


default search action
International Journal of Information Technology and Management, Volume 11
Volume 11, Numbers 1/2, 2012
- Qinghan Xiao, Diana Wilkinson, Malcolm Anderson:

Using biometrics and active RFID to improve security and safety in mass casualty management. 2-17 - Marina L. Gavrilova, Kushan Ahmadian:

Dealing with biometric multi-dimensionality through chaotic neural network methodology. 18-34 - Romain Giot

, Christophe Rosenberger
:
A new soft biometric approach for keystroke dynamics based on gender recognition. 35-49 - Hongtao Chen, Heng Zhao, Liaojun Pang, Jimin Liang

, Jie Tian:
Multi fuzzy vault based on secret sharing for deadlock restoration. 50-60 - Lynne Norris-Jones:

Biometric access control in the workplace: benefit or bind? 61-71 - L. Wang:

Some issues of biometrics: technology intelligence, progress and challenges. 72-82 - N. Tajunisha

, V. Saravanan:
An efficient unsupervised sample clustering for cancer datasets based on statistical model pre-processing. 83-91 - Li-Min Liu:

ATPDI: a computational definition of fingerprint singular points. 92-111 - Loris Nanni, Sheryl Brahnam, Alessandra Lumini:

A user dependent multi-resolution approach for biometric data. 112-121 - Rima Belguechi, Patrick Lacharme, Christophe Rosenberger

:
Enhancing the privacy of electronic passports. 122-137 - Gérard Chollet

, Patrick Perrot, Walid Karam, Chafic Mokbel, Sanjay Ganesh Kanade, Dijana Petrovska-Delacrétaz
:
Identities, forgeries and disguises. 138-152 - Chitu Okoli

, Kevin Carillo:
The best of adaptive and predictive methodologies: open source software development, a balance between agility and discipline. 153-166
Volume 11, Number 3, 2012
- Victor B. Kreng, Chih-Ming Tsai:

A knowledge diffusion model of substitutive knowledge for evaluating the change of enterprise benefits. 167-185 - John T. Perry, Timothy L. Pett, J. Kirk Ring:

Comparison of the information-sharing benefit of the internet for family and non-family firms. 186-200 - Mu-Jung Huang, Mu-Yen Chen

, Tai-Chun Lee:
A novel hybrid evaluation approach of knowledge management performance for R&D division. 201-224 - Lidong Wang:

RFID-based information technology and management in agriculture and food supply chains. 225-239 - Matthew Waritay Guah, Rhoda C. Joseph:

Analysis of RFID technology usage for luggage management in the airline industry. 240-255
Volume 11, Number 4, 2012
- Marijn G. A. Plomp, Glenn Van Rijn, Ronald Batenburg

:
Chain digitisation support by point-of-sale systems: an analysis of the Dutch product software market. 257-272 - Arjun Neupane, Jeffrey Soar

, Kishor Vaidya:
The potential of e-procurement technology for reducing corruption. 273-287 - Mário Franco

, João Pissarra:
ICT as a mechanism for sharing intra-organisational knowledge: case study of the application of the GURU-IT platform. 288-306 - Hongwei Wang, Yu Liu, Pei Yin:

Study on user preferences modelling based on web mining. 307-322 - Yiannis E. Spanos:

Absorptive capacity and the propensity to adopt advanced technology: the case of computer integrated manufacturing (CIM) systems. 323-346

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














