• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

Business process management: Where business processes and web services meet
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
SwetoDblp ontology of Computer Science publications
Fulltext Access 5 Pages 2007
Web Authoring for Accessibility (WAfA)
Fulltext Access 5 Pages 2007
In brief
Fulltext Access 5 Pages 2007
Acceptance and cognitive load in a clinical setting of a novel device allowing natural real-time data acquisition
Fulltext Access 6 Pages 2007
Implementing security in a distributed web-based EHCR
Fulltext Access 6 Pages 2007
Investigating risk exposure in e-health systems
Fulltext Access 6 Pages 2007
Comparing approaches for advanced e-health security infrastructures
Fulltext Access 6 Pages 2007
Information governance in NHS's NPfIT: A case for policy specification
Fulltext Access 6 Pages 2007
Educating 10,000 informaticians by 2010: The AMIA 10 × 10 program
Fulltext Access 6 Pages 2007
An Internet supported workflow for the publication process in UMVF (French Virtual Medical University)
Fulltext Access 6 Pages 2007
Doc’UMVF: Two search tools to provide quality-controlled teaching resources in French to students and teachers
Fulltext Access 6 Pages 2007
The RAFT network: 5 years of distance continuing medical education and tele-consultations over the Internet in French-speaking Africa
Fulltext Access 6 Pages 2007
Patient-directed intelligent and interactive computer medical history-gathering systems: A utility and feasibility study in the emergency department
Fulltext Access 6 Pages 2007
IT support for clinical pathways—Lessons learned
Fulltext Access 6 Pages 2007
Modeling and analysis of software aging and software failure
Fulltext Access 6 Pages 2007
Unintended transformations of clinical relations with a computerized physician order entry system
Fulltext Access 6 Pages 2007
Putting the technical back into socio-technical systems research
Fulltext Access 6 Pages 2007
Cross-cultural factors necessary to enable design of flexible consumer health informatics systems (CHIS)
Fulltext Access 6 Pages 2007
Emergent CSCW systems: The resolution and bandwidth of workplaces
Fulltext Access 6 Pages 2007
Design and implementation of an ICU incident registry
Fulltext Access 6 Pages 2007
GALEN based formal representation of ICD10
Fulltext Access 6 Pages 2007
3LGM2-Modeling to support management of health information systems
Fulltext Access 6 Pages 2007
Improving pathway compliance and clinician performance by using information technology
Fulltext Access 6 Pages 2007
Automatic lexeme acquisition for a multilingual medical subword thesaurus
Fulltext Access 6 Pages 2007
Using argumentation to extract key sentences from biomedical abstracts
Fulltext Access 6 Pages 2007
Towards patient-related information needs
Fulltext Access 6 Pages 2007
Encoding a clinical practice guideline using guideline interchange format: A case study of a depression screening and management guideline
Fulltext Access 6 Pages 2007
On the behavior of journal impact factor rank-order distribution
Fulltext Access 6 Pages 2007
The influence of missing publications on the Hirsch index
Fulltext Access 6 Pages 2007
A systematic analysis of Hirsch-type indices for journals
Fulltext Access 6 Pages 2007
Subject index to volume 43
Fulltext Access 6 Pages 2007
Note on supply chain integration in vendor-managed inventory
Fulltext Access 6 Pages 2007
Cost orientation and xDSL services: Retail-minus vs. LRAIC
Fulltext Access 6 Pages 2007
The When-Who-How analysis of defects for improving the quality control process
Fulltext Access 6 Pages 2007
Some issues in privacy data management
Fulltext Access 6 Pages 2007
The data building blocks of the enterprise architect
Fulltext Access 6 Pages 2007
Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags
Fulltext Access 6 Pages 2007
Using every part of the buffalo in Windows memory analysis
Fulltext Access 6 Pages 2007
Tackling the U3 trend with computer forensics
Fulltext Access 6 Pages 2007
Modeling and analyzing the spread of active worms based on P2P systems
Fulltext Access 6 Pages 2007
Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences
Fulltext Access 6 Pages 2007
Mining TCP/IP packets to detect stepping-stone intrusion
Fulltext Access 6 Pages 2007
Information security in networkable Windows-based operating system devices: Challenges and solutions
Fulltext Access 6 Pages 2007
A clustering method to distribute a database on a grid
Fulltext Access 6 Pages 2007
Byte-code scheduling of Java programs with branches for desktop grid
Fulltext Access 6 Pages 2007
The Maple package SyNRAC and its application to robust control design
Fulltext Access 6 Pages 2007
Web framework with Java and XML in multi-tiers for productivity
Fulltext Access 6 Pages 2007
Grid Services Base Library: A high-level, procedural application programming interface for writing Globus-based Grid services
Fulltext Access 6 Pages 2007
Design and analysis of a load balancing strategy in Data Grids
Fulltext Access 6 Pages 2007
Using ontologies for preprocessing and mining spectra data on the Grid
Fulltext Access 6 Pages 2007
Design and implementation of a data mining grid-aware architecture
Fulltext Access 6 Pages 2007
A novel deniable authentication protocol using generalized ElGamal signature scheme
Fulltext Access 6 Pages 2007
Linearly many faults in Cayley graphs generated by transposition trees
Fulltext Access 6 Pages 2007
A note on variable threshold concept lattices: Threshold-based operators are reducible to classical concept-forming operators
Fulltext Access 6 Pages 2007
The interval-merging problem
Fulltext Access 6 Pages 2007
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results
Fulltext Access 6 Pages 2007
Honor List of Referees for Information Processing & Management October 2004-May 2006
Fulltext Access 6 Pages 2007
Older versions of the ROUGEeval summarization evaluation system were easier to fool
Fulltext Access 6 Pages 2007
Adapting molar data (without density) for molal models
Fulltext Access 6 Pages 2007
File Marshal: Automatic extraction of peer-to-peer data
Fulltext Access 6 Pages 2007
Application of the Mohid-2D model to a mesotidal temperate coastal lagoon
Fulltext Access 6 Pages 2007
Improvement of Yang et al.’s threshold proxy signature scheme
Fulltext Access 6 Pages 2007
Impact and contributions of MBASE on software engineering graduate courses
Fulltext Access 6 Pages 2007
An industry born of necessity
Fulltext Access 6 Pages 2007
Can CLI be trusted?
Fulltext Access 6 Pages 2007
A graphical user interface for particle-in-cell finite element analysis of lithospheric deformation and mantle convection in two dimensions
Fulltext Access 6 Pages 2007
Negotiation support systems and team negotiations: The coalition formation perspective
Fulltext Access 7 Pages 2007
Author index to volume 43
Fulltext Access 7 Pages 2007
Constructing a minimum height elimination tree of a tree in linear time
Fulltext Access 7 Pages 2007
Strategic bidder behavior in sponsored search auctions
Fulltext Access 7 Pages 2007
Executive information systems development in an emerging economy
Fulltext Access 7 Pages 2007
Subject index to volume 42
Fulltext Access 7 Pages 2007
Notes on “the lower and upper approximations in a fuzzy group” and “rough ideals in semigroups”
Fulltext Access 7 Pages 2007
4D medical image computing and visualization of lung tumor mobility in spatio-temporal CT image data
Fulltext Access 7 Pages 2007
Informal notes to support the asynchronous collaborative activities
Fulltext Access 7 Pages 2007
Statistical cluster and extreme limit points of sequences of fuzzy numbers
Fulltext Access 7 Pages 2007
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Fulltext Access 7 Pages 2007
A computational model of activities performance decrease in Alzheimer's disease
Fulltext Access 7 Pages 2007
A novel key agreement protocol based on chaotic maps
Fulltext Access 7 Pages 2007
On reliability of the folded hypercubes
Fulltext Access 7 Pages 2007
Exploring confusion in product ciphers through regression analysis
Fulltext Access 7 Pages 2007
On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision
Fulltext Access 7 Pages 2007
With good intentions
Fulltext Access 7 Pages 2007
Incremental assignment problem
Fulltext Access 7 Pages 2007
Cell phones in campus libraries: An analysis of policy responses to an invasive mobile technology
Fulltext Access 7 Pages 2007
More than just a mouse click: Research into work practices behind the assignment of medical trust marks on the World Wide Web
Fulltext Access 7 Pages 2007
Categorizing the unintended sociotechnical consequences of computerized provider order entry
Fulltext Access 7 Pages 2007
Robust image registration for fusion
Fulltext Access 7 Pages 2007
The product and process of referral: Optimizing general practitioner-medical specialist interaction through information technology
Fulltext Access 7 Pages 2007
Ubiquitous computing to support co-located clinical teams: Using the semiotics of physical objects in system design
Fulltext Access 7 Pages 2007
Towards automated classification of intensive care nursing narratives
Fulltext Access 7 Pages 2007
<< < 296 297 298 299 300 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities