Information Technology Reference
In-Depth Information
Salton, G., & Buckley, C. (1990). Improving retrieval per-
formance by relevance feedback. Journal of the American
Society for Information Science, 41 (4), 288-97.
Schnell, R., Hill, P. B., & Esser, E. (1999). Methoden
der empirischen Sozialforschung (6 th ed.). Munich et
al.: Oldenbourg-Verlag. (in German)
Salton, S. (1989). Automatic text processing . Addison
Wesley.
Schoedinger, A. B. (Ed.) (1992). The Problem of Uni-
versals . New Jersey: Humanities Press.
Sander, J., Ester, M., Kriegel, H. P., & Xu X., (1998).
Density-based clustering in spatial databases: The al-
gorithm GDBSCAN and its applications. Data Mining
and Knowledge Discovery 2 (2), 169-194.
Scime, A., & Sugumaran, V., (Eds.) (2007, April). Special
Issue on Web Mining, International Journal of Intelligent
Information Technologies .
Searle, J. (1969). Speech acts: An essay in the philosophy
of language . Cambridge: Cambridge University Press.
Sander, T. & Tschudin, C. F. (1998). Protecting mobile
agents against malicious hosts. In G. Vigna (Ed.), Mobile
agents and security, LNCS 1419 (pp. 44-60). Springer.
Searle, J. R. (1995). The construction of social reality .
New York: Free Press.
Saracevic, T. (1975). Relevance: A review of and frame-
work for the thinking n the notion in information science.
Journal of the American Society for Information Science,
26 (6), 321-343.
Searle, J. R. (2006). Social ontology: Some basic prin-
ciples. Anthropological Theory, 6 12-29.
Service Component Architecture (SCA). (2005). Ser-
vice component architecture and service data objects.
Retrieved March 27, 2006, from http://www.128.ibm.
com/developerworks/webservices/library/specifica-
tion/ws-scasdosumm/
Saracevic, T. (1996). Relevance reconsidered. In P roceed-
ings of the Second Conference on Conceptions of Library
and Information Science (CoLIS 2), (pp. 201-218).
Sarukkai, R. (2000). Link prediction and path analysis
using markov chains. Computer Networks, 33 (1-6),
377-386.
Shahabi, C., Zarkesh, A., Adibi, J. & Shah, V. (1997).
Knowledge discovery from users Web-page navigation .
In Workshop on Research Issues in Data Engineering,
Birminghan, UK.
Satchidananda D.i, Patnaik, S., Ashish G. & Rajib M.
(2008) Application of elitist multi-objective genetic
algorithm for classification rule generation. Appl. Soft
Comput. 8 (1), 477-487.
Shanks, G., Tansley, E., & Weber, R. (2003). Using on-
tology to validate conceptual models. Communications
of the ACM, 46 , 85-89.
Schmid, H. (1994). Probabilistic part-of-speech tagging
using decision trees. In International Conference on New
Methods in Language Processing , Manchester, UK.
Shapiro, D., Sheppard, B. H., & Cheraskin, L. (1992,
October). Business on a handshake. The Negotiation
Journal , 365-378.
Schmitz, S.W., & Latzerb, M. (2000). Competition in B2C
e-commerce: Analytical issues and empirical evidence.
Electronic Markets, 12 (3), 163-174.
Shapiro, E. Y. (1981). Inductive inference of theories from
facts. (Report 192). Department of Computer Science,
Yale University.
Schneiderman, A. (1999). Why balanced scorecards
fail. Journal of Strategic Performance Measurement ,
6 - 11.
Shaw Jr., W. M. (1986). On the foundation of evaluation.
Journal of the American Society for Information Science ,
37 (5), 346-348.
Schneier, B. (1996). Applied cryptography . Wiley.
Shaw, M., DeLine, R., Klein, D. V., Ross, T. L., Young,
D. M., & Zelesnik, G. (1995). Abstractions for software
Search WWH ::




Custom Search