Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
26 Publications
2015 | Conference Paper | LibreCat-ID: 5590 |
Weishäupl, E., Kunz, M., Yasasin, E., Wagner, G., Prester, J., Schryen, G., & Pernul, G. (2015). Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory. In 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15).
LibreCat
| Files available
2013 | Journal Article | LibreCat-ID: 9808
Kimotho, J. K., Sondermann-Wölke, C., Meyer, T., & Sextro, W. (2013). Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation. International Journal of Prognostics and Health Management, 4(2).
LibreCat
2013 | Conference Paper | LibreCat-ID: 11716
Abdelaziz, A. H., Zeiler, S., Kolossa, D., Leutnant, V., & Haeb-Umbach, R. (2013). GMM-based significance decoding. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on (pp. 6827–6831). https://doi.org/10.1109/ICASSP.2013.6638984
LibreCat
| DOI
2012 | Journal Article | LibreCat-ID: 6064
Weiß, K., & Scharlau, I. (2012). At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions. Acta Psychologica, 139(1), 54–64.
LibreCat
2010 | Conference Paper | LibreCat-ID: 5685 |
Finkbeiner, J., Bodenstein, C., Schryen, G., & Neumann, D. (2010). Applying heuristic methods for job scheduling in storage markets. In 18th European Conference on Information Systems (ECIS 2010).
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5632 |
Schryen, G., & Bodenstein, C. (2010). A decision-theoretic foundation of IS business value research. In Proceedings of the 18th European Conference on Information Systems (ECIS 2010).
LibreCat
| Files available