• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

Geological symbol set for Manifold® Geographic Information System
Fulltext Access 6 Pages 2006
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
Fulltext Access 6 Pages 2006
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem
Fulltext Access 6 Pages 2006
Selective and intelligent imaging using digital evidence bags
Fulltext Access 6 Pages 2006
Detecting false captioning using common-sense reasoning
Fulltext Access 6 Pages 2006
Newsgroups reborn – The binary posting renaissance
Fulltext Access 6 Pages 2006
A two-dimensional circumplex approach to the development of a hacker taxonomy
Fulltext Access 6 Pages 2006
Mass image classification
Fulltext Access 6 Pages 2006
Case study: AOL instant messenger trace evidence
Fulltext Access 6 Pages 2006
ISMS, security standards and security regulations
Fulltext Access 6 Pages 2006
Product roundup
Fulltext Access 6 Pages 2006
An efficient Matlab script to calculate heterogeneous anisotropically elastic wave propagation in three dimensions
Fulltext Access 6 Pages 2006
Monitoring soil moisture and water table height with a low-cost data logger
Fulltext Access 6 Pages 2006
GEOISO-A Windows™ program to calculate and plot mass balances and volume changes occurring in a wide variety of geologic processes
Fulltext Access 6 Pages 2006
Philippe Smets (1938-2005)
Fulltext Access 6 Pages 2006
Measures of international collaboration in scientific literature: Part II
Fulltext Access 6 Pages 2006
A distribution of impact factors of journals in the area of software: An empirical study
Fulltext Access 6 Pages 2006
An analysis of image retrieval behavior for metadata type image database
Fulltext Access 6 Pages 2006
Piloting a web-based continuing professional development program for asthma education
Fulltext Access 6 Pages 2006
On the potential of personal networks for hospitals
Fulltext Access 6 Pages 2006
Advanced and secure architectural EHR approaches
Fulltext Access 6 Pages 2006
Medical guidelines presentation and comparing with Electronic Health Record
Fulltext Access 6 Pages 2006
Improving access of associated states to advanced concepts in medical telematics-A day before the accession to EU
Fulltext Access 6 Pages 2006
An unbiased approach to iterated fusion by weakening
Fulltext Access 6 Pages 2006
Guide for Authors
Fulltext Access 6 Pages 2006
Aggregation of bioinformatics data using Semantic Web technology
Fulltext Access 6 Pages 2006
Ontologies for ecoinformatics
Fulltext Access 6 Pages 2006
A traceable threshold signature scheme with multiple signing policies
Fulltext Access 6 Pages 2006
AMROEBA: Computational astrophysics modeling enabled by dynamic lambda switching
Fulltext Access 6 Pages 2006
Efficient remote mutual authentication and key agreement
Fulltext Access 6 Pages 2006
PING attack – How bad is it?
Fulltext Access 6 Pages 2006
A novel remote user authentication scheme using bilinear pairings
Fulltext Access 6 Pages 2006
Security implications in RFID and authentication processing framework
Fulltext Access 6 Pages 2006
Computer forensics and electronic discovery: The new management challenge
Fulltext Access 6 Pages 2006
Security considerations for incremental hash functions based on pair block chaining
Fulltext Access 6 Pages 2006
Using RDF to describe networks
Fulltext Access 6 Pages 2006
Contents and author index
Fulltext Access 6 Pages 2006
High-definition multimedia for multiparty low-latency interactive communication
Fulltext Access 6 Pages 2006
A differential approach to solve the inverse eigenvalue problem derived from a neural network
Fulltext Access 6 Pages 2006
Windows device interface security
Fulltext Access 6 Pages 2006
An automated scoring algorithm for computerized clinical vignettes: Evaluating physician performance against explicit quality criteria
Fulltext Access 7 Pages 2006
GeoPlot: An Excel VBA program for geochemical data plotting
Fulltext Access 7 Pages 2006
Distributed and collaborative visualization of large data sets using high-speed networks
Fulltext Access 7 Pages 2006
Problem-based learning in medical informatics for undergraduate medical students: An experiment in two medical schools
Fulltext Access 7 Pages 2006
A software tool to aid long-term care budget planning at local authority level
Fulltext Access 7 Pages 2006
Simulating and visualizing the human arterial system on the TeraGrid
Fulltext Access 7 Pages 2006
Electronic healthcare communications in Vietnam in 2004
Fulltext Access 7 Pages 2006
Large-scale multimedia content delivery over optical networks for interactive TV services
Fulltext Access 7 Pages 2006
Token based networking: Experiment NL-101
Fulltext Access 7 Pages 2006
Learning outcomes in medical informatics: Comparison of a WebCT course with ordinary web site learning material
Fulltext Access 7 Pages 2006
Numerical methods for computing SVD in the D-orthogonal group
Fulltext Access 7 Pages 2006
Scientific collaboration of new 10 EU countries in the field of social sciences
Fulltext Access 7 Pages 2006
Binary Pathfinder: An improvement to the Pathfinder algorithm
Fulltext Access 7 Pages 2006
From a paper-based transmission of discharge summaries to electronic communication in health care regions
Fulltext Access 7 Pages 2006
Quality of service provision assessment in the healthcare information and telecommunications infrastructures
Fulltext Access 7 Pages 2006
Using zero configuration technology for IP addressing in optical networks
Fulltext Access 7 Pages 2006
E-health progresses in Romania
Fulltext Access 7 Pages 2006
Continuous auditing technologies and models: A discussion
Fulltext Access 7 Pages 2006
Looking for answers, constructing reliability: An exploration into how Dutch patients check web-based medical information
Fulltext Access 7 Pages 2006
Internet-based smoking cessation programs
Fulltext Access 7 Pages 2006
Seamless live migration of virtual machines over the MAN/WAN
Fulltext Access 7 Pages 2006
Incomplete linguistic preference relations and their fusion
Fulltext Access 7 Pages 2006
The relative influence of management control and user–IS personnel interaction on project performance
Fulltext Access 7 Pages 2006
Online aggregation with tight error bounds in dynamic environments
Fulltext Access 7 Pages 2006
An approach to avoiding rank reversal in AHP
Fulltext Access 7 Pages 2006
List of contents and author index, Volume 30, 2006
Fulltext Access 7 Pages 2006
SWAN: A distributed knowledge infrastructure for Alzheimer disease research
Fulltext Access 7 Pages 2006
Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach
Fulltext Access 7 Pages 2006
The Computer Misuse Act
Fulltext Access 7 Pages 2006
New Vistas in elliptic curve cryptography
Fulltext Access 7 Pages 2006
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
Fulltext Access 7 Pages 2006
Application of temporal and spatial role based access control in 802.11 wireless networks
Fulltext Access 7 Pages 2006
A strategy for testing hardware write block devices
Fulltext Access 7 Pages 2006
Searching for processes and threads in Microsoft Windows memory dumps
Fulltext Access 7 Pages 2006
A cyber forensics ontology: Creating a new approach to studying cyber forensics
Fulltext Access 7 Pages 2006
A new protocol to counter online dictionary attacks
Fulltext Access 7 Pages 2006
Identifying almost identical files using context triggered piecewise hashing
Fulltext Access 7 Pages 2006
An examination into Yahoo Messenger 7.0 contact identification
Fulltext Access 7 Pages 2006
Identifying an existing file via KaZaA artefacts
Fulltext Access 7 Pages 2006
On the potential of high density smart cards
Fulltext Access 7 Pages 2006
An overview of RFID tags and new cryptographic developments
Fulltext Access 7 Pages 2006
Integrity of intention (a theory of types for security APIs)
Fulltext Access 7 Pages 2006
Security Views - Malware Update
Fulltext Access 7 Pages 2006
Preparing Information Security for legal and regulatory compliance (Sarbanes–Oxley and Basel II)
Fulltext Access 7 Pages 2006
Enhancing potential field data using filters based on the local phase
Fulltext Access 7 Pages 2006
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
Fulltext Access 7 Pages 2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks
Fulltext Access 7 Pages 2006
Shortcut method for reliability comparisons in RAID
Fulltext Access 7 Pages 2006
Assessment of eco-security in the Knowledge Grid e-science environment
Fulltext Access 7 Pages 2006
A new model for polluted soil risk assessment
Fulltext Access 7 Pages 2006
Mathematical modeling of steam-assisted gravity drainage
Fulltext Access 7 Pages 2006
An identity management protocol for Internet applications over 3G mobile networks
Fulltext Access 7 Pages 2006
A revision of the FORTRAN codes GRAVW to compute deformation produced by a point magma intrusion in elastic-gravitational layered earth models
Fulltext Access 7 Pages 2006
An advanced video-based system for monitoring active volcanoes
Fulltext Access 7 Pages 2006
FOLD PROFILER: A MATLAB®—based program for fold shape classification
Fulltext Access 7 Pages 2006
Incorporating nonlinear rules in a web-based interactive landform simulation model (WILSIM)
Fulltext Access 7 Pages 2006
A quantitative method for ISO 17799 gap analysis
Fulltext Access 7 Pages 2006
Iterative solutions of the gradient wind equation
Fulltext Access 7 Pages 2006
Improved resolution of the multiple inverse method by eliminating erroneous solutions
Fulltext Access 7 Pages 2006
On balancing network traffic in path-based multicast communication
Fulltext Access 7 Pages 2006
<< < 315 316 317 318 319 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities