default search action
Information Technology and Management, Volume 10
Volume 10, Number 1, March 2009
- Kamna Malik, Anurag Agarwal:
Special issue devoted to papers presented at the first international conference on information systems technology and management, New Delhi, March 12-13, 2007. 1 - T. V. Vijay Kumar, Atul Shridhar, Aloke Ghoshal:
Computing full disjunction using COJO. 3-20 - Adriano C. M. Pereira, Leonardo Rocha, Fernando Mourão, Paulo B. Góes, Wagner Meira Jr.:
Reactivity based model to study online auctions dynamics. 21-37 - Wei Jiang, Anurag Agarwal:
Special issue devoted to papers presented at the second INFORMS workshop on artificial intelligence and data mining, Seattle, November 3, 2007. 39 - Selwyn Piramuthu, Michael J. Shaw:
Learning-enhanced adaptive DSS: a Design Science perspective. 41-54 - Jason K. Deane, Terry R. Rakes, Loren Paul Rees:
Efficient heuristics for wireless network tower placement. 55-65 - Praveen Paruchuri, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordóñez, Sarit Kraus:
Coordinating randomized policies for increasing security of agent systems. 67-79
Volume 10, Numbers 2-3, September 2009
- Kaushal Chari, Akhil Kumar:
Guest Editors' Introduction. 81 - Ahmed Abbasi, Hsinchun Chen:
A comparison of fraud cues and classification methods for fake escrow website detection. 83-101 - Sameh Al-Natour, Hasan Cavusoglu:
The strategic knowledge-based dependency diagrams: a tool for analyzing strategic knowledge dependencies for the purposes of understanding and communicating. 103-121 - Matthew S. Smith, Christophe G. Giraud-Carrier, Nathan Purser:
Implicit affinity networks and social capital. 123-134 - Oliver Hühn, Christian Markl, Martin Bichler:
On the predictive performance of queueing network models for large-scale distributed transaction processing systems. 135-149 - Kosuke Takano, Xing Chen, Keisuke Masuda:
A framework for a feedback process to analyze and personalize a document vector space in a feature extraction model. 151-176
Volume 10, Number 4, December 2009
- Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma:
Wake up or fall asleep-value implication of trusted computing. 177-192 - Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-ichi Matsumoto:
Software development productivity of Japanese enterprise applications. 193-205 - Ilke Onur, Kerem Tomak:
Interplay between Buy-It-Now price and last minute bidding on online bidding strategies. 207-219 - Wei Jiang, Anurag Agarwal:
Special issue devoted to papers presented at the second INFORMS workshop on artificial intelligence and data mining, Seattle, November 3, 2007. 221 - Seoung Bum Kim, Xiaoming Huo, Kwok-Leung Tsui:
A finite-sample simulation study of cross validation in tree-based models. 223-233 - Uzma Raja, Marietta J. Tretter:
Antecedents of open source software defects: A data mining approach to model formulation, validation and testing. 235-251 - Monica Chiarini Tremblay, Donald J. Berndt, Stephen Luther, Philip Foulis, Dustin D. French:
Identifying fall-related injuries: Text mining the electronic medical record. 253-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.