default search action
Journal of Database Management, Volume 16
Volume 16, Number 1, 2005
- Won Kim:
On U.S. Homeland Security and Database Technology. 1-17 - Larry P. English:
Information Quality: Critical Ingredient for National Security. 18-32 - Amit P. Sheth, Boanerges Aleman-Meza, Ismailcem Budak Arpinar, Clemens Bertram, Yashodhan S. Warke, Cartic Ramakrishnan, Chris Halaschek, Kemafor Anyanwu, David Avant, Fatma Sena Arpinar, Krys J. Kochut:
Semantic Association Identification and Knowledge Discovery for National Security Applications. 33-53 - Paul Thompson:
Text Mining, Names and Security. 54-59 - Mathew Neville Smith, Peter J. H. King:
A Database Interface for Link Analysis. 60-74 - Bhavani Thuraisingham:
Privacy-Preserving Data Mining: Development and Directions. 75-87
Volume 16, Number 2, 2005
- Patrick Martin, Wendy Powley, Min Zheng:
Experimental Study of a Self-Tuning Algorithm for DBMS Buffer Pools. 1-20 - Zhen He, Jérôme Darmont:
Evaluating the Dynamic Behavior of Database Applications. 21-45 - Shi-Ming Huang, Binshan Lin, Qun-Shi Deng:
Intelligent Cache Management for Mobile Data Warehouse Systems. 46-65 - Zongmin Ma:
A Conceptual Design Methodology for Fuzzy Relational Databases. 66-83 - Dinesh Batra:
Conceptual Data Modeling Patterns: Representation and Validation. 84-106
Volume 16, Number 3, 2005
- Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, Allen S. Parrish:
Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories. 1-20 - Pnina Soffer:
Refinement Equivalence in Model-Based Reuse: Overcoming Differences in Abstraction Level. 21-39 - Keng Siau, John Erickson, Lihyunn Lee:
Theoretical vs. Practical Complexity: The Case of UML. 40-57 - G. Daryl Nord, Jeretta Horn Nord, Hongjiang Xu:
An Investigation of the Impact of Organization Size on Data Quality Issues. 58-71 - Zina Ben-Miled, Nianhua Li, Omran A. Bukhres:
BACIIS: Biological and Chemical Information Integration System. 72-85
Volume 16, Number 4, 2005
- Brian Henderson-Sellers, M. K. Serour:
Creating a Dual-Agility Method: The Value of Method Engineering. 1-24 - Mehmet N. Aydin, Frank Harmsen, Kees van Slooten, R. A. Stagwee:
On the Adaptation of an Agile Information Systems Development Method. 25-40 - Hilkka Merisalo-Rantanen, Tuure Tuunanen, Matti Rossi:
Is Extreme Programming Just Old Wine in New Bottles: A Comparison of Two Cases. 41-61 - Daniel E. Turk, Robert B. France, Bernhard Rumpe:
Assumptions Underlying Agile Software-Development Processes. 62-87 - John Erickson, Kalle Lyytinen, Keng Siau:
Agile Modeling, Agile Software Development, and Extreme Programming: The State of Research. 88-99
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.