-
4
-
-
84863086968
-
Including spatial interdependence in customer acquisition models: A cross-category comparison
-
P. Baecke, and D. Van den Poel Including spatial interdependence in customer acquisition models: A cross-category comparison Expert Systems with Applications 39 15 2012 12105 12113
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.15
, pp. 12105-12113
-
-
Baecke, P.1
Van Den Poel, D.2
-
7
-
-
84861347296
-
Improving customer retention in financial services using kinship network information
-
D.F. Benoit, and D. Van den Poel Improving customer retention in financial services using kinship network information Expert Systems with Applications 39 13 2012 11435 11442
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.13
, pp. 11435-11442
-
-
Benoit, D.F.1
Van Den Poel, D.2
-
9
-
-
61349134071
-
Assessment of information impacts in power system security against malicious attacks in a general framework
-
E. Bompard, R. Napoli, and F. Xue Assessment of information impacts in power system security against malicious attacks in a general framework Reliability Engineering & System Safety 94 6 2009 1087 1094
-
(2009)
Reliability Engineering & System Safety
, vol.94
, Issue.6
, pp. 1087-1094
-
-
Bompard, E.1
Napoli, R.2
Xue, F.3
-
10
-
-
84865259099
-
Married women's lifestyles in Japan: Disparities based on the number of children
-
Y. Cao, S. Matsumoto, and T. Murata Married women's lifestyles in Japan: Disparities based on the number of children The Review of Socionetwork Strategies 6 1 2012 1 14
-
(2012)
The Review of Socionetwork Strategies
, vol.6
, Issue.1
, pp. 1-14
-
-
Cao, Y.1
Matsumoto, S.2
Murata, T.3
-
11
-
-
0024135474
-
Implementing multilevel security by violation privilege
-
J.M. Carroll Implementing multilevel security by violation privilege Computers & Security 7 6 1988 563 573
-
(1988)
Computers & Security
, vol.7
, Issue.6
, pp. 563-573
-
-
Carroll, J.M.1
-
12
-
-
84855884211
-
A survey of security in multi-agent systems
-
R.C. Cavalcante, I. Bittencourt, A.P. da Silva, M. Silva, E. Costa, and R. Santos A survey of security in multi-agent systems Expert Systems with Applications 39 5 2012 4835 4846
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.5
, pp. 4835-4846
-
-
Cavalcante, R.C.1
Bittencourt, I.2
Da Silva, A.P.3
Silva, M.4
Costa, E.5
Santos, R.6
-
14
-
-
0011588485
-
Trusted products evaluation
-
S. Chokhani Trusted products evaluation Communication of the ACM 35 7 1992 64 76
-
(1992)
Communication of the ACM
, vol.35
, Issue.7
, pp. 64-76
-
-
Chokhani, S.1
-
15
-
-
33645164231
-
Managing role relationships in an information flow control model
-
S.C. Chou, and Y.C. Chen Managing role relationships in an information flow control model Journal of Systems and Software 79 4 2006 507 522
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.4
, pp. 507-522
-
-
Chou, S.C.1
Chen, Y.C.2
-
16
-
-
84859215151
-
Using latent topics to enhance search and recommendation in enterprise social software
-
K. Christidis, G. Mentzas, and D. Apostolou Using latent topics to enhance search and recommendation in enterprise social software Expert Systems with Applications 39 10 2012 9297 9307
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.10
, pp. 9297-9307
-
-
Christidis, K.1
Mentzas, G.2
Apostolou, D.3
-
17
-
-
84857651191
-
Reconciling performance and interpretability in customer churn prediction using ensemble learning based on generalized additive models
-
K.W. De Bock, and D. Van den Poel Reconciling performance and interpretability in customer churn prediction using ensemble learning based on generalized additive models Expert Systems with Applications 39 8 2012 6816 6826
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.8
, pp. 6816-6826
-
-
De Bock, K.W.1
Van Den Poel, D.2
-
18
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. Deerwester, S. Dumais, G. Furnas, T. Landauer, and R. Harshman Indexing by latent semantic analysis Journal of the American Society for Information Science 41 6 1990 391 407
-
(1990)
Journal of the American Society for Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.2
Furnas, G.3
Landauer, T.4
Harshman, R.5
-
19
-
-
0023710206
-
Comparing the areas under two or more correlated receiver operating characteristic curves: A nonparametric approach
-
E.R. DeLong, D.M. DeLong, and D.L. Clarke-Pearson Comparing the areas under two or more correlated receiver operating characteristic curves: A nonparametric approach Biometrics 44 3 1988 837 845
-
(1988)
Biometrics
, vol.44
, Issue.3
, pp. 837-845
-
-
Delong, E.R.1
Delong, D.M.2
Clarke-Pearson, D.L.3
-
20
-
-
79954555301
-
Do you have the right security?
-
M. Dubash Do you have the right security? Computer Fraud & Security 2011 3 2011 14 16
-
(2011)
Computer Fraud & Security
, vol.2011
, Issue.3
, pp. 14-16
-
-
Dubash, M.1
-
21
-
-
0005270292
-
Confidentiality and adolescents' disclosure of sensitive information
-
C.A. Ford, S.G. Millstein, B. Halpern-Felsher, and C.E. Irwin Confidentiality and adolescents' disclosure of sensitive information Journal of Adolescent Health 18 2 1996 111
-
(1996)
Journal of Adolescent Health
, vol.18
, Issue.2
, pp. 111
-
-
Ford, C.A.1
Millstein, S.G.2
Halpern-Felsher, B.3
Irwin, C.E.4
-
24
-
-
63849136022
-
Vertrauliche Verarbeitung staatlich eingestufter Information-die Informationstechnologie im Geheimschutz
-
W. Gericke, D. Thorleuchter, G. Weck, F. Reiländer, and D. Loß Vertrauliche Verarbeitung staatlich eingestufter Information-die Informationstechnologie im Geheimschutz Informatik Spektrum 32 2 2009 102 109
-
(2009)
Informatik Spektrum
, vol.32
, Issue.2
, pp. 102-109
-
-
Gericke, W.1
Thorleuchter, D.2
Weck, G.3
Reiländer, F.4
Loß, D.5
-
25
-
-
0032263984
-
A theory of term weighting based on exploratory data analysis
-
W.R. Greiff A theory of term weighting based on exploratory data analysis W.B. Croft, A. Moffat, C.J. van Rijsbergen, R. Wilkinson, J. Zobel, Proceedings of the 21st SIGIR Conference 1998 ACM New York 11 19
-
(1998)
Proceedings of the 21st SIGIR Conference
, pp. 11-19
-
-
Greiff, W.R.1
-
26
-
-
0030096972
-
Comparison of receiver operating characteristic curves on the basis of optimal operating points
-
E.J. Halpern, M. Albert, A.M. Krieger, C.E. Metz, and A.D. Maidment Comparison of receiver operating characteristic curves on the basis of optimal operating points Academic Radiology 3 3 1996 245 253
-
(1996)
Academic Radiology
, vol.3
, Issue.3
, pp. 245-253
-
-
Halpern, E.J.1
Albert, M.2
Krieger, A.M.3
Metz, C.E.4
Maidment, A.D.5
-
27
-
-
0020083498
-
The meaning and use of the area under a receiver operating characteristic (ROC) curve
-
J.A. Hanley, and B.J. McNeil The meaning and use of the area under a receiver operating characteristic (ROC) curve Radiology 143 1 1982 29 36 (Pubitemid 12142173)
-
(1982)
Radiology
, vol.143
, Issue.1
, pp. 29-36
-
-
Hanley, J.A.1
McNeil, B.J.2
-
28
-
-
78449301618
-
Classifying data from protected statistical datasets
-
J. Herranza, S. Matwin, J. Nind, and V. Torra Classifying data from protected statistical datasets Computer and Security 29 8 2010 875 890
-
(2010)
Computer and Security
, vol.29
, Issue.8
, pp. 875-890
-
-
Herranza, J.1
Matwin, S.2
Nind, J.3
Torra, V.4
-
29
-
-
0036927958
-
Differentally secure multicasting and its implementation methods
-
S. Holeman, G. Manimaron, J. Davis, and A. Chakrabarti Differentally secure multicasting and its implementation methods Computer Security 21 8 2002 736 749
-
(2002)
Computer Security
, vol.21
, Issue.8
, pp. 736-749
-
-
Holeman, S.1
Manimaron, G.2
Davis, J.3
Chakrabarti, A.4
-
30
-
-
84865060803
-
Social network rebuilder: A tool to estimate a social network of financial crisis propagation
-
K. Ichikawa, T. Takemura, M. Murakami, K. Minetaki, and T. Maeda Social network rebuilder: A tool to estimate a social network of financial crisis propagation The Review of Socionetwork Strategies 5 1 2011 1 16
-
(2011)
The Review of Socionetwork Strategies
, vol.5
, Issue.1
, pp. 1-16
-
-
Ichikawa, K.1
Takemura, T.2
Murakami, M.3
Minetaki, K.4
Maeda, T.5
-
31
-
-
84864999914
-
The effects of proposals for basic pension reform on the income distribution of the elderly in Japan
-
S. Inagaki The effects of proposals for basic pension reform on the income distribution of the elderly in Japan The Review of Socionetwork Strategies 4 1 2010 1 16
-
(2010)
The Review of Socionetwork Strategies
, vol.4
, Issue.1
, pp. 1-16
-
-
Inagaki, S.1
-
32
-
-
0012699391
-
Mining consumer product data via latent semantic indexing
-
DOI 10.1016/S1088-467X(99)00029-3
-
J. Jiang, M.W. Berry, J.M. Donato, G. Ostrouchov, and N.W. Grady Mining consumer product data via latent semantic indexing Intelligent Data Analysis 3 5 1999 377 398 (Pubitemid 33260722)
-
(1999)
Intelligent data analysis
, vol.3
, Issue.5
, pp. 377-398
-
-
Jiang, J.1
Berry, M.W.2
Donato, J.M.3
Ostrouchov, G.4
Grady, N.W.5
-
33
-
-
84953744816
-
A statistical interpretation of term specificity and its application in retrieval
-
K.S. Jones A statistical interpretation of term specificity and its application in retrieval Journal of Documentation 28 1 1972 11 21
-
(1972)
Journal of Documentation
, vol.28
, Issue.1
, pp. 11-21
-
-
Jones, K.S.1
-
34
-
-
33750374206
-
A taxonomy and comparison of computer security incidents from the commercial and government sectors
-
DOI 10.1016/j.cose.2006.08.004, PII S0167404806001234
-
M. Kjaerland A taxonomy and comparison of computer security incidents from the commercial and government sectors Computers & Security 25 7 2006 522 538 (Pubitemid 44634763)
-
(2006)
Computers and Security
, vol.25
, Issue.7
, pp. 522-538
-
-
Kjaerland, M.1
-
35
-
-
55949121544
-
Text classification from unlabeled documents with bootstrapping and feature projection techniques
-
Y. Ko, and J. Seo Text classification from unlabeled documents with bootstrapping and feature projection techniques Information Processing & Management 45 1 2009 70 83
-
(2009)
Information Processing & Management
, vol.45
, Issue.1
, pp. 70-83
-
-
Ko, Y.1
Seo, J.2
-
36
-
-
0019608720
-
Formal models for computer security
-
C.E. Landwehr Formal models for computer security Computing Surveys 13 3 1981
-
(1981)
Computing Surveys
, vol.13
, Issue.3
-
-
Landwehr, C.E.1
-
37
-
-
84862808238
-
An information fusion approach to integrate image annotation and text mining methods for geographic knowledge discovery
-
C.H. Lee, and S.H. Wang An information fusion approach to integrate image annotation and text mining methods for geographic knowledge discovery Expert Systems with Applications 39 10 2012 8954 8967
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.10
, pp. 8954-8967
-
-
Lee, C.H.1
Wang, S.H.2
-
38
-
-
33846794857
-
Access control in collaborative commerce
-
DOI 10.1016/j.dss.2005.05.022, PII S0167923605000874
-
E.Y. Li, T.C. Du, and J.W. Wong Access control in collaborative commerce Decision Support Systems 43 2007 675 685 (Pubitemid 46216536)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 675-685
-
-
Li, E.Y.1
Du, T.C.2
Wong, J.W.3
-
39
-
-
84865232323
-
Opportunities for crossing the chasm between early adopters and the early majority through new uses of innovative products
-
M. -H. Lin, and C. -F. Hong Opportunities for crossing the chasm between early adopters and the early majority through new uses of innovative products The Review of Socionetwork Strategies 5 2 2011 27 42
-
(2011)
The Review of Socionetwork Strategies
, vol.5
, Issue.2
, pp. 27-42
-
-
L, M.-H.1
H, C.-F.2
-
41
-
-
0024607892
-
Access control policies: Some unanswered questions
-
T.F. Lunt Access control policies: Some unanswered questions Computers & Security 8 1 1989 43 54
-
(1989)
Computers & Security
, vol.8
, Issue.1
, pp. 43-54
-
-
Lunt, T.F.1
-
42
-
-
79958001937
-
A semantic term weighting scheme for text categorization
-
Q. Luo, E. Chen, and H. Xiong A semantic term weighting scheme for text categorization Expert Systems with Applications 38 10 2011 12708 12716
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.10
, pp. 12708-12716
-
-
Luo, Q.1
Chen, E.2
Xiong, H.3
-
44
-
-
80051804223
-
Modeling behavioral considerations related to information security
-
I.J. Martinez-Moyano, S.H. Conrad, and D.F. Andersen Modeling behavioral considerations related to information security Computers & Security 30 6-7 2011 397 409
-
(2011)
Computers & Security
, vol.30
, Issue.67
, pp. 397-409
-
-
Martinez-Moyano, I.J.1
Conrad, S.H.2
Andersen, D.F.3
-
45
-
-
0022012611
-
A comment on the basic security theorem of Bell and LaPadula
-
J. McLean A comment on the basic security theorem of Bell and LaPadula Information Process Letter 20 1985
-
(1985)
Information Process Letter
, vol.20
-
-
McLean, J.1
-
46
-
-
84861199904
-
Modeling partial customer churn: On the value of first product-category purchase sequences
-
V.L. Miguéis, D. Van den Poel, A.S. Camanho, and J. Falcão e Cunha Modeling partial customer churn: On the value of first product-category purchase sequences Expert Systems with Applications 39 12 2012 11250 11256
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.12
, pp. 11250-11256
-
-
Miguéis, V.L.1
Van Den Poel, D.2
Camanho, A.S.3
Falcão Cunha, E.J.4
-
47
-
-
42749086128
-
Detection of unknown computer worms based on behavioral classification of the host
-
R. Moskovitch, Y. Elovici, and L. Rokach Detection of unknown computer worms based on behavioral classification of the host Computational Statistics & Data Analysis 52 9 2008 4544 4566
-
(2008)
Computational Statistics & Data Analysis
, vol.52
, Issue.9
, pp. 4544-4566
-
-
Moskovitch, R.1
Elovici, Y.2
Rokach, L.3
-
49
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
F. Palmieri, and U. Fiore Network anomaly detection through nonlinear analysis Computer Security 29 2010 737 755
-
(2010)
Computer Security
, vol.29
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
50
-
-
84862777391
-
A literature review and classification of recommender systems research
-
D.H. Park, H.K. Kim, I.Y. Choi, and J.K. Kim A literature review and classification of recommender systems research Expert Systems with Applications 39 11 2012 10059 10072
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.11
, pp. 10059-10072
-
-
Park, D.H.1
Kim, H.K.2
Choi, I.Y.3
Kim, J.K.4
-
51
-
-
77949562741
-
A framework of composable access control features: Preserving separation of access control concerns from models to code
-
J.A. Pavlich-Mariscal, S.A. Demurjian, and L.D. Michel A framework of composable access control features: Preserving separation of access control concerns from models to code Computers & Security 29 3 2010 350 379
-
(2010)
Computers & Security
, vol.29
, Issue.3
, pp. 350-379
-
-
Pavlich-Mariscal, J.A.1
Demurjian, S.A.2
Michel, L.D.3
-
53
-
-
84948481845
-
An algorithm for suffix stripping
-
M.F. Porter An algorithm for suffix stripping Program 14 3 1980 130 137
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
54
-
-
0016555241
-
The protection of information in computer systems
-
J.H. Saltzer, and M.D. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 1975 1278 1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
55
-
-
84976664060
-
Automatic structuring and retrieval of large text files
-
G. Salton, J. Allan, and C. Buckley Automatic structuring and retrieval of large text files Communications of the ACM 37 2 1994 97 108
-
(1994)
Communications of the ACM
, vol.37
, Issue.2
, pp. 97-108
-
-
Salton, G.1
Allan, J.2
Buckley, C.3
-
56
-
-
45549117987
-
Term-weighting approaches in automatic text retrieval
-
G. Salton, and C. Buckley Term-weighting approaches in automatic text retrieval Information Processing & Management 24 5 1988 513 523
-
(1988)
Information Processing & Management
, vol.24
, Issue.5
, pp. 513-523
-
-
Salton, G.1
Buckley, C.2
-
57
-
-
84861100364
-
Dynamic risk-based decision methods for access control systems
-
Shaikh, R. A.; Adi, K.; & Logrippo, L. (2012). Dynamic risk-based decision methods for access control systems. Computers & Security.
-
(2012)
Computers & Security
-
-
Shaikh, R.A.1
Adi, K.2
Logrippo, L.3
-
58
-
-
84859215235
-
User-oriented ontology-based clustering of stored memories
-
L. Shi, and R. Setchi User-oriented ontology-based clustering of stored memories Expert Systems with Applications 39 10 2012 9730 9742
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.10
, pp. 9730-9742
-
-
Shi, L.1
Setchi, R.2
-
61
-
-
84865243746
-
An emergency evacuation planning model using the universally quickest flow
-
A. Takizawa, M. Inoue, and N. Katoh An emergency evacuation planning model using the universally quickest flow The Review of Socionetwork Strategies 6 1 2012 15 28
-
(2012)
The Review of Socionetwork Strategies
, vol.6
, Issue.1
, pp. 15-28
-
-
Takizawa, A.1
Inoue, M.2
Katoh, N.3
-
62
-
-
84879575209
-
Finding technological ideas and inventions with text mining and technique philosophy
-
D. Thorleuchter Finding technological ideas and inventions with text mining and technique philosophy C. Preisach, H. Burkhardt, L. Schmidt-Thieme, R. Decker, Data analysis, machine learning, and applications 2008 Springer Berlin 413 420
-
(2008)
Data Analysis, Machine Learning, and Applications
, pp. 413-420
-
-
Thorleuchter, D.1
-
64
-
-
77955034444
-
A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies
-
D. Thorleuchter, D. Van den Poel, and A. Prinzie A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies Technological Forecasting and Social Change 77 7 2010 1037 1050
-
(2010)
Technological Forecasting and Social Change
, vol.77
, Issue.7
, pp. 1037-1050
-
-
Thorleuchter, D.1
Van Den Poel, D.2
Prinzie, A.3
-
65
-
-
77952121800
-
Extracting consumers needs for new products-A web mining approach
-
IEEE Computer Society Los Alamitos
-
D. Thorleuchter, D. Van den Poel, and A. Prinzie Extracting consumers needs for new products-A web mining approach Proceedings WKDD 2010 2010 IEEE Computer Society Los Alamitos 441
-
(2010)
Proceedings WKDD 2010
, pp. 441
-
-
Thorleuchter, D.1
Van Den Poel, D.2
Prinzie, A.3
-
72
-
-
84864935139
-
Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing
-
D. Thorleuchter, D. Van den Poel, and A. Prinzie Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing Expert Systems with Applications 39 3 2012 2597 2605
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.3
, pp. 2597-2605
-
-
Thorleuchter, D.1
Van Den Poel, D.2
Prinzie, A.3
-
75
-
-
84874809994
-
Using webcrawling of publicly-available websites to assess e-commerce relationships
-
IEEE New York
-
D. Thorleuchter, and D. Van den Poel Using webcrawling of publicly-available websites to assess e-commerce relationships SRII Global Conference 2012 2012 IEEE New York
-
(2012)
SRII Global Conference 2012
-
-
Thorleuchter, D.1
Van Den Poel, D.2
-
77
-
-
84865034916
-
Predicting e-commerce company success by mining the text of its publicly-accessible website
-
Thorleuchter, D.; & Van den Poel, D. (2012e). Predicting e-commerce company success by mining the text of its publicly-accessible website. Expert Systems with Applications. http://dx.doi.org/10.1016/j.eswa.2012.05.096.
-
(2012)
Expert Systems with Applications
-
-
Thorleuchter, D.1
Van Den Poel, D.2
-
81
-
-
84858337533
-
Global data mining: An empirical study of current trends, future forecasts and technology diffusions
-
H.H. Tsai Global data mining: An empirical study of current trends, future forecasts and technology diffusions Expert Systems with Applications 39 9 2012 8172 8181
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.9
, pp. 8172-8181
-
-
Tsai, H.H.1
-
82
-
-
84865261911
-
Correlation and regression analysis for characterizations of a university hospital
-
Y. Tsumoto, and S. Tsumoto Correlation and regression analysis for characterizations of a university hospital The Review of Socionetwork Strategies 5 2 2011 43 55
-
(2011)
The Review of Socionetwork Strategies
, vol.5
, Issue.2
, pp. 43-55
-
-
Tsumoto, Y.1
Tsumoto, S.2
-
83
-
-
0032077905
-
Receiver operating characteristic (ROC) analysis: Basic principles and applications in radiology
-
DOI 10.1016/S0720-048X(97)00157-5, PII S0720048X97001575
-
A.R. Van Erkel, and P.M.T. Pattynama Receiver operating characteristic (ROC) analysis: Basic principles and applications in radiology European Journal of Radiology 27 2 1998 88 94 (Pubitemid 28234366)
-
(1998)
European Journal of Radiology
, vol.27
, Issue.2
, pp. 88-94
-
-
Van Erkel, A.R.1
Pattynama, P.M.T.2
-
84
-
-
0032624397
-
Managing multi level security in a military intranet environment
-
S.H. Von Solms, and J.H.S. Geldenhuys Managing multi level security in a military intranet environment Computers & Security 18 3 1999 257 270
-
(1999)
Computers & Security
, vol.18
, Issue.3
, pp. 257-270
-
-
Von Solms, S.H.1
Geldenhuys, J.H.S.2
-
85
-
-
0036299647
-
The development of access control policies for information technology systems
-
DOI 10.1016/S0167-4048(02)00414-5
-
P. Ward, and C.L. Smith The development of access control policies for information technology systems Computers & Security 21 4 2002 356 371 (Pubitemid 34715240)
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 356-371
-
-
Ward, P.1
Smith, C.L.2
-
86
-
-
53049094540
-
The need for information security education
-
M.A. Wright The need for information security education Computer Fraud & Security 1998 8 1998 14 17
-
(1998)
Computer Fraud & Security
, vol.1998
, Issue.8
, pp. 14-17
-
-
Wright, M.A.1
-
87
-
-
84862794793
-
Topics modeling based on selective Zipf distribution
-
J. Zeng, J. Duan, W. Cao, and C. Wu Topics modeling based on selective Zipf distribution Expert Systems with Applications 39 7 2012 6541 6546
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.7
, pp. 6541-6546
-
-
Zeng, J.1
Duan, J.2
Cao, W.3
Wu, C.4
-
88
-
-
84862970802
-
Mediating secure information flow policies
-
G.Q. Zhang Mediating secure information flow policies Information and Computation 205 9 2007 1413 1425
-
(2007)
Information and Computation
, vol.205
, Issue.9
, pp. 1413-1425
-
-
Zhang, G.Q.1
|