callback( { "result":{ "query":":facetid:toc:\"db/journals/ibmrd/ibmrd58.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.87" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"54", "@dc":"54", "@oc":"54", "@id":"43453862", "text":":facetid:toc:db/journals/ibmrd/ibmrd58.bht" } }, "hits":{ "@total":"54", "@computed":"54", "@sent":"54", "@first":"0", "hit":[{ "@score":"1", "@id":"3730899", "info":{"authors":{"author":[{"@pid":"28/11083","text":"Musheer Ahmed"},{"@pid":"73/3162","text":"Mustaque Ahamad"},{"@pid":"76/7686","text":"Tushar Jaiswal"}]},"title":"Augmenting security and accountability within the eHealth Exchange.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/AhmedAJ14","doi":"10.1147/JRD.2013.2288068","ee":"https://doi.org/10.1147/JRD.2013.2288068","url":"https://dblp.org/rec/journals/ibmrd/AhmedAJ14"}, "url":"URL#3730899" }, { "@score":"1", "@id":"3730900", "info":{"authors":{"author":[{"@pid":"72/1094","text":"Alfredo Alba"},{"@pid":"137/1381","text":"Gabriel Alatorre"},{"@pid":"157/1436","text":"C. Bolik"},{"@pid":"146/9371","text":"Ann Corrao"},{"@pid":"156/1544","text":"T. Clark"},{"@pid":"72/5871","text":"Sandeep Gopisetty"},{"@pid":"42/4809-1","text":"Robert Haas 0001"},{"@pid":"69/5045","text":"Ronen I. Kat"},{"@pid":"80/6758","text":"Bryan Langston"},{"@pid":"78/4874","text":"NagaPramod Mandagere"},{"@pid":"261/6374","text":"Dietmar Noll"},{"@pid":"28/1356","text":"Sumant Padbidri"},{"@pid":"21/5885","text":"Ramani Routray"},{"@pid":"24/4470-5","text":"Yang Song 0005"},{"@pid":"53/1185","text":"Chung-Hao Tan"},{"@pid":"93/410","text":"Avishay Traeger"}]},"title":"Efficient and agile storage management in software defined environments.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/AlbaABCCGHKLMNPRSTT14","doi":"10.1147/JRD.2014.2302381","ee":"https://doi.org/10.1147/JRD.2014.2302381","url":"https://dblp.org/rec/journals/ibmrd/AlbaABCCGHKLMNPRSTT14"}, "url":"URL#3730900" }, { "@score":"1", "@id":"3730901", "info":{"authors":{"author":[{"@pid":"157/1428","text":"Sabine Albrecht"},{"@pid":"15/9649","text":"Alessio Bonti"},{"@pid":"80/10976","text":"Jasbir Dhaliwal"},{"@pid":"157/1383","text":"Federico M. Giaimo"},{"@pid":"59/6734","text":"Jürg von Känel"},{"@pid":"64/3456","text":"S. Pandey"},{"@pid":"157/1380","text":"A. Phan"},{"@pid":"09/195","text":"Y. Wang"}]},"title":"Smarter Financial Life: Rethinking personal financial planning.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/AlbrechtBDGKPPW14","doi":"10.1147/JRD.2014.2329384","ee":"https://doi.org/10.1147/JRD.2014.2329384","url":"https://dblp.org/rec/journals/ibmrd/AlbrechtBDGKPPW14"}, "url":"URL#3730901" }, { "@score":"1", "@id":"3730902", "info":{"authors":{"author":[{"@pid":"43/9326","text":"Y. Amemiya"},{"@pid":"19/3999","text":"H. Yang"},{"@pid":"157/1429","text":"K. Anikeev"}]},"title":"An approach to enterprise revenue forecasting as a decision support system.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/AmemiyaYA14","doi":"10.1147/JRD.2014.2328931","ee":"https://doi.org/10.1147/JRD.2014.2328931","url":"https://dblp.org/rec/journals/ibmrd/AmemiyaYA14"}, "url":"URL#3730902" }, { "@score":"1", "@id":"3730903", "info":{"authors":{"author":[{"@pid":"17/1094","text":"William C. Arnold"},{"@pid":"24/11531","text":"Diana Arroyo"},{"@pid":"24/4042","text":"Wolfgang Segmuller"},{"@pid":"94/538","text":"Mike Spreitzer"},{"@pid":"28/980","text":"Malgorzata Steinder"},{"@pid":"57/2116","text":"Asser N. Tantawi"}]},"title":"Workload orchestration and optimization for software defined environments.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/ArnoldASSST14","doi":"10.1147/JRD.2014.2304864","ee":"https://doi.org/10.1147/JRD.2014.2304864","url":"https://dblp.org/rec/journals/ibmrd/ArnoldASSST14"}, "url":"URL#3730903" }, { "@score":"1", "@id":"3730904", "info":{"authors":{"author":[{"@pid":"14/6224","text":"Alain C. Azagury"},{"@pid":"42/4809-1","text":"Robert Haas 0001"},{"@pid":"56/3008","text":"Dean Hildebrand"},{"@pid":"60/2496","text":"Steven W. Hunter"},{"@pid":"157/1353","text":"Todd Neville"},{"@pid":"72/1617","text":"Sven Oehme"},{"@pid":"55/654","text":"Anees Shaikh"}]},"title":"GPFS-based implementation of a hyperconverged system for software defined infrastructure.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/AzaguryHHHNOS14","doi":"10.1147/JRD.2014.2303321","ee":"https://doi.org/10.1147/JRD.2014.2303321","url":"https://dblp.org/rec/journals/ibmrd/AzaguryHHHNOS14"}, "url":"URL#3730904" }, { "@score":"1", "@id":"3730905", "info":{"authors":{"author":[{"@pid":"02/6571","text":"Michael Baentsch"},{"@pid":"98/6777","text":"Peter Buhler"},{"@pid":"82/2053","text":"Luis Garcés-Erice"},{"@pid":"83/2798","text":"Thomas Gschwind"},{"@pid":"37/6554","text":"Frank Höring"},{"@pid":"146/7614","text":"Michael Kuyper"},{"@pid":"76/6362","text":"Andreas Schade"},{"@pid":"66/6057","text":"Paolo Scotton"},{"@pid":"146/7661","text":"Peter Urbanetz"}]},"title":"IBM Secure Enterprise Desktop.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/BaentschBGGHKSSU14","doi":"10.1147/JRD.2013.2289606","ee":"https://doi.org/10.1147/JRD.2013.2289606","url":"https://dblp.org/rec/journals/ibmrd/BaentschBGGHKSSU14"}, "url":"URL#3730905" }, { "@score":"1", "@id":"3730906", "info":{"authors":{"author":[{"@pid":"48/2184","text":"J. Bao"},{"@pid":"62/220","text":"A. Deshpande"},{"@pid":"43/2291","text":"Scott McFaddin"},{"@pid":"91/3542","text":"Chandrasekhar Narayanaswami 0001"}]},"title":"Partner-marketing using geo-social media data for smarter commerce.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/BaoDMN14","doi":"10.1147/JRD.2014.2344514","ee":"https://doi.org/10.1147/JRD.2014.2344514","url":"https://dblp.org/rec/journals/ibmrd/BaoDMN14"}, "url":"URL#3730906" }, { "@score":"1", "@id":"3730907", "info":{"authors":{"author":[{"@pid":"25/1768","text":"Salman Abdul Baset"},{"@pid":"68/4459-3","text":"Long Wang 0003"},{"@pid":"10/6711","text":"Byung-Chul Tak"},{"@pid":"20/6376-3","text":"Cuong Pham 0003"},{"@pid":"81/4301","text":"Chunqiang Tang"}]},"title":"Toward achieving operational excellence in a cloud.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/BasetWTPT14","doi":"10.1147/JRD.2014.2298927","ee":"https://doi.org/10.1147/JRD.2014.2298927","url":"https://dblp.org/rec/journals/ibmrd/BasetWTPT14"}, "url":"URL#3730907" }, { "@score":"1", "@id":"3730908", "info":{"authors":{"author":[{"@pid":"26/829","text":"Gerd Breiter"},{"@pid":"22/9326","text":"Michael Behrendt"},{"@pid":"63/126","text":"M. Gupta"},{"@pid":"63/5972","text":"Simon Daniel Moser"},{"@pid":"38/2334","text":"R. Schulze"},{"@pid":"157/1440","text":"I. Sippli"},{"@pid":"98/9921","text":"Thomas Spatzier"}]},"title":"Software defined environments based on TOSCA in IBM cloud implementations.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/BreiterBGMSSS14","doi":"10.1147/JRD.2014.2304772","ee":"https://doi.org/10.1147/JRD.2014.2304772","url":"https://dblp.org/rec/journals/ibmrd/BreiterBGMSSS14"}, "url":"URL#3730908" }, { "@score":"1", "@id":"3730909", "info":{"authors":{"author":[{"@pid":"82/1098","text":"Stephen J. Buckley"},{"@pid":"02/1590","text":"Markus Ettl"},{"@pid":"32/465-1","text":"Prateek Jain 0001"},{"@pid":"80/75","text":"Ronny Luss"},{"@pid":"41/6546","text":"Marek Petrik"},{"@pid":"04/1958","text":"Rajesh Kumar Ravi"},{"@pid":"49/2856","text":"Chitra Venkatramani"}]},"title":"Social media and customer behavior analytics for personalized customer engagements.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/BuckleyE0LPRV14","doi":"10.1147/JRD.2014.2344515","ee":"https://doi.org/10.1147/JRD.2014.2344515","url":"https://dblp.org/rec/journals/ibmrd/BuckleyE0LPRV14"}, "url":"URL#3730909" }, { "@score":"1", "@id":"3730910", "info":{"authors":{"author":[{"@pid":"80/3365","text":"H. Cao"},{"@pid":"30/1128","text":"Weishan Dong"},{"@pid":"48/3285-2","text":"Leslie S. Liu 0002"},{"@pid":"86/9883","text":"Chunyang Ma"},{"@pid":"83/7048","text":"Weihong Qian"},{"@pid":"135/7112","text":"J. W. Shi"},{"@pid":"51/5215","text":"Chunhua Tian"},{"@pid":"02/5889-21","text":"Yu Wang 0021"},{"@pid":"k/DavidKonopnicki","text":"David Konopnicki"},{"@pid":"s/MShmueliS","text":"Michal Shmueli-Scheuer"},{"@pid":"62/6734","text":"Doron Cohen"},{"@pid":"23/3743","text":"Natwar Modani"},{"@pid":"120/8503","text":"Hemank Lamba"},{"@pid":"160/5904","text":"A. Dwivedi"},{"@pid":"26/521","text":"Amit Anil Nanavati"},{"@pid":"14/1342","text":"Mohit Kumar"}]},"title":"SoLoMo analytics for telco Big Data monetization.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/CaoDLMQST0KSCML14","doi":"10.1147/JRD.2014.2336177","ee":"https://doi.org/10.1147/JRD.2014.2336177","url":"https://dblp.org/rec/journals/ibmrd/CaoDLMQST0KSCML14"}, "url":"URL#3730910" }, { "@score":"1", "@id":"3730911", "info":{"authors":{"author":[{"@pid":"78/574","text":"Michael Desmond"},{"@pid":"160/5884","text":"H. L. Guo"},{"@pid":"12/9872","text":"Fenno F. Terry Heath III"},{"@pid":"14/1187","text":"S. Bao"},{"@pid":"46/960","text":"Elham Khabiri"},{"@pid":"18/5667","text":"Sophia Krasikov"},{"@pid":"23/3743","text":"Natwar Modani"},{"@pid":"82/2219","text":"Seema Nagar"},{"@pid":"160/5871","text":"M. Ohno"},{"@pid":"87/1595","text":"Harini Srinivasan"},{"@pid":"135/9494","text":"H. Takeuchi"},{"@pid":"47/4468","text":"Roman Vaculín"},{"@pid":"160/5909","text":"S. W. Zhao"},{"@pid":"160/5852","text":"T. Hamid"}]},"title":"A social analytics platform for smarter commerce solutions.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/DesmondGHBKKMNO14","doi":"10.1147/JRD.2014.2346262","ee":"https://doi.org/10.1147/JRD.2014.2346262","url":"https://dblp.org/rec/journals/ibmrd/DesmondGHBKKMNO14"}, "url":"URL#3730911" }, { "@score":"1", "@id":"3730912", "info":{"authors":{"author":[{"@pid":"00/4008","text":"Colin Dixon"},{"@pid":"125/8600","text":"David Olshefski"},{"@pid":"33/2378","text":"Vinit Jain"},{"@pid":"40/5394","text":"Casimer M. DeCusatis"},{"@pid":"02/7018","text":"Wes Felter"},{"@pid":"c/JohnBCarter","text":"John B. Carter"},{"@pid":"18/6845","text":"Mohammad Banikazemi"},{"@pid":"157/1399","text":"V. Mann"},{"@pid":"69/6181","text":"John M. Tracey"},{"@pid":"86/2082","text":"Renato Recio"}]},"title":"Software defined networking to support the software defined environment.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/DixonOJDFCBMTR14","doi":"10.1147/JRD.2014.2300365","ee":"https://doi.org/10.1147/JRD.2014.2300365","url":"https://dblp.org/rec/journals/ibmrd/DixonOJDFCBMTR14"}, "url":"URL#3730912" }, { "@score":"1", "@id":"3730913", "info":{"authors":{"author":[{"@pid":"157/1434","text":"K. Duch"},{"@pid":"01/685","text":"Y. Jiang"},{"@pid":"67/2692","text":"Alexander Y. Kreinin"}]},"title":"New approaches to operational risk modeling.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/DuchJK14","doi":"10.1147/JRD.2014.2321851","ee":"https://doi.org/10.1147/JRD.2014.2321851","url":"https://dblp.org/rec/journals/ibmrd/DuchJK14"}, "url":"URL#3730913" }, { "@score":"1", "@id":"3730914", "info":{"authors":{"author":[{"@pid":"118/3402","text":"Manuel Fiorelli"},{"@pid":"98/2076","text":"Maria Teresa Pazienza"},{"@pid":"15/5031","text":"Armando Stellato"},{"@pid":"74/1970","text":"Andrea Turbati"}]},"title":"CODA: Computer-aided ontology development architecture.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/FiorelliPST14","doi":"10.1147/JRD.2014.2307518","ee":"https://doi.org/10.1147/JRD.2014.2307518","url":"https://dblp.org/rec/journals/ibmrd/FiorelliPST14"}, "url":"URL#3730914" }, { "@score":"1", "@id":"3730915", "info":{"authors":{"author":[{"@pid":"64/4944","text":"Aris Gkoulalas-Divanis"},{"@pid":"61/11344","text":"Pol Mac Aonghusa"}]},"title":"Privacy protection in open information management platforms.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/Gkoulalas-DivanisA14","doi":"10.1147/JRD.2013.2285853","ee":"https://doi.org/10.1147/JRD.2013.2285853","url":"https://dblp.org/rec/journals/ibmrd/Gkoulalas-DivanisA14"}, "url":"URL#3730915" }, { "@score":"1", "@id":"3730916", "info":{"authors":{"author":[{"@pid":"64/4944","text":"Aris Gkoulalas-Divanis"},{"@pid":"96/4724","text":"Grigorios Loukides"},{"@pid":"54/4948","text":"Jimeng Sun 0001"}]},"title":"Toward smarter healthcare: Anonymizing medical data to support research studies.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/Gkoulalas-DivanisLS14","doi":"10.1147/JRD.2013.2288173","ee":"https://doi.org/10.1147/JRD.2013.2288173","url":"https://dblp.org/rec/journals/ibmrd/Gkoulalas-DivanisLS14"}, "url":"URL#3730916" }, { "@score":"1", "@id":"3730917", "info":{"authors":{"author":[{"@pid":"32/2457","text":"John B. Guerard Jr."},{"@pid":"30/6585","text":"Harry M. Markowitz"},{"@pid":"03/11297","text":"Ganlin Xu"}]},"title":"The role of effective corporate decisions in the creation of efficient portfolios.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/GuerardMX14","doi":"10.1147/JRD.2014.2326591","ee":"https://doi.org/10.1147/JRD.2014.2326591","url":"https://dblp.org/rec/journals/ibmrd/GuerardMX14"}, "url":"URL#3730917" }, { "@score":"1", "@id":"3730918", "info":{"authors":{"author":[{"@pid":"05/1520","text":"Miao He"},{"@pid":"160/5866","text":"C. Ren"},{"@pid":"18/6324","text":"H. Zhang"}]},"title":"Intent-based recommendation for B2C e-commerce platforms.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/HeRZ14","doi":"10.1147/JRD.2014.2338091","ee":"https://doi.org/10.1147/JRD.2014.2338091","url":"https://dblp.org/rec/journals/ibmrd/HeRZ14"}, "url":"URL#3730918" }, { "@score":"1", "@id":"3730919", "info":{"authors":{"author":[{"@pid":"146/7491","text":"M. Azua Himmel"},{"@pid":"146/7540","text":"F. Grossman"}]},"title":"Security on distributed systems: Cloud security versus traditional IT.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/HimmelG14","doi":"10.1147/JRD.2013.2287591","ee":"https://doi.org/10.1147/JRD.2013.2287591","url":"https://dblp.org/rec/journals/ibmrd/HimmelG14"}, "url":"URL#3730919" }, { "@score":"1", "@id":"3730920", "info":{"authors":{"author":[{"@pid":"157/1369","text":"D. Horrall"},{"@pid":"157/1384","text":"Y. Siddiqui"}]},"title":"Evaluating risk: IBM's Country Financial Risk and Treasury Risk Scorecards.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/HorrallS14","doi":"10.1147/JRD.2014.2321072","ee":"https://doi.org/10.1147/JRD.2014.2321072","url":"https://dblp.org/rec/journals/ibmrd/HorrallS14"}, "url":"URL#3730920" }, { "@score":"1", "@id":"3730921", "info":{"authors":{"author":[{"@pid":"160/5902","text":"James Jamison"},{"@pid":"160/5896","text":"Chuck Snow"}]},"title":"An architecture for customer experience management based on the Internet of Things.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/JamisonS14","doi":"10.1147/JRD.2014.2346593","ee":"https://doi.org/10.1147/JRD.2014.2346593","url":"https://dblp.org/rec/journals/ibmrd/JamisonS14"}, "url":"URL#3730921" }, { "@score":"1", "@id":"3730922", "info":{"authors":{"author":[{"@pid":"52/3200","text":"Michael H. Kalantar"},{"@pid":"55/6217","text":"Florian Rosenberg"},{"@pid":"144/8468","text":"James Doran"},{"@pid":"16/1242","text":"Tamar Eilam"},{"@pid":"04/9980","text":"Michael Elder"},{"@pid":"05/2943","text":"Fábio Oliveira"},{"@pid":"55/4033","text":"Ed C. Snible"},{"@pid":"44/5251","text":"Tova Roth"}]},"title":"Weaver: Language and runtime for software defined environments.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/KalantarRDEEOSR14","doi":"10.1147/JRD.2014.2304865","ee":"https://doi.org/10.1147/JRD.2014.2304865","url":"https://dblp.org/rec/journals/ibmrd/KalantarRDEEOSR14"}, "url":"URL#3730922" }, { "@score":"1", "@id":"3730923", "info":{"authors":{"author":[{"@pid":"19/3646","text":"Gokul B. Kandiraju"},{"@pid":"11/4120","text":"H. Franke"},{"@pid":"157/1396","text":"M. D. Williams"},{"@pid":"28/980","text":"Malgorzata Steinder"},{"@pid":"157/1448","text":"S. M. Black"}]},"title":"Software defined infrastructures.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/KandirajuFWSB14","doi":"10.1147/JRD.2014.2298133","ee":"https://doi.org/10.1147/JRD.2014.2298133","url":"https://dblp.org/rec/journals/ibmrd/KandirajuFWSB14"}, "url":"URL#3730923" }, { "@score":"1", "@id":"3730924", "info":{"authors":{"author":[{"@pid":"69/10257","text":"Ban Kawas"},{"@pid":"124/6040","text":"Ali Koc"},{"@pid":"91/6716","text":"Marco Laumanns"},{"@pid":"31/10687","text":"Chungmok Lee"},{"@pid":"m/RaduMarinescu2","text":"Radu Marinescu 0002"},{"@pid":"72/7550","text":"Martin Mevissen"},{"@pid":"71/8655","text":"Nicole Taheri"},{"@pid":"72/3329","text":"Susara Van den Heever"},{"@pid":"21/2680","text":"Rudi Verago"}]},"title":"Unified framework and toolkit for commerce optimization under uncertainty.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/KawasKLLMMTHV14","doi":"10.1147/JRD.2014.2346071","ee":"https://doi.org/10.1147/JRD.2014.2346071","url":"https://dblp.org/rec/journals/ibmrd/KawasKLLMMTHV14"}, "url":"URL#3730924" }, { "@score":"1", "@id":"3730925", "info":{"authors":{"author":[{"@pid":"76/913","text":"Alan J. King"},{"@pid":"157/1435","text":"Aviv Orani"},{"@pid":"45/800","text":"Francis N. Parr"}]},"title":"Middleware for financial risk data aggregation.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/KingOP14","doi":"10.1147/JRD.2014.2322272","ee":"https://doi.org/10.1147/JRD.2014.2322272","url":"https://dblp.org/rec/journals/ibmrd/KingOP14"}, "url":"URL#3730925" }, { "@score":"1", "@id":"3730926", "info":{"authors":{"author":[{"@pid":"126/4680","text":"H. Kitayama"},{"@pid":"78/1238","text":"Seiji Munetoh"},{"@pid":"14/10164","text":"K. Ohnishi"},{"@pid":"19/2638","text":"Naohiko Uramoto"},{"@pid":"78/157","text":"Y. Watanabe"}]},"title":"Advanced security and privacy in connected vehicles.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/KitayamaMOUW14","doi":"10.1147/JRD.2013.2288061","ee":"https://doi.org/10.1147/JRD.2013.2288061","url":"https://dblp.org/rec/journals/ibmrd/KitayamaMOUW14"}, "url":"URL#3730926" }, { "@score":"1", "@id":"3730927", "info":{"authors":{"author":[{"@pid":"30/5849","text":"Chung-Sheng Li"},{"@pid":"256/2320","text":"Brad L. Brech"},{"@pid":"256/2255","text":"Scott Crowder"},{"@pid":"43/6432","text":"Daniel M. Dias"},{"@pid":"17/3453","text":"Hubertus Franke"},{"@pid":"04/5427","text":"Matt Hogstrom"},{"@pid":"92/6888","text":"David Lindquist"},{"@pid":"27/5135","text":"Giovanni Pacifici"},{"@pid":"58/6510","text":"Stefan Pappe"},{"@pid":"22/4004","text":"Bala Rajaraman"},{"@pid":"256/2138","text":"Josyula Rao"},{"@pid":"52/9325","text":"Radha Ratnaparkhi"},{"@pid":"14/699","text":"Rodney A. Smith"},{"@pid":"68/1075","text":"Michael D. Williams"}]},"title":"Software defined environments: An introduction.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/LiBCDFHLPPRRRSW14","doi":"10.1147/JRD.2014.2298134","ee":"https://doi.org/10.1147/JRD.2014.2298134","url":"https://dblp.org/rec/journals/ibmrd/LiBCDFHLPPRRRSW14"}, "url":"URL#3730927" }, { "@score":"1", "@id":"3730928", "info":{"authors":{"author":[{"@pid":"160/5878","text":"R. M. Lotlikar"},{"@pid":"160/5931","text":"P. N. Pachigolla"},{"@pid":"160/5868","text":"D. Miller-Davie"},{"@pid":"01/3820","text":"S. Godbole"}]},"title":"Real-time customer probing and decision support in a call center.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/LotlikarPMG14","doi":"10.1147/JRD.2014.2346659","ee":"https://doi.org/10.1147/JRD.2014.2346659","url":"https://dblp.org/rec/journals/ibmrd/LotlikarPMG14"}, "url":"URL#3730928" }, { "@score":"1", "@id":"3730929", "info":{"authors":{"author":[{"@pid":"21/2133","text":"Yingdong Lu"},{"@pid":"88/215","text":"Mayank Sharma"},{"@pid":"67/3865","text":"Mark S. Squillante"}]},"title":"Workforce management: Risk-based financial planning and capacity provisioning.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/LuSS14","doi":"10.1147/JRD.2014.2327709","ee":"https://doi.org/10.1147/JRD.2014.2327709","url":"https://dblp.org/rec/journals/ibmrd/LuSS14"}, "url":"URL#3730929" }, { "@score":"1", "@id":"3730930", "info":{"authors":{"author":[{"@pid":"95/6783","text":"Ruchi Mahindru"},{"@pid":"91/6100","text":"Ronnie Sarkar"},{"@pid":"146/7548","text":"M. Viswanathan"}]},"title":"Software defined unified monitoring and management of clouds.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/MahindruSV14","doi":"10.1147/JRD.2014.2305313","ee":"https://doi.org/10.1147/JRD.2014.2305313","url":"https://dblp.org/rec/journals/ibmrd/MahindruSV14"}, "url":"URL#3730930" }, { "@score":"1", "@id":"3730931", "info":{"authors":{"author":[{"@pid":"144/2684","text":"Helmut Mausser"},{"@pid":"91/8812","text":"Oleksandr Romanko"}]},"title":"Computing equal risk contribution portfolios.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/MausserR14","doi":"10.1147/JRD.2014.2325291","ee":"https://doi.org/10.1147/JRD.2014.2325291","url":"https://dblp.org/rec/journals/ibmrd/MausserR14"}, "url":"URL#3730931" }, { "@score":"1", "@id":"3730932", "info":{"authors":{"author":[{"@pid":"77/5478","text":"Cataldo Mega"},{"@pid":"127/0406","text":"Tim Waizenegger"},{"@pid":"80/9007","text":"David Lebutsch"},{"@pid":"10/543","text":"Stefan Schleipen"},{"@pid":"157/1426","text":"J. M. Barney"}]},"title":"Dynamic cloud service topology adaption for minimizing resources while meeting performance goals.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/MegaWLSB14","doi":"10.1147/JRD.2014.2304771","ee":"https://doi.org/10.1147/JRD.2014.2304771","url":"https://dblp.org/rec/journals/ibmrd/MegaWLSB14"}, "url":"URL#3730932" }, { "@score":"1", "@id":"3730933", "info":{"authors":{"author":[{"@pid":"11/7137","text":"Hoan Nguyen"},{"@pid":"157/1364","text":"L. Michel"},{"@pid":"t/JulieDawnThompson","text":"Julie Dawn Thompson"},{"@pid":"47/875","text":"Olivier Poch"}]},"title":"Heterogeneous biological data integration with declarative query language.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/NguyenMTP14","doi":"10.1147/JRD.2014.2309032","ee":"https://doi.org/10.1147/JRD.2014.2309032","url":"https://dblp.org/rec/journals/ibmrd/NguyenMTP14"}, "url":"URL#3730933" }, { "@score":"1", "@id":"3730934", "info":{"authors":{"author":[{"@pid":"18/2087","text":"P. O'Sullivan"},{"@pid":"42/3725","text":"G. Thompson"},{"@pid":"160/5858","text":"A. Clifford"}]},"title":"Applying data models to big data architectures.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/OSullivanTC14","doi":"10.1147/JRD.2014.2352474","ee":"https://doi.org/10.1147/JRD.2014.2352474","url":"https://dblp.org/rec/journals/ibmrd/OSullivanTC14"}, "url":"URL#3730934" }, { "@score":"1", "@id":"3730935", "info":{"authors":{"author":[{"@pid":"79/7932","text":"Diego A. Ortiz-Yepes"},{"@pid":"32/6560","text":"Reto Hermann"},{"@pid":"146/7636","text":"Hansruedi Steinauer"},{"@pid":"98/6777","text":"Peter Buhler"}]},"title":"Bringing strong authentication and transaction security to the realm of mobile devices.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/Ortiz-YepesHSB14","doi":"10.1147/JRD.2013.2287810","ee":"https://doi.org/10.1147/JRD.2013.2287810","url":"https://dblp.org/rec/journals/ibmrd/Ortiz-YepesHSB14"}, "url":"URL#3730935" }, { "@score":"1", "@id":"3730936", "info":{"authors":{"author":[{"@pid":"139/6805","text":"R. Ram"},{"@pid":"49/8726","text":"Y. Peres"}]},"title":"Online shop for integrated software, hardware, and human services.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/RamP14","doi":"10.1147/JRD.2014.2352473","ee":"https://doi.org/10.1147/JRD.2014.2352473","url":"https://dblp.org/rec/journals/ibmrd/RamP14"}, "url":"URL#3730936" }, { "@score":"1", "@id":"3730937", "info":{"authors":{"author":[{"@pid":"40/1406","text":"Jesus Rios"},{"@pid":"128/9936","text":"Konstantin Anikeev"},{"@pid":"11/5121","text":"M. J. Richard"},{"@pid":"62/429","text":"Shubir Kapoor"},{"@pid":"68/1162","text":"Bonnie K. Ray"},{"@pid":"128/9780","text":"Christian Toft-Nielsen"},{"@pid":"65/5460","text":"Dharmashankar Subramanian"},{"@pid":"16/4520","text":"Chen Jiang"},{"@pid":"00/1363","text":"Youssef Drissi"},{"@pid":"64/1049","text":"Jing Fu"}]},"title":"A framework for strategic financial risk management.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/RiosARKRTSJDF14","doi":"10.1147/JRD.2014.2320833","ee":"https://doi.org/10.1147/JRD.2014.2320833","url":"https://dblp.org/rec/journals/ibmrd/RiosARKRTSJDF14"}, "url":"URL#3730937" }, { "@score":"1", "@id":"3730938", "info":{"authors":{"author":[{"@pid":"160/5862","text":"T. Rojahn"},{"@pid":"160/5853","text":"R. Lebsack"},{"@pid":"89/2732","text":"Chris Pavlovski"}]},"title":"Toward a computing workload classifier.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/RojahnLP14","doi":"10.1147/JRD.2014.2352491","ee":"https://doi.org/10.1147/JRD.2014.2352491","url":"https://dblp.org/rec/journals/ibmrd/RojahnLP14"}, "url":"URL#3730938" }, { "@score":"1", "@id":"3730939", "info":{"authors":{"author":[{"@pid":"160/5843","text":"H. Schlenker"},{"@pid":"77/3598","text":"R. Kluge"},{"@pid":"160/5914","text":"J. Koehl"}]},"title":"Optimization of the worldwide supply chain at Continental Tires: A case study.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/SchlenkerKK14","doi":"10.1147/JRD.2014.2345934","ee":"https://doi.org/10.1147/JRD.2014.2345934","url":"https://dblp.org/rec/journals/ibmrd/SchlenkerKK14"}, "url":"URL#3730939" }, { "@score":"1", "@id":"3730940", "info":{"authors":{"author":[{"@pid":"80/391","text":"Sangeetha Seshadri"},{"@pid":"12/6086","text":"Paul Muench"},{"@pid":"91/3355","text":"Lawrence Chiu"},{"@pid":"85/4388","text":"Ioannis Koltsidas"},{"@pid":"06/7063","text":"Nikolas Ioannou"},{"@pid":"42/4809-1","text":"Robert Haas 0001"},{"@pid":"51/3710","text":"Yang Liu"},{"@pid":"28/7547","text":"Mei Mei"},{"@pid":"157/1378","text":"Stephen Blinick"}]},"title":"Software defined just-in-time caching in an enterprise storage system.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/SeshadriMCKIHLMB14","doi":"10.1147/JRD.2014.2303595","ee":"https://doi.org/10.1147/JRD.2014.2303595","url":"https://dblp.org/rec/journals/ibmrd/SeshadriMCKIHLMB14"}, "url":"URL#3730940" }, { "@score":"1", "@id":"3730941", "info":{"authors":{"author":[{"@pid":"09/5042-31","text":"Wei Sun 0031"},{"@pid":"160/5894","text":"Pavankumar Murali"},{"@pid":"27/4227","text":"Anshul Sheopuri"},{"@pid":"53/4355","text":"Yi-Min Chee"}]},"title":"Designing promotions: Consumers' surprise and perception of discounts.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/SunMSC14","doi":"10.1147/JRD.2014.2337691","ee":"https://doi.org/10.1147/JRD.2014.2337691","url":"https://dblp.org/rec/journals/ibmrd/SunMSC14"}, "url":"URL#3730941" }, { "@score":"1", "@id":"3730942", "info":{"authors":{"author":[{"@pid":"73/7515","text":"N. Sun"},{"@pid":"160/5899","text":"J. G. Morris"},{"@pid":"73/1149","text":"Jian Xu"},{"@pid":"43/5721","text":"X. Zhu"},{"@pid":"26/5903","text":"M. Xie"}]},"title":"iCARE: A framework for big data-based banking customer analytics.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/SunMXZX14","doi":"10.1147/JRD.2014.2337118","ee":"https://doi.org/10.1147/JRD.2014.2337118","url":"https://dblp.org/rec/journals/ibmrd/SunMXZX14"}, "url":"URL#3730942" }, { "@score":"1", "@id":"3730943", "info":{"authors":{"author":[{"@pid":"146/7301","text":"A. R. Szakal"},{"@pid":"146/7351","text":"K. J. Pearsall"}]},"title":"Open industry standards for mitigating risks to global supply chains.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/SzakalP14","doi":"10.1147/JRD.2013.2285605","ee":"https://doi.org/10.1147/JRD.2013.2285605","url":"https://dblp.org/rec/journals/ibmrd/SzakalP14"}, "url":"URL#3730943" }, { "@score":"1", "@id":"3730944", "info":{"authors":{"author":[{"@pid":"44/2275","text":"Rikiya Takahashi"},{"@pid":"160/5876","text":"T. Yoshizumi"},{"@pid":"81/2364","text":"Hideyuki Mizuta"},{"@pid":"88/6485","text":"Naoki Abe"},{"@pid":"140/9574","text":"Ruby L. Kennedy"},{"@pid":"140/9484","text":"Vincent J. Jeffs"},{"@pid":"46/5676","text":"Ravi Shah"},{"@pid":"48/3552","text":"Robert H. Crites"}]},"title":"Multi-period marketing-mix optimization with response spike forecasting.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/TakahashiYMAKJS14","doi":"10.1147/JRD.2014.2337131","ee":"https://doi.org/10.1147/JRD.2014.2337131","url":"https://dblp.org/rec/journals/ibmrd/TakahashiYMAKJS14"}, "url":"URL#3730944" }, { "@score":"1", "@id":"3730945", "info":{"authors":{"author":[{"@pid":"51/5215","text":"Chunhua Tian"},{"@pid":"02/5889-21","text":"Yu Wang 0021"},{"@pid":"127/8670","text":"Wen Ting Mo"},{"@pid":"160/5917","text":"F. C. Huang"},{"@pid":"30/1128","text":"Weishan Dong"},{"@pid":"49/2488","text":"Jin Huang"}]},"title":"Pre-release sales forecasting: A model-driven context feature extraction approach.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/Tian0MHDH14","doi":"10.1147/JRD.2014.2344531","ee":"https://doi.org/10.1147/JRD.2014.2344531","url":"https://dblp.org/rec/journals/ibmrd/Tian0MHDH14"}, "url":"URL#3730945" }, { "@score":"1", "@id":"3730946", "info":{"authors":{"author":[{"@pid":"157/1449","text":"G. Vernizzi"},{"@pid":"32/478","text":"Mary Yvonne Lanzerotti"},{"@pid":"157/1387","text":"J. Kujawski"},{"@pid":"157/1444","text":"Allan Weatherwax"}]},"title":"Topological constraints for E. F. Rent's work on microminiature packaging and circuitry.","venue":"IBM J. Res. Dev.","volume":"58","number":"2/3","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/VernizziLKW14","doi":"10.1147/JRD.2014.2307225","ee":"https://doi.org/10.1147/JRD.2014.2307225","url":"https://dblp.org/rec/journals/ibmrd/VernizziLKW14"}, "url":"URL#3730946" }, { "@score":"1", "@id":"3730947", "info":{"authors":{"author":[{"@pid":"146/7758","text":"Tamas Visegrady"},{"@pid":"88/2787","text":"Silvio Dragone"},{"@pid":"86/2636","text":"Michael Osborne"}]},"title":"Stateless cryptography for virtual environments.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/VisegradyDO14","doi":"10.1147/JRD.2013.2287811","ee":"https://doi.org/10.1147/JRD.2013.2287811","url":"https://dblp.org/rec/journals/ibmrd/VisegradyDO14"}, "url":"URL#3730947" }, { "@score":"1", "@id":"3730948", "info":{"authors":{"author":[{"@pid":"137/7657","text":"Alexander Vogt"},{"@pid":"157/1442","text":"E. R. Mattfeldt"},{"@pid":"86/6970","text":"Gerhard Satzger"},{"@pid":"157/1368","text":"L. Lüders"},{"@pid":"157/1360","text":"M. Piper"},{"@pid":"152/9487","text":"Oliver Gehb"},{"@pid":"06/842","text":"Wayne Jones"}]},"title":"Analytical support for predicting cost in complex service delivery environments.","venue":"IBM J. Res. Dev.","volume":"58","number":"4","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/VogtMSLPGJ14","doi":"10.1147/JRD.2014.2327301","ee":"https://doi.org/10.1147/JRD.2014.2327301","url":"https://dblp.org/rec/journals/ibmrd/VogtMSLPGJ14"}, "url":"URL#3730948" }, { "@score":"1", "@id":"3730949", "info":{"authors":{"author":[{"@pid":"28/7644","text":"Jim Whitmore"},{"@pid":"39/5806","text":"Sven Türpe"},{"@pid":"53/7871","text":"Stefan Triller"},{"@pid":"65/5908","text":"Andreas Poller"},{"@pid":"146/7623","text":"Christina Carlson"}]},"title":"Threat analysis in the software development lifecycle.","venue":"IBM J. Res. Dev.","volume":"58","number":"1","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/WhitmoreTTPC14","doi":"10.1147/JRD.2013.2288060","ee":"https://doi.org/10.1147/JRD.2013.2288060","url":"https://dblp.org/rec/journals/ibmrd/WhitmoreTTPC14"}, "url":"URL#3730949" }, { "@score":"1", "@id":"3730950", "info":{"authors":{"author":[{"@pid":"16/275","text":"Avi Yaeli"},{"@pid":"60/7514","text":"Peter Bak"},{"@pid":"34/7238","text":"Guy Feigenblat"},{"@pid":"160/5863","text":"Sima Nadler"},{"@pid":"94/4396","text":"Haggai Roitman"},{"@pid":"160/5864","text":"Gilad Saadoun"},{"@pid":"118/2705","text":"Harold J. Ship"},{"@pid":"62/6734","text":"Doron Cohen"},{"@pid":"70/8281","text":"Omri Fuchs"},{"@pid":"77/201","text":"Shila Ofek-Koifman"},{"@pid":"76/1665","text":"Tommy Sandbank"}]},"title":"Understanding customer behavior using indoor location analysis and visualization.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/YaeliBFNRSSCFOS14","doi":"10.1147/JRD.2014.2337552","ee":"https://doi.org/10.1147/JRD.2014.2337552","url":"https://dblp.org/rec/journals/ibmrd/YaeliBFNRSSCFOS14"}, "url":"URL#3730950" }, { "@score":"1", "@id":"3730951", "info":{"authors":{"author":[{"@pid":"160/0508","text":"Michael Yesudas"},{"@pid":"11/3934","text":"Shweta Gupta"},{"@pid":"52/5486","text":"H. Ramamurthy"}]},"title":"Cloud-based mobile commerce for grocery purchasing in developing countries.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/YesudasGR14","doi":"10.1147/JRD.2014.2352471","ee":"https://doi.org/10.1147/JRD.2014.2352471","url":"https://dblp.org/rec/journals/ibmrd/YesudasGR14"}, "url":"URL#3730951" }, { "@score":"1", "@id":"3730952", "info":{"authors":{"author":[{"@pid":"160/0508","text":"Michael Yesudas"},{"@pid":"160/0483","text":"Girish Menon S"},{"@pid":"21/3312","text":"V. Ramamurthy"}]},"title":"Intelligent operational dashboards for smarter commerce using big data.","venue":"IBM J. Res. Dev.","volume":"58","number":"5/6","year":"2014","type":"Journal Articles","access":"closed","key":"journals/ibmrd/YesudasSR14","doi":"10.1147/JRD.2014.2346131","ee":"https://doi.org/10.1147/JRD.2014.2346131","url":"https://dblp.org/rec/journals/ibmrd/YesudasSR14"}, "url":"URL#3730952" } ] } } } )