default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2008
- Haroun Alryalat, Samer Al Hawari:
Towards Customer Knowledge Relationship Management: Integrating Knowledge Management and Customer Relationship Management Process. J. Inf. Knowl. Manag. 7(3): 145-157 (2008) - Pasquale Ardimento, Danilo Caivano, Marta Cimitile, Giuseppe Visaggio:
Empirical Investigation of the Efficacy and Efficiency of Tools for Transferring Software Engineering Knowledge. J. Inf. Knowl. Manag. 7(3): 197-207 (2008) - G. Suri Babu, T. Mohana Rao, Salma Ahmed, K. S. Gupta:
Relationship between Leadership Capability and Knowledge Management: a Measurement Approach. J. Inf. Knowl. Manag. 7(2): 83-92 (2008) - S. Appavu alias Balamurugan, G. Athiappan, M. Muthu Pandian, Ramasamy Rajaram:
Classification Methods in the Detection of New Suspicious Emails. J. Inf. Knowl. Manag. 7(3): 209-217 (2008) - Eric Y. Cheng, Yen Lin Liu:
Adoption of Knowledge Management Technologies and Organisational Culture: an Exploratory Study. J. Inf. Knowl. Manag. 7(1): 15-29 (2008) - John W. Coffey, Thomas C. Eskridge:
Case Studies of Knowledge Modeling for Knowledge Preservation and Sharing in the US Nuclear Power Industry. J. Inf. Knowl. Manag. 7(3): 173-185 (2008) - Wei Dai, Lorna Uden:
Empowering SME Users through Technology Innovation: a Services Computing Approach. J. Inf. Knowl. Manag. 7(4): 267-278 (2008) - K. Duraiswamy, N. Maheswari:
Sensitive Items in Privacy Preserving - Association Rule Mining. J. Inf. Knowl. Manag. 7(1): 31-35 (2008) - Shanmugasundaram Hariharan, Rengaramanujam Srinivasan:
A Comparison of Similarity Measures for Text Documents. J. Inf. Knowl. Manag. 7(1): 1-8 (2008) - Ari Jantunen, Kaisu Puumalainen, Pia Hurmelinna-Laukkanen:
Knowledge Sharing and Innovation Performance. J. Inf. Knowl. Manag. 7(3): 187-195 (2008) - Ravi Kant, M. D. Singh:
Knowledge Management Implementation: Modeling the Barriers. J. Inf. Knowl. Manag. 7(4): 291-305 (2008) - Michael E. D. Koenig, Kenneth Neveroski:
The Origins and Development of Knowledge Management. J. Inf. Knowl. Manag. 7(4): 243-254 (2008) - Priyantha Kumarawadu:
Achieving Competitive Advantage through Knowledge Management Initiatives in Small and Medium Software Industry. J. Inf. Knowl. Manag. 7(4): 255-265 (2008) - Jun Li, Lingling Zhang, Yong Shi:
Research on Evaluation Model of Organisational Knowledge Assets. J. Inf. Knowl. Manag. 7(1): 47-54 (2008) - Monika Mittal:
Personal Knowledge Management: a Study of Knowledge Behaviour of Academicians. J. Inf. Knowl. Manag. 7(2): 93-100 (2008) - Fattah Nazem:
The Compilation of Math Pattern for Productivity in Educational Organisations, Service Organisations (Municipalities), and Industrial Organisations Based on Organisational Climate in Iran. J. Inf. Knowl. Manag. 7(2): 75-82 (2008) - Kwang Sing Ngui, Peter Songan, Kian Sam Hong:
Organisational Learning Capability of Malaysia SMEs: Examining the Effects of entrepreneurial Orientation and Human-Capital Development Practices. J. Inf. Knowl. Manag. 7(4): 219-230 (2008) - Bruce E. Perrott:
Towards a Model of Transformation: Manager's Perceptions of Transformation in an E-Business Environment. J. Inf. Knowl. Manag. 7(2): 63-74 (2008) - Sumit Pillai, Rajen K. Gupta, K. B. C. Saxena:
From Rhetoric to Reality: an Enquiry into KM Initiatives in an Organisation of Higher Learning. J. Inf. Knowl. Manag. 7(3): 135-143 (2008) - Selwyn Piramuthu:
Adaptive Framework for Collisions in RFID Tag Identification. J. Inf. Knowl. Manag. 7(1): 9-14 (2008) - Jayanthi Ranjan:
Knowledge Management in Business Schools. J. Inf. Knowl. Manag. 7(1): 55-62 (2008) - Diego Reforgiato Recupero, Rodrigo A. Gutiérrez, Dennis E. Shasha:
Graphclust: a Method for Clustering Database of Graphs. J. Inf. Knowl. Manag. 7(4): 231-241 (2008) - Md. Roknuzzaman, Katsuhiro Umemoto:
Knowledge Management's Relevance to Library and Information Science: an Interdisciplinary Approach. J. Inf. Knowl. Manag. 7(4): 279-290 (2008) - Mark W. Salisbury:
A Framework for Reusing and Repurposing Knowledge Work in Organisations. J. Inf. Knowl. Manag. 7(2): 101-111 (2008) - Valle Santos-Álvarez, Teresa García Merino:
The Export Decision and the Cognitive Limitation of the Managers. J. Inf. Knowl. Manag. 7(2): 123-133 (2008) - Suraya Hamid, Hamidah Ahmad:
Knowledge Management in Tourism Industry: KMS for Tourist Information Counter in Malaysia. J. Inf. Knowl. Manag. 7(3): 159-172 (2008) - Deborah E. Swain, Jean-Pierre Booto Ekionea:
A Framework for Developing and Aligning a Knowledge Management Strategy. J. Inf. Knowl. Manag. 7(2): 113-122 (2008) - Madjid Tavana:
Knowledge-Based Expert System Development and Validation with Petri Nets. J. Inf. Knowl. Manag. 7(1): 37-46 (2008)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-18 17:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint