• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

Forensic memory analysis: Files mapped in memory
Fulltext Access 6 Pages 2008
Consensus ranking – An ICT security awareness case study
Fulltext Access 6 Pages 2008
Security beliefs and barriers for novice Internet users
Fulltext Access 6 Pages 2008
Cryptanalysis of simple three-party key exchange protocol
Fulltext Access 6 Pages 2008
Leadership and justice: Increasing non participating users’ assessment of an IT through passive participation
Fulltext Access 6 Pages 2008
Determinants of successful virtual communities: Contributions from system characteristics and social factors
Fulltext Access 6 Pages 2008
Understanding information systems continuance: The case of Internet-based learning technologies
Fulltext Access 6 Pages 2008
The effects of change control and management review on software flexibility and project performance
Fulltext Access 6 Pages 2008
New product development team intelligence: Antecedents and consequences
Fulltext Access 6 Pages 2008
Building secure business applications at Microsoft
Fulltext Access 6 Pages 2008
The atmospheric factors of online storefront environment design: An empirical experiment in Taiwan
Fulltext Access 6 Pages 2008
An assessment of advanced mobile services acceptance: Contributions from TAM and diffusion theory models
Fulltext Access 6 Pages 2008
AGRIF: Adaptive grid refinement in Fortran
Fulltext Access 6 Pages 2008
Effectiveness of mobile and internet intervention in patients with obese type 2 diabetes
Fulltext Access 6 Pages 2008
A symmetry axiom for scientific impact indices
Fulltext Access 6 Pages 2008
A modification of the h-index: The hm-index accounts for multi-authored manuscripts
Fulltext Access 6 Pages 2008
The two cultures: Mashing up Web 2.0 and the Semantic Web
Fulltext Access 6 Pages 2008
A short note on algebraic T-rough sets
Fulltext Access 6 Pages 2008
Leaving a trace
Fulltext Access 6 Pages 2008
Woeginger's axiomatisation of the h-index and its relation to the g-index, the h(2)-index and the R2-index
Fulltext Access 6 Pages 2008
Future consumer mobile phone security: A case study using the data-centric security model
Fulltext Access 6 Pages 2008
Clinical information sources used by hospital doctors in Mongolia
Fulltext Access 7 Pages 2008
The impact of patient–physician web messaging on healthcare service provision
Fulltext Access 7 Pages 2008
The nature and occurrence of registration errors in the emergency department
Fulltext Access 7 Pages 2008
The risk of using the Internet as reference resource: A comparative study
Fulltext Access 7 Pages 2008
An analysis of the most cited articles in software engineering journals – 2001
Fulltext Access 7 Pages 2008
Web-based secure access from multiple patient repositories
Fulltext Access 7 Pages 2008
Interruptions in a level one trauma center: A case study
Fulltext Access 7 Pages 2008
New frontiers for health information systems using Epi Info in developing countries: Structured application framework for Epi Info (SAFE)
Fulltext Access 7 Pages 2008
Cost-effectiveness of telemonitoring for high-risk pregnant women
Fulltext Access 7 Pages 2008
The use of health information technology in seven nations
Fulltext Access 7 Pages 2008
A web-based patient education system and self-help group in Persian language for inflammatory bowel disease patients
Fulltext Access 7 Pages 2008
Predicting computerized physician order entry system adoption in US hospitals: Can the federal mandate be met?
Fulltext Access 7 Pages 2008
Health data quality improvement by comparing administrative medical data and billing data
Fulltext Access 7 Pages 2008
Modeling the Arden Syntax for medical decisions in XML
Fulltext Access 7 Pages 2008
On test collections for adaptive information retrieval
Fulltext Access 7 Pages 2008
Moderating effects of Job Relevance and Experience on mobile wireless technology acceptance: Adoption of a smartphone by individuals
Fulltext Access 7 Pages 2008
Optimal reciprocal access pricing and collusion
Fulltext Access 7 Pages 2008
FOAFing the music: Bridging the semantic gap in music recommendation
Fulltext Access 7 Pages 2008
Semantic annotation and search of cultural-heritage collections: The MultimediaN E-Culture demonstrator
Fulltext Access 7 Pages 2008
hGRDDL: Bridging microformats and RDFa
Fulltext Access 7 Pages 2008
Metcalfe's law, Web 2.0, and the Semantic Web
Fulltext Access 7 Pages 2008
A note on an experimental study of DSS and forecasting exponential growth
Fulltext Access 7 Pages 2008
Organizational competence for harnessing IT: A case study
Fulltext Access 7 Pages 2008
Perceptions and use of electronic media: Testing the relationship between organizational interpretation differences and media richness
Fulltext Access 7 Pages 2008
A systematic approach for improving the quality of official statistics: Case of Korean information and telecommunication industry
Fulltext Access 7 Pages 2008
On the relationship between the structural and socioacademic communities of a coauthorship network
Fulltext Access 7 Pages 2008
Internet messaging: An examination of the impact of attitudinal, normative, and control belief systems
Fulltext Access 7 Pages 2008
Inter-organizational relationships and the flow of information through value chains
Fulltext Access 7 Pages 2008
Measuring e-government readiness
Fulltext Access 7 Pages 2008
A study of B2B e-market in China: E-commerce process perspective
Fulltext Access 7 Pages 2008
A smooth transition from serial to parallel processing in the industrial petroleum system modeling package PetroMod
Fulltext Access 7 Pages 2008
Dependent uncertain ordered weighted aggregation operators
Fulltext Access 7 Pages 2008
Multi-sensor optimal fusion fixed-interval Kalman smoothers
Fulltext Access 7 Pages 2008
A rational, successive g-index applied to economics departments in Ireland
Fulltext Access 7 Pages 2008
De Finetti’s contribution to the theory of random functions
Fulltext Access 7 Pages 2008
Predicting the types of file fragments
Fulltext Access 7 Pages 2008
Efficient multi-server authentication scheme based on one-way hash function without verification table
Fulltext Access 7 Pages 2008
SSL/TLS session-aware user authentication revisited
Fulltext Access 7 Pages 2008
Macroeconomics based Grid resource allocation
Fulltext Access 7 Pages 2008
A gradient-based reinforcement learning approach to dynamic pricing in partially-observable environments
Fulltext Access 7 Pages 2008
Semantic-supported and agent-based decentralized grid resource discovery
Fulltext Access 7 Pages 2008
GECEM: A portal-based Grid application for computational electromagnetics
Fulltext Access 7 Pages 2008
Interactive videostreaming visualization on grids
Fulltext Access 7 Pages 2008
Making the best of a bad situation: Prioritized storage management in GEMS
Fulltext Access 7 Pages 2008
A parallel method for large sparse generalized eigenvalue problems using a GridRPC system
Fulltext Access 7 Pages 2008
Fuzzy Chebyshev type inequality
Fulltext Access 7 Pages 2008
Forensic analysis of the Windows registry in memory
Fulltext Access 7 Pages 2008
Fuzzy integrals and linearity
Fulltext Access 7 Pages 2008
Least-square method to priority of the fuzzy preference relations with incomplete information
Fulltext Access 7 Pages 2008
A non-symbolic implementation of abdominal pain estimation in childhood
Fulltext Access 7 Pages 2008
Results on rotation symmetric polynomials over GF(p)
Fulltext Access 7 Pages 2008
New measures of weighted fuzzy entropy and their applications for the study of maximum weighted fuzzy entropy principle
Fulltext Access 7 Pages 2008
Random weighting estimation of parameters in generalized Gaussian distribution
Fulltext Access 7 Pages 2008
On the linear complexity of some new q-ary sequences
Fulltext Access 7 Pages 2008
The theoretical foundations of statistical learning theory based on fuzzy number samples
Fulltext Access 7 Pages 2008
Some results of weighted quasi-arithmetic mean of continuous triangular norms
Fulltext Access 7 Pages 2008
Optimal companding vector quantization for circularly symmetric sources
Fulltext Access 7 Pages 2008
Segmented software cost estimation models based on fuzzy clustering
Fulltext Access 7 Pages 2008
FMet—an integrated framework for Meteosat data processing for operational scientific applications
Fulltext Access 7 Pages 2008
MRQP: A windows-based mixed-language program for mineral resource quantitative prediction
Fulltext Access 7 Pages 2008
Interobl: An interactive software tool for displaying and scaling oblique ionograms
Fulltext Access 7 Pages 2008
Quo Vadis computer science: From Turing to personal computer, personal content and collective intelligence
Fulltext Access 7 Pages 2008
DeCompactionTool: Software for subsidence analysis including statistical error quantification
Fulltext Access 7 Pages 2008
Volume and surface-area measurements using tomography, with an example from the Brenham pallasite meteorite
Fulltext Access 7 Pages 2008
FORTRAN codes to implement enhanced local wave number technique to determine the depth and location and shape of the causative source using magnetic anomaly
Fulltext Access 7 Pages 2008
Characterization of influence zones of simulated droughts and floods of water bodies in a floodplain
Fulltext Access 7 Pages 2008
Non-singular expressions for the vector and the gradient tensor of gravitation in a geocentric spherical frame
Fulltext Access 7 Pages 2008
Bidder-anonymous English auction scheme with privacy and public verifiability
Fulltext Access 7 Pages 2008
Geostatistics with the Matern semivariogram model: A library of computer programs for inference, kriging and simulation
Fulltext Access 7 Pages 2008
White and grey-box verification and validation approaches for safety- and security-critical software systems
Fulltext Access 7 Pages 2008
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774.1 Do you know who I am?
Fulltext Access 7 Pages 2008
Insights on identity documents based on the Belgian case study
Fulltext Access 7 Pages 2008
Secure authenticated group key agreement protocol in the MANET environment
Fulltext Access 7 Pages 2008
New mutual agreement protocol to secure mobile RFID-enabled devices
Fulltext Access 7 Pages 2008
Information Security management: A human challenge?
Fulltext Access 7 Pages 2008
An overall assessment of Mobile Internal Acquisition Tool
Fulltext Access 7 Pages 2008
Automated computer forensics training in a virtualized environment
Fulltext Access 7 Pages 2008
Using the HFS+ journal for deleted file recovery
Fulltext Access 7 Pages 2008
The impact of Microsoft Windows pool allocation strategies on memory forensics
Fulltext Access 7 Pages 2008
<< < 278 279 280 281 282 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities