default search action
Search dblp for Publications
export results for "toc:db/journals/ijitm/ijitm14.bht:"
@article{DBLP:journals/ijitm/Banerjee15, author = {Arnab Banerjee}, title = {Information technology enabled process re-engineering for supply chain leagility}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {1}, pages = {60--75}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.066060}, doi = {10.1504/IJITM.2015.066060}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/Banerjee15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/Colazo15, author = {Jorge A. Colazo}, title = {The interplay among software volatility, complexity and development outcomes: evidence from open source software}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {160--171}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068462}, doi = {10.1504/IJITM.2015.068462}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/Colazo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/FayyoumiE15, author = {Ayham Fayyoumi and Gianluca Elia}, title = {A systemic model for measuring the effectiveness of virtual learning programs}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {4}, pages = {305--332}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.072047}, doi = {10.1504/IJITM.2015.072047}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/FayyoumiE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/GeorgeE15, author = {James T. George and Elizabeth Elias}, title = {Design of multiplier-less continuously variable bandwidth sharp {FIR} filters using modified harmony search algorithm}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {1}, pages = {5--25}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.066057}, doi = {10.1504/IJITM.2015.066057}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/GeorgeE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/Ghnaya15, author = {Boutheina Ben Ghnaya}, title = {Research and development disclosure information on internet by multinational corporations}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {4}, pages = {274--304}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.072080}, doi = {10.1504/IJITM.2015.072080}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/Ghnaya15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/HuangJLSH15, author = {Yongwen Huang and Zuhua Jiang and Lijun Liu and Bo Song and Lijie Han}, title = {Building a knowledge map model situated in product design}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {1}, pages = {76--94}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.066059}, doi = {10.1504/IJITM.2015.066059}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/HuangJLSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/LiHW15, author = {Wei Li and Jianbin Huang and Shuzhen Wang}, title = {Mining top-k influential nodes in social networks via community detection}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {172--184}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068460}, doi = {10.1504/IJITM.2015.068460}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/LiHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/LiWL15, author = {Yongjian Li and Xunqing Wang and Zhe Li}, title = {Great East Japan Earthquake emergency evolution and contingency decision based on system engineering approach}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {146--159}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068501}, doi = {10.1504/IJITM.2015.068501}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/LiWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/NecirD15, author = {Hamid Necir and Habiba Drias}, title = {A distributed maximal frequent itemset mining with multi agents system on bitmap join indexes selection}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {201--214}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068470}, doi = {10.1504/IJITM.2015.068470}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/NecirD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/PriyaK15, author = {R. Devi Priya and S. Kuppuswami}, title = {A novel approach for imputation of missing continuous attribute values in databases using genetic algorithm}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {185--200}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068461}, doi = {10.1504/IJITM.2015.068461}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/PriyaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/RomeroL15, author = {Alejandro Romero and {\'{E}}lisabeth Lefebvre}, title = {Combining barcodes and {RFID} in a hybrid solution to improve hospital pharmacy logistics processes}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {97--123}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068504}, doi = {10.1504/IJITM.2015.068504}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/RomeroL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/Sarja15, author = {Jari Sarja}, title = {Key factors of successful technology push projects in the {ICT} context: a review of the literature}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {4}, pages = {253--273}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.072071}, doi = {10.1504/IJITM.2015.072071}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/Sarja15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/SrideviR15, author = {Balu Sridevi and S. Rajaram}, title = {Automated secured handoff delay reduction by minimising authentication cost in mobile WiMAX network entry process}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {1}, pages = {43--59}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.066058}, doi = {10.1504/IJITM.2015.066058}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitm/SrideviR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/SubramanianK15, author = {Kannimuthu Subramanian and Kandhasamy Premalatha}, title = {{UP-GNIV:} an expeditious high utility pattern mining algorithm for itemsets with negative utility values}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {1}, pages = {26--42}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.066056}, doi = {10.1504/IJITM.2015.066056}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/SubramanianK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/TewariM15, author = {Sumant Kumar Tewari and Madhvendra Misra}, title = {Information and communication technology: a tool for increasing marketing efficiency}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {215--231}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068499}, doi = {10.1504/IJITM.2015.068499}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitm/TewariM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/TrigoVSGM15, author = {Ant{\'{o}}nio Trigo and Jo{\~{a}}o Varaj{\~{a}}o and Pedro Soto{-}Acosta and Nicol{\'{a}}s Gonz{\'{a}}lvez{-}Gallego and Francisco Jose Molina{-}Castillo}, title = {Influence of firm size on the adoption of enterprise information systems: insights from Iberian firms}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {4}, pages = {233--252}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.072046}, doi = {10.1504/IJITM.2015.072046}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitm/TrigoVSGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/WangYZ15, author = {Jing Wang and Haoxiong Yang and Jianming Zhu}, title = {Research on emergency resources storage region division based on two-stage stochastic programming}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {124--132}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068497}, doi = {10.1504/IJITM.2015.068497}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/WangYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/XuSCWW15, author = {Yihong Xu and Mengju Shi and Hao Chang and Qiushuang Wei and Suhua Wang}, title = {Comprehensive evaluation of marketing channel risk of beverage enterprise on the basis of GRA-Fuzzy-AHP}, journal = {Int. J. Inf. Technol. Manag.}, volume = {14}, number = {2/3}, pages = {133--145}, year = {2015}, url = {https://doi.org/10.1504/IJITM.2015.068492}, doi = {10.1504/IJITM.2015.068492}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/XuSCWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.