• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

Dynamic taint propagation: Finding vulnerabilities without attacking
Fulltext Access 7 Pages 2008
“First-hit” heart attack risk calculators on the world wide web: Implications for laypersons and healthcare practitioners
Fulltext Access 8 Pages 2008
Tracking the social dimensions of RFID systems in hospitals
Fulltext Access 8 Pages 2008
Medication safety messages for patients via the web portal: The MedCheck intervention
Fulltext Access 8 Pages 2008
An effort to improve electronic health record medication list accuracy between visits: Patients’ and physicians’ response
Fulltext Access 8 Pages 2008
Reliability of diagnoses coding with ICD-10
Fulltext Access 8 Pages 2008
The role of perceptions of clinicians in their adoption of a web-based antibiotic approval system: Do perceptions translate into actions?
Fulltext Access 8 Pages 2008
Applying PRIM (Patient Rule Induction Method) and logistic regression for selecting high-risk subgroups in very elderly ICU patients
Fulltext Access 8 Pages 2008
Assessing the anticipated consequences of Computer-based Provider Order Entry at three community hospitals using an open-ended, semi-structured survey instrument
Fulltext Access 8 Pages 2008
From a conceptual problem-oriented electronic patient record model to running systems: A nationwide assessment
Fulltext Access 8 Pages 2008
Evaluation of electronic discharge summaries: A comparison of documentation in electronic and handwritten discharge summaries
Fulltext Access 8 Pages 2008
Computer-generated tailored feedback letters for smoking cessation: Theoretical and empirical variability of tailoring
Fulltext Access 8 Pages 2008
Post-coordination in practice: Evaluating compositional terminological system-based registration of ICU reasons for admission
Fulltext Access 8 Pages 2008
Integrating evidence into clinical information systems for nursing decision support
Fulltext Access 8 Pages 2008
Combining mapping and citation network analysis for a better understanding of the scientific development: The case of the absorptive capacity field
Fulltext Access 8 Pages 2008
Patients’ use of digital pens for pain assessment in advanced palliative home healthcare
Fulltext Access 8 Pages 2008
Medical text-based consultations on the Internet: A 4-year study
Fulltext Access 8 Pages 2008
The use of a CPOE log for the analysis of physicians’ behavior when responding to drug-duplication reminders
Fulltext Access 8 Pages 2008
Looking back: On relevance, probabilistic indexing and information retrieval
Fulltext Access 8 Pages 2008
An auto-indexing method for Arabic text
Fulltext Access 8 Pages 2008
Comparison of different nano- and micro-focus X-ray computed tomography set-ups for the visualization of the soil microstructure and soil organic matter
Fulltext Access 8 Pages 2008
Comparing time series using wavelet-based semblance analysis
Fulltext Access 8 Pages 2008
Programs to compute magnetization to density ratio and the magnetization inclination from 3-D gravity and magnetic anomalies
Fulltext Access 8 Pages 2008
New least-squares algorithm for model parameters estimation using self-potential anomalies
Fulltext Access 8 Pages 2008
Merging radiometric grids using histogram matching
Fulltext Access 8 Pages 2008
A new multi-platform modular software tool for wide-angle reflection/refraction seismic data processing and representation (WASPAR)
Fulltext Access 8 Pages 2008
Exploring the potential effects of emoticons
Fulltext Access 8 Pages 2008
Recommendations based on semantically enriched museum collections
Fulltext Access 8 Pages 2008
Revyu: Linking reviews and ratings into the Web of Data
Fulltext Access 8 Pages 2008
Ease of interaction plus ease of integration: Combining Web2.0 and the Semantic Web in a reviewing site
Fulltext Access 8 Pages 2008
Using the Semantic Web for linking and reusing data across Web 2.0 communities
Fulltext Access 8 Pages 2008
ZemPod: A semantic web approach to podcasting
Fulltext Access 8 Pages 2008
Value creation in information-based industries through convergence: A study of U.S. mergers and acquisitions between 1993 and 2005
Fulltext Access 8 Pages 2008
Understanding Web-based learning continuance intention: The role of subjective task value
Fulltext Access 8 Pages 2008
Exploring the relationship between software project duration and risk exposure: A cluster analysis
Fulltext Access 8 Pages 2008
Understanding knowledge management system usage antecedents: An integration of social cognitive theory and task technology fit
Fulltext Access 8 Pages 2008
Training as regulation and development: An exploration of the needs of enterprise systems users
Fulltext Access 8 Pages 2008
The potential of synchronous communication to enhance participation in online discussions: A case study of two e-learning courses
Fulltext Access 8 Pages 2008
The role of readiness for change in ERP implementation: Theoretical bases and empirical validation
Fulltext Access 8 Pages 2008
Qrtzgeotherm: An ActiveX component for the quartz solubility geothermometer
Fulltext Access 8 Pages 2008
Social network, social trust and shared goals in organizational knowledge sharing
Fulltext Access 8 Pages 2008
Factors impacting the perceived organizational support of IT employees
Fulltext Access 8 Pages 2008
Trust in consumer-to-consumer electronic commerce
Fulltext Access 8 Pages 2008
Exploring the effects of direct experience on IT use: An organizational field study
Fulltext Access 8 Pages 2008
The impacts of user review on software responsiveness: Moderating requirements uncertainty
Fulltext Access 8 Pages 2008
Entity matching in heterogeneous databases: A logistic regression approach
Fulltext Access 8 Pages 2008
The impact of software process standardization on software flexibility and project management performance: Control theory perspective
Fulltext Access 8 Pages 2008
An empirical study of the Cobb–Douglas production function properties of software development effort
Fulltext Access 8 Pages 2008
A general definition of the Leimkuhler curve
Fulltext Access 8 Pages 2008
The Reference Return Ratio
Fulltext Access 8 Pages 2008
How to detect indications of potential sources of bias in peer review: A generalized latent variable modeling approach exemplified by a gender study
Fulltext Access 8 Pages 2008
Aggregation of infinite sequences
Fulltext Access 8 Pages 2008
IAN2 : Industrial Autonomic Network Node architecture for supporting personalized network services in the industrial context
Fulltext Access 8 Pages 2008
Powerful resource discovery for Arigatoni overlay network
Fulltext Access 8 Pages 2008
Monte Carlo methods for matrix computations on the grid
Fulltext Access 8 Pages 2008
Protein secondary structure prediction using distance based classifiers
Fulltext Access 8 Pages 2008
Dependence-space-based attribute reductions in inconsistent decision information systems
Fulltext Access 8 Pages 2008
American option pricing with imprecise risk-neutral probabilities
Fulltext Access 8 Pages 2008
Bayesian networks with a logistic regression model for the conditional probabilities
Fulltext Access 8 Pages 2008
Diameter variability of cycles and tori
Fulltext Access 8 Pages 2008
Fuzzy filters and fuzzy prime filters of bounded RℓRℓ-monoids and pseudo BL-algebras
Fulltext Access 8 Pages 2008
The semiring of matrices over a finite chain
Fulltext Access 8 Pages 2008
Secure public-key encryption scheme without random oracles
Fulltext Access 8 Pages 2008
Optimal models for single-period supply chain problems with fuzzy demand
Fulltext Access 8 Pages 2008
A multiple parallel download scheme with server throughput and client bandwidth considerations for data grids
Fulltext Access 8 Pages 2008
A note on information entropy measures for vague sets and its applications
Fulltext Access 8 Pages 2008
Solution of an open problem on pseudo-Archimedean t-norms
Fulltext Access 8 Pages 2008
On representations of 2-increasing binary aggregation functions
Fulltext Access 8 Pages 2008
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Fulltext Access 8 Pages 2008
A quasi-synchronous checkpointing algorithm that prevents contention for stable storage
Fulltext Access 8 Pages 2008
Acknowledgment of Reviewers 2008
Fulltext Access 8 Pages 2008
New delay-dependent non-fragile H∞ observer-based control for continuous time-delay systems
Fulltext Access 8 Pages 2008
Convertible multi-authenticated encryption scheme
Fulltext Access 8 Pages 2008
A novel ID-based designated verifier signature scheme
Fulltext Access 8 Pages 2008
Weighted aggregation operators based on minimization
Fulltext Access 8 Pages 2008
Fuzzy approximately cubic mappings
Fulltext Access 8 Pages 2008
National e-ID card schemes: A European overview
Fulltext Access 8 Pages 2008
Predicting sea-level variations at the Cocos (Keeling) Islands with artificial neural networks
Fulltext Access 8 Pages 2008
Visualizing the ground motions of the 1906 San Francisco earthquake
Fulltext Access 8 Pages 2008
Security analysis of the full-round DDO-64 block cipher
Fulltext Access 8 Pages 2008
Software reliability prediction by soft computing techniques
Fulltext Access 8 Pages 2008
Extracting entity-relationship diagram from a table-based legacy database
Fulltext Access 8 Pages 2008
Reconciling usability and interactive system architecture using patterns
Fulltext Access 8 Pages 2008
An analysis of research topics in software engineering – 2006
Fulltext Access 8 Pages 2008
A pairing SW implementation for Smart-Cards
Fulltext Access 8 Pages 2008
Designing and evaluating interleaving decompressing and virus scanning in a stream-based mail proxy
Fulltext Access 8 Pages 2008
Security-by-contract on the .NET platform
Fulltext Access 8 Pages 2008
Re-engineering Xen internals for higher-assurance security
Fulltext Access 8 Pages 2008
Fast S-box security mechanism research based on the polymorphic cipher
Fulltext Access 8 Pages 2008
On handling insider attacks in wireless sensor networks
Fulltext Access 8 Pages 2008
MEGA: A tool for Mac OS X operating system and application forensics
Fulltext Access 8 Pages 2008
Information security management: An information security retrieval and awareness model for industry
Fulltext Access 8 Pages 2008
Practical anonymous user authentication scheme with security proof
Fulltext Access 8 Pages 2008
Critical study of neural networks in detecting intrusions
Fulltext Access 8 Pages 2008
Enterprise information security strategies
Fulltext Access 8 Pages 2008
MGF: A grid-enabled MPI library
Fulltext Access 8 Pages 2008
A framework for distributed content-based web services notification in Grid systems
Fulltext Access 8 Pages 2008
Dynamic security context management in Grid-based applications
Fulltext Access 8 Pages 2008
Solving the grid interoperability problem by P-GRADE portal at workflow level
Fulltext Access 8 Pages 2008
Grid enabled, hierarchical distributed metamodel-assisted evolutionary algorithms for aerodynamic shape optimization
Fulltext Access 8 Pages 2008
<< < 279 280 281 282 283 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities