Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using network-based text analysis to analyze trends in Microsoft's security innovations., , , , and . Comput. Secur., (2013)Neural network-based simulation metamodels for predicting probability distributions., and . Comput. Ind. Eng., 54 (4): 879-888 (2008)Information quality of commericial web site home pages: an explorative analysis., , and . ICIS, page 164-175. Association for Information Systems, (2000)Calculating the Cost of Year-2000 Compliance., , , and . Commun. ACM, 41 (2): 30-39 (1998)A hybrid grouping genetic algorithm for the cell formation problem., , and . Comput. Oper. Res., 34 (7): 2059-2079 (2007)Grouping efficiency measures and their impact on factory measures for the machine-part cell formation problem: A simulation study., , and . Eng. Appl. Artif. Intell., 20 (1): 63-78 (2007)A comparative study of the reliability of nine statistical software packages., and . Comput. Stat. Data Anal., 51 (8): 3811-3831 (2007)Invited Paper: The Transition from MIS Departments to Analytics Departments., and . J. Inf. Syst. Educ., 30 (4): 303-310 (2019)A framework to explore innovation at SAP through bibliometric analysis of patent applications., , , , , and . Expert Syst. Appl., 42 (24): 9389-9401 (2015)The Economic Value of Online User Reviews with Ad Spending on Movie Box-Office Sales., , and . Inf. Syst. Frontiers, 21 (4): 829-844 (2019)