Information Technology Reference
In-Depth Information
Salton, G., & Buckley, C. (1990). Improving retrieval per-
formance by relevance feedback.
Journal of the American
Society for Information Science, 41
(4), 288-97.
Schnell, R., Hill, P. B., & Esser, E. (1999).
Methoden
der empirischen Sozialforschung
(6
th
ed.). Munich et
al.: Oldenbourg-Verlag. (in German)
Salton, S. (1989).
Automatic text processing
. Addison
Wesley.
Schoedinger, A. B. (Ed.) (1992).
The Problem of Uni-
versals
. New Jersey: Humanities Press.
Sander, J., Ester, M., Kriegel, H. P., & Xu X., (1998).
Density-based clustering in spatial databases: The al-
gorithm GDBSCAN and its applications.
Data Mining
and Knowledge Discovery 2
(2), 169-194.
Scime, A., & Sugumaran, V., (Eds.) (2007, April). Special
Issue on Web Mining,
International Journal of Intelligent
Information Technologies
.
Searle, J. (1969).
Speech acts: An essay in the philosophy
of language
. Cambridge: Cambridge University Press.
Sander, T. & Tschudin, C. F. (1998). Protecting mobile
agents against malicious hosts. In G. Vigna (Ed.),
Mobile
agents and security, LNCS 1419
(pp. 44-60). Springer.
Searle, J. R. (1995).
The construction of social reality
.
New York: Free Press.
Saracevic, T. (1975). Relevance: A review of and frame-
work for the thinking n the notion in information science.
Journal of the American Society for Information Science,
26
(6), 321-343.
Searle, J. R. (2006). Social ontology: Some basic prin-
ciples.
Anthropological Theory, 6
12-29.
Service Component Architecture (SCA). (2005).
Ser-
vice component architecture and service data objects.
Retrieved March 27, 2006, from http://www.128.ibm.
com/developerworks/webservices/library/specifica-
tion/ws-scasdosumm/
Saracevic, T. (1996). Relevance reconsidered. In P
roceed-
ings of the Second Conference on Conceptions of Library
and Information Science (CoLIS 2),
(pp. 201-218).
Sarukkai, R. (2000). Link prediction and path analysis
using markov chains.
Computer Networks, 33
(1-6),
377-386.
Shahabi, C., Zarkesh, A., Adibi, J. & Shah, V. (1997).
Knowledge discovery from users Web-page navigation
.
In Workshop on Research Issues in Data Engineering,
Birminghan, UK.
Satchidananda D.i, Patnaik, S., Ashish G. & Rajib M.
(2008) Application of elitist multi-objective genetic
algorithm for classification rule generation.
Appl. Soft
Comput. 8
(1), 477-487.
Shanks, G., Tansley, E., & Weber, R. (2003). Using on-
tology to validate conceptual models.
Communications
of the ACM, 46
, 85-89.
Schmid, H. (1994). Probabilistic part-of-speech tagging
using decision trees. In
International Conference on New
Methods in Language Processing
, Manchester, UK.
Shapiro, D., Sheppard, B. H., & Cheraskin, L. (1992,
October). Business on a handshake.
The Negotiation
Journal
, 365-378.
Schmitz, S.W., & Latzerb, M. (2000). Competition in B2C
e-commerce: Analytical issues and empirical evidence.
Electronic Markets,
12
(3), 163-174.
Shapiro, E. Y. (1981). Inductive inference of theories from
facts. (Report 192). Department of Computer Science,
Yale University.
Schneiderman, A. (1999). Why balanced scorecards
fail.
Journal of Strategic Performance Measurement
,
6 - 11.
Shaw Jr., W. M. (1986). On the foundation of evaluation.
Journal of the American Society for Information Science
,
37
(5), 346-348.
Schneier, B. (1996).
Applied cryptography
. Wiley.
Shaw, M., DeLine, R., Klein, D. V., Ross, T. L., Young,
D. M., & Zelesnik, G. (1995). Abstractions for software
Search WWH ::
Custom Search