Information Technology Reference
In-Depth Information
Kosakaya, J., & Yamaoka, K. (2001). Cooperative multi-
agent intelligent field terminals. In
Proceedings of the
Fifth International Conference on Autonomous Agents,
(pp.
348-354).
of the Sixteenth ACM Conference on Conference on
information and Knowledge Management - CIKM '07
,
(pp. 721-730).
Lakoff, G. (1987).
Women, fire and dangerous things:
What categories reveal about the mind.
Chicago: Uni-
versity of Chicago Press.
Koskela, M., Laaksonen, J., & Oja, E. (2004). Entropy-
based measures for clustering and SOM topology pres-
ervation applied to content-based image indexing and
retrieval. In
Proceedings of 17th International Conference
on Pattern Recognition (ICPR 2004)
, (pp. 1005-1009).
Lakoff, G. (1987).
Women, Fire, and Dangerous Things:
What Categories Reveal about the Mind.
Chicago: Uni-
versity of Chicago Press.
Koutri, M., Daskalaki, S., & Avouris N. (2002). Adap-
tive interaction with Web Sites: An overview of methods
and techniques. In
Proceedings of the 4
th
International
Workshop on Computer Science and Information Tech-
nologies
.Patras, Greece.
Lakoff, G. (1988). Cognitive Semantics. In Eco, U., San-
tambrogio, M. and Violi, P. (Eds.)
Meaning and Mental
Representations
. Bloomington: Indiana University
Press, pp. 119-154.
Lambert, D. M., & Lalonde, B. J. (1976). Inventory car-
rying costs.
Management Accounting, 58
(2), 31.
Kryszkiewicz, M., & Rybinski, H. (1994). Finding reducts
in composed information systems, rough sets, fuzzy sets
knowledge discovery. In W. P. Ziarko (Ed.),
Proceedings
of the International Workshop on Rough Sets, Knowledge
(pp. 261-273). Banff, AB, Canada: Springer-Verlag.
Landt, F. W. (1997).
Stock price prediction using neural
networks
. Leiden University, Leiden, Netherlands.
Larsen, B., & Aone, C. (1999, August). Fast and effec-
tive text mining using linear-time document clustering.
In
Proceedings of the 5th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining
.
San Diego.
Krzanowski, W., & Lai, Y. (1985). A criterion for deter-
mining the number of groups in a dataset using sum of
squares clustering.
Biometrics, 44
, 23-34.
Kudoh, Y., Haraguchi, M., & Okubo, Y. (2003, January
27). Data abstractions for decision tree induction.
Theo-
retical Computer Science
,
292
(2), 387-416.
Laudon, K. C., & Laudon, J. P. (2006).
Management
information system: Managing the digital FIRM
(9th
ed.). New Jersey, Prentice Hall.
Kundu, A., & Chen, J. L. (1992). Texture classification
using QMF Bank-based subband decomposition.
CVGIP:
Graphical Models and Image Processing, 54,
369-384.
Le Metayer, D. (1994). Higher-order multiset processing.
DIMACS Series in Discrete Mathematics and Theoretical
Computer Science, 18
, 179-200.
Kwon, O.-W. & Lee, J.-H. (2000). Web page classifica-
tion based on k-nearest neighbor approach. In
IRAL
'00: Proceedings of the fifth international workshop on
Information retrieval with Asian languages
(pp. 9-15).
New York: ACM Press.
Lee, D. L., Xu, J., Zheng, B., & Lee, W. C. (2002). Data
management in location-dependent information services.
Pervasive Computing, IEEE, 1
(3), 65-72.
Lee, H. L., Padmanabhan, V., & Whang, S. (1997). The
bullwhip effect in supply chains.
Sloan Management
Review, 38
(3), 93.
Labrou, Y., & Finin, T. (1997). Semantics and con-
versations for an agent communication language
.
In
Readings in agents
(pp. 235-242)
.
Morgan Kaufmann
Publishers Inc.
Lee, H. L., Padmanabhan, V., & Whang, S. (1997).
Information distortion in a supply chain: The bullwhip
effect.
Management Science, 43
(4), 546.
Lad, A., & Yang, Y. (2007). Generalizing from relevance
feedback using named entity wildcards. In
Proceedings
Search WWH ::
Custom Search