349 | -- | 351 | . Editor s Introduction |
353 | -- | 372 | Michael A. Eierman, George C. Philip. The Task of Problem Formulation |
373 | -- | 380 | Omprakash K. Gupta, M. Mallikarjun, Namjae Cho, Jeevan Jaisingh. Strategic Response of an Incumbent Firm in IT Intensive Industry: Few Reflections |
381 | -- | 395 | Wenjie Zhan, Shouyang Wang, K. K. Lai. Relationship Between Offer Strategy and Trade Ratio for k-ZI Traders in Continuous Double Auction Market |
397 | -- | 405 | Ming Li, Chi-Hung Chi, Weijia Jia, Wei Zhao, Wanlei Zhou, Jiannong Cao, Dongyang Long, Qiang Meng. Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks |
407 | -- | 424 | Zhongzhi Shi, Qing He, Ziyan Jia, Jiayou Li. Intelligence Chinese Document Semantic Indexing System |
425 | -- | 444 | J. Philip Craiger, Michael D. Coovert, Mark S. Teachout. Predicting Job Performance with a Fuzzy Rule-Based System |
445 | -- | 457 | Chien-Hsiung Lin, Yi-Hsin Liu. Multiple Trait Selection and Classification of Genotype - A Data Mining Approach |
459 | -- | 476 | Mark Levene, George Loizou. Computing the Entropy of User Navigation in the Web |
477 | -- | 496 | Susanna S. Y. Ho, Siu Man Lui, Will W. K. Ma. Acceptance of Internet Content Filters: An Empirical Study |
497 | -- | 522 | Sheng Uei Guan, Feng Hua. A Multi-Agent Architecture for Electronic Payment |