


default search action
Decision Support Systems, Volume 46
Volume 46, Number 1, December 2008
- Jennifer Shang, Pandu R. Tadikamalla, Laurie J. Kirsch, Lawrence Brown:

A decision support system for managing inventory at GlaxoSmithKline. 1-13 - Stephen Russell, Aryya Gangopadhyay, Victoria Y. Yoon:

Assisting decision making in the event-driven enterprise using wavelets. 14-28 - Munir Mandviwalla

, Ravi Patnayakuni, David Schuff:
Improving the peer review process with information technology. 29-40 - Ying Sai:

Transparent Safe. 41-51 - Chetan Kumar, John B. Norris:

A new approach for a proxy-level web caching mechanism. 52-60 - Robert S. Garfinkel, Ram D. Gopal

, Bhavik Pathak, Fang Yin:
Shopbot 2.0: Integrating recommendations and promotions with comparison shopping. 61-69 - Shi-Ming Huang, David C. Yen

, Luen-Wei Yang, Jing-Shiuan Hua:
An investigation of Zipf's Law for fraud detection (DSS#06-10-1826R(2)). 70-83 - Beatriz Abdul-Jalbar

, José Miguel Gutiérrez
, Joaquín Sicilia
:
Policies for a single-vendor multi-buyer system with finite production rate. 84-100 - Riyaz T. Sikora, Vishal Sachdev:

Learning bidding strategies with autonomous agents in environments with unstable equilibrium. 101-114 - David Dreyfus, Bala Iyer:

Managing architectural emergence: A conceptual model and simulation. 115-127 - Stephen G. Powell, Kenneth R. Baker, Barry Lawson:

A critical review of the literature on spreadsheet errors. 128-138 - Sang Won Yoon, Juan Diego Velásquez, Barry K. Partridge, Shimon Y. Nof:

Transportation security decision support system for emergency response: A training prototype. 139-148 - Shih-Wei Chou, Yu-Chieh Chang:

The implementation factors that influence the ERP (enterprise resource planning) benefits. 149-157 - Daniel G. Conway, Gary J. Koehler:

Caveat mercator in electronic commerce: An update. 158-172 - Ramanath Subramanyam

, Mu Xia:
Free/Libre Open Source Software development in developing and developed countries: A conceptual framework with an exploratory study. 173-186 - Adrian Paschke, Martin Bichler:

Knowledge representation concepts for automated SLA management. 187-205 - Zhiping D. Walter

, Melissa Succi Lopez:
Physician acceptance of information technologies: Role of perceived threat to professional autonomy. 206-215 - Jahyun Goo, C. Derrick Huang:

Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory. 216-232 - Christine Kiss, Martin Bichler:

Identification of influencers - Measuring influence in customer networks. 233-253 - Nanda Kumar, Kannan Mohan, Richard D. Holowczak:

Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. 254-264 - Martijn Kagie, Michiel C. van Wezel, Patrick J. F. Groenen

:
A graphical shopping interface based on product attributes. 265-276 - K. O. Willis, Dylan F. Jones

:
Multi-objective simulation optimization through search heuristics and relational database analysis. 277-286 - Atish P. Sinha, Huimin Zhao:

Incorporating domain knowledge into data mining classifiers: An application in indirect lending. 287-299 - Minseok Song

, Wil M. P. van der Aalst
:
Towards comprehensive support for organizational mining. 300-317 - Hong Guo, Juheng Zhang

, Gary J. Koehler:
A survey of quantum games. 318-332 - Juheng Zhang

, Subhajyoti Bandyopadhyay
, Selwyn Piramuthu:
Real option valuation on grid computing. 333-343 - Cokky A. R. Hilhorst, Pieter M. A. Ribbers, Eric van Heck, Martin Smits:

Using Dempster-Shafer theory and real options theory to assess competing strategies for implementing IT infrastructures: A case study. 344-355 - Upkar Varshney:

A middleware framework for managing transactions in group-oriented mobile commerce services. 356-365 - Rui Borges Lopes, Sérgio Barreto

, Carlos Ferreira
, Beatriz Sousa Santos
:
A decision-support tool for a capacitated location-routing problem. 366-375 - Geoffrey Lamptey, Samuel Labi, Zongzhi Li

:
Decision support for optimal scheduling of highway pavement preventive maintenance within resurfacing cycle. 376-387 - Ye Chen, Divakaran Liginlal:

A maximum entropy approach to feature selection in knowledge-based authentication. 388-398 - Gokul Bhandari, Khaled Hassanein

, Richard Deaves:
Debiasing investors with decision support systems: An experimental investigation. 399-410 - Zhan-Li Sun, Tsan-Ming Choi

, Kin-Fan Au, Yong Yu
:
Sales forecasting using extreme learning machine with applications in fashion retailing. 411-419 - Pier Luigi Conti, Maurizio Naldi

:
Detection of anomalous bids in procurement auctions. 420-428 - Navin Kumar, Aryya Gangopadhyay, Sanjay Bapna, George Karabatis, Zhiyuan Chen:

Measuring interestingness of discovered skewed patterns in data cubes. 429-439 - Zhe Qu

, Han Zhang, Haizheng Li:
Determinants of online merchant rating: Content analysis of consumer comments about Yahoo merchants. 440-449
Volume 46, Number 2, January 2009
- Younghwa Lee, Kenneth A. Kozar, Kai R. T. Larsen:

Avatar e-mail versus traditional e-mail: Perceptual difference and media selection difference. 451-467 - Hakan Tarakci, Zafer D. Ozdemir

, Moosa Sharafali:
On the staffing policy and technology investment in a specialty hospital offering telemedicine. 468-480 - Enes Eryarsoy, Gary J. Koehler, Haldun Aytug:

Using domain-specific knowledge in generalization error bounds for support vector machine learning. 481-491 - Chetan Kumar:

Performance evaluation for implementations of a network of proxy caches. 492-500 - Chieh-Yuan Tsai, Yu-Chen Shieh:

A change detection method for sequential patterns. 501-511 - Jian Cai, Xiangdong Liu, Zhihui Xiao, Jin Liu:

Improving supply chain performance management: A systematic approach to analyzing iterative KPI accomplishment. 512-521 - Yoshinori Suzuki:

A decision support system of dynamic vehicle refueling. 522-531 - Jing Wang

, Kholekile L. Gwebu
, Murali S. Shanker, Marvin D. Troutt:
An application of agent-based simulation to knowledge sharing. 532-541 - Punit Ahluwalia, Upkar Varshney:

Composite quality of service and decision making perspectives in wireless networks. 542-551 - Vidyanand Choudhary

, Rajeev K. Tyagi:
Economic incentives to adopt electronic payment schemes under competition. 552-561 - Ned Kock, Jacques Verville, Azim Danesh-Pajou, Dorrie DeLuca:

Communication flow orientation in business process modeling and its effect on redesign success: Results from a field study. 562-575 - Chandrasekar Subramaniam, Ravi Sen, Matthew L. Nelson:

Determinants of open source software project success: A longitudinal study. 576-585 - Yu-Ju Tu

, Wei Zhou
, Selwyn Piramuthu:
Identifying RFID-embedded objects in pervasive healthcare applications. 586-593 - Cuneyd C. Kaya, Guoying Zhang, Yong Tan, Vijay S. Mookerjee:

An admission-control technique for delay reduction in proxy caching. 594-603
Volume 46, Number 3, February 2009
- Upkar Varshney:

Guest editorial: Wireless in the healthcare. 605 - Sweta Sneha, Upkar Varshney:

Enabling ubiquitous patient monitoring: Model, decision protocols, opportunities and challenges. 606-619 - Sutirtha Chatterjee

, Suranjan Chakraborty, Saonee Sarker, Suprateek Sarker, Francis Y. Lau:
Examining the success factors for mobile work in healthcare: A deductive study. 620-633 - Iris A. Junglas, Chon Abraham, Blake Ives

:
Mobile technology at the frontlines of patient care: Understanding fit and human drives in utilization decisions and performance. 634-647
- Laureano F. Escudero

, Mercedes Landete
, Alfredo Marín
:
A branch-and-cut algorithm for the Winner Determination Problem. 649-659 - Norman A. Johnson, Randolph B. Cooper, Wynne W. Chin:

Anger and flaming in computer-mediated negotiation among strangers. 660-672 - Norman A. Johnson, Randolph B. Cooper:

Media, affect, concession, and agreement in negotiation: IM versus telephone. 673-684 - Dimitris A. Papakiriakopoulos

, Katerina Pramatari, Georgios I. Doukidis:
A decision support system for detecting products missing from the shelf based on heuristic rules. 685-694 - Christie M. Fuller

, David P. Biros, Rick L. Wilson:
Decision support for determining veracity via linguistic-based cues. 695-703 - Fenghui Ren

, Minjie Zhang
, Kwang Mong Sim
:
Adaptive conceding strategies for automated trading agents in dynamic, open markets. 704-716 - Boris A. Galitsky

, María Paula González, Carlos Iván Chesñevar
:
A novel approach for classifying customer complaints through graphs similarities in argumentative dialogues. 717-729 - Jorge E. Mendoza

, Andrés L. Medaglia
, Nubia Velasco
:
An evolutionary-based decision support system for vehicle routing: The case of a public utility. 730-742 - Michael V. Mannino, Yanjuan Yang, Young Ryu

:
Classification algorithm sensitivity to training data with non representative attribute noise. 743-751
Volume 46, Number 4, March 2009
- James Y. L. Thong, Felix B. Tan:

Introduction to the PACIS2007 special issue for decision support systems. 753-754 - Seungwoo Kwon

, Byungjoon Yoo, Jinbae Kim, Wei Shang, Gunwoong Lee:
Reservation price reporting mechanisms for online negotiations. 755-762 - Jeevan Jaisingh

:
Impact of piracy on innovation at software firms and implications for piracy policy. 763-773 - Fu-ren Lin, Jen-Hung Yu:

Visualized cognitive knowledge map integration for P2P networks. 774-785 - Angela Liew

, David Sundaram:
Flexible modelling and support of interrelated decisions. 786-802 - Frank K. Y. Chan

, James Y. L. Thong
:
Acceptance of agile methodologies: A critical review and conceptual framework. 803-814 - Boon-Yuen Ng, Atreyi Kankanhalli, Yunjie Calvin Xu:

Studying users' computer security behavior: A health belief perspective. 815-825 - Joy Wei He, Kwok-Kee Wei

:
What drives continued knowledge sharing? An investigation of knowledge-contribution and -seeking beliefs. 826-838 - Weiling Ke, Hefu Liu

, Kwok Kee Wei
, Jibao Gu, Huaping Chen:
How do mediated and non-mediated power affect electronic supply chain management system adoption? The mediating effects of trust and institutional pressures. 839-851
- Carolyn F. Holton:

Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem. 853-864 - Winston T. Lin:

The business value of information technology as measured by technical efficiency: Evidence from country-level data. 865-874 - Frank Witlox

, Marc Antrop, Peter Bogaert, Philippe De Maeyer
, Ben Derudder, Tijs Neutens, Veronique Van Acker
, Nico Van de Weghe
:
Introducing functional classification theory to land use planning by means of decision tables. 875-881 - Hak-Jin Kim, Wooju Kim

, Myungjin Lee:
Semantic Web Constraint Language and its application to an intelligent shopping agent. 882-894 - Stefan Koch

, Johann Mitlöhner:
Software project effort estimation with voting rules. 895-901 - Joseph S. Valacich, Saonee Sarker, Jamie Pratt, Mike Groomer:

Understanding risk-taking behavior of groups: A "decision analysis" perspective. 902-912

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














