|
Search the dblp DataBase
Tim Chenoweth:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tim Chenoweth, Robert Minch, Sharon Tabor
User Security Behavior on Wireless Networks: An Empirical Study. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:145- [Conf]
- Tim Chenoweth, Zoran Obradovic, Sauchi Stephen Lee
Embedding Technical Analysis Into Neural Network Based Trading Systems. [Citation Graph (0, 0)][DBLP] Applied Artificial Intelligence, 1996, v:10, n:6, pp:523-542 [Journal]
- Tim Chenoweth, Karen Corral, Haluk Demirkan
Seven key interventions for data warehouse success. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2006, v:49, n:1, pp:114-119 [Journal]
- Tim Chenoweth, David Schuff, Robert D. St. Louis
A method for developing dimensional data marts. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:12, pp:93-98 [Journal]
- Tim Chenoweth, Karen L. Dowling, Robert D. St. Louis
Convincing DSS users that complex models are worth the effort. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2004, v:37, n:1, pp:71-82 [Journal]
- Tim Chenoweth, Zoran Obradovic
A multi-component nonlinear prediction system for the S&P 500 Index. [Citation Graph (0, 0)][DBLP] Neurocomputing, 1996, v:10, n:3, pp:275-290 [Journal]
- Tim Chenoweth, Robert Hubata, Robert D. St. Louis
Automatic ARMA identification using neural networks and the extended sample autocorrelation function: a reevaluation. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2000, v:29, n:1, pp:21-30 [Journal]
Application of Protection Motivation Theory to Adoption of Protective Technologies. [Citation Graph (, )][DBLP]
Wireless insecurity: examining user security behavior on public networks. [Citation Graph (, )][DBLP]
Search in 0.041secs, Finished in 0.042secs
|