Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
26 Publications
2015 | Conference Paper | LibreCat-ID: 5590 |
E. Weishäupl et al., “Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory,” in 2nd International Workshop on Security in highly connected IT Systems (SHCIS?15), 2015.
LibreCat
| Files available
2013 | Journal Article | LibreCat-ID: 9808
J. K. Kimotho, C. Sondermann-Wölke, T. Meyer, and W. Sextro, “Application of Event Based Decision Tree and Ensemble of Data Driven Methods for Maintenance Action Recommendation,” International Journal of Prognostics and Health Management, vol. 4, no. 2, 2013.
LibreCat
2012 | Journal Article | LibreCat-ID: 6064
K. Weiß and I. Scharlau, “At the mercy of prior entry: Prior entry induced by invisible primes is not susceptible to current intentions.,” Acta Psychologica, vol. 139, no. 1, pp. 54–64, 2012.
LibreCat
2010 | Conference Paper | LibreCat-ID: 5685 |
J. Finkbeiner, C. Bodenstein, G. Schryen, and D. Neumann, “Applying heuristic methods for job scheduling in storage markets,” in 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat
| Files available
2010 | Conference Paper | LibreCat-ID: 5632 |
G. Schryen and C. Bodenstein, “A decision-theoretic foundation of IS business value research,” in Proceedings of the 18th European Conference on Information Systems (ECIS 2010), 2010.
LibreCat
| Files available