• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

A predictive approach for the efficient distribution of agent-based systems on a hybrid-cloud
Fulltext Access 44 Pages 2018
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things
Fulltext Access 44 Pages 2018
An adaptive multi-population differential artificial bee colony algorithm for many-objective service composition in cloud manufacturing
Fulltext Access 44 Pages 2018
A machine learning based approach to identify protected health information in Chinese clinical text
Fulltext Access 44 Pages 2018
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
Fulltext Access 44 Pages 2018
An approach for optimized feature selection in large-scale software product lines
Fulltext Access 45 Pages 2018
Feature selection based on composition of rough sets induced by feature granulation
Fulltext Access 45 Pages 2018
Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment
Fulltext Access 45 Pages 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems
Fulltext Access 45 Pages 2018
A systematic review of fuzzing techniques
Fulltext Access 45 Pages 2018
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition
Fulltext Access 45 Pages 2018
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Fulltext Access 45 Pages 2018
Gamification in software engineering education: A systematic mapping
Fulltext Access 45 Pages 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
Fulltext Access 45 Pages 2018
Exploring the usefulness of unlabelled test cases in software fault localization
Fulltext Access 45 Pages 2018
Investigating the effect of adding nanoparticles to the blood flow in presence of magnetic field in a porous blood arterial
Fulltext Access 45 Pages 2018
IT-enabled knowledge ambidexterity and innovation performance in small U.S. firms: The moderator role of social media capability
Fulltext Access 45 Pages 2018
Early detection of Parkinson's disease through patient questionnaire and predictive modelling
Fulltext Access 45 Pages 2018
Using the elaboration likelihood model to examine online persuasion through website design
Fulltext Access 45 Pages 2018
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
Fulltext Access 45 Pages 2018
A multi-target approach to estimate software vulnerability characteristics and severity scores
Fulltext Access 45 Pages 2018
Design and simulation of the emergent behavior of small drones swarming for distributed target localization
Fulltext Access 45 Pages 2018
An ordinal consistency-based group decision making process with probabilistic linguistic preference relation
Fulltext Access 45 Pages 2018
A decision maxim for efficient task realization within analytical network infrastructures
Fulltext Access 46 Pages 2018
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Fulltext Access 46 Pages 2018
Secure provenance using an authenticated data structure approach
Fulltext Access 46 Pages 2018
Investigating the impact of fault data completeness over time on predicting class fault-proneness
Fulltext Access 46 Pages 2018
Lessoning travelers' motivating behavior for a growing phenomenon in Taiwan by an advanced hybrid object-oriented hierarchical model
Fulltext Access 46 Pages 2018
Adaptive Pareto-based approach for geo-ontology matching
Fulltext Access 46 Pages 2018
Privacy-preserving personal data operation on mobile cloud-Chances and challenges over advanced persistent threat
Fulltext Access 46 Pages 2018
Pattern graph tracking-based stock price prediction using big data
Fulltext Access 46 Pages 2018
Cloud provider capacity augmentation through automated resource bartering
Fulltext Access 46 Pages 2018
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model
Fulltext Access 46 Pages 2018
A cloud-based remote sensing data production system
Fulltext Access 46 Pages 2018
Security-oriented opportunistic data forwarding in Mobile Social Networks
Fulltext Access 46 Pages 2018
A multi-temporal framework for high-level activity analysis: Violent event detection in visual surveillance
Fulltext Access 46 Pages 2018
Using behavioral features in tablet-based auditory emotion recognition studies
Fulltext Access 46 Pages 2018
Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications
Fulltext Access 46 Pages 2018
A scalable framework for cross-lingual authorship identification
Fulltext Access 46 Pages 2018
Unsupervised learning by cluster quality optimization
Fulltext Access 47 Pages 2018
Strong continuous non-malleable encoding schemes with tamper-detection
Fulltext Access 47 Pages 2018
How do we efficiently generate high-resolution hydraulic models at large numbers of riverine reaches?
Fulltext Access 47 Pages 2018
Molecular dynamics simulation approach to explore atomistic molecular mechanism of peroxidase activity of apoptotic cytochrome c mutants
Fulltext Access 47 Pages 2018
Social learning differential evolution
Fulltext Access 47 Pages 2018
Providing recommendations in social networks by integrating local and global reputation
Fulltext Access 47 Pages 2018
Cross project defect prediction using class distribution estimation and oversampling
Fulltext Access 47 Pages 2018
Scalable approximate query tracking over highly distributed data streams with tunable accuracy guarantees
Fulltext Access 47 Pages 2018
A systematic review of requirements change management
Fulltext Access 47 Pages 2018
The role of social media in enhancing guanxi and perceived effectiveness of E-commerce institutional mechanisms in online marketplace
Fulltext Access 47 Pages 2018
Parallel algorithms for the automated discovery of declarative process models
Fulltext Access 47 Pages 2018
Dynamic skipping and blocking, dead path elimination for cyclic workflows, and a local semantics for inclusive gateways
Fulltext Access 47 Pages 2018
Laboratory testing in primary care: A systematic review of health IT impacts
Fulltext Access 48 Pages 2018
Differential evolution with individual-dependent topology adaptation
Fulltext Access 48 Pages 2018
Genetic algorithms for hyperparameter optimization in predictive business process monitoring
Fulltext Access 48 Pages 2018
Across Neighborhood Search algorithm: A comprehensive analysis
Fulltext Access 48 Pages 2018
Nearest close friend search in geo-social networks
Fulltext Access 48 Pages 2018
Computational methods and optimizations for containment and complementarity in web data cubes
Fulltext Access 48 Pages 2018
Adaptive composition in dynamic service environments
Fulltext Access 48 Pages 2018
Distributed nearest neighbor classification for large-scale multi-label data on spark
Fulltext Access 49 Pages 2018
Lossy compression approach to subspace clustering
Fulltext Access 49 Pages 2018
Induction of classification rules by Gini-index based rule generation
Fulltext Access 49 Pages 2018
Building an automotive security assurance case using systematic security evaluations
Fulltext Access 49 Pages 2018
Do android developers neglect error handling? a maintenance-Centric study on the relationship between android abstractions and uncaught exceptions
Fulltext Access 49 Pages 2018
Evaluation of transaction authentication methods for online banking
Fulltext Access 49 Pages 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
Fulltext Access 49 Pages 2018
Adaptive generation of challenging scenarios for testing and evaluation of autonomous vehicles
Fulltext Access 49 Pages 2018
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
Fulltext Access 49 Pages 2018
Security-by-design in multi-cloud applications: An optimization approach
Fulltext Access 49 Pages 2018
Distinguishing between facts and opinions for sentiment analysis: Survey and challenges
Fulltext Access 50 Pages 2018
Cloud service evaluation method-based Multi-Criteria Decision-Making: A systematic literature review
Fulltext Access 50 Pages 2018
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis
Fulltext Access 50 Pages 2018
Identification of geochemical anomalies through combined sequential Gaussian simulation and grid-based local singularity analysis
Fulltext Access 50 Pages 2018
Linking data and process perspectives for conformance analysis
Fulltext Access 50 Pages 2018
Efficient detection and validation of atomicity violations in concurrent programs
Fulltext Access 50 Pages 2018
The impacts of techniques, programs and tests on automated program repair: An empirical study
Fulltext Access 50 Pages 2018
On the implementation of dynamic software product lines: An exploratory study
Fulltext Access 51 Pages 2018
Feature interaction in software product line engineering: A systematic mapping study
Fulltext Access 51 Pages 2018
Sources and impacts of social influence from online anonymous user reviews
Fulltext Access 51 Pages 2018
A distributed approach to compliance monitoring of business process event streams
Fulltext Access 51 Pages 2018
What motivates health information exchange in social media? The roles of the social cognitive theory and perceived interactivity
Fulltext Access 51 Pages 2018
System 1 and System 2 cognition in the decision to adopt and use a new technology
Fulltext Access 51 Pages 2018
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning
Fulltext Access 52 Pages 2018
A systematic mapping study on text analysis techniques in software architecture
Fulltext Access 52 Pages 2018
Localizing multiple software faults based on evolution algorithm
Fulltext Access 52 Pages 2018
Are there any relationships between technology and cultural values? A country-level trend study of the association between information communication technology and cultural values
Fulltext Access 52 Pages 2018
A visual analytics system to support tax evasion discovery
Fulltext Access 52 Pages 2018
Software startup engineering: A systematic mapping study
Fulltext Access 52 Pages 2018
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Fulltext Access 52 Pages 2018
From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world
Fulltext Access 52 Pages 2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
Fulltext Access 53 Pages 2018
Revealing community structures by ensemble clustering using group diffusion
Fulltext Access 53 Pages 2018
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
Fulltext Access 53 Pages 2018
On the relevance of a business constraint to an event log
Fulltext Access 53 Pages 2018
Regional ICT access and entrepreneurship: Evidence from China
Fulltext Access 53 Pages 2018
Contextualizing spectrum-based fault localization
Fulltext Access 53 Pages 2018
Software metrics thresholds calculation techniques to predict fault-proneness: An empirical comparison
Fulltext Access 53 Pages 2018
A Bayesian networks-based approach to assess and improve the teamwork quality of agile teams
Fulltext Access 53 Pages 2018
An exponential-type kernel robust regression model for interval-valued variables
Fulltext Access 53 Pages 2018
Reusing empirical knowledge during cloud computing adoption
Fulltext Access 53 Pages 2018
Constraint verification failure recovery in web service composition
Fulltext Access 53 Pages 2018
<< < 25 26 27 28 29 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities