Towards value-driven strategies in pricing IT solutions
The objective of this paper is to discuss the challenges and opportunities involved in...
Long-Term Generation Scheduling of Hydropower System Using Multi-Core Parallelization of Particle Swarm Optimization
A multi‐core parallel Particle Swarm Optimization (MPPSO) algorithm is...
Occupational Survival Through Field-Level Task Integration: Systems Men, Production Planners, and the Computer, 1940s‐1990s
King Brayden G
This paper examines how occupational groups survive the introduction of a new...
An Analytical Throughput Approximation for Closed Fork/Join Networks
Queueing networks featuring fork/join stations are natural models for a variety of...
Relational marketing in knowledge-intensive business services: an analysis of the computer services sector
This paper addresses the marketing approaches adopted by Knowledge‐Intensive...
Reliability Analysis for Laptop Computer Under Electrical Harmonics
Pia-Monarrez Manuel R
Because of electrical variations presented in the power line, the estimated...
An Integrated Framework for Developing Discrete-Time Modelling in Software Reliability Engineering
In the software reliability engineering literature, few attempts have been made to...
An Examination of Customers’ Attitudes About Tabletop Technology in Full-Service Restaurants
Susskind Alex M
This paper examines the influence of customer‐facing technology in...
Opening Up Intellectual Property Strategy: Implications for Open Source Software Entry by Start-up Firms
We examine whether a firm’s intellectual property (IP) strategy in support of...
Economic Impact of Software Patching and Optimal Release Scheduling
Because of highly distributed nature of software products, the task of improving...
Student Peer Evaluated Line Balancing Competition
The Student Peer Evaluated Line Balancing Competition is a 30‐minute...
An ANN-PSO-based model to predict fault-prone modules in software
Goyal Neeraj Kumar
Fault‐prone module identification in software helps software developers to...
A Parallel Strategy for the Logical-probabilistic Calculus-based Method to Calculate Two-terminal Reliability
The theory of network reliability has been applied to many complicated network...
To Plan or to Simply React? An Experimental Study of Action Planning in a Game Environment
Many contemporary computer games, notably action and role‐playing games,...
Fully Sequential Procedures for Large-Scale Ranking-and-Selection Problems in Parallel Computing Environments
Hong L Jeff
Fully sequential ranking‐and‐selection (R&S) procedures to find the...
The Design of Feature-Limited Demonstration Software: Choosing the Right Features to Include
Today, software supports many important tasks in a variety of industries. In the...
Computer self-efficacy in global contexts: appraising Chinese and Indian non-specialists' attitudes to common and advanced computer tasks
DeCoursey C A
Most studies of computing self‐efficacy among non‐specialists have used...
Two-stage, single-lot, lot streaming problem for a 1+2 hybrid flow shop
In this paper, we address a single‐lot, lot streaming problem for a...
A mining approach for component abnormal information based on monitor log
A software component is an assembly unit that can be deployed independently in any...
Semantics of multisampling systems
We present the semantics of the continuous flow system specification (CFSS)....
The potential of learning from erroneous models: comparing three types of model instruction
Wijnen Frances M
Learning from computer models is a promising approach to learning. This study...
Line search method for solving a non-preemptive strictly periodic scheduling problem
We study a non‐preemptive strictly periodic scheduling problem. This problem...
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
The operation of cyber infrastructures relies on both cyber and physical components,...
Reliability of a Multi-State Computer Network Through k Minimal Paths Within Tolerable Error Rate and Time Threshold
A computer system is usually modeled as a network topology where each branch denotes a...
Papers per page: