


default search action
Journal of Information Technology Research, Volume 5
Volume 5, Number 1, 2012
- Frank Ortmeier:

Dependability in Pervasive Computing: Challenges and Chances. 1-17 - Ekaterine Kldiashvili

:
The Cloud Computing as the Tool for Implementation of Virtual Organization Technology for eHealth. 18-34 - Richard A. Stein:

Direct-to-Consumer Genetic Testing: Interdisciplinary Crossroads. 35-67 - John Lindström, Claas Hanken:

Security Challenges and Selected Legal Aspects for Wearable Computing. 68-87
Volume 5, Number 2, 2012
- Norazah Mohd Suki

:
Correlations of Perceived Flow, Perceived System Quality, Perceived Information Quality, and Perceived User Trust on Mobile Social Networking Service (SNS) Users' Loyalty. 1-14 - Shrikant Tiwari

, Sanjay Kumar Singh
:
Newborn Verification Using Headprint. 15-30 - Regina Connolly

, Cliona Patricia McParland:
Dataveillance: Employee Monitoring & Information Privacy Concerns in the Workplace. 31-45 - Ronald John Lofaro, Kevin M. Smith

:
Critique and Proposed Revision of Crew Resource Management (CRM): A New Paradigm. 46-72 - Mohamed Taher:

Digital Preservation of Cultural Heritage Collection: Among Libraries of India and Iran: A Comparative Study. 73-74
Volume 5, Number 3, 2012
- Suraya Miskon

, Wasana Bandara
, Guy G. Gable
, Erwin Fielt
:
Success Factors for ICT Shared Services in the Higher Education Sector. 1-24 - Awang Hendrianto Pratomo

, Anton Satria Prabuwono
, Siti Norul Huda Sheikh Abdullah
, Mohammad Faidzul Nasrudin, Muhamad Syafiq Shohaimi, Teddy Mantoro
:
Adaptive Robot Soccer Defence Strategy via Behavioural Trail. 25-45 - Siti Norul Huda Sheikh Abdullah

, Muhammad Nuruddin Sudin, Anton Satria Prabuwono
, Teddy Mantoro
:
License Plate Detection and Segmentation Using Cluster Run Length Smoothing Algorithm. 46-70 - Sardjoeni Moedjiono, Ali Mas'at:

Cloud Computing Implementation Strategy for Information Dissemination on Meteorology, Climatology, Air Quality, and Geophysics (MKKuG). 71-84 - Norsaremah Salleh

, Ramlah Hussein, Norshidah Mohamed
:
An Empirical Investigation on Internet Privacy on Social Network Sites among Malaysian Youths. 85-97 - Media A. Ayu

, Swaleh Maulid Omari:
ICT Based Communication Channels Preferences towards Knowledge Sharing among Multicultural Students. 98-113
Volume 5, Number 4, 2012
- Camelia-Mihaela Pintea

, Gloria Cerasela Crisan
, Mihai Manea:
Parallel ACO with a Ring Neighborhood for Dynamic TSP. 1-13 - Maryam S. Nuser:

A Molecular Solution to the Three-Partition Problem. 14-29 - Vikas Singh, Deepak Singh, Ritu Tiwari

, Anupam Shukla
:
MDABC: Motif Discovery Using Artificial Bee Colony Algorithm. 30-47 - Prakash Tekchandani, Aditya Trivedi:

Clock Drift Management Using Nature Inspired Algorithms. 48-62 - Irina Georgescu

:
Computing the Risk Indicators in Fuzzy Systems. 63-84 - László Kovács:

Classification Method for Learning Morpheme Analysis. 85-98

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














