seidmann, Yabing Jiang, Jie Zhang:
Introduction to the special issue on "information issues in supply chain and in service system design". 831-832 - Joseph G. Szmerekovsky, Vera Tilson, Jiang Zhang:
Analytical model of adoption of item level RFID in a two-echelon supply chain with shelf-space and price-dependent demand. 833-841 - Özden Engin Çakici, Harry Groenevelt, Abraham Seidmann:
Using RFID for the management of pharmaceutical inventory - system optimization and shrinkage control. 842-852 - Jie Zhang, Gregory V. Frazier:
Strategic alliance via co-opetition: Supply chain partnership with a competitor. 853-863 - Arti Mann, Robert J. Kauffman, Kunsoo Han, Barrie R. Nault:
Are there contagion effects in information technology and business process outsourcing? 864-874 - Gregory Dobson, Arvind Sainathan:
On the impact of analyzing customer information and prioritizing in a service system. 875-883 - Eric K. Clemons, Paul F. Nunes:
Carrying your long tail: Delighting your consumers and managing your operations. 884-893 - Ori Marom, Abraham Seidmann:
Using "last-minute" sales for vertical differentiation on the Internet. 894-903 - Yong Jick Lee, Robert J. Kauffman, Ryan Sougstad:
Profit-maximizing firm investments in customer information security. 904-920
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.