| Software failure prediction based on a Markov Bayesian network model |
Fe:160 |
OR/MS / 45 / 4 / 467 |
| Dynamical networks for information processing |
Cc:160 |
OR/MS / 45 / 3 / 293 |
| Recursive self-organizing network models |
Fb:160 |
OR/MS / 45 / 3 / 345 |
| The effect of piracy on the market penetration of subscription software |
Fz:160 |
OR/MS / 45 / 2 / 223 |
| Economics of information in the web economy toward a new theory? |
Fc:160 |
OR/MS / 45 / 1 / 105 |
| A review of studies on expert estimation of software development effort |
Fe:160 |
OR/MS / 45 / 1 / 107 |
| Software project control centers: Concepts and approaches |
Fe:160 |
OR/MS / 45 / 1 / 109 |
| Web page feature selection and classification using neural networks |
Fc:160 |
OR/MS / 44 / 6 / 695 |
| Investors’ resource commitments and information reporting systems: Control in international joint ventures |
Fd:160 |
OR/MS / 44 / 6 / 697 |
| The researcher’s challenge: Building a credible literature review using electronic databases |
Fe:160 |
OR/MS / 44 / 6 / 701 |
| Small business internet commerce: A case study |
Fc:160 |
OR/MS / 44 / 5 / 577 |
| Vendor related risks in IT development: A chronology of an outsourced project failure |
Fd:160 |
OR/MS / 44 / 5 / 579 |
| Perceptions on IS risks and failure types: A comparison of designers from the United States, Japan and Korea |
Fd:160 |
OR/MS / 44 / 5 / 581 |
| The influence of business managers’ IT competence on championing IT |
Fd:160 |
OR/MS / 44 / 5 / 583 |
| Beyond normal failures: Dynamic management of software projects |
Fe:160 |
OR/MS / 44 / 5 / 585 |
| The dawning of the automatic computing era |
Fz:160 |
OR/MS / 44 / 5 / 587 |
| The security of confidential numerical data in databases |
Fz:160 |
OR/MS / 44 / 5 / 589 |
| A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development |
Ec:160 |
OR/MS / 44 / 4 / 447 |
| Statistical fraud detection: A review |
Ec:160 |
OR/MS / 44 / 4 / 449 |
| How to build a WebFountain: An architecture for very large-scale text analytics |
Fa:160 |
OR/MS / 44 / 4 / 459 |
| Database aggregation of imprecise and uncertain evidence |
Fd:160 |
OR/MS / 44 / 4 / 465 |
| Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction |
Fd:160 |
OR/MS / 44 / 4 / 469 |
| Supply chain information technology metrics |
Ah:160 |
OR/MS / 44 / 3 / 255 |
| Demand chain management in manufacturing and services: Web-based integration, drivers and performance |
Ah:160 |
OR/MS / 44 / 3 / 257 |
| A multi-objective, multi-criteria approach for evaluating IT investments: Results from two case studies |
Cb:160 |
OR/MS / 44 / 3 / 267 |
| Rules and fuzzy rules in text: Concept, extraction and usage |
Ec:160 |
OR/MS / 44 / 3 / 309 |
| Success factors in the implementation of a collaborative technology and resulting productivity improvements in a small business: An explorative study |
Fa:160 |
OR/MS / 44 / 3 / 319 |
| Managing online auctions: Current business and research issues |
Fc:160 |
OR/MS / 44 / 3 / 325 |
| Dawn of the e-bomb |
Fc:160 |
OR/MS / 44 / 3 / 329 |
| Soft approaches to distributed information retrieval |
Fd:160 |
OR/MS / 44 / 3 / 331 |
| How not to measure the efficiency of public services (and how one might) |
Fd:160 |
OR/MS / 44 / 3 / 333 |
| Motivators of software process improvement: An analysis of practitioners’ views |
Fe:160 |
OR/MS / 44 / 3 / 335 |
| Key success factors for implementing software process improvement: A maturity-based analysis |
Fe:160 |
OR/MS / 44 / 3 / 339 |
| Technology and organizations: Where’s the off button? |
Fa:160 |
OR/MS / 44 / 2 / 189 |
| Hijacking the web |
Fc:160 |
OR/MS / 44 / 2 / 201 |
| Software evaluation problem situations |
Fe:160 |
OR/MS / 44 / 2 / 205 |
| A comparison of methods for locating features in legacy software |
Fe:160 |
OR/MS / 44 / 2 / 207 |
| Combining techniques to optimize effort predictions in software project management |
Fe:160 |
OR/MS / 44 / 2 / 209 |
| The evolution of storage systems |
Fz:160 |
OR/MS / 44 / 2 / 211 |
| e-integration in the supply chain: Barriers and performance |
Ah:160 |
OR/MS / 44 / 1 / 31 |
| The internet and the price-value-loyalty chain |
Fc:160 |
OR/MS / 44 / 1 / 89 |
| Perceptions and attitudes about e-commerce development in China: An exploratory study |
Fc:160 |
OR/MS / 44 / 1 / 91 |
| Enterprise resource planning: Implementation procedures and critical success factors |
Fd:160 |
OR/MS / 44 / 1 / 97 |
| Understanding the hidden dissatisfaction of users toward end-user computing |
Fd:160 |
OR/MS / 44 / 1 / 101 |
| A longitudinal study of software process management in Taiwan’s top companies |
Fe:160 |
OR/MS / 44 / 1 / 107 |
| e-business and supply chain management |
Ah:160 |
OR/MS / 43 / 6 / 619 |
| Virtual team trust: Instrument development and validation in an IS educational environment |
Bc:160 |
OR/MS / 43 / 6 / 623 |
| When subordinates become IT contractors: Persistent managerial expectations in IT outsourcing |
Fa:160 |
OR/MS / 43 / 6 / 687 |
| Trust transfer on the World Wide Web |
Fc:160 |
OR/MS / 43 / 6 / 695 |
| A rule-based video database system architecture |
Fd:160 |
OR/MS / 43 / 6 / 697 |
| Privacy protection of binary confidential data against deterministic, stochastic and insider threat |
Fd:160 |
OR/MS / 43 / 6 / 699 |
| Online trust: A stakeholder perspective, concepts, implications and future directions |
Fc:160 |
OR/MS / 43 / 5 / 587 |
| Online analytical mining of path traversal patterns for web measurement |
Fc:160 |
OR/MS / 43 / 5 / 589 |
| Issues in implementing ERP: A case study |
Fd:160 |
OR/MS / 43 / 5 / 591 |
| A two phase optimization technique for XML queries with multiple regular path expressions |
Cd:160 |
OR/MS / 43 / 4 / 401 |
| Businesses as buildings: Metrics for the architectural quality of internet businesses |
Fc:160 |
OR/MS / 43 / 4 / 461 |
| IT alignment and firm performance in small manufacturing firms |
Fd:160 |
OR/MS / 43 / 4 / 463 |
| A testing approach for large system portfolios in industrial environments |
Fd:160 |
OR/MS / 43 / 4 / 465 |
| A decision-tree-based symbolic rule induction system for text categorization |
Fd:160 |
OR/MS / 43 / 4 / 467 |
| Library website user testing |
Fc:160 |
OR/MS / 43 / 3 / 343 |
| Knowledge management: Philosophy, processes and pitfalls |
Fd:160 |
OR/MS / 43 / 3 / 345 |
| Software process management of top companies in Taiwan: A comparative study |
Fe:160 |
OR/MS / 43 / 3 / 347 |
| Global comparison of stages of growth based on critical success factors |
Fd:160 |
OR/MS / 43 / 2 / 219 |
| Representation and storage of motion data |
Fd:160 |
OR/MS / 43 / 2 / 221 |
| An intelligent coherent approach to cooperation between TCP and ATM congestion and control algorithms – modeling and simulation analysis |
Fd:160 |
OR/MS / 43 / 2 / 225 |
| Regression testing of database applications |
Fe:160 |
OR/MS / 43 / 2 / 229 |
| Challenges of component-based development |
Fe:160 |
OR/MS / 43 / 2 / 231 |
| An integrated architecture for tightly coupled design and evaluation of educational multimedia |
Bf:160 |
OR/MS / 43 / 1 / 35 |
| Intelligent assessment of distance learning |
Bf:160 |
OR/MS / 43 / 1 / 37 |
| Data mining for network intrusion detection: A comparison of alternative methods |
Ee:160 |
OR/MS / 43 / 1 / 81 |
| Benchmarking data mining algorithms |
Fd:160 |
OR/MS / 43 / 1 / 99 |
| A simplified model of software project dynamics |
Fe:160 |
OR/MS / 43 / 1 / 105 |
| Software requirements validation via task analysis |
Fe:160 |
OR/MS / 43 / 1 / 107 |
| A platform-neutral live IP/TV presentation system |
Bf:160 |
OR/MS / 42 / 6 / 627 |
| Chaos theory as a framework for studying information systems |
Da:160 |
OR/MS / 42 / 6 / 653 |
| Maintaining security and timeliness in real-time database system |
Fd:160 |
OR/MS / 42 / 6 / 683 |
| Deciding how long to test software |
Fe:160 |
OR/MS / 42 / 6 / 685 |
| Automated prototyping tool-kit (APT) |
Fe:160 |
OR/MS / 42 / 6 / 691 |
| Producing reliable software: An experiment |
Fe:160 |
OR/MS / 42 / 6 / 693 |
| Software engineering technology watch |
Fe:160 |
OR/MS / 42 / 6 / 695 |