Results 1 to 20 of 86
Page 1 of 5  Next >
TypeTitleAuthor(s)YearViews
INTELFRA Ltd.: pricing telecom infrastructure in a monopolistic marketBanerjee, A; Bose, I; Saha, D; Huang, M201192
 
IMECS 2011 - International MultiConference of Engineers and Computer Scientists 2011: PrefaceAbdelkader, YH; AitKadi, D; AlNajjar, B; Allahverdi, A; Amavasai, BP; Henggeler, C; Bouchaffra, D; Bose, I; Brabazon, A; Brdys, M; Cacheda, F; Chan, AHS; Chan, FTS; Chang, CC; Chaudhuri, P; Chen, CH; Chen, CS; Chen, MS; Chen, Q; Choy, W; Chung, TS; Clubb, OL; Damasio, MJ; Dang, C; Djordjevich, A; Fung, YF; Ganesan, G; Leng, RGK; Sing, GO; Gracia, AM; Gu, Z; Gulpinar, N; HeatonAdegbile, P; HerreraViedma, E; Herrero, JR; Huang, X; Hwang, CK; Hwang, HS; Ishihara, S; Jia, L; Kannan, R; Karatzas, GP; Katagiri, H; Kendall, G; Kikuta, K; Kim, HK; Kim, SI; Kothari, C; Krishnamoorthy, M; Kumamoto, T; Kwan, R; Lee, HW; Li, L; Li, X; Li, Y; Lin, CM; Liu, B; Liu, L; Lopez, EMM; Luk, C; Maeda, K; Mahanti, PK; Mahmoud, QH; Matsatsinis, N; Mavrommatis, G; McGuigan, M; Melin, P; Mikhailov, L; Mineno, H; Monsuur, H; Moon, C; Murua, A; Musliu, N; Nakache, D; Ni, J; Nolle, L; Ozalp, AA; Pang, WK; Papadopoulos, AN; Piramuthu, S; Premachandra, IM; Seng, QT; Sharma, D; Sheu, JB; Sheu, SH; Resteanu, CIG; Romero, C; Saito, S; Sawik, T; Seva, RR; Shakshuki, E; Singh, V; Siskos, Y; Stoyan, YG; Sun, J; Sun, Z; Rad, AB; Resta, M; Rodriguez, ML; Rojas, R; Tiwari, MK; Tran, D; Triguero, FH; Tseng, LY; Tsuda, S; Tzeng, GH; Utkin, LV; Vaz, I; Luis, JV; Wang, HF; Wang, L; Wang, SH; Watanabe, T; Werner, F; Wojnicki, I; Wu, EX; Wu, T; Xie, G; Xu, L; Xu, SH; Yang, GC; Yang, XS; Yu, KM; Zanni, C; Zhang, X; Zhang, ZG; Zhao, Y; Zhao, Y; Zopounidis, C2011121
 
Assessing the severity of phishing attacks: A hybrid data mining approachChen, X; Bose, I; Leung, ACM; Guo, C2011117
 
Detection of financial statement fraud and feature selection using data mining techniquesRavisankar, P; Ravi, V; Raghava Rao, G; Bose, I2011312
 
The green potential of RFID projects: A case-based analysisBose, I; Yan, S2011111
 
Manipulation in digital word-of-mouth: A reality check for book reviewsHu, N; Bose, I; Gao, Y; Liu, L2011141
 
Exploring business opportunities from mobile services data of customers: An inter-cluster analysis approachBose, I; Chen, X2010122
 
Failure prediction of dotcom companies using neural network-genetic programming hybridsRavisankar, P; Ravi, V; Bose, I2010124
 
Does sampling influence customers in online retailing of digital music?Hu, N; Liu, L; Bose, I; Shen, J2010118
 
An analysis of investment in identity theft countermeasuresBose, I; Leung, ACM201086
 
Data Mining In TourismBose, I2009218
 
A framework for context sensitive services: A knowledge discovery based approachBose, I; Chen, X200990
 
Hybrid models using unsupervised clustering for prediction of customer churnBose, I; Chen, X2009158
 
What Drives The Adoption Of Anti-phishing Measures By Hong Kong Banks?Bose, I; Leung, ACM2009127
 
A method for extension of generative topographic mapping for fuzzy clusteringBose, I; Chen, X200980
 
Do Phishing Announcements Influence Market Value? An Analysis Of Global FirmsBose, I2009109
 
Quantitative models in support of direct marketing in electronic channelsBose, I2009121
 
Implementation Of Quality Of Service In Voice Over Internet ProtocolBose, I; Fong, MC200975
 
Hybrid Models Using Unsupervised Clustering For Prediction Of Customer ChurnBose, I; Chen, X200985
 
An optimization based approach for deployment of roadway incident response vehicles with reliability constraintsPal, R; Bose, I2009140
 
Page 1 of 5  Next >
Export Records
Step 1: Select content and export format
  • Citation only
Step 2: Select export method
  • Download