Content
March 2010, Volume 12, Issue 1
- 1-7 Advances in multi-agency disaster management: Key elements in disaster research
by Marijn Janssen & JinKyu Lee & Nitesh Bharosa & Anthony Cresswell - 9-27 Collaborative systems development in disaster relief: The impact of multi-level governance
by Edgar A. Maldonado & Carleen F. Maitland & Andrea H. Tapia - 29-47 Alert based disaster notification and resource allocation
by Dickson K. W. Chiu & Drake T. T. Lin & Eleanna Kafeza & Minhong Wang & Haiyang Hu & Hua Hu & Yi Zhuang - 49-65 Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises
by Nitesh Bharosa & JinKyu Lee & Marijn Janssen - 67-79 Information intermediaries for emergency preparedness and response: A case study from public health
by Minu Ipe & T. S. Raghu & Ajay Vinze - 81-95 Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system
by Jane Fedorowicz & Janis L. Gogan
November 2009, Volume 11, Issue 5
- 481-482 Intelligent systems and smart homes
by Jong Hyuk Park & Ching-Hsien Hsu & Hamid R. Arabnia - 483-490 Service integration with UPnP agent for an ubiquitous home environment
by Wally Chen & Sy-Yen Kuo & Han-Chieh Chao - 491-500 A novel memory management scheme for residential gateways
by Ibrahim Kamel & Beizhong Chen - 501-512 Location-aware communications in smart environments
by Ichiro Satoh - 513-521 T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks
by Jiman Hong & Joongjin Kook & Sangjun Lee & Dongseop Kwon & Sangho Yi - 523-528 A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA
by Hak-Man Kim & Jong-Joo Lee & Myong-Chul Shin & Seok-Soo Kim - 529-536 A ubiquitous smart home for elderly
by M. W. Raad & L. T. Yang - 537-537 Monitoring user activities in smart home environments
by Sajid Hussain & Senol Zafer Erdogan & Jong Hyuk Park - 539-549 Monitoring user activities in smart home environments
by Sajid Hussain & Senol Zafer Erdogen & Jong Hyuk Park - 551-559 Learning fuzzy concept hierarchy and measurement with node labeling
by Been-Chian Chien & Chih-Hung Hu & Ming-Yi Ju - 561-567 A study on applying context-aware technology on hypothetical shopping advertisement
by Jae-gu Song & Seoksoo Kim - 569-597 VO breeding environments & virtual organizations integral business process management framework
by David Romero & Arturo Molina - 599-608 A ‘smart house’ is not a home: The domestication of ICTs
by Helen J. Richardson
September 2009, Volume 11, Issue 4
- 345-347 Editorial for the special issue of knowledge discovery and management in biomedical information systems
by Ying Liu & Lawrence Wing-Chi Chan & Chi-Ren Shyu & Ying Liu - 349-368 An automated bacterial colony counting and classification system
by Wei-Bang Chen & Chengcui Zhang - 369-379 Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model
by Alex K. S. Wong & Lawrence W. C. Chan & Ying Liu - 381-389 Image fusion enhancement of deformable human structures using a two-stage warping-deformable strategy: A content-based image retrieval consideration
by Fuk-hay Tang & H. S. Horace Ip - 391-403 Interactive survival analysis with the OCDM system: From development to application
by Sebastian Klenk & Jürgen Dippon & Peter Fritz & Gunther Heidemann - 405-417 Design of an RFID-based Healthcare Management System using an Information System Design Theory
by E. W. T. Ngai & J. K. L. Poon & F. F. C. Suk & C. C. Ng - 419-431 Coronary artery disease prediction method using linear and nonlinear feature of heart rate variability in three recumbent postures
by Heon Gyu Lee & Wuon-Shik Kim & Ki Yong Noh & Jin-Ho Shin & Unil Yun & Keun Ho Ryu - 433-447 Efficient mining of multilevel gene association rules from microarray and gene ontology
by Vincent S. Tseng & Hsieh-Hui Yu & Shih-Chiang Yang - 449-460 Comparing data mining methods with logistic regression in childhood obesity prediction
by Shaoyan Zhang & Christos Tjortjis & Xiaojun Zeng & Hong Qiao & Iain Buchan & John Keane - 461-469 Proportional fault-tolerant data mining with applications to bioinformatics
by Guanling Lee & Sheng-Lung Peng & Yuh-Tzu Lin - 471-480 Knowledge management in biomedical libraries: A semantic web approach
by Damaris Fuentes-Lorenzo & Jorge Morato & Juan Miguel Gómez
July 2009, Volume 11, Issue 3
- 201-209 Challenges and opportunities in collaborative business process management: Overview of recent advances and introduction to the special issue
by Chengfei Liu & Qing Li & Xiaohui Zhao - 211-225 Evie - A developer toolkit for encoding service interaction patterns
by Anthony M. J. O’Hagan & Shazia Sadiq & Wasim Sadiq - 227-239 Quality analysis of composed services through fault injection
by Maria Grazia Fugini & Barbara Pernici & Filippo Ramoni - 241-256 Towards ubiquitous tourist service coordination and process integration: A collaborative travel agent system architecture with semantic web services
by Dickson K. W. Chiu & Yves T. F. Yueh & Ho-fung Leung & Patrick C. K. Hung - 257-272 CoBTx-Net: A model for business collaboration reliability verification
by Haiyang Sun & Jian Yang & Lai Xu - 273-291 Evaluation of inter-organizational business process solutions: A conceptual model-based approach
by Johny Ghattas & Pnina Soffer - 293-305 Delegating revocations and authorizations in collaborative business environments
by Hua Wang & Jinli Cao & Yanchun Zhang - 307-322 Analysis of a collaborative workflow process with distributed actors
by Hajo A. Reijers & Minseok Song & Byungduk Jeong - 323-333 Investigating mobile wireless technology adoption: An extension of the technology acceptance model
by Sanghyun Kim & Gary Garrison - 335-343 A secure e-auction scheme based on group signatures
by Cheng-Chi Lee & Pi-Fang Ho & Min-Shiang Hwang
April 2009, Volume 11, Issue 2
- 103-104 Guest editorial: Information and communications technology for development
by Balaji Parthasarathy & Krithi Ramamritham - 105-116 If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India
by Joyojeet Pal - 117-128 Design of a braille writing tutor to combat illiteracy
by N. Kalra & T. Lauwers & D. Dewey & T. Stepleton & M. B. Dias - 129-144 “My child will be respected”: Parental perspectives on computers and education in Rural India
by Joyojeet Pal & Meera Lakshmanan & Kentaro Toyama - 145-154 Advancement through interactive radio
by S. Revi Sterling & John O’Brien & John K. Bennett - 155-166 ICT intervention in the ‘Chandanbari’ Village of Bangladesh: Results from a field study
by Mahfuz Ashraf & Jo Hanisch & Paul Swatman - 167-179 Effect of the food traceability system for building trust: Price premium and buying behavior
by Young Chan Choe & Joowon Park & Miri Chung & Junghoon Moon - 181-188 Managing cooperation in e-business systems
by Pradeep Ray & Lundy Lewis - 189-200 Managing the diffusion of organizational learning behavior
by Gary F. Templeton & Mark B. Schmidt & G. Stephen Taylor
March 2009, Volume 11, Issue 1
- 1-5 Special issue on Ambient Intelligence
by Satyen Mukherjee & Emile Aarts & Terry Doyle - 7-18 Harvesting mechanical energy for ambient intelligent devices
by Bert Op het Veld & Dennis Hohlfeld & Valer Pop - 19-41 Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
by Jorge Guajardo & Boris Škorić & Pim Tuyls & Sandeep S. Kumar & Thijs Bel & Antoon H. M. Blom & Geert-Jan Schrijen - 43-60 Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom
by Yuan-Chu Hwang & Soe-Tsyr Yuan - 61-73 Distributed network intelligence: A prerequisite for adaptive and personalised service delivery
by M. J. O’Grady & G. M. P. O’Hare & J. Chen & D. Phelan - 75-86 Method of design and specification of web services based on quality system documentation
by Miladin Stefanovic & Milan Matijević & Milan Erić & Visnja Simic - 87-102 Profiling a decade of Information Systems Frontiers’ research
by Yogesh K. Dwivedi & Banita Lal & Navonil Mustafee & Michael D. Williams
November 2008, Volume 10, Issue 5
- 499-501 Advances in enterprise information systems
by Ling Li & Ricardo Valerdi & John N. Warfield - 503-518 Complex service design: A virtual enterprise architecture for logistics service
by Charles Møller & Sohail S. Chaudhry & Bent Jørgensen - 519-529 Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies
by WenAn Tan & ChuanQun Jiang & Ling Li & Zhenhong Lv - 531-542 Creation of environmental health information system for public health service: A pilot study
by Ling Li & Li Xu & Hueiwang Anna Jeng & Dayanand Naik & Thomas Allen & Maria Frontini - 543-553 Architecture, implementation and application of complex event processing in enterprise information systems based on RFID
by Chuanzhen Zang & Yushun Fan & Renjing Liu - 555-571 A literature review of electronic marketplace research: Themes, theories and an integrative framework
by Shan Wang & Shi Zheng & Lida Xu & Dezheng Li & Huan Meng - 573-588 An OVAL-based active vulnerability assessment system for enterprise computer networks
by Xiuzhen Chen & Qinghua Zheng & Xiaohong Guan - 589-600 Parameter mapping and data transformation for engineering application integration
by Chengen Wang & Lida Xu - 601-609 The concept and theory of material flow
by Shoubo Xu - 611-624 An approach to enterprise process dynamic modeling supporting enterprise process evolution
by Lida Xu & WenAn Tan & Hongyuan Zhen & Weiming Shen
September 2008, Volume 10, Issue 4
- 385-390 Guest Editorial: A profile of adoption of Information & Communication Technologies (ICT) research in the household context
by Yogesh K. Dwivedi & Michael D. Williams & Viswanath Venkatesh - 391-395 Digital home technologies and transformation of households
by Alladi Venkatesh - 397-402 Household technology adoption, use, and impacts: Past, present, and future
by Susan A. Brown - 403-413 Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values
by Xiaojun Zhang & Likoebe M. Maruping - 415-429 Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services
by Roman Beck & Daniel Beimborn & Tim Weitzel & Wolfgang König - 431-445 Understanding the behavior of mobile data services consumers
by Se-Joon Hong & James Y. L. Thong & Jae-Yun Moon & Kar-Yan Tam - 447-459 Social networking and digital gaming media convergence: Classification and its consequences for appropriation
by Marie Griffiths & Ben Light - 461-472 Affective e-Learning in residential and pervasive computing environments
by Liping Shen & Victor Callaghan & Ruimin Shen - 473-482 E-government adoption: A cultural comparison
by Lemuria Carter & Vishanth Weerakkody - 483-497 Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis
by Dinesh A. Mirchandani & Julius H. Johnson Jr. & Kailash Joshi
July 2008, Volume 10, Issue 3
- 277-279 Decision models for information systems management
by Kweku-Muata Osei-Bryson & Ojelanki Ngwenyama - 281-292 Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories
by Sergey Samoilenko - 293-305 Analyzing IT maintenance outsourcing decision from a knowledge management perspective
by Mehmet N. Aydin & Mark E. Bakker - 307-319 An approach to analyzing and planning post-merger IS integration: Insights from two field studies
by Maria Alaranta & Stefan Henningsson - 321-330 A process-focused decision framework for analyzing the business value potential of IT investments
by Helana Scheepers & Rens Scheepers - 331-345 Towards an integrated measurement of IS project performance: The project performance scorecard
by Corlane Barclay - 347-359 Team performance and information system implementation
by Malgorzata Plaza - 361-373 An approach for incorporating quality-based cost–benefit analysis in data warehouse design
by Lila Rao & Kweku-Muata Osei-Bryson - 375-383 Is your back-up IT infrastructure in a safe location?
by Ozgur Turetken
April 2008, Volume 10, Issue 2
- 125-127 Foreword to the special issue on IS sourcing
by Rudy Hirschheim & Jens Dibbern & Armin Heinzl - 129-143 Firm strategic profile and IT outsourcing
by Benoit A. Aubert & Guillaume Beaurivage & Anne-Marie Croteau & Suzanne Rivard - 145-163 An integrative model of trust on IT outsourcing: Examining a bilateral perspective
by Jae-Nam Lee & Minh Q. Huynh & Rudy Hirschheim - 165-178 Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company
by Julie Fisher & Rudy Hirschheim & Robert Jacobs - 179-194 Information technology workforce skills: The software and IT services provider perspective
by Tim Goles & Stephen Hawk & Kate M. Kaiser - 195-210 Strategic dependence on the IT resource and outsourcing: A test of the strategic control model
by Detmar Straub & Peter Weill & Kathy S. Schwaig - 211-224 The impact of process standardization on business process outsourcing success
by Kim Wüllenweber & Daniel Beimborn & Tim Weitzel & Wolfgang König - 225-241 Turnover intentions of Indian IS professionals
by Mary C. Lacity & Vidya V. Iyer & Prasad S. Rudramuniyaiah - 243-258 The impact of cultural differences in offshore outsourcing—Case study results from German–Indian application development projects
by Jessica K. Winkler & Jens Dibbern & Armin Heinzl - 259-275 A US Client’s learning from outsourcing IT work offshore
by Joseph W. Rottman & Mary C. Lacity
March 2008, Volume 10, Issue 1
- 1-2 Editorial
by R. Ramesh & H. R. Rao - 3-18 Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation
by Janice C. Sipior & Burke T. Ward - 19-32 Formalising theories of trust for authentication protocols
by Ji Ma & Mehmet A. Orgun - 33-45 A scalable multi-level feature extraction technique to detect malicious executables
by Mohammad M. Masud & Latifur Khan & Bhavani Thuraisingham - 47-60 Building effective online game websites with knowledge-based trust
by Clyde W. Holsapple & Jiming Wu - 61-75 Market reaction to patent infringement litigations in the information technology industry
by T. S. Raghu & Wonseok Woo & S. B. Mohan & H. Raghav Rao - 77-102 Spectrum acquisition strategies adopted by wireless carriers in the USA
by Hemant K. Sabat - 103-110 Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading
by Borka Jerman-Blažič - 111-124 A decision support system for locating VHF/UHF radio jammer systems on the terrain
by Cevriye Gencer & Emel Kizilkaya Aydogan & Coskun Celik
November 2007, Volume 9, Issue 5
- 449-450 Special issue on secure knowledge management
by Nasir Memon & Thomas Daniels - 451-467 Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
by Yanjun Zuo & Timothy O’Keefe - 469-479 An interorganizational knowledge-sharing security model with breach propagation detection
by Daniel S. Soper & Haluk Demirkan & Michael Goul - 481-492 Overcoming organizational challenges to secure knowledge management
by Finn Olav Sveen & Eliot Rich & Matthew Jager - 493-504 Security as a contributor to knowledge management success
by Murray E. Jennex & Suzanne Zyngier - 505-514 Virtual organization security policies: An ontology-based integration approach
by Saravanan Muthaiyah & Larry Kerschberg - 515-529 Sharing information and building trust through value congruence
by Joseph A. Cazier & Benjamin B. M. Shao & Robert D. St. Louis - 531-539 An examination of private intermediaries’ roles in software vulnerabilities disclosure
by Pu Li & H. Raghav Rao - 541-556 Managing the false alarms: A framework for assurance and verification of surveillance monitoring
by Peter Goldschmidt
September 2007, Volume 9, Issue 4
- 325-326 Special issue on enterprise distributed computing model and implementation
by Patrick C. K. Hung - 327-342 Requirements traceability in model-driven development: Applying model and transformation conformance
by João Paulo A. Almeida & Maria-Eugenia Iacob & Pascal Eck - 343-358 Ubiquitous enterprise service adaptations based on contextual user behavior
by Dan Hong & Dickson K. W. Chiu & Vincent Y. Shen & S. C. Cheung & Eleanna Kafeza - 359-373 The adequacy of languages for representing interaction mechanisms
by Remco M. Dijkman & Teduh Dirgahayu & Dick A. C. Quartel - 375-389 WS-CDL+ for web service collaboration
by Zuling Kang & Hongbing Wang & Patrick C. K. Hung - 391-409 A model-driven development framework for enterprise Web services
by Xiaofeng Yu & Yan Zhang & Tian Zhang & Linzhang Wang & Jun Hu & JianHua Zhao & Xuandong Li - 411-421 Agent-mediated knowledge sharing for intelligent services management
by Michael F. Nowlan & M. Brian Blake - 423-437 VsLattice: A vector-based conceptual index structure for web service retrieval
by Dunlu Peng & Xiaoling Wang & Aoying Zhou - 439-448 EXEM: Efficient XML data exchange management for mobile applications
by Yuri Natchetoi & Huaigu Wu & Gilbert Babin & Serhan Dagtas
July 2007, Volume 9, Issue 2
- 135-136 ISF special issue on enterprise services computing: Evolution and challenges
by Patrick C. K. Hung & Don Sparrow & Qing Li - 137-150 Specifying and controlling multi-channel web interfaces for enterprise applications
by Matthias Book & Volker Gruhn - 151-162 Reducing verification effort in component-based software engineering through built-in testing
by Daniel Brenner & Colin Atkinson & Rainer Malaka & Matthias Merdes & Barbara Paech & Dima Suliman - 163-180 Enterprise architecture analysis with extended influence diagrams
by Pontus Johnson & Robert Lagerström & Per Närman & Mårten Simonsson - 181-194 From trading to eCommunity management: Responding to social and contractual challenges
by Lea Kutvonen & Janne Metso & Sini Ruohomaa - 195-208 Integrated model-driven dashboard development
by Themis Palpanas & Pawan Chowdhary & George Mihaila & Florian Pinel - 209-224 QoS-aware model driven architecture through the UML and CIM
by Kenneth Chan & Iman Poernomo - 225-244 COSMO: A conceptual framework for service modelling and refinement
by Dick A. C. Quartel & Maarten W. A. Steen & Stanislav Pokraev & Marten J. Sinderen - 245-256 The imagination market
by Christina Ann LaComb & Janet Arlie Barnett & Qimei Pan - 257-265 A model of the dynamics of the market of COTS software, in the absence of new entrants
by Michele Marchesi & Giancarlo Succi & Barbara Russo - 267-282 A model for a web-based learning system
by Vincenza Carchiolo & Alessandro Longheu & Michele Malgeri & Giuseppe Mangioni - 283-296 Do e-business strategies matter? The antecedents and relationship with firm performance
by Chulmo Koo & Jaeki Song & Yong Jin Kim & Kichan Nam - 297-308 Assessing the UK policies for broadband adoption
by Jyoti Choudrie & Anastasia Papazafeiropoulou - 309-324 Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements
by Y. I. Song & W. Woo & H. R. Rao
March 2007, Volume 9, Issue 1
- 1-8 Services computing as the foundation of enterprise agility: Overview of recent advances and introduction to the special issue
by J. Leon Zhao & Mohan Tanniru & Liang-Jie Zhang - 9-27 A web services framework for distributed model management
by Therani Madhusudan - 29-51 Guided interaction: A mechanism to enable ad hoc service interaction
by Phillipa Oaks & Arthur Hofstede - 53-67 Realizing the vision for web services: Strategies for dealing with imperfect standards
by Sanjay Gosain - 69-84 A framework for deriving semantic web services
by David Bell & Sergio Cesare & Nicola Iacovelli & Mark Lycett & Antonio Merico - 85-101 End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach
by Patrick C. K. Hung & Dickson K. W. Chiu & W. W. Fung & William K. Cheung & Raymond Wong & Samuel P. M. Choi & Eleanna Kafeza & James Kwok & Joshua C. C. Pun & Vivying S. Y. Cheng - 103-118 Enhancing the efficiency of supply chain processes through web services
by Seung-Hyun Rhee & Hyerim Bae & Yongsun Choi - 119-134 A theoretical investigation of the emerging standards for web services
by Karthikeyan Umapathy & Sandeep Purao
December 2006, Volume 8, Issue 5
- 335-337 Economic aspects of information security: An emerging field of research
by Lawrence A. Gordon & Martin P. Loeb - 338-349 Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
by Kjell Hausken - 350-362 Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
by Ashish Arora & Anand Nandkumar & Rahul Telang - 363-374 An experimental economics approach toward quantifying online privacy choices
by J. C. Poindexter & Julia B. Earp & David L. Baumer - 375-394 Capturing and reusing knowledge in engineering change management: A case of automobile development
by Hong Joo Lee & Hyung Jun Ahn & Jong Woo Kim & Sung Joo Park - 395-410 Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing
by Youcef Baghdadi
September 2006, Volume 8, Issue 4
- 253-254 Web and distributed information systems: Special issue of the journal of information systems frontiers
by Muhammad Younas & Kuo-Ming Chao & Ying Huang - 255-269 A user-friendly platform for developing and accessing grid services
by Hiroyuki Morohoshi & Runhe Huang & Jianhua Ma - 271-284 Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks
by Kenichi Watanabe & Tomoya Enokido & Makoto Takizawa - 285-295 Mobility management for m-commerce requests in wireless cellular networks
by Irfan Awan - 297-306 A web-based e-learning system for increasing study efficiency by stimulating learner’s motivation
by Leonard Barolli & Akio Koyama & Arjan Durresi & Giuseppe Marco - 307-319 The realization of service-oriented e-Marketplaces
by Yinsheng Li & Xiaohua Lu & Kuo-Ming Chao & Ying Huang & Muhammad Younas - 321-333 Parameter learning of personalized trust models in broker-based distributed trust management
by Jane Yung-jen Hsu & Kwei-Jay Lin & Tsung-Hsiang Chang & Chien-ju Ho & Han-Shen Huang & Wan-rong Jih
July 2006, Volume 8, Issue 3
- 147-161 A data mining approach to database compression
by Chin-Feng Lee & S. Wesley Changchien & Wei-Tse Wang & Jau-Ji Shen - 163-177 An attack-norm separation approach for detecting cyber attacks
by Nong Ye & Toni Farley & Deepak Lakshminarasimhan - 179-194 Optimum design of electronic communities as economic entities
by Levent V. Orman - 195-209 Splitting methods for decision tree induction: An exploration of the relative performance of two entropy-based families
by Kweku-Muata Osei-Bryson & Kendall Giles - 211-223 Interplay of cost and adoption of tele-medicine in Sub-Saharan Africa: The case of tele-cardiology in Ethiopia
by Mengistu Kifle & Victor W. A. Mbarika & Pratim Datta - 225-239 The rise and fall of the competitive local exchange carriers in the U.S.: An institutional perspective
by Qing Hu & C. Derrick Huang - 241-252 Social influence process in the acceptance of a virtual community service
by Jaeki Song & Yong Jin Kim
February 2006, Volume 8, Issue 2
- 63-66 Enterprise architecture: Management tool and blueprint for the organisation
by Henk Jonkers & Marc M. Lankhorst & Hugo W. L. ter Doest & Farhad Arbab & Hans Bosma & Roel J. Wieringa - 67-79 Management and enterprise architecture click: The FAD(E)E framework
by Frank G. Goethals & Monique Snoeck & Wilfried Lemahieu & Jacques Vandenbulcke - 81-90 A survey on CIO concerns-do enterprise architecture frameworks support them?
by Åsa Lindström & Pontus Johnson & Erik Johansson & Mathias Ekstedt & Mårten Simonsson - 91-102 Business architecture: A new paradigm to relate business strategy to ICT
by Gerrit Versteeg & Harry Bouwman - 103-113 The many faces of architectural descriptions
by Danny Greefhorst & Henk Koning & Hans van Vliet - 115-131 Systemic classification of concern-based design methods in the context of enterprise architecture
by Pavel Balabko & Alain Wegmann - 133-143 An investigation into applying UML to the Zachman framework
by Ali Fatolahi & Fereidoon Shams
February 2006, Volume 8, Issue 1
- 5-7 Introduction: Knowledge Discovery in High-Throughput Biological Domains
by Janice Glasgow & Igor Jurisica - 9-20 Statistical Methods for Meta-Analysis of Microarray Data: A Comparative Study
by Pingzhao Hu & Celia M. T. Greenwood & Joseph Beyene - 21-27 Interactive Gene Clustering—A Case Study of Breast Cancer Microarray Data
by Alicja Gruźdź & Aleksandra Ihnatowicz & Dominik Ślʁzak - 29-36 Protein Structure from Contact Maps: A Case-Based Reasoning Approach
by Janice Glasgow & Tony Kuo & Jim Davies - 37-47 Predicting Protein-Protein Interactions by Association Mining
by Max Kotlyar & Igor Jurisica - 47-57 Mutation Mining—A Prospector's Tale
by Christopher J. O. Baker & René Witte
December 2005, Volume 7, Issue 4
- 335-336 Guest Editors: Special Issue in Advances in e-Technology and e-Services
by Soe-Tsyr Yuan & Jiming Liu - 337-358 Propagation Models for Trust and Distrust in Social Networks
by Cai-Nicolas Ziegler & Georg Lausen - 359-370 Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System
by Matthias Enzmann & Markus Schneider - 371-389 e-coupons: An Efficient, Secure and Delegable Micro-Payment System
by Vishwas Patil & R. K. Shyamasundar - 391-404 Combining Cooperative and Non-Cooperative Automated Negotiations
by Jen-Hsiang Chen & Kuo-Ming Chao & Nick Godwin & Von-Wun Soo - 405-419 The Layer-Seeds Term Clustering Method: Enabling Proactive Situation-Aware Product Recommendations in E-Commerce Dialogues
by Libo Chen & Marcello L'Abbate & Ulrich Thiel & Erich J. Neuhold - 421-434 e-CLV: A Modeling Approach for Customer Lifetime Evaluation in e-Commerce Domains, with an Application and Case Study for Online Auction
by Opher Etzion & Amit Fisher & Segev Wasserkrug - 435-448 Efficient Processing of Continual Range Queries for Location-Aware Mobile Services
by Kun-Lung Wu & Shyh-Kwei Chen & Philip S. Yu
July 2005, Volume 7, Issue 3
- 215-215 Foreword Design Science and Information Systems
by Ram Ramesh & H. Raghav Rao - 217-256 IT Infrastructure to Enable Next Generation Enterprises
by Amjad Umar - 257-271 Database Schema Design for a Web Services Supply Chain Manager: Requirements and Proposed Infrastructure
by Michael Goul & Karen Corral & Haluk Demirkan - 273-297 Clustering-Based Visual Interfaces for Presentation of Web Search Results: An Empirical Investigation
by Ozgur Turetken & Ramesh Sharda - 299-316 The Role of Fuzzy Awareness Modelling in Cooperative Management
by Pradeep Ray & Seyed A. Shahrestani & Farhad Daneshgar - 317-327 Adaptive Multimodule Routers for Multiprocessor Architectures
by Suresh Chalasani & Rajendra V. Boppana
May 2005, Volume 7, Issue 2
- 111-112 Guest Editors’ Introduction
by Giri K. Tayi & Ram Ramanathan & S. S. Ravi & Sanjay Goel - 113-128 Performance Comparison of Several Non-Linear Equalizers in the Context of Mobile Telecommunications
by João-Batista Destro-Filho - 129-140 Signaling Performance Trials and Evaluation Results on a GPRS Platform
by Nikolas V. Stylianides & George V. Stephanopoulos & George S. Tselikis & Michael Dopher - 141-154 Reactive Mobility by Failure: When Fail Means Move
by Alejandro Zunino & Marcelo Campo & Cristian Mateos - 155-173 Inter-organizational Emergency Medical Services: Case Study of Rural Wireless Deployment and Management
by Thomas A. Horan & Benjamin Schooley - 175-186 An Empirical Study of Use Contexts in the Mobile Internet, Focusing on the Usability of Information Architecture
by Hoyoung Kim & Jinwoo Kim & Yeonsoo Lee - 187-206 The Network Investment Economics of the Mobile Wireless Industry
by Hemant K. Sabat