Information Technology Reference
In-Depth Information
Tan, K. C. (2001). A framework of supply chain man-
agement literature. European Journal of Purchasing &
Supply Management, 7 (1), 39-48.
Traugott, J. (1989). Deductive synthesis of sorting pro-
grams. Journal of Symbolic Computation, 7 , 533-572.
Treu, S. (1967). Testing and evaluation— Literature
review. In A. Kent, O.E. Taulbee, J. Belzer, & G.D.
Goldstein (Eds.), Electronic handling of information:
Testing and evaluation (pp. 71-88). Washington, D.C.:
Thompson Book Co.
Tang, J., Chen, Z., Fu, A. W., & Cheung, D. W. (2007). Ca-
pabilities of outlier detection schemes in large databases,
framework and methodologies. Knowledge and Informa-
tion Systems . 11 (1), 45-84. New York: Springer.
Tantrum, J., Murua, A., & Stuetzle, W. (2002, July). Hier-
archical model-based clustering of large datasets through
fractionation and refractionation . The 8th ACM SIGKDD
International Conference on Knowledge and Discovery
and Data Mining Location . Edmonton, Canada.
Truong, T. H., & Azadivar, F. (2003). Simulation-based
optimization for supply chain configuration design. In
S. Chick, P.J. Sanchez, D. Ferrin, D., & D. J. Morrice,
(Eds.) Proceedings of 2003 Winter Simulation Confer-
ence (pp. 1268-75) , IEEE.
Tao-Huan, T., & Theon, W. (2001). Towards a generic
model of trust in electronic commerce. International
Journal of Electronic Commerce, 5 (2), 61-74.
Tschudin, C. F. (1999). Mobile agent security. In M. Klusch
(Ed.), Intelligent information agents [Forthcoming
LNCS ]. Retrieved from http://www.docs.uu.se/~tschudin/
pub/cft-1999-iia.ps.gz
Teorey, T. J. (1990). Database Modeling and Design: The
Entity-Relationship Approach . San Mateo, CA: Morgan
Kaufman Publishers, Inc.
Tse, P. K. C., Lam, W. K., Ng, K. W., & Chan, C. (2005).
An implementation of location-aware multimedia infor-
mation download to mobile system. Journal of Mobile
Multimedia, 1 (1), 33-46.
Thiruvady, D. R. & Webb, G. I. (2004). Mining negative
rules using GRD. In 8th Pacific-Asia Conference on
Knowledge Discovery and Data Mining 2004. (Lecture
Notes in Artificial Intelligence, 3056, pp. 161-165).
Tsechansky, M., Pliskin, N., Rabinowitz, G., & Porath, A.
(1999). Mining relational patterns from multiple relational
tables. Decision Support Systems, 27 (1999), 177-195.
Thomas, D. J., & Griffin, P.M. (1996). Co-ordinated sup-
ply chain management. European Journal of Operations
Research, 94, 1-15.
Tulving, E. (1983). Elements of episodic memory . New
York: Oxford University Press.
Thomas, M., Redmond, R., Yoon, V., & Singh, R. (2005).
A semantic approach to monitor business process perfor-
mance. Communications of the ACM, 48 , 55-59.
Twain, M. (2000). Diary of Adam and Eve . Prometheus
Books.
Tynjälä, T. (2006). A formal, product structure driven
design of optimized end-to-end demand supply chains.
Journal of Systemics, Cybernetics, and Informatics, 3 (1) .
Retrieved from www.iiisci.org/Journal/SCI/Past.asp
Tibshirani R., Walther, G., & Hastie, T. (2000). Estimating
the number of clusters in a dataset via the gap statistic .
(Tech. Rep.) Palo Alto, California: Stanford University,
Department of Bio-statistics.
Tynjälä, T., & Eloranta, E. (2007). Investigating the
effect of product variants, and demand distributions on
the optimal demand supply network setup. Production
Planning & Control, 18 (7), 561-72.
Tikk, D., Kóczy, L. T., & Gedeon, T. D. (2001). Universal
approximation and its limits in soft computing techniques.
An overview (Research Working Paper No. RWP-IT-02-
2001). Perth (W.A.): Murdoch University.
Tyrone, W. A., Grandison (2003). Trust management
for Internet applications. Unpublished doctoral thesis,
Imperial College of Science, Technology and Medicine
University of London, Department of Computing.
Tjioe, H. C., & Taniar, D. (2005). Mining association
rules in data warehouses. International Journal of Data
Warehousing and Mining, 1 (3), 28-62.
Search WWH ::




Custom Search