|
Reference [1]K. Ameen and S.J. Haider, “Book selection strategies in university libraries of Pakistan: An analysis,” Library Collections, Acquisitions, and Technical Services, vol. 31, no. 3-4, pp. 208-219, 2007. [2]D. C. Dryer, C. Eisbach, and W. S. Ark, “At what cost pervasive? A social computing view of mobile computing systems,” IBM System Journal, vol. 38, no. 4, pp. 652-676, Dec. 1999. [3]G. Fischer, P. Jennings, M. L. Maher, M. Resnick, and B. Shneiderman, “Creativity challenges and opportunities in social computing,” in Proc. 27th Int. Conf. Human Factors in Computing Systems, Boston, Massachusetts, USA, 2009, pp. 3283-3286. [4]D. H. L. Goh, and A. Y. K. Chua, “Investigating the influence of social computing applications on website quality,” in Proc. 25th Annual ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, 2010, pp. 807-811. [5]C. Haythornthwaite, “Social network analysis: An approach and technique for the study of information exchange,” Library and Infor¬mation Science Research, vol. 18, no. 4, pp, 323-342, 1996. [6]T. F. Ho, S. J. Shyu, and Y. L. Wu, “Material acquisitions in academic libraries,” in Proc. 3rd IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, 2008, pp.1465-1470. [7]S. Kao, H. Chang, and C. Lin, “Decision support for the academic library acquisition budget allocation via circulation database mining,” Information Processing & Management, vol. 39, no. 1, pp. 133-147, Jan. 2003. [8]M. Parameswaran and A. B. Whinston, “Social computing: an overview,” Communications of the Association for Information Systems, vol. 19, pp. 762-780, 2007. [9]H. F. Rashid, “Book availability as a performance measure of a library: An analysis of the effectiveness of a health sciences library,” Journal of the American Society for Information Science, vol. 41, no. 7, pp. 501-507, Oct. 1990. [10]I. S. Sitanggang, N. A. Husin, A. Agustina, and N. Mahmoodian, “Sequential pattern mining on library transaction data,” presented in Int. Symp. Inform. Technology 2010 (ITSim 2010), Kuala Lumpur, 2010. [11]J. C. Shieh and Y. C. Wei, “The study of applying data warehouse to library management-acquisition policy marking based on collections analysis,” Journal of Educational Media & Library Sciences, vol. 40, no. 3, pp. 345-356, Mar. 2003. [12]F. Y. Wang, K. M. Carley, D. Zeng, and W. Mao, “Social computing: From social informatics to social intelligence,” IEEE Intelligent Systems, vol. 22, no. 2, pp. 79-83, Mar. 2007. [13]C. H. Wu, “Data mining applied to material acquisition budget allocation for libraries: design and development,” Expert Systems with Applications, vol. 25, no. 3, pp. 401-411, Oct. 2003. [14]C. H. Wu, T. Z. Lee and S. C. Kao, “Knowledge discovery applied to material acquisitions for libraries,” Information Processing & Management, vol. 40, no. 4, pp. 709-725, May 2004. [15]F. Wu, H. H. Lee, and Y. H. Kuo, “Reputation evaluation for choosing a trustworthy counterparty in C2C e-commerce,” Electronic Commerce Research and Applications, in press. [16]K. Wise and D. E. Perushek, “Linear goal programming for academic library acquisitions allocations,” Library Acquisitions: Practice and Theory, vol. 20, no. 3, pp. 311-327, 1996. [17]K. Wise, and D. E. Perushek, “Goal programming as a solution technique for the acquisition allocation problem,” Library and Information Science Research, vol. 22, no. 2, pp. 165-183, Jun. 2000. [18]W. Li, X. Li, and L. Zhao, “A decision support system for books procurement of university libraries,” in Proc 26th Chinese Control Conference, Zhangjiajie, Hunan, China, 2007, pp. 154-157.
|