• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

FCLOS: A client–server architecture for mobile OLAP
Fulltext Access 29 Pages 2009
Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture
Fulltext Access 29 Pages 2009
A reconstruction algorithm for the essential graph
Fulltext Access 29 Pages 2009
Using semantic components to search for domain-specific documents: An evaluation from the system perspective and the user perspective
Fulltext Access 29 Pages 2009
Knowledge discovery from imbalanced and noisy data
Fulltext Access 30 Pages 2009
Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark
Fulltext Access 30 Pages 2009
Automated compilation of Object-Oriented Probabilistic Relational Models
Fulltext Access 30 Pages 2009
On the relationship between workflow models and document types
Fulltext Access 31 Pages 2009
An experimental study on the applicability of evolutionary algorithms to craniofacial superimposition in forensic identification
Fulltext Access 31 Pages 2009
Efficient algorithms for incremental maintenance of closed sequential patterns in large databases
Fulltext Access 39 Pages 2009
Editorial
Fulltext Access 4 Pages 2008
An assessment of systems and software engineering scholars and institutions (2001–2005)
Fulltext Access 4 Pages 2008
A private path to security
Fulltext Access 4 Pages 2008
The right tools for the job
Fulltext Access 4 Pages 2008
Pathway to maturity
Fulltext Access 4 Pages 2008
Getting on the board
Fulltext Access 4 Pages 2008
Hiring, firing, conspiring
Fulltext Access 4 Pages 2008
The right medicine
Fulltext Access 4 Pages 2008
Financial exposure
Fulltext Access 4 Pages 2008
More than meets the eye
Fulltext Access 4 Pages 2008
The price of love
Fulltext Access 4 Pages 2008
Complying to a false sense of security
Fulltext Access 4 Pages 2008
Putting money where your mouth is
Fulltext Access 4 Pages 2008
When two become one
Fulltext Access 4 Pages 2008
Protecting what matters
Fulltext Access 4 Pages 2008
Premium pricing
Fulltext Access 4 Pages 2008
A little less conversation, a little more security please
Fulltext Access 4 Pages 2008
Everything as standard
Fulltext Access 4 Pages 2008
Recent advances in preserving privacy when mining data
Fulltext Access 4 Pages 2008
Translating the Foundational Model of Anatomy into OWL
Fulltext Access 4 Pages 2008
List of Reviewers 2006-2007
Fulltext Access 4 Pages 2008
List of Reviewers
Fulltext Access 4 Pages 2008
Author Index to Volume 45
Fulltext Access 4 Pages 2008
Subject Index to volume 44
Fulltext Access 4 Pages 2008
Author Index to volume 44
Fulltext Access 4 Pages 2008
Subject index to volume 45
Fulltext Access 4 Pages 2008
What do software architects really do?
Fulltext Access 4 Pages 2008
Another year, another milestone
Fulltext Access 4 Pages 2008
ID document personalisation
Fulltext Access 4 Pages 2008
In Brief
Fulltext Access 4 Pages 2008
Web information fusion: A review of the state of the art
Fulltext Access 4 Pages 2008
Some comments on the journal weighted impact factor proposed by Habibzadeh and Yadollahie
Fulltext Access 4 Pages 2008
Honor List of Reviewers for Information Processing & Management June 2006 - December 2007
Fulltext Access 4 Pages 2008
Evaluating exploratory search systems
Fulltext Access 4 Pages 2008
Company Index
Fulltext Access 4 Pages 2008
Recovering erased digital evidence from CD-RW discs in a child exploitation investigation
Fulltext Access 4 Pages 2008
Through Hell and high water
Fulltext Access 4 Pages 2008
Batten down the hatches
Fulltext Access 4 Pages 2008
Efficient identity-based RSA multisignatures
Fulltext Access 4 Pages 2008
How to get ahead in infosec
Fulltext Access 4 Pages 2008
Someone's got to pay
Fulltext Access 4 Pages 2008
RFID: Coming to a town near you
Fulltext Access 4 Pages 2008
Coughs and sneezes spread diseases
Fulltext Access 4 Pages 2008
Politically speaking
Fulltext Access 4 Pages 2008
Out of sight, out of mind
Fulltext Access 4 Pages 2008
Strength in numbers
Fulltext Access 4 Pages 2008
Giving way to outbound traffic
Fulltext Access 4 Pages 2008
Catch me if you can
Fulltext Access 4 Pages 2008
Generalized rough sets based on reflexive and transitive relations
Fulltext Access 4 Pages 2008
An attack on a payment scheme
Fulltext Access 4 Pages 2008
ISMS insider intrusion prevention and detection
Fulltext Access 4 Pages 2008
Secure software development: Why the development world awoke to the challenge
Fulltext Access 4 Pages 2008
In brief
Fulltext Access 5 Pages 2008
In Brief
Fulltext Access 5 Pages 2008
Using JPEG quantization tables to identify imagery processed by software
Fulltext Access 5 Pages 2008
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors
Fulltext Access 5 Pages 2008
In Brief
Fulltext Access 5 Pages 2008
In Brief
Fulltext Access 5 Pages 2008
In brief
Fulltext Access 5 Pages 2008
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Fulltext Access 5 Pages 2008
In brief
Fulltext Access 5 Pages 2008
In brief
Fulltext Access 5 Pages 2008
Dynamic models for computer viruses
Fulltext Access 5 Pages 2008
The Open Run-Time Environment (OpenRTE): A transparent multicluster environment for high-performance computing
Fulltext Access 5 Pages 2008
Author index to volume 45
Fulltext Access 5 Pages 2008
A generalization of additive generator of triangular norms
Fulltext Access 5 Pages 2008
Robustness of star graph network under link failure
Fulltext Access 5 Pages 2008
The re-inventing Valley
Fulltext Access 5 Pages 2008
Far from Perfect
Fulltext Access 5 Pages 2008
Identity management of e-ID, privacy and security in Europe. A human rights view
Fulltext Access 5 Pages 2008
Catching the malicious insider
Fulltext Access 5 Pages 2008
Music piracy born out of a ‘something for nothing’ society
Fulltext Access 5 Pages 2008
Assessing the ‘insider–outsider threat’ duality in the context of the development of public–private partnerships delivering ‘choice’ in healthcare services: A sociomaterial critique
Fulltext Access 5 Pages 2008
Look after your heart
Fulltext Access 5 Pages 2008
Why and how can human-related measures support software development processes?
Fulltext Access 5 Pages 2008
Give us this day our UTM
Fulltext Access 5 Pages 2008
In Brief
Fulltext Access 5 Pages 2008
A Visual Basic program to plot sediment grain-size data on ternary diagrams
Fulltext Access 5 Pages 2008
Do general practitioners change how they use the computer during consultations with a significant psychological component?
Fulltext Access 5 Pages 2008
An effective computerized reminder for contact isolation of patients colonized or infected with resistant organisms
Fulltext Access 5 Pages 2008
An axiomatic analysis of Egghe’s g-index
Fulltext Access 5 Pages 2008
Education, education, education
Fulltext Access 5 Pages 2008
Some comments on “The estimation of lost multi-copy documents: A new type of informetrics theory” by Egghe and Proot
Fulltext Access 5 Pages 2008
High-speed search using Tarari content processor in digital forensics
Fulltext Access 5 Pages 2008
A novel similarity based quality metric for image fusion
Fulltext Access 5 Pages 2008
Collaborative information seeking: The combined activity of information seeking and collaborative grounding
Fulltext Access 6 Pages 2008
Computerizing medical records in Japan
Fulltext Access 6 Pages 2008
The extreme points of the set of belief measures
Fulltext Access 6 Pages 2008
Note on “Numerical solutions of fuzzy differential equations by predictor–corrector method”
Fulltext Access 6 Pages 2008
A note on fibered projective plane geometry
Fulltext Access 6 Pages 2008
<< < 277 278 279 280 281 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities