1 | -- | 17 | Nuo Yu. A novel selection method of network intrusion optimal route detection based on naive Bayesian |
18 | -- | 35 | Saeed Askary, Jean-Paul M. Arnaout, Naser Abughazaleh. Audit evidences and modelling audit risk using goal programming |
36 | -- | 54 | Chang Qing. Vehicle scheduling model of emergency logistics distribution based on internet of things |
55 | -- | 78 | S. Meysam Mousavi, N. Foroozesh, Hossein Gitinavard, Behnam Vahdani. Solving group decision-making problems in manufacturing systems by an uncertain compromise ranking method |
79 | -- | 99 | Xingyu Yang, Huaping Li, Yong Zhang, Jin'an He. Reversion strategy for online portfolio selection with transaction costs |
100 | -- | 126 | Leonardo Ensslin, Sandra Rolim Ensslin, Ademar Dutra, André Andrade Longaray, Vinicius Dezem. Performance assessment model for bank client's services and business development process: a constructivist proposal |