• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Information Systems Journas Latest Articles

Information Systems Research Articles

Scaling up cosine interesting pattern discovery: A depth-first method
Fulltext Access 16 Pages 2014
A framework for state attraction of discrete event systems under partial observation
Fulltext Access 16 Pages 2014
A prioritized aggregation operator-based approach to multiple criteria decision making using interval-valued intuitionistic fuzzy sets: A comparative perspective
Fulltext Access 16 Pages 2014
Derivation digraphs for dependencies in ordinal and similarity-based data
Fulltext Access 16 Pages 2014
A fuzzy multi-criteria decision-making model by associating technique for order preference by similarity to ideal solution with relative preference relation
Fulltext Access 16 Pages 2014
How to adjust the distribution of nonzero elements in sparse representation: A granular locality-preserving approach
Fulltext Access 16 Pages 2014
A two-stage stochastic mixed-integer program modelling and hybrid solution approach to portfolio selection problems
Fulltext Access 16 Pages 2014
Adaptive fuzzy decentralized tracking fault-tolerant control for stochastic nonlinear large-scale systems with unmodeled dynamics
Fulltext Access 16 Pages 2014
Data-based analysis of discrete-time linear systems in noisy environment: Controllability and observability
Fulltext Access 16 Pages 2014
Personlized English reading sequencing based on learning portfolio analysis
Fulltext Access 16 Pages 2014
Robust control on saturated Markov jump systems with missing information
Fulltext Access 16 Pages 2014
Evolutionary strategies for ultra-large-scale autonomic systems
Fulltext Access 16 Pages 2014
Secret sharing with multi-cover adaptive steganography
Fulltext Access 16 Pages 2014
A novel method for attribute reduction of covering decision systems
Fulltext Access 16 Pages 2014
Belief functions on general intuitionistic fuzzy information systems
Fulltext Access 16 Pages 2014
Evaluating the educational effectiveness of simulation games: A value generation model
Fulltext Access 16 Pages 2014
An axiomatizable logical foundation for lattice-ordered qualitative linguistic approach for reasoning with words
Fulltext Access 16 Pages 2014
Polygonal approximation using integer particle swarm optimization
Fulltext Access 16 Pages 2014
Shape classification by manifold learning in multiple observation spaces
Fulltext Access 16 Pages 2014
Runtime analysis of a multi-objective evolutionary algorithm for obtaining finite approximations of Pareto fronts
Fulltext Access 16 Pages 2014
Skyline ranking for uncertain databases
Fulltext Access 16 Pages 2014
Image quality assessment based on matching pursuit
Fulltext Access 16 Pages 2014
A comparative study of variation operators used for evolutionary multi-objective optimization
Fulltext Access 16 Pages 2014
Mining frequent items in data stream using time fading model
Fulltext Access 16 Pages 2014
Maintenance of prelarge trees for data mining with modified records
Fulltext Access 16 Pages 2014
Indicators for the characterization of discrete Choquet integrals
Fulltext Access 16 Pages 2014
Constructing ordinary sum differential equations using polynomial networks
Fulltext Access 16 Pages 2014
Security and privacy for storage and computation in cloud computing
Fulltext Access 16 Pages 2014
Enhancing the detection of metamorphic malware using call graphs
Fulltext Access 17 Pages 2014
Bayesian network approach to multinomial parameter learning using data and expert judgments
Fulltext Access 17 Pages 2014
Survey of certificate usage in distributed access control
Fulltext Access 17 Pages 2014
Bayesian robustness under a skew-normal class of prior distribution
Fulltext Access 17 Pages 2014
A label semantics approach to linguistic hedges
Fulltext Access 17 Pages 2014
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems
Fulltext Access 17 Pages 2014
Leveraging spatial join for robust tuple extraction from web pages
Fulltext Access 17 Pages 2014
Performance optimization of deployed software-as-a-service applications
Fulltext Access 17 Pages 2014
Logout in single sign-on systems: Problems and solutions
Fulltext Access 17 Pages 2014
A multi-level approach to understanding the impact of cyber crime on the financial sector
Fulltext Access 17 Pages 2014
A comparative analysis of net neutrality: Insights gained by juxtaposing the U.S. and Korea
Fulltext Access 17 Pages 2014
Music genre classification based on local feature selection using a self-adaptive harmony search algorithm
Fulltext Access 17 Pages 2014
The role of handbooks in knowledge creation and diffusion: A case of science and technology studies
Fulltext Access 17 Pages 2014
Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use
Fulltext Access 17 Pages 2014
Data matching of building polygons at multiple map scales improved by contextual information and relaxation
Fulltext Access 17 Pages 2014
Experimental evaluation of user performance on two-dimensional and three-dimensional perspective displays in discrete-event simulation
Fulltext Access 17 Pages 2014
Conceptual modeling of natural language functional requirements
Fulltext Access 17 Pages 2014
Agile requirements engineering via paraconsistent reasoning
Fulltext Access 17 Pages 2014
Validation of user intentions in process orchestration and choreography
Fulltext Access 17 Pages 2014
On modeling context-aware social collaboration processes
Fulltext Access 17 Pages 2014
A dynamic capabilities perspective of IS project portfolio management
Fulltext Access 17 Pages 2014
Telecommunications reform and efficiency performance: Do good institutions matter?
Fulltext Access 17 Pages 2014
Regulating a monopoly with universal service obligations: The role of flexible tariff schemes
Fulltext Access 17 Pages 2014
Unifying traditional risk assessment approaches with attack trees
Fulltext Access 17 Pages 2014
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Fulltext Access 17 Pages 2014
Developing a maturity model for service systems in heavy equipment manufacturing enterprises
Fulltext Access 17 Pages 2014
Sentiment classification: The contribution of ensemble learning
Fulltext Access 17 Pages 2014
Individual empowerment of agile and non-agile software developers in small teams
Fulltext Access 17 Pages 2014
Automatic test case generation for structural testing of function block diagrams
Fulltext Access 17 Pages 2014
On strategies for testing software product lines: A systematic literature review
Fulltext Access 17 Pages 2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
Fulltext Access 17 Pages 2014
A hybrid model through the fusion of type-2 fuzzy logic systems and extreme learning machines for modelling permeability prediction
Fulltext Access 17 Pages 2014
Visual topical analysis of Chinese and American Library and Information Science research institutions
Fulltext Access 17 Pages 2014
Mapping altruism
Fulltext Access 17 Pages 2014
Generating combinatorial test suite using combinatorial optimization
Fulltext Access 17 Pages 2014
On building a consistent framework for executable systems architecture
Fulltext Access 17 Pages 2014
Parallel-machine scheduling to minimize makespan with fuzzy processing times and learning effects
Fulltext Access 17 Pages 2014
Fixed charge transportation problem with type-2 fuzzy variables
Fulltext Access 17 Pages 2014
A human-centric framework for context-aware flowable services in cloud computing environments
Fulltext Access 17 Pages 2014
Which weighted circulant networks have perfect state transfer?
Fulltext Access 17 Pages 2014
Allowing agents to be imprecise: A proposal using multiple linguistic terms
Fulltext Access 17 Pages 2014
Linear estimation for networked control systems with random transmission delays and packet dropouts
Fulltext Access 17 Pages 2014
Modelling and controller design for discrete-time networked control systems with limited channels and data drift
Fulltext Access 17 Pages 2014
An efficient and reliable approach for quality-of-service-aware service composition
Fulltext Access 17 Pages 2014
Reversible data hiding for depth maps using the depth no-synthesis-error model
Fulltext Access 17 Pages 2014
Modeling and controller design for complex flexible nonlinear systems via a fuzzy singularly perturbed approach
Fulltext Access 17 Pages 2014
Mining incomplete data with singleton, subset and concept probabilistic approximations
Fulltext Access 17 Pages 2014
Particle swarm optimization of ensemble neural networks with fuzzy aggregation for time series prediction of the Mexican Stock Exchange
Fulltext Access 17 Pages 2014
Disclosed: An efficient depth-first, top-down algorithm for mining disjunctive closed itemsets in high-dimensional data
Fulltext Access 17 Pages 2014
Lagrange stability of neural networks with memristive synapses and multiple delays
Fulltext Access 17 Pages 2014
Communication-efficient processing of multiple continuous aggregate queries
Fulltext Access 17 Pages 2014
Mining frequent itemsets in data streams within a time horizon
Fulltext Access 17 Pages 2014
Reducing the bottleneck of graph-based data mining by improving the efficiency of labeled graph isomorphism testing
Fulltext Access 17 Pages 2014
A concurrently updatable index structure for predicted paths of moving objects
Fulltext Access 17 Pages 2014
Maximally permissive liveness-enforcing supervisor with lowest implementation cost for flexible manufacturing systems
Fulltext Access 17 Pages 2014
Optimal signal-setting for road network with maximum capacity
Fulltext Access 17 Pages 2014
The structures of intuitionistic fuzzy equivalence relations
Fulltext Access 17 Pages 2014
Expressive generalized itemsets
Fulltext Access 17 Pages 2014
Evolution of knowledge sharing behavior in social commerce: An agent-based computational approach
Fulltext Access 17 Pages 2014
Quantitative rough sets based on subsethood measures
Fulltext Access 17 Pages 2014
Clustering of web search results based on the cuckoo search algorithm and Balanced Bayesian Information Criterion
Fulltext Access 17 Pages 2014
Distortionless visual multi-secret sharing based on random grid
Fulltext Access 17 Pages 2014
A single-machine scheduling with a truncated linear deterioration and ready times
Fulltext Access 17 Pages 2014
Region based memetic algorithm for real-parameter optimisation
Fulltext Access 17 Pages 2014
A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
Fulltext Access 17 Pages 2014
An active contour model and its algorithms with local and global Gaussian distribution fitting energies
Fulltext Access 17 Pages 2014
Quick attribute reduct algorithm for neighborhood rough set model
Fulltext Access 17 Pages 2014
Markov-binary visibility graph: A new method for analyzing complex systems
Fulltext Access 17 Pages 2014
Information acquisition processes and their continuity: Transforming uncertainty into risk
Fulltext Access 17 Pages 2014
Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation
Fulltext Access 17 Pages 2014
Probabilistic correlation-based similarity measure on text records
Fulltext Access 17 Pages 2014
Ant intelligence inspired blind data detection for ultra-wideband radar sensors
Fulltext Access 17 Pages 2014
<< < 96 97 98 99 100 > >>
Related Topics
Remote sensing Articles
5244 Papers
GIS Articles
4012 Papers
Sensitivity analysis Articles
3934 Papers
Artificial Neural Network Articles
3435 Papers
Internet Articles
3405 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
artificial intelligence Articles
1940 Papers
Automation Articles
1810 Papers
Information Articles
1654 Papers
Cloud computing Articles
1472 Papers
CAM Articles
1272 Papers
information technology Articles
1089 Papers
Information retrieval Articles
955 Papers
Authentication Articles
819 Papers
Information theory Articles
762 Papers
information processing Articles
683 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
Data & Knowledge Engineering Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Systems and Software Journal
Vehicular Communications Journal
Informatics in Medicine Unlocked Journal
Computers & Geosciences Journal
Healthcare Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of Informetrics Journal
Information Fusion Journal
Card Technology Today Journal
Information and Software Technology Journal
Decision Support Systems Journal
European Research in Telemedicine / La Recherche Européenne en Télémédecine Journal
IERI Procedia Journal
Information & Management Journal
Information and Organization Journal
Internet Interventions Journal
ISPRS Journal of Photogrammetry and Remote Sensing Journal
Journal of Electrical Systems and Information Technology Journal
Journal of Industrial Information Integration Journal
The Journal of Strategic Information Systems Journal
Telecommunications Policy Journal
Web Semantics: Science, Services and Agents on the World Wide Web Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities