Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 124
Issue Date | Title | Author(s) |
2013 | Cyber-risk decision models: To insure IT or not? | Mukhopadhyay, Arunabha; Chatterjee, Samir; Saha, Debashish; Mahanti, Ambuj; Sadhukhan, Samir K. |
2014 | Experimenting with proxy agents in online combinatorial auctions | Chakraborty, Soumyakanti; Sen, Anup Kumar; Bagchi, Amitava |
2013 | Course management system adoption and usage: A process theoretic perspective | Dutta, Amitava; Roy, Rahul Kumar; Seetharaman, Priya |
2015 | Managing a big data project: The case of Ramco cements limited | Dutta, Debprotim; Bose, Indranil |
2015 | Proposal for quantum rational secret sharing | Maitra, Arpita; De, Sourya Joyee; Paul, Goutam; Pal, Asim Kumar |
2014 | Do phishing alerts impact global corporations? A firm value analysis | Bose, Indranil; Leung, Alvin Chung Man |
2014 | How small and medium enterprises (SMEs) should bid for spot instances of Amazon's EC2 cloud | Saha, Debashish |
2014 | Competitive learning with pairwise constraints for text | Chakrabarti, Muktamala; Pal, Asim Kumar |
2016 | Innovation research in information systems: A commentary on contemporary trends and issues | Jha, Ashish Kumar; Bose, Indranil |
2015 | Exploring an energy-efficient DTN framework supporting disaster management services in post disaster relief operation | Bhattacharjee, Suman; Roy, Siuli; Bandyopadhyay, Somprakash |
2015 | Addressing the valuation problem in multi-round combinatorial auctions | Chakraborty, Soumyakanti; Sen, A. K.; Bagchi, Amitava |
2015 | Does director interlock impact corporate R&D investment? | Han, Jie; Bose, Indranil; Hu, Nan; Qi, Baolei; Tian, Gaoliang |
2020 | Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized | Parthiban, Rishikesan; Qureshi, Israr; Bandyopadhyay, Somprakash; Bhatt, Babita; Jaikumar, Saravana |
2015 | Prediction of financial distress: An empirical study of listed Chinese companies using data mining | Geng, Ruibin; Bose, Indranil; Chen, Xi |
2015 | Detecting the migration of mobile service customers using fuzzy clustering | Bose, Indranil; Chen, Xi |
2015 | Mapping systemic risk: Critical degree and failures distribution in financial networks | Smerlak, Matteo; Stoll, Brady L.; Gupta, Agam; Magdanz, James S. |
2016 | Efficient two phase heuristic routing technique for digital microfluidic biochip | Chakraborty, Sarit; Chakraborty, Susanta; Das, Chandan; Dasgupta, Partha Sarathi |
2014 | Exploring the factors affecting sponsored search ad performance | Gupta, Agam; Mateen, Arqum |
2016 | Platform based innovation: The case of Bosch India | Jha, Ashish Kumar; Bose, Indranil; Ngai, Wai Ting Eric |
2015 | A novel photosensitive tunneling transistor for near-infrared sensing applications: Design, modeling, and simulation | Gupta, Partha Sarathi; Chattopadhyay, Sanatan; Dasgupta, Partha Sarathi; Rahaman, Hafizur |
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 124