Sciweavers

2826 search results - page 477 / 566
» A resource-based analysis of IT sourcing
Sort
View
EOR
2006
104views more  EOR 2006»
15 years 1 months ago
Financial networks with intermediation: Risk management with variable weights
: In this paper, we develop a framework for the modeling, analysis, and computation of solutions to multitiered financial network problems with intermediaries in which both the sou...
Anna Nagurney, Ke Ke
125
Voted
IJIPT
2008
191views more  IJIPT 2008»
15 years 1 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah
IJON
2006
169views more  IJON 2006»
15 years 1 months ago
Denoising using local projective subspace methods
In this paper we present denoising algorithms for enhancing noisy signals based on Local ICA (LICA), Delayed AMUSE (dAMUSE) and Kernel PCA (KPCA). The algorithm LICA relies on app...
Peter Gruber, Kurt Stadlthanner, Matthias Böh...
COR
2007
83views more  COR 2007»
15 years 1 months ago
The impact of US tax depreciation law on asset location and ownership decisions
The decision of whether to manufacture products within the US, manufacture internationally or to outsource production depends critically upon a thorough understanding of the costs...
Joseph C. Hartman, Stephen L. Liedtka, Lawrence V....
JBI
2008
104views Bioinformatics» more  JBI 2008»
15 years 1 months ago
Ontology-enhanced automatic chief complaint classification for syndromic surveillance
Emergency department free-text chief complaints (CCs) are a major data source for syndromic surveillance. CCs need to be classified into syndromic categories for subsequent automa...
Hsin-Min Lu, Daniel Zeng, Lea Trujillo, Ken Komats...