Software failure prediction based on a Markov Bayesian network model |
Fe:160 |
OR/MS / 45 / 4 / 467 |
Dynamical networks for information processing |
Cc:160 |
OR/MS / 45 / 3 / 293 |
Recursive self-organizing network models |
Fb:160 |
OR/MS / 45 / 3 / 345 |
The effect of piracy on the market penetration of subscription software |
Fz:160 |
OR/MS / 45 / 2 / 223 |
Economics of information in the web economy toward a new theory? |
Fc:160 |
OR/MS / 45 / 1 / 105 |
A review of studies on expert estimation of software development effort |
Fe:160 |
OR/MS / 45 / 1 / 107 |
Software project control centers: Concepts and approaches |
Fe:160 |
OR/MS / 45 / 1 / 109 |
Web page feature selection and classification using neural networks |
Fc:160 |
OR/MS / 44 / 6 / 695 |
Investors’ resource commitments and information reporting systems: Control in international joint ventures |
Fd:160 |
OR/MS / 44 / 6 / 697 |
The researcher’s challenge: Building a credible literature review using electronic databases |
Fe:160 |
OR/MS / 44 / 6 / 701 |
Small business internet commerce: A case study |
Fc:160 |
OR/MS / 44 / 5 / 577 |
Vendor related risks in IT development: A chronology of an outsourced project failure |
Fd:160 |
OR/MS / 44 / 5 / 579 |
Perceptions on IS risks and failure types: A comparison of designers from the United States, Japan and Korea |
Fd:160 |
OR/MS / 44 / 5 / 581 |
The influence of business managers’ IT competence on championing IT |
Fd:160 |
OR/MS / 44 / 5 / 583 |
Beyond normal failures: Dynamic management of software projects |
Fe:160 |
OR/MS / 44 / 5 / 585 |
The dawning of the automatic computing era |
Fz:160 |
OR/MS / 44 / 5 / 587 |
The security of confidential numerical data in databases |
Fz:160 |
OR/MS / 44 / 5 / 589 |
A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development |
Ec:160 |
OR/MS / 44 / 4 / 447 |
Statistical fraud detection: A review |
Ec:160 |
OR/MS / 44 / 4 / 449 |
How to build a WebFountain: An architecture for very large-scale text analytics |
Fa:160 |
OR/MS / 44 / 4 / 459 |
Database aggregation of imprecise and uncertain evidence |
Fd:160 |
OR/MS / 44 / 4 / 465 |
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction |
Fd:160 |
OR/MS / 44 / 4 / 469 |
Supply chain information technology metrics |
Ah:160 |
OR/MS / 44 / 3 / 255 |
Demand chain management in manufacturing and services: Web-based integration, drivers and performance |
Ah:160 |
OR/MS / 44 / 3 / 257 |
A multi-objective, multi-criteria approach for evaluating IT investments: Results from two case studies |
Cb:160 |
OR/MS / 44 / 3 / 267 |
Rules and fuzzy rules in text: Concept, extraction and usage |
Ec:160 |
OR/MS / 44 / 3 / 309 |
Success factors in the implementation of a collaborative technology and resulting productivity improvements in a small business: An explorative study |
Fa:160 |
OR/MS / 44 / 3 / 319 |
Managing online auctions: Current business and research issues |
Fc:160 |
OR/MS / 44 / 3 / 325 |
Dawn of the e-bomb |
Fc:160 |
OR/MS / 44 / 3 / 329 |
Soft approaches to distributed information retrieval |
Fd:160 |
OR/MS / 44 / 3 / 331 |
How not to measure the efficiency of public services (and how one might) |
Fd:160 |
OR/MS / 44 / 3 / 333 |
Motivators of software process improvement: An analysis of practitioners’ views |
Fe:160 |
OR/MS / 44 / 3 / 335 |
Key success factors for implementing software process improvement: A maturity-based analysis |
Fe:160 |
OR/MS / 44 / 3 / 339 |
Technology and organizations: Where’s the off button? |
Fa:160 |
OR/MS / 44 / 2 / 189 |
Hijacking the web |
Fc:160 |
OR/MS / 44 / 2 / 201 |
Software evaluation problem situations |
Fe:160 |
OR/MS / 44 / 2 / 205 |
A comparison of methods for locating features in legacy software |
Fe:160 |
OR/MS / 44 / 2 / 207 |
Combining techniques to optimize effort predictions in software project management |
Fe:160 |
OR/MS / 44 / 2 / 209 |
The evolution of storage systems |
Fz:160 |
OR/MS / 44 / 2 / 211 |
e-integration in the supply chain: Barriers and performance |
Ah:160 |
OR/MS / 44 / 1 / 31 |
The internet and the price-value-loyalty chain |
Fc:160 |
OR/MS / 44 / 1 / 89 |
Perceptions and attitudes about e-commerce development in China: An exploratory study |
Fc:160 |
OR/MS / 44 / 1 / 91 |
Enterprise resource planning: Implementation procedures and critical success factors |
Fd:160 |
OR/MS / 44 / 1 / 97 |
Understanding the hidden dissatisfaction of users toward end-user computing |
Fd:160 |
OR/MS / 44 / 1 / 101 |
A longitudinal study of software process management in Taiwan’s top companies |
Fe:160 |
OR/MS / 44 / 1 / 107 |
e-business and supply chain management |
Ah:160 |
OR/MS / 43 / 6 / 619 |
Virtual team trust: Instrument development and validation in an IS educational environment |
Bc:160 |
OR/MS / 43 / 6 / 623 |
When subordinates become IT contractors: Persistent managerial expectations in IT outsourcing |
Fa:160 |
OR/MS / 43 / 6 / 687 |
Trust transfer on the World Wide Web |
Fc:160 |
OR/MS / 43 / 6 / 695 |
A rule-based video database system architecture |
Fd:160 |
OR/MS / 43 / 6 / 697 |
Privacy protection of binary confidential data against deterministic, stochastic and insider threat |
Fd:160 |
OR/MS / 43 / 6 / 699 |
Online trust: A stakeholder perspective, concepts, implications and future directions |
Fc:160 |
OR/MS / 43 / 5 / 587 |
Online analytical mining of path traversal patterns for web measurement |
Fc:160 |
OR/MS / 43 / 5 / 589 |
Issues in implementing ERP: A case study |
Fd:160 |
OR/MS / 43 / 5 / 591 |
A two phase optimization technique for XML queries with multiple regular path expressions |
Cd:160 |
OR/MS / 43 / 4 / 401 |
Businesses as buildings: Metrics for the architectural quality of internet businesses |
Fc:160 |
OR/MS / 43 / 4 / 461 |
IT alignment and firm performance in small manufacturing firms |
Fd:160 |
OR/MS / 43 / 4 / 463 |
A testing approach for large system portfolios in industrial environments |
Fd:160 |
OR/MS / 43 / 4 / 465 |
A decision-tree-based symbolic rule induction system for text categorization |
Fd:160 |
OR/MS / 43 / 4 / 467 |
Library website user testing |
Fc:160 |
OR/MS / 43 / 3 / 343 |
Knowledge management: Philosophy, processes and pitfalls |
Fd:160 |
OR/MS / 43 / 3 / 345 |
Software process management of top companies in Taiwan: A comparative study |
Fe:160 |
OR/MS / 43 / 3 / 347 |
Global comparison of stages of growth based on critical success factors |
Fd:160 |
OR/MS / 43 / 2 / 219 |
Representation and storage of motion data |
Fd:160 |
OR/MS / 43 / 2 / 221 |
An intelligent coherent approach to cooperation between TCP and ATM congestion and control algorithms – modeling and simulation analysis |
Fd:160 |
OR/MS / 43 / 2 / 225 |
Regression testing of database applications |
Fe:160 |
OR/MS / 43 / 2 / 229 |
Challenges of component-based development |
Fe:160 |
OR/MS / 43 / 2 / 231 |
An integrated architecture for tightly coupled design and evaluation of educational multimedia |
Bf:160 |
OR/MS / 43 / 1 / 35 |
Intelligent assessment of distance learning |
Bf:160 |
OR/MS / 43 / 1 / 37 |
Data mining for network intrusion detection: A comparison of alternative methods |
Ee:160 |
OR/MS / 43 / 1 / 81 |
Benchmarking data mining algorithms |
Fd:160 |
OR/MS / 43 / 1 / 99 |
A simplified model of software project dynamics |
Fe:160 |
OR/MS / 43 / 1 / 105 |
Software requirements validation via task analysis |
Fe:160 |
OR/MS / 43 / 1 / 107 |
A platform-neutral live IP/TV presentation system |
Bf:160 |
OR/MS / 42 / 6 / 627 |
Chaos theory as a framework for studying information systems |
Da:160 |
OR/MS / 42 / 6 / 653 |
Maintaining security and timeliness in real-time database system |
Fd:160 |
OR/MS / 42 / 6 / 683 |
Deciding how long to test software |
Fe:160 |
OR/MS / 42 / 6 / 685 |
Automated prototyping tool-kit (APT) |
Fe:160 |
OR/MS / 42 / 6 / 691 |
Producing reliable software: An experiment |
Fe:160 |
OR/MS / 42 / 6 / 693 |
Software engineering technology watch |
Fe:160 |
OR/MS / 42 / 6 / 695 |