


default search action
Information Technology and Management, Volume 10
Volume 10, Number 1, March 2009
- Kamna Malik, Anurag Agarwal:

Special issue devoted to papers presented at the first international conference on information systems technology and management, New Delhi, March 12-13, 2007. 1 - T. V. Vijay Kumar, Atul Shridhar, Aloke Ghoshal:

Computing full disjunction using COJO. 3-20 - Adriano C. M. Pereira

, Leonardo Rocha
, Fernando Mourão, Paulo B. Góes, Wagner Meira Jr.:
Reactivity based model to study online auctions dynamics. 21-37 - Wei Jiang, Anurag Agarwal:

Special issue devoted to papers presented at the second INFORMS workshop on artificial intelligence and data mining, Seattle, November 3, 2007. 39 - Selwyn Piramuthu, Michael J. Shaw:

Learning-enhanced adaptive DSS: a Design Science perspective. 41-54 - Jason K. Deane

, Terry R. Rakes, Loren Paul Rees:
Efficient heuristics for wireless network tower placement. 55-65 - Praveen Paruchuri

, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordóñez
, Sarit Kraus:
Coordinating randomized policies for increasing security of agent systems. 67-79
Volume 10, Numbers 2-3, September 2009
- Kaushal Chari, Akhil Kumar:

Guest Editors' Introduction. 81 - Ahmed Abbasi

, Hsinchun Chen:
A comparison of fraud cues and classification methods for fake escrow website detection. 83-101 - Sameh Al-Natour, Hasan Cavusoglu

:
The strategic knowledge-based dependency diagrams: a tool for analyzing strategic knowledge dependencies for the purposes of understanding and communicating. 103-121 - Matthew S. Smith, Christophe G. Giraud-Carrier

, Nathan Purser:
Implicit affinity networks and social capital. 123-134 - Oliver Hühn, Christian Markl, Martin Bichler:

On the predictive performance of queueing network models for large-scale distributed transaction processing systems. 135-149 - Kosuke Takano, Xing Chen, Keisuke Masuda:

A framework for a feedback process to analyze and personalize a document vector space in a feature extraction model. 151-176
Volume 10, Number 4, December 2009
- Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma:

Wake up or fall asleep-value implication of trusted computing. 177-192 - Masateru Tsunoda, Akito Monden

, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-ichi Matsumoto:
Software development productivity of Japanese enterprise applications. 193-205 - Ilke Onur

, Kerem Tomak:
Interplay between Buy-It-Now price and last minute bidding on online bidding strategies. 207-219 - Wei Jiang, Anurag Agarwal:

Special issue devoted to papers presented at the second INFORMS workshop on artificial intelligence and data mining, Seattle, November 3, 2007. 221 - Seoung Bum Kim, Xiaoming Huo, Kwok-Leung Tsui

:
A finite-sample simulation study of cross validation in tree-based models. 223-233 - Uzma Raja, Marietta J. Tretter:

Antecedents of open source software defects: A data mining approach to model formulation, validation and testing. 235-251 - Monica Chiarini Tremblay

, Donald J. Berndt
, Stephen Luther, Philip Foulis, Dustin D. French
:
Identifying fall-related injuries: Text mining the electronic medical record. 253-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














