• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

Novel intuitionistic fuzzy decision making models in the framework of decision field theory
Fulltext Access 46 Pages 2017
Software product lines adoption in small organizations
Fulltext Access 46 Pages 2017
A semantic-grained perspective of latent knowledge modeling
Fulltext Access 46 Pages 2017
An associative engines based approach supporting collaborative analytics in the Internet of cultural things
Fulltext Access 46 Pages 2017
Measuring inconsistency with many-valued logics
Fulltext Access 46 Pages 2017
Using argumentation theory to analyse software practitioners' defeasible evidence, inference and belief
Fulltext Access 46 Pages 2017
Towards collaborative storage scheduling using alternating direction method of multipliers for mobile edge cloud
Fulltext Access 46 Pages 2017
Factors influencing online shoppers' repurchase intentions: The roles of satisfaction and regret
Fulltext Access 46 Pages 2017
Context-aware recommender systems in mobile environment: On the road of future research
Fulltext Access 46 Pages 2017
A systematic study of double auction mechanisms in cloud computing
Fulltext Access 47 Pages 2017
Role of local presence in online impulse buying
Fulltext Access 47 Pages 2017
Transition of organizational roles in Agile transformation process: A grounded theory approach
Fulltext Access 47 Pages 2017
Secure group communication schemes for dynamic heterogeneous distributed computing
Fulltext Access 47 Pages 2017
Enhancing developer recommendation with supplementary information via mining historical commits
Fulltext Access 47 Pages 2017
Unified authentication factors and fuzzy service access using interaction provenance
Fulltext Access 47 Pages 2017
A new efficient approach for mining uncertain frequent patterns using minimum data structure without false positives
Fulltext Access 47 Pages 2017
Phishing environments, techniques, and countermeasures: A survey
Fulltext Access 47 Pages 2017
Security assurance assessment methodology for hybrid clouds
Fulltext Access 47 Pages 2017
Defining and identifying dominant information security cultures and subcultures
Fulltext Access 47 Pages 2017
The RIGHT model for Continuous Experimentation
Fulltext Access 47 Pages 2017
A framework for visually monitoring business process compliance
Fulltext Access 47 Pages 2017
Incorporating user preferences in search-based software engineering: A systematic mapping study
Fulltext Access 47 Pages 2017
Minimizing the stakeholder dissatisfaction risk in requirement selection for next release planning
Fulltext Access 47 Pages 2017
Automated refactoring of super-class method invocations to the Template Method design pattern
Fulltext Access 47 Pages 2017
Combining trust and skills evaluation to form e-Learning classes in online social networks
Fulltext Access 47 Pages 2017
Discovering profitable stocks for intraday trading
Fulltext Access 47 Pages 2017
Constructing shadowed sets and three-way approximations of fuzzy sets
Fulltext Access 47 Pages 2017
Linguistic geometry approach for solving the Cops and Robber problem in grid environments
Fulltext Access 47 Pages 2017
Automated discovery of safety and efficacy concerns for joint & muscle pain relief treatments from online reviews
Fulltext Access 48 Pages 2017
Introducing continuous experimentation in large software-intensive product and service organisations
Fulltext Access 48 Pages 2017
Be more familiar with our enemies and pave the way forward: A review of the roles bugs played in software failures
Fulltext Access 48 Pages 2017
Improving modular structure of software system using structural and lexical dependency
Fulltext Access 48 Pages 2017
An industrial case study on an architectural assumption documentation framework
Fulltext Access 48 Pages 2017
Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory
Fulltext Access 48 Pages 2017
Semi-supervised cross-entropy clustering with information bottleneck constraint
Fulltext Access 48 Pages 2017
Supporting secure keyword search in the personal cloud
Fulltext Access 48 Pages 2017
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption
Fulltext Access 49 Pages 2017
A decision support framework for identifying novel ideas in new product development from cross-domain analysis
Fulltext Access 49 Pages 2017
The impact of mobile Internet on mobile voice usage: A two-level analysis of mobile communications customers in a GCC country
Fulltext Access 49 Pages 2017
An integrated workflow for stress and flow modelling using outcrop-derived discrete fracture networks
Fulltext Access 49 Pages 2017
Nature-inspired metaheuristic optimization in least squares support vector regression for obtaining bridge scour information
Fulltext Access 49 Pages 2017
On small-scale IT users' system architectures and cyber security: A UK case study
Fulltext Access 50 Pages 2017
Subtle higher order mutants
Fulltext Access 50 Pages 2017
Logic-based argumentation with existential rules
Fulltext Access 50 Pages 2017
Taxonomy of workflow partitioning problems and methods in distributed environments
Fulltext Access 50 Pages 2017
Scheduling deadline constrained scientific workflows on dynamically provisioned cloud resources
Fulltext Access 50 Pages 2017
Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios
Fulltext Access 50 Pages 2017
Research issues for privacy and security of electronic health services
Fulltext Access 50 Pages 2017
Application of swarm based intelligent computing algorithms for dynamic evaluation of maximum loadability of transmission network
Fulltext Access 50 Pages 2017
A novel ensemble learning approach to unsupervised record linkage
Fulltext Access 51 Pages 2017
Animated conversational agents and e-consumer productivity: The roles of agents and individual characteristics
Fulltext Access 51 Pages 2017
Making electronic health records support quality management: A narrative review
Fulltext Access 51 Pages 2017
Technology meets tradition: The perceived impact of the introduction of information and communication technology on ward rounds in the intensive care unit
Fulltext Access 51 Pages 2017
To use or not to use: Modelling end user grumbling as user resistance in pre-implementation stage of enterprise resource planning system
Fulltext Access 51 Pages 2017
Faster compression methods for a weighted graph using locality sensitive hashing
Fulltext Access 51 Pages 2017
Privacy concerns for mobile app download: An elaboration likelihood model perspective
Fulltext Access 51 Pages 2017
Towards a trust evaluation middleware for cloud service selection
Fulltext Access 51 Pages 2017
An approach to characterize graded entailment of arguments through a label-based framework
Fulltext Access 52 Pages 2017
Data-driven optimization approach for mass-spring models parametrization based on isogeometric analysis
Fulltext Access 52 Pages 2017
A method to generate reusable safety case argument-fragments from compositional safety analysis
Fulltext Access 52 Pages 2017
Extending the framework for mobile health information systems Research: A content analysis
Fulltext Access 52 Pages 2017
Why a counterfeit risk avoidance strategy fails
Fulltext Access 52 Pages 2017
Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks
Fulltext Access 52 Pages 2017
Discovering socio-spatio-temporal important locations of social media users
Fulltext Access 52 Pages 2017
A fast feature weighting algorithm of data gravitation classification
Fulltext Access 52 Pages 2017
Conceptualizing and measuring quality of experience of the internet of things: Exploring how quality is perceived by users
Fulltext Access 52 Pages 2017
Data-driven analytics for cyber-threat intelligence and information sharing
Fulltext Access 53 Pages 2017
Determinants of early conformance with information security policies
Fulltext Access 53 Pages 2017
Dynamic application placement in the Mobile Cloud Network
Fulltext Access 53 Pages 2017
Identification and analysis of the elements required to manage technical debt by means of a systematic mapping study
Fulltext Access 53 Pages 2017
Distributed clustering of categorical data using the information bottleneck framework
Fulltext Access 53 Pages 2017
Scalable model exploration for model-driven engineering
Fulltext Access 53 Pages 2017
Three-way decisions based on semi-three-way decision spaces
Fulltext Access 54 Pages 2017
A survey on feature drift adaptation: Definition, benchmark, challenges and future directions
Fulltext Access 54 Pages 2017
Hybrid bi-objective portfolio optimization with pre-selection strategy
Fulltext Access 54 Pages 2017
Hybrid approaches to digital forensic investigations: A comparative analysis in an institutional context
Fulltext Access 54 Pages 2017
A new method for classification of imprecise data using fuzzy rough fuzzification
Fulltext Access 54 Pages 2017
Smart tourism technologies in travel planning: The role of exploration and exploitation
Fulltext Access 55 Pages 2017
IT-enabled operational agility: An interdependencies perspective
Fulltext Access 55 Pages 2017
From traditional education technologies to student satisfaction in Management education: A theory of the role of social media applications
Fulltext Access 55 Pages 2017
A mapping study on design-time quality attributes and metrics
Fulltext Access 55 Pages 2017
Investigating styles in variability modeling: Hierarchical vs. constrained styles
Fulltext Access 56 Pages 2017
A systematic literature review on methods that handle multiple quality attributes in architecture-based self-adaptive systems
Fulltext Access 56 Pages 2017
Continued use of an interactive computer game-based visual perception learning system in children with developmental delay
Fulltext Access 56 Pages 2017
A large-scale study of cultural differences using urban data about eating and drinking preferences
Fulltext Access 56 Pages 2017
Who needs to be more visible online? The value implications of web visibility and firm heterogeneity
Fulltext Access 57 Pages 2017
A review of natural language processing techniques for opinion mining systems
Fulltext Access 57 Pages 2017
Deployment of an open sensorized platform in a smart city context
Fulltext Access 57 Pages 2017
Reusing business components and objects for modeling business systems: The influence of decomposition characteristics and analyst experience
Fulltext Access 57 Pages 2017
Rough set based effective technique of image watermarking
Fulltext Access 58 Pages 2017
Inconsistency-tolerant reasoning over linear probabilistic knowledge bases
Fulltext Access 58 Pages 2017
Acceptance model of a Hospital Information System
Fulltext Access 58 Pages 2017
Towards a secure service provisioning framework in a Smart city environment
Fulltext Access 59 Pages 2017
Field effects of social media platforms on information-sharing continuance: Do reach and richness matter?
Fulltext Access 60 Pages 2017
The state of online impulse-buying research: A literature analysis
Fulltext Access 60 Pages 2017
Game of Life variations for image scrambling
Fulltext Access 60 Pages 2017
Quality attributes and quality models for ambient assisted living software systems: A systematic mapping
Fulltext Access 60 Pages 2017
A value-oriented approach to business process specialization: Principles, proof-of-concept, and validation
Fulltext Access 62 Pages 2017
Design and evaluation of virtual environments mechanisms to support remote collaboration on complex process diagrams
Fulltext Access 62 Pages 2017
Optimal allocation of virtual machines in multi-cloud environments with reserved and on-demand pricing
Fulltext Access 62 Pages 2017
<< < 47 48 49 50 51 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities