Browsing by Author rp01041

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 51 to 70 of 85 < previous   next >
TitleAuthor(s)Issue DateViews
 
Hybrid Models Using Unsupervised Clustering For Prediction Of Customer Churn
Proceeding/Conference:The Proceedings of the International MultiConference of Engineers and Computer Scientist
2009
44
 
Hybrid models using unsupervised clustering for prediction of customer churn
Journal:Journal of Organizational Computing and Electronic Commerce
2009
157
 
IMECS 2011 - International MultiConference of Engineers and Computer Scientists 2011: Preface
Journal:IMECS 2011 - International MultiConference of Engineers and Computer Scientists 2011
2011
131
 
Impact Analysis Of Phishing Announcements On Market Value Of Hong Kong Banks
Proceeding/Conference:Third International Multiconference Of Engineers And Computer Scientists
2008
33
 
Implementation Of Quality Of Service In Voice Over Internet Protocol
Book:Encyclopedia Of Multimedia Technology And Networking
2009
34
 
Indirect Financial Loss of Phishing to Global Market
Proceeding/Conference:International Conference On Information Systems
2008
44
 
2011
49
 
A Lagrangean Relaxation Based Scheme For Allocation Of Bandwidth
Proceeding/Conference:Proceedings of the 5th International Conference on Electronic Business
2005
28
 
Lessons Learned From Distributed Agile Software Projects: A Case Based Analysis
Journal:Communications of the Association for Information Systems
2008
213
 
A Longitudinal Study Of Anti-phishing Preparedness Of Hong Kong Banks
Proceeding/Conference:International Conference On Web Engineering And Applications
2007
39
 
Managing RFID projects in organizations
Journal:European Journal of Information Systems
2009
59
 
2011
159
 
A method for extension of generative topographic mapping for fuzzy clustering
Journal:Journal of the American Society for Information Science and Technology
2009
70
 
Multi-period Design Of Survivable Wireless Access Networks Under Capacity Constraints
Proceeding/Conference:Proceedings Of The Fifth International Congress On Industrial And Applied Mathematics
2004
34
 
2005
61
 
On returns policies with exogenous price
Journal:European Journal of Operational Research
2007
73
 
2009
58
 
2004
274
 
Phishing Is Here: Are We Ready?
Proceeding/Conference:Proceedings Of The International Multiconference Of Engineers And Computer Scientists
2006
33
 
Phishing – The New Security Threat On The Internet
Book:Advances In Enterprise Information Technology Security
2007
32