On discovery of soft associations with “most” fuzzy quantifier for item promotion applications Fulltext Access 29 Pages 2008
Efficient computation of volume fractions for multi-material cell complexes in a grid by slicing Fulltext Access 29 Pages 2008
Towards portable natural language interfaces to knowledge bases – The case of the ORAKEL system Fulltext Access 30 Pages 2008
Aondê: An ontology Web service for interoperability across biodiversity applications Fulltext Access 30 Pages 2008
A general model of parameterized OWA aggregation with given orness level Fulltext Access 30 Pages 2008
Adoption of information systems innovations by individuals: A study of processes involving contextual, adopter, and influencer actions Fulltext Access 30 Pages 2008
A temporal object relational SQL language with attribute timestamping in a temporal transparency environment Fulltext Access 31 Pages 2008
Messaging specifications, properties and gratifications as institutions: How messaging institutions shaped wireless service diffusion in Norway and Japan Fulltext Access 31 Pages 2008
Re-examining the effects of adding relevance information in a relevance feedback environment Fulltext Access 31 Pages 2008
User-assisted query translation for interactive cross-language information retrieval Fulltext Access 31 Pages 2008
A knowledge-based approach to manage information systems interoperability Fulltext Access 31 Pages 2008
Differential evolution with dynamic stochastic selection for constrained optimization Fulltext Access 32 Pages 2008
A catalog of architectural primitives for modeling architectural patterns Fulltext Access 32 Pages 2008
Sequence-based clustering for Web usage mining: A new experimental framework and ANN-enhanced K-means algorithm Fulltext Access 32 Pages 2008
A conceptual model for temporal data warehouses and its transformation to the ER and the object-relational models Fulltext Access 33 Pages 2008
Why do we trust new technology? A study of initial trust formation with organizational information systems Fulltext Access 33 Pages 2008
Zero, single, or multi? Genre of web pages through the users’ perspective Fulltext Access 36 Pages 2008
Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE1 and correct protocols in cyberspace Fulltext Access 37 Pages 2008
The XML Tree Model – toward an XML conceptual schema reversed from XML Schema Definition Fulltext Access 38 Pages 2008
IT compliance of industrial information systems: Technology management and industrial engineering perspective Fulltext Access 4 Pages 2007
Enhancing linear features in image data using horizontal orthogonal gradient ratios Fulltext Access 4 Pages 2007
GEODIST: A C++ program for calculating geodesic distances with a shapefile Fulltext Access 4 Pages 2007
Applying emergent ubiquitous technologies in health: The need to respond to new challenges of opportunity, expectation, and responsibility Fulltext Access 4 Pages 2007
The need to know the history of the use of digital patient data, in particular the EHR Fulltext Access 4 Pages 2007
An effort to use qualitative data analysis software for analysing think aloud data Fulltext Access 4 Pages 2007
Information Lifecycle Security Risk Assessment: A tool for closing security gaps Fulltext Access 5 Pages 2007
Experience teaching Barry Boehm's techniques in industrial and academic settings Fulltext Access 5 Pages 2007
Purposes of health identification cards and role of a secure access platform (Be-Health) in Belgium Fulltext Access 5 Pages 2007
Comprehensive management of the access to the electronic patient record: Towards trans-institutional networks Fulltext Access 5 Pages 2007
A notary archive model for secure preservation and distribution of electrically signed patient documents Fulltext Access 5 Pages 2007
An ‘Honest Broker’ mechanism to maintain privacy for patient care and academic medical research Fulltext Access 5 Pages 2007
User interpretations of future information system use: A snapshot with technological frames Fulltext Access 5 Pages 2007
The demographic bias of Email as a survey method in a pediatric emergency population Fulltext Access 5 Pages 2007
Risks due to convergence of physical security systems and information technology environments Fulltext Access 5 Pages 2007