


default search action
International Journal of Information Technology and Management, Volume 14
Volume 14, Number 1, 2015
- James T. George, Elizabeth Elias:
Design of multiplier-less continuously variable bandwidth sharp FIR filters using modified harmony search algorithm. 5-25 - Kannimuthu Subramanian
, Kandhasamy Premalatha
:
UP-GNIV: an expeditious high utility pattern mining algorithm for itemsets with negative utility values. 26-42 - Balu Sridevi, S. Rajaram
:
Automated secured handoff delay reduction by minimising authentication cost in mobile WiMAX network entry process. 43-59 - Arnab Banerjee:
Information technology enabled process re-engineering for supply chain leagility. 60-75 - Yongwen Huang, Zuhua Jiang, Lijun Liu, Bo Song
, Lijie Han:
Building a knowledge map model situated in product design. 76-94
Volume 14, Numbers 2/3, 2015
- Alejandro Romero, Élisabeth Lefebvre:
Combining barcodes and RFID in a hybrid solution to improve hospital pharmacy logistics processes. 97-123 - Jing Wang, Haoxiong Yang, Jianming Zhu
:
Research on emergency resources storage region division based on two-stage stochastic programming. 124-132 - Yihong Xu, Mengju Shi, Hao Chang, Qiushuang Wei, Suhua Wang:
Comprehensive evaluation of marketing channel risk of beverage enterprise on the basis of GRA-Fuzzy-AHP. 133-145 - Yongjian Li, Xunqing Wang, Zhe Li:
Great East Japan Earthquake emergency evolution and contingency decision based on system engineering approach. 146-159 - Jorge A. Colazo
:
The interplay among software volatility, complexity and development outcomes: evidence from open source software. 160-171 - Wei Li, Jianbin Huang, Shuzhen Wang:
Mining top-k influential nodes in social networks via community detection. 172-184 - R. Devi Priya, S. Kuppuswami:
A novel approach for imputation of missing continuous attribute values in databases using genetic algorithm. 185-200 - Hamid Necir, Habiba Drias
:
A distributed maximal frequent itemset mining with multi agents system on bitmap join indexes selection. 201-214 - Sumant Kumar Tewari, Madhvendra Misra
:
Information and communication technology: a tool for increasing marketing efficiency. 215-231
Volume 14, Number 4, 2015
- António Trigo
, João Varajão
, Pedro Soto-Acosta
, Nicolás Gonzálvez-Gallego, Francisco Jose Molina-Castillo
:
Influence of firm size on the adoption of enterprise information systems: insights from Iberian firms. 233-252 - Jari Sarja:
Key factors of successful technology push projects in the ICT context: a review of the literature. 253-273 - Boutheina Ben Ghnaya:
Research and development disclosure information on internet by multinational corporations. 274-304 - Ayham Fayyoumi, Gianluca Elia
:
A systemic model for measuring the effectiveness of virtual learning programs. 305-332

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.