Alan Wang 王刚
Alan Wang 王刚
Professor in Business Information Technology, Pamplin College of Business, Virginia Tech
Email verificata su - Home page
Citata da
Citata da
Crime data mining: a general framework and some examples
H Chen, W Chung, JJ Xu, G Wang, Y Qin, M Chau
Computer 37 (4), 50-56, 2004
Automatic identification of different types of welding defects in radiographic images
G Wang, TW Liao
Ndt & E International 35 (8), 519-528, 2002
Understanding the determinants of online review helpfulness: A meta-analytic investigation
H Hong, D Xu, GA Wang, W Fan
Decision Support Systems 102, 1-11, 2017
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining …
H Chen, H Atabakhsh, JJ Xu, AG Wang, B Marshall, S Kaza, LC Tseng, ...
Proceedings of the 2005 national conference on Digital government research …, 2005
Vehicle defect discovery from social media
AS Abrahams, J Jiao, GA Wang, W Fan
Decision Support Systems, 2012
ExpertRank: A topic-aware expert finding algorithm for online knowledge communities
GA Wang, J Jiao, AS Abrahams, W Fan, Z Zhang
Decision Support Systems 54 (3), 1442-1451, 2013
The impact of channel integration on consumer responses in omni-channel retailing: The mediating effect of consumer empowerment
M Zhang, C Ren, GA Wang, Z He
Electronic Commerce Research and Applications 28, 181-193, 2018
An integrated text analytic framework for product defect discovery
AS Abrahams, W Fan, GA Wang, ZJ Zhang, J Jiao
Production and Operations Management 24 (6), 975-990, 2015
Automatically detecting deceptive criminal identities
G Wang, H Chen, H Atabakhsh
Communications of the ACM 47 (3), 70-76, 2004
Project description and crowdfunding success: an exploratory study
MJ Zhou, B Lu, WP Fan, GA Wang
Information Systems Frontiers 20 (2), 259-274, 2018
Crime data mining: an overview and case studies
H Chen, W Chung, Y Qin, M Chau, JJ Xu, G Wang, R Zheng, H Atabakhsh
Proceedings of the 2003 annual national conference on Digital government …, 2003
Social media adoption and corporate disclosure
M Zhou, L Lei, J Wang, W Fan, AG Wang
Journal of Information Systems 29 (2), 23-50, 2015
What's buzzing in the blizzard of buzz? Automotive component isolation in social media postings
AS Abrahams, J Jiao, W Fan, GA Wang, Z Zhang
Decision Support Systems 55 (4), 871-882, 2013
Measuring Customer Agility from Online Reviews Using Big Data Text Analytics
S Zhou, Z Qiao, Q Du, GA Wang, W Fan, X Yan
Journal of Management Information Systems 35 (2), 510-539, 2018
Intelligence and security informatics
M Wang, XZH Chen, DZW Mao
Pacific Asia Workshop (PAISI), 2011
Intelligence and Security Informatics
MCGA Wang, XZH Chen, DZW Mao
Intelligence and security informatics
HCFY Wang, CCYD Zeng, MCK Chang
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings
M Chau, WT Yue, GA Wang, H Chen
Springer, 2012
Automatically detecting criminal identity deception: an adaptive detection algorithm
GA Wang, H Chen, JJ Xu, H Atabakhsh
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
M Chau, GA Wang, WT Yue, H Chen
Springer-Verlag, 2012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20