1 | -- | 2 | Karl Reiner Lang, Eric A. Walden. Introduction to the special section on information product markets |
3 | -- | 13 | Robert J. Kauffman, Trent J. Spaulding, Charles A. Wood. Are online auction markets efficient? An empirical study of market liquidity and abnormal returns |
14 | -- | 22 | Chong (Alex) Wang, Xiaoquan (Michael) Zhang. Sampling of information goods |
23 | -- | 32 | Nitin Aggarwal, Eric A. Walden. Intellectual Property Bundle (IPB) theory: Managing transaction costs in technology development through network governance |
33 | -- | 45 | Karl Reiner Lang, Richard D. Shang, Roumen Vragov. Designing markets for co-production of digital culture goods |
46 | -- | 56 | Eric K. Clemons. The complex problem of monetizing virtual electronic social networks |
57 | -- | 68 | Hua Yuan, Guoqing Chen, Junjie Wu, Hui Xiong. Towards controlling virus propagation in information systems with point-to-group information sharing |
69 | -- | 80 | Hoi-Ming Chi, Herbert Moskowitz, Okan K. Ersoy, Kemal Altinkemer, Peter F. Gavin, Bret E. Huff, Bernard A. Olsen. Machine learning and genetic algorithms in pharmaceutical development and manufacturing processes |
81 | -- | 91 | Feng-Yang Kuo, Chiung-Wen Hsu, Rong-Fuh Day. An exploratory study of cognitive effort involved in decision under Framing - an application of the eye-tracking technology |
92 | -- | 102 | Jingguo Wang, Rui Chen, Tejaswini Herath, H. Raghav Rao. Visual e-mail authentication and identification services: An investigation of the effects on e-mail use |
103 | -- | 111 | Murat Köksalan, Riikka-Leena Leskelä, Hannele Wallenius, Jyrki Wallenius. Improving efficiency in multiple-unit combinatorial auctions: Bundling bids from multiple bidders |
112 | -- | 121 | Hailiang Chen, Hongyan Liu, Jiawei Han, Xiaoxin Yin, Jun He. Exploring optimization of semantic relationship graph for multi-relational Bayesian classification |
122 | -- | 132 | Seokjoo Andrew Chang, Giri Kumar Tayi. An analytical approach to bundling in the presence of customer transition effects |
133 | -- | 140 | Dan Zhu, Xiao-Bai Li, Shuning Wu. Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining |
141 | -- | 149 | Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan, Rahul Telang. To theme or not to theme: Can theme strength be the music industry s killer app ? |
150 | -- | 157 | A. R. Hatami, H. Seifi, M. K. Sheikh-El-Eslami. Hedging risks with interruptible load programs for a load serving entity |
158 | -- | 168 | Indranil Bose, Xi Chen. A framework for context sensitive services: A knowledge discovery based approach |
169 | -- | 179 | Wei Zhou, Yu-Ju Tu, Selwyn Piramuthu. RFID-enabled item-level retail pricing |
180 | -- | 190 | Basilio Sierra, Elena Lazkano, Ekaitza Jauregi, I. Irigoien. Histogram distance-based Bayesian Network structure learning: A supervised classification specific approach |
191 | -- | 201 | Aixin Sun, Ee-Peng Lim, Ying Liu. On strategies for imbalanced text classification using SVM: A comparative study |
202 | -- | 211 | Stephanie Watts, Ganesan Shankaranarayanan, Adir Even. Data quality assessment in context: A cognitive perspective |
212 | -- | 223 | Sara Casolari, Michele Colajanni. Short-term prediction models for server management in Internet-based contexts |
224 | -- | 236 | Jose M. Cruz. The impact of corporate social responsibility in supply chain management: Multicriteria decision-making approach |
237 | -- | 245 | Lu Zhen, George Q. Huang, Zuhua Jiang. Recommender system based on workflow |
246 | -- | 256 | Kwai-Sang Chin, Ying-Ming Wang, Gary Ka Kwai Poon, Jian-Bo Yang. Failure mode and effects analysis by data envelopment analysis |
257 | -- | 266 | Barry R. Cobb. Efficiency of influence diagram models with continuous decision variables |
267 | -- | 281 | Harry Jiannan Wang, J. Leon Zhao, Liang-Jie Zhang. Policy-Driven Process Mapping (PDPM): Discovering process models from business policies |
282 | -- | 292 | Vasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes, Ricardo Perrone. A bio-inspired crime simulation model |
293 | -- | 302 | Pei-Chen Sun, Hsing Kenneth Cheng, Glenn Finger. Critical functionalities of a successful e-learning system - An analysis from instructors cognitive structure toward system usage |
303 | -- | 312 | Paul Michael Di Gangi, Molly Wasko. Steal my idea! Organizational adoption of user innovations from a user innovation community: A case study of Dell IdeaStorm |