论文列表及评分结果
Credit Scoring, Statistical Techniques and Evaluation Criteria: A Review of the Literature.
电商所评分:1
Modelling the Adaptation of Business Continuity Planning by Businesses Using Neural Networks.
电商所评分:8
The Use of Social Media in the Supply Chain: Survey and Extensions.
电商所评分:7
Neuro-Genetic Predictions of Currency crises.
电商所评分:2
Business Intelligence (Bi) Success and the Role of Bi Capabilities.
电商所评分:7
Building and Evolving Data Warehousing and Business Intelligence artefacts: the Case of Sysco.
电商所评分:10
Probabilistic Approaches for Credit Screening and bankruptcy Prediction.
电商所评分:6
Linear Relationship between the aud/USD Exchange Rate and the Respective Stock Market Indices: a Computational Finance Perspective.
电商所评分:1
A Radial Basis Function Approach to Earnings Forecast.
电商所评分:5
Using Neural Nets to Combine Information Sets in Corporate bankruptcy Prediction.
电商所评分:10
Integrated Metaheuristic Optimization of 130-30 Investment-Strategy-Based Long-Short Portfolios.
电商所评分:8
Pricing and hedging Short Sterling Options Using Neural Networks.
电商所评分:10
Fast distributed bi-directional authentication for wireless sensor networks.
电商所评分:2
Retrieving knowledge from auditing log-files for computer and network forensics and accountability.
电商所评分:2
When is a key establishment protocol correct?
电商所评分:2
An authorization model for cross-enterprise collaborations.
电商所评分:3
Optimal multiuser spread-spectrum data hiding in digital images.
电商所评分:10
n-Evasive all-but-many lossy trapdoor function and its constructions.
电商所评分:10
Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels.
电商所评分:9
A dependable storage service system in cloud environment.
电商所评分:7
Efficient techniques of key management and quantum cryptography in RFID networks.
电商所评分:5
Efficient and fault-diagnosable authentication architecture for AMI in smart grid.
电商所评分:6
Single authentication through in convergence space using collaborative smart cameras.
电商所评分:3
Location-preserved contention-based routing in vehicular ad hoc networks.
电商所评分:9
Authentication and key relay in medical cyber-physical systems.
电商所评分:2
Using camouflaging mobility to protect privacy in mobile ad hoc networks.
电商所评分:4
Analysis and improvement of a multi-factor biometric authentication scheme.
电商所评分:3
SAV4AV: securing authentication and verification for ad hoc vehicles.
电商所评分:3
Residual energy-based replica detection scheme for mobile wireless sensor networks.
电商所评分:6
A novel automated framework for modeling and evaluating covert channel algorithms.
电商所评分:2