Information Technology Reference
In-Depth Information
Kosakaya, J., & Yamaoka, K. (2001). Cooperative multi-
agent intelligent field terminals. In Proceedings of the
Fifth International Conference on Autonomous Agents,
(pp. 348-354).
of the Sixteenth ACM Conference on Conference on
information and Knowledge Management - CIKM '07 ,
(pp. 721-730).
Lakoff, G. (1987). Women, fire and dangerous things:
What categories reveal about the mind. Chicago: Uni-
versity of Chicago Press.
Koskela, M., Laaksonen, J., & Oja, E. (2004). Entropy-
based measures for clustering and SOM topology pres-
ervation applied to content-based image indexing and
retrieval. In Proceedings of 17th International Conference
on Pattern Recognition (ICPR 2004) , (pp. 1005-1009).
Lakoff, G. (1987). Women, Fire, and Dangerous Things:
What Categories Reveal about the Mind. Chicago: Uni-
versity of Chicago Press.
Koutri, M., Daskalaki, S., & Avouris N. (2002). Adap-
tive interaction with Web Sites: An overview of methods
and techniques. In Proceedings of the 4 th International
Workshop on Computer Science and Information Tech-
nologies .Patras, Greece.
Lakoff, G. (1988). Cognitive Semantics. In Eco, U., San-
tambrogio, M. and Violi, P. (Eds.) Meaning and Mental
Representations . Bloomington: Indiana University
Press, pp. 119-154.
Lambert, D. M., & Lalonde, B. J. (1976). Inventory car-
rying costs. Management Accounting, 58 (2), 31.
Kryszkiewicz, M., & Rybinski, H. (1994). Finding reducts
in composed information systems, rough sets, fuzzy sets
knowledge discovery. In W. P. Ziarko (Ed.), Proceedings
of the International Workshop on Rough Sets, Knowledge
(pp. 261-273). Banff, AB, Canada: Springer-Verlag.
Landt, F. W. (1997). Stock price prediction using neural
networks . Leiden University, Leiden, Netherlands.
Larsen, B., & Aone, C. (1999, August). Fast and effec-
tive text mining using linear-time document clustering.
In Proceedings of the 5th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining .
San Diego.
Krzanowski, W., & Lai, Y. (1985). A criterion for deter-
mining the number of groups in a dataset using sum of
squares clustering. Biometrics, 44 , 23-34.
Kudoh, Y., Haraguchi, M., & Okubo, Y. (2003, January
27). Data abstractions for decision tree induction. Theo-
retical Computer Science , 292 (2), 387-416.
Laudon, K. C., & Laudon, J. P. (2006). Management
information system: Managing the digital FIRM (9th
ed.). New Jersey, Prentice Hall.
Kundu, A., & Chen, J. L. (1992). Texture classification
using QMF Bank-based subband decomposition. CVGIP:
Graphical Models and Image Processing, 54, 369-384.
Le Metayer, D. (1994). Higher-order multiset processing.
DIMACS Series in Discrete Mathematics and Theoretical
Computer Science, 18 , 179-200.
Kwon, O.-W. & Lee, J.-H. (2000). Web page classifica-
tion based on k-nearest neighbor approach. In IRAL
'00: Proceedings of the fifth international workshop on
Information retrieval with Asian languages (pp. 9-15).
New York: ACM Press.
Lee, D. L., Xu, J., Zheng, B., & Lee, W. C. (2002). Data
management in location-dependent information services.
Pervasive Computing, IEEE, 1 (3), 65-72.
Lee, H. L., Padmanabhan, V., & Whang, S. (1997). The
bullwhip effect in supply chains. Sloan Management
Review, 38 (3), 93.
Labrou, Y., & Finin, T. (1997). Semantics and con-
versations for an agent communication language . In
Readings in agents (pp. 235-242) . Morgan Kaufmann
Publishers Inc.
Lee, H. L., Padmanabhan, V., & Whang, S. (1997).
Information distortion in a supply chain: The bullwhip
effect. Management Science, 43 (4), 546.
Lad, A., & Yang, Y. (2007). Generalizing from relevance
feedback using named entity wildcards. In Proceedings
Search WWH ::




Custom Search