default search action
Yufei Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Sicong Zhu, Yufei Yuan, Wenjie Peng, Hangbin Wu, Lei Yu, Qing Lan:
Integrated engineering education through design activities: A signal phase module design case study for traffic engineering course. Comput. Appl. Eng. Educ. 32(4) (2024) - [j67]Yanling Zhuang, Yun Zhou, Elkafi Hassini, Yufei Yuan, Xiangpei Hu:
Improving order picking efficiency through storage assignment optimization in robotic mobile fulfillment systems. Eur. J. Oper. Res. 316(2): 718-732 (2024) - [j66]Maarif Sohail, Fang Wang, Norm Archer, Wenting Wang, Yufei Yuan:
Lower than expected but still willing to use: User acceptance toward current intelligent conversational agents. Inf. Manag. 61(8): 104033 (2024) - [j65]Yufei Yuan, Wenling Wu, Tairong Shi, Lei Zhang, Yu Zhang:
A Framework to Improve the Implementations of Linear Layers. IACR Trans. Symmetric Cryptol. 2024(2): 322-347 (2024) - [c51]Fatemeh Navazi, Yufei Yuan, Norm Archer:
Measuring compliance with Covid-19 non-pharmaceutical interventions by data fusion from Google. AMCIS 2024 - [c50]Wenting Wang, Yufei Yuan:
The Impact of ChatGPT on Employee Job Identity - an Automation-Augmentation Perspective. AMCIS 2024 - [c49]Gabriel Rodrigues de Campos, Alessia Knauss, Nikita Tanov, David Mano, Bram Bakker, Haneen Farah, Yufei Yuan, Stefan Andersson:
Towards self-aware vehicle automation for improved usability and safer automation mediation. IV 2024: 3289-3296 - 2023
- [j64]Mona Nasery, Ofir Turel, Yufei Yuan:
Combating Fake News on Social Media: A Framework, Review, and Future Opportunities. Commun. Assoc. Inf. Syst. 53: 9 (2023) - [j63]Hao Chen, Yufei Yuan:
The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Res. 33(6): 2244-2275 (2023) - [j62]Yan Wan, Yifan Zhang, Fengting Wang, Yufei Yuan:
Retailer response to negative online consumer reviews: how can damaged trust be effectively repaired? Inf. Technol. Manag. 24(1): 37-53 (2023) - [j61]Qi Chen, Ofir Turel, Yufei Yuan:
Conflicting social influences regarding controversial information systems: the case of online dating. Inf. Technol. People 36(2): 834-866 (2023) - [j60]Yufei Yuan, Kaiyi Wang, Dorine C. Duives, Serge P. Hoogendoorn, Sascha Hoogendoorn-Lanser, Rick Lindeman:
Bicycle Data-Driven Application Framework: A Dutch Case Study on Machine Learning-Based Bicycle Delay Estimation at Signalized Intersections Using Nationwide Sparse GPS Data. Sensors 23(24): 9664 (2023) - [j59]Rong Huang, Xuan Zhao, Yufei Yuan, Qiang Yu, Chengqing Liu, Winnie Daamen:
Modeling Pedestrian Tactical and Operational Decisions Under Risk and Uncertainty: A Two-Layer Model Framework. IEEE Trans. Intell. Transp. Syst. 24(5): 5259-5281 (2023) - [c48]Mahdi Abouei, Yufei Yuan:
Citizens' Support for AI Security Surveillance Systems: A Social Exchange Perspective. ICIS 2023 - 2022
- [j58]Yanling Zhuang, Yun Zhou, Yufei Yuan, Xiangpei Hu, Elkafi Hassini:
Order picking optimization with rack-moving mobile robots and multiple workstations. Eur. J. Oper. Res. 300(2): 527-544 (2022) - [j57]Hao Chen, Ofir Turel, Yufei Yuan:
E-waste information security protection motivation: the role of optimism bias. Inf. Technol. People 35(2): 600-620 (2022) - [j56]Delin Ouyang, Yufei Yuan, Guofa Li, Zizheng Guo:
The Effect of Time Window Length on EEG-Based Emotion Recognition. Sensors 22(13): 4939 (2022) - [c47]Wenting Wang, Yufei Yuan:
Employees' Attitude towards a Digital Teammate - Will AI-enabled Chatbot Lead to Enhancing Employees' Job Identity? ICIS 2022 - [c46]Xinghao Lou, Ailing Huang, Yufei Yuan, Mingjie Li:
Resource Allocation Optimization for Airport Landside Multi-modal Transportation: A Simulation Case Study in Beijing Daxing International Airport. ICITE 2022: 46-51 - 2021
- [j55]Siqi Chen, Yufei Yuan, Xin (Robert) Luo, Jie Jian, Yan Wang:
Discovering group-based transnational cyber fraud actives: A polymethodological view. Comput. Secur. 104: 102217 (2021) - [j54]Shan Zhu, Xiangpei Hu, Kai Huang, Yufei Yuan:
Optimization of product category allocation in multiple warehouses to minimize splitting of online supermarket customer orders. Eur. J. Oper. Res. 290(2): 556-571 (2021) - [j53]Qi Chen, Yufei Yuan, Yuqiang Feng, Norm Archer:
A decision paradox: benefit vs risk and trust vs distrust for online dating adoption vs non-adoption. Internet Res. 31(1): 341-375 (2021) - [j52]Jiaqing Xu, Weiling Jiao, Hao Chen, Yufei Yuan:
Study on free trial decision-making of IT products and services from an IT company's perspective. J. Enterp. Inf. Manag. 34(1): 543-558 (2021) - 2020
- [j51]Weiling Jiao, Hao Chen, Yufei Yuan:
Understanding users' dynamic behavior in a free trial of IT services: A three-stage model. Inf. Manag. 57(6): 103238 (2020)
2010 – 2019
- 2019
- [j50]Yu Han, Andreas Hegyi, Yufei Yuan, Claudio Roncoli, Serge P. Hoogendoorn:
An Extended Linear Quadratic Model Predictive Control Approach for Multi-Destination Urban Traffic Networks. IEEE Trans. Intell. Transp. Syst. 20(10): 3647-3660 (2019) - [c45]Samira Farivar, Fang Wang, Yufei Yuan:
Meformer vs. Informer: Influencer type and Follower Behavioral Intentions. AMCIS 2019 - [c44]Jie Jian, Xiaoming Yu, Yufei Yuan:
Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey. ICAIS (3) 2019: 618-631 - [c43]Bell Raj Eapen, Norm Archer, Kamran Sartipi, Yufei Yuan:
Drishti: a sense-plan-act extension to open mHealth framework using FHIR. SEH@ICSE 2019: 49-52 - 2018
- [j49]Samira Farivar, Ofir Turel, Yufei Yuan:
Skewing users' rational risk considerations in social commerce: An empirical examination of the role of social identification. Inf. Manag. 55(8): 1038-1048 (2018) - [j48]Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly:
Strategic value alignment for information security management: a critical success factor analysis. Inf. Comput. Secur. 26(2): 150-170 (2018) - [j47]Yanni Liu, Dongsheng Liu, Yufei Yuan, Norm Archer:
Examining situational continuous mobile game play behavior from the perspectives of diversion and flow experience. Inf. Technol. People 31(4): 948-965 (2018) - [c42]Nicole O'Brien, Yufei Yuan:
Social Networking Site Use on Social Capital of Older Adults. AMCIS 2018 - [c41]Qi Chen, Yuqiang Feng, Yufei Yuan, Luning Liu:
Adoption vs. Non-Adoption: A Case of Online Dating. PACIS 2018: 215 - 2017
- [j46]Samira Farivar, Ofir Turel, Yufei Yuan:
A trust-risk perspective on social commerce use: an examination of the biasing role of habit. Internet Res. 27(3): 586-607 (2017) - [c40]Samira Farivar, Yufei Yuan:
Understanding Consumers' Impulsive Buying Behavior in Social Commerce Platforms. AMCIS 2017 - [c39]Nicole O'Brien, Yufei Yuan, Joseph Tan:
How does Social Networking Reduce Loneliness for Older Adults? AMCIS 2017 - [c38]Steven C. Way, Yufei Yuan:
A Framework for Collaborative Disaster Response: A Grounded Theory Approach. GDN 2017: 33-46 - 2016
- [c37]Samira Farivar, Yufei Yuan, Ofir Turel:
Understanding Social Commerce Acceptance: The Role of Trust, Perceived Risk, and Benefit. AMCIS 2016 - [c36]Nicole O'Brien, Joseph Tan, Yufei Yuan:
The Role of Social Networking in Healthcare. HICSS 2016: 3043-3052 - [c35]Yun Yang, Yufei Yuan, Norman P. Archer, Ellen Ryan:
Adoption of Social Media and the Quality of Life of Older Adults. HICSS 2016: 3133-3142 - [c34]Samira Farivar, Yufei Yuan, Ofir Turel:
Biases in Social Commerce Users' Rational Risk Considerations. ICIS 2016 - [c33]Yufei Yuan, Winnie Daamen, Dorine C. Duives, Serge P. Hoogendoorn:
Comparison of three algorithms for real-time pedestrian state estimation - supporting a monitoring dashboard for large-scale events. ITSC 2016: 2601-2606 - 2015
- [j45]Zhiling Tu, Ofir Turel, Yufei Yuan, Norman P. Archer:
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination. Inf. Manag. 52(4): 506-517 (2015) - [j44]Youwei Wang, Yufei Yuan, Ofir Turel, Zhiling Tu:
Understanding the Development and Diffusion of Mobile Commerce Technologies in China: A Biographical Study with an Actor-Network Theory Perspective. Int. J. Electron. Commer. 19(4): 47-76 (2015) - [c32]Zhiling Tu, Yufei Yuan:
Coping with BYOD Security Threat: From Management Perspective. AMCIS 2015 - [c31]Yu Han, Yufei Yuan, Serge P. Hoogendoorn:
Integrated network Linear-Quadratic Model Predictive Control for disturbance on freeways. ICNSC 2015: 521-526 - [c30]Yufei Yuan, Friso Scholten, Hans van Lint:
Efficient Traffic State Estimation and Prediction Based on the Ensemble Kalman Filter with a Fast Implementation and Localized Deterministic Scheme. ITSC 2015: 477-482 - [c29]Yu Han, Yufei Yuan, Andreas Hegyi, Serge P. Hoogendoorn:
Linear Quadratic MPC for Integrated Route Guidance and Ramp Metering. ITSC 2015: 1150-1155 - 2014
- [j43]Zhiling Tu, Yufei Yuan, Norman P. Archer:
Understanding user behaviour in coping with security threats of mobile device loss and theft. Int. J. Mob. Commun. 12(6): 603-623 (2014) - [j42]Yufei Yuan, Hans van Lint, Femke van Wageningen-Kessels, Serge P. Hoogendoorn:
Network-Wide Traffic State Estimation Using Loop Detector and Floating Car Data. J. Intell. Transp. Syst. 18(1): 41-50 (2014) - [c28]Zhiling Tu, Yufei Yuan:
Critical Success Factors Analysis on Effective Information Security Management: A Literature Review. AMCIS 2014 - [c27]Hans van Lint, Ramon L. Landman, Yufei Yuan, Chris P. IJ. van Hinsbergen, Serge P. Hoogendoorn:
Traffic monitoring for coordinated traffic management - Experiences from the field trial integrated traffic management in Amsterdam. ITSC 2014: 477-482 - [c26]Yufei Yuan, Adam J. Pel, Serge P. Hoogendoorn:
The transition between normal and emergency driving behaviour during evacuation and its implications for traffic flow operations and traffic management. ITSC 2014: 2700-2705 - 2013
- [j41]Ting Wang, Lih-Bin Oh, Kanliang Wang, Yufei Yuan:
User adoption and purchasing intention after free trial: an empirical study of mobile newspapers. Inf. Syst. E Bus. Manag. 11(2): 189-210 (2013) - [c25]Andreas Hegyi, Bart D. Netten, Meng Wang, Wouter J. Schakel, Thomas Schreiter, Yufei Yuan, Bart van Arem, Tom Alkim:
A cooperative system based variable speed limit control algorithm against jam waves - an extension of the SPECIALIST algorithm. ITSC 2013: 973-978 - 2012
- [j40]Zhengchuan Xu, Ofir Turel, Yufei Yuan:
Online game addiction among adolescents: motivation and prevention factors. Eur. J. Inf. Syst. 21(3): 321-340 (2012) - [j39]Ken H. Guo, Yufei Yuan:
The effects of multilevel sanctions on information security violations: A mediating model. Inf. Manag. 49(6): 320-326 (2012) - [j38]Yufei Yuan, J. W. C. van Lint, R. Eddie Wilson, Femke van Wageningen-Kessels, Serge P. Hoogendoorn:
Real-Time Lagrangian Traffic State Estimator for Freeways. IEEE Trans. Intell. Transp. Syst. 13(1): 59-70 (2012) - [c24]Yiping Jiang, Yufei Yuan, Kai Huang, Lindu Zhao:
Logistics for Large-Scale Disaster Response: Achievements and Challenges. HICSS 2012: 1277-1285 - [c23]Zhiling Tu, Yufei Yuan:
Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft. HICSS 2012: 1393-1402 - [c22]Yanli Pei, Yufei Yuan, Zhengchuan Xu:
A Conceptual Framework for Mobile Group Support Systems. ICMB 2012: 1 - [c21]Steven C. Way, Yufei Yuan:
Towards a context-aware multi-party emergency coordination system framework. ISCRAM 2012 - 2011
- [j37]Ken H. Guo, Yufei Yuan, Norman P. Archer, Catherine E. Connelly:
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model. J. Manag. Inf. Syst. 28(2): 203-236 (2011) - [j36]Pieter Ballon, Harry Bouwman, Yufei Yuan:
Special Issue on Business Models for Mobile Platforms: Guest Editors' Introduction. J. Theor. Appl. Electron. Commer. Res. 6(2) (2011) - [j35]Tim S. McLaren, Milena M. Head, Yufei Yuan, Yolande E. Chan:
A Multilevel Model for Measuring Fit Between a Firm's Competitive Strategies and Information Systems Capabilities. MIS Q. 35(4): 909-929 (2011) - [c20]Yufei Yuan, J. W. C. van Lint, Serge P. Hoogendoorn, Jos L. M. Vrancken, Thomas Schreiter:
Freeway traffic state estimation using extended Kalman filter for first-order traffic model in Lagrangian coordinates. ICNSC 2011: 121-126 - 2010
- [j34]Yufei Yuan, Norman P. Archer, Catherine E. Connelly, Wuping Zheng:
Identifying the ideal fit between mobile work and mobile work support. Inf. Manag. 47(3): 125-137 (2010) - [c19]Yufei Yuan, Hans van Lint, Thomas Schreiter, Serge P. Hoogendoorn, Jos L. M. Vrancken:
Automatic speed-bias correction with flow-density relationships. ICNSC 2010: 1-7 - [p1]Ofir Turel, Yufei Yuan:
Online Dispute Resolution Services: Justice, Concepts and Challenges. Handbook of Group Decision and Negotiation 2010: 425-436
2000 – 2009
- 2009
- [j33]Mihail Cocosila, Norm Archer, Yufei Yuan:
Early Investigation of New Information Technology Acceptance: A Perceived Risk - Motivation Model. Commun. Assoc. Inf. Syst. 25: 30 (2009) - [j32]Zhengchuan Xu, Yufei Yuan:
The impact of context and incentives on mobile service adoption. Int. J. Mob. Commun. 7(3): 363-381 (2009) - [j31]Mihail Cocosila, Norman P. Archer, R. Brian Haynes, Yufei Yuan:
Can wireless text messaging improve adherence to preventive activities? Results of a randomised controlled trial. Int. J. Medical Informatics 78(4): 230-238 (2009) - [j30]Zhengchuan Xu, Yufei Yuan:
Principle-based dispute resolution for consumer protection. Knowl. Based Syst. 22(1): 18-27 (2009) - [c18]Steven C. Way, Yufei Yuan:
Criteria for Evaluating Authentication Systems. AMCIS 2009: 338 - [c17]Yubin Wang, Yufei Yuan, Jos L. M. Vrancken:
Traffic parameter estimation on motorway networks by combination of filtering techniques. SMC 2009: 3558-3562 - 2008
- [j29]Youwei Wang, Weihui Dai, Yufei Yuan:
Website browsing aid: A navigation graph-based recommendation system. Decis. Support Syst. 45(3): 387-400 (2008) - [j28]Ofir Turel, Yufei Yuan, Catherine E. Connelly:
In Justice We Trust: Predicting User Acceptance of E-Customer Services. J. Manag. Inf. Syst. 24(4): 123-151 (2008) - [c16]Zhengchuan Xu, Yufei Yuan, Shaobo Ji:
A Decision Analysis Framework for Emergency Notification. HICSS 2008: 26 - 2007
- [j27]Mihail Cocosila, Ofir Turel, Norman P. Archer, Yufei Yuan:
Perceived health risks of 3G cell phones: do users care? Commun. ACM 50(6): 89-92 (2007) - [j26]Ofir Turel, Yufei Yuan:
Online Dispute Resolution services for electronic markets: a user centric research agenda. Int. J. Electron. Bus. 5(6): 590-603 (2007) - [j25]Jiangxu Zhao, Yufei Yuan, David Ludwin, Amiram Gafni:
An intelligent agent approach to improving the coordination efficiency in the donor kidney distribution process. Int. J. Electron. Heal. 3(4): 479-496 (2007) - [j24]Wuping Zheng, Yufei Yuan:
Identifying the differences between stationary office support and mobile work support: a conceptual framework. Int. J. Mob. Commun. 5(1): 107-122 (2007) - [j23]Yufei Yuan, Bruce F. Cockburn, Thomas Sikora, Mrinal K. Mandal:
Efficient allocation of packet-level forward error correction in video streaming over the Internet. J. Electronic Imaging 16(2): 023012 (2007) - [c15]Mihail Cocosila, Norman P. Archer, Yufei Yuan:
Adoption of SMS for Business-to-Consumer Usage: Supporting Adherence to Healthy Activities. AMCIS 2007: 22 - [c14]Zhengchuan Xu, Yufei Yuan:
What is the Influence of Context and Incentive on Mobile Commerce Adoption? A Case study of a GPS-based Taxi Dispatching System. ICMB 2007: 4 - 2006
- [j22]Xiaoqing Li, Ali R. Montazemi, Yufei Yuan:
Agent-based buddy-finding methodology for knowledge sharing. Inf. Manag. 43(3): 283-296 (2006) - [j21]Wenjie Wang, Yufei Yuan, Norman P. Archer:
A Contextual Framework for Combating Identity Theft. IEEE Secur. Priv. 4(2): 30-38 (2006) - [j20]Shiu-Li Huang, Fu-ren Lin, Yufei Yuan:
Understanding Agent-Based On-Line Persuasion and Bargaining Strategies: An Empirical Study. Int. J. Electron. Commer. 11(1): 85-115 (2006) - [j19]Ofir Turel, Yufei Yuan:
Investigating the dynamics of the m-commerce value system: a comparative viewpoint. Int. J. Mob. Commun. 4(5): 532-557 (2006) - [c13]Jiangxu Zhao, Yufei Yuan, David Ludwin, Amiram Gafni:
An Intelligent Agent Approach to Improving the Coordination Efficiency in Donor Kidney Distribution Process. AMCIS 2006: 327 - [c12]Mihail Cocosila, Ofir Turel, Norman P. Archer, Yufei Yuan:
Perceived Health Risk Effects on the Adoption of 3G Cell Phones. AMCIS 2006: 347 - [c11]Youwei Wang, Yufei Yuan:
The Role of SMS in Mobile Data Service Diffusion in China: A Longitudinal Case Study Based on Actor-Network Theory. ICIS 2006: 105 - [c10]Yufei Yuan, Wuping Zheng:
The Fit between Mobile Task and Mobile Work Support: A Theoretical Framework. ICMB 2006: 11 - 2005
- [j18]Yufei Yuan, Brian Detlor:
Intelligent mobile crisis response systems. Commun. ACM 48(2): 95-98 (2005) - [c9]Yufei Yuan, Wuping Zheng:
From Stationary Work Support to Mobile Work Support: A Theoretical Framework. ICMB 2005: 315-321 - [c8]Zhengchuan Xu, Yufei Yuan, Huiliang Jin, Ling Hong:
Investigating the Value of Location Information in Taxi Dispatching Services: A case study of DaZhong Taxi. PACIS 2005: 111 - 2004
- [j17]Yufei Yuan, Jason Zhang, Wuping Zheng:
Can e-government help China meet the challenges of joining the World Trade Organization? Electron. Gov. an Int. J. 1(1): 77-91 (2004) - [j16]Yufei Yuan, Mrinal K. Mandal:
Context-Modeled Wavelet Difference Reduction Coding Based on Fractional Bit-Plane Partitioning. IEICE Trans. Inf. Syst. 87-D(2): 491-493 (2004) - [j15]Mihail Cocosila, Constantinos K. Coursaris, Yufei Yuan:
M-healthcare for patient self-management: a case for diabetics. Int. J. Electron. Heal. 1(2): 221-241 (2004) - [j14]Tim S. McLaren, Milena M. Head, Yufei Yuan:
Using competitive strategy patterns to determine ideal supply chain management information systems capabilities. Int. J. Internet Enterp. Manag. 2(1): 45-61 (2004) - [j13]Tim S. McLaren, Milena M. Head, Yufei Yuan:
Supply chain management information systems capabilities. An exploratory study of electronics manufacturers. Inf. Syst. E Bus. Manag. 2(2-3): 207-222 (2004) - [j12]Yufei Yuan, Mrinal K. Mandal:
An embedded wavelet image coder with parallel encoding and sequential decoding of bit-planes. Real Time Imaging 10(5): 285-295 (2004) - [c7]Yufei Yuan, Mrinal K. Mandal:
Embedded color image coding using context-modeled wavelet difference reduction. ICASSP (3) 2004: 61-64 - [c6]Tim S. McLaren, Milena M. Head, Yufei Yuan:
Strategic Fit of Supply Chain Management Information Systems: A Measurement Model. ICIS 2004: 597-606 - [c5]Yufei Yuan, Mrinal K. Mandal:
An embedded wavelet image coder with parallel encoding and sequential decoding of bit-planes. ISCAS (3) 2004: 841-844 - 2003
- [j11]Jen-Her Wu, Yufei Yuan:
Improving searching and reading performance: the effect of highlighting and text color coding. Inf. Manag. 40(7): 617-637 (2003) - [j10]Yufei Yuan, Jason J. Zhang:
Towards an appropriate business model for m-commerce. Int. J. Mob. Commun. 1(1/2): 35-56 (2003) - [c4]Yufei Yuan, Mrinal K. Mandal:
Context-modeled wavelet difference reduction coding based on fractional bit-plane partitioning. ICIP (2) 2003: 251-254 - 2002
- [j9]Yufei Yuan, Stuart Feldhamer, Amiram Gafni, Fran Fyfe, David Ludwin:
The development and evaluation of a fuzzy logic expert system for renal transplantation assignment: Is this a useful tool? Eur. J. Oper. Res. 142(1): 152-173 (2002) - [j8]Tim S. McLaren, Milena M. Head, Yufei Yuan:
Supply chain collaboration alternatives: understanding the expected costs and benefits. Internet Res. 12(4): 348-364 (2002) - [c3]Yufei Yuan, Mrinal K. Mandal:
Low-Band-Shifted Hierarchical Backward Motion Estimation, Compensation for Wavelet-Based Video Coding. ICVGIP 2002 - 2000
- [j7]Milena M. Head, Norman P. Archer, Yufei Yuan:
World Wide Web navigation aid. Int. J. Hum. Comput. Stud. 53(2): 301-330 (2000) - [j6]Norman P. Archer, Yufei Yuan:
Managing business-to-business relationships throughout the e-commerce procurement life cycle. Internet Res. 10(5): 385-395 (2000) - [c2]Yufei Yuan, Choong Wah Chan:
Overlapped multiresolution motion compensation technique for wavelet video compression. VCIP 2000: 1221-1228
1990 – 1999
- 1999
- [c1]Xiaowei Ma, Yili Fu, Yufei Yuan, Wang Wei, Yulin Ma, Hegao Cai:
The Path Planning of Mobile Manipulator with Genetic-Fuzzy Controller in Flexible Manufacturing Cell. ICRA 1999: 329-334 - 1998
- [j5]Yufei Yuan, Joseph B. Rose, Norman P. Archer:
A Web-Based Negotiation Support System. Electron. Mark. 8(3): 13-17 (1998) - 1996
- [j4]Yufei Yuan, Huijun Zhuang:
A genetic algorithm for generating fuzzy classification rules. Fuzzy Sets Syst. 84(1): 1-19 (1996) - [j3]Norman P. Archer, Milena M. Head, Yufei Yuan:
Patterns in information search for decision making: the effects of information abstraction. Int. J. Hum. Comput. Stud. 45(5): 599-616 (1996) - [j2]Norman P. Archer, Milena M. Head, J. P. Wollersheim, Yufei Yuan:
Investigation of Voice and Text Output Modes with Abstraction in a Computer Interface. Interact. Comput. 8(4): 323-345 (1996) - 1995
- [j1]Norman P. Archer, Yufei Yuan:
Comparing telephone-computer interface designs: Are software simulations as good as hardware prototypes? Int. J. Hum. Comput. Stud. 42(2): 169-184 (1995)
Coauthor Index
aka: Norm Archer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint