default search action
Information Systems Frontiers, Volume 8
Volume 8, Number 1, February 2006
- Igor Jurisica, Janice I. Glasgow:
Introduction: Knowledge Discovery in High-Throughput Biological Domains. 5-7 - Pingzhao Hu, Celia M. T. Greenwood, Joseph Beyene:
Statistical Methods for Meta-Analysis of Microarray Data: A Comparative Study. 9-20 - Alicja Gruzdz, Aleksandra Ihnatowicz, Dominik Slezak:
Interactive Gene Clustering-A Case Study of Breast Cancer Microarray Data. 21-27 - Janice I. Glasgow, Tony Kuo, Jim Davies:
Protein Structure from Contact Maps: A Case-Based Reasoning Approach. 29-36 - Max Kotlyar, Igor Jurisica:
Predicting Protein-Protein Interactions by Association Mining. 37-47 - Christopher J. O. Baker, René Witte:
Mutation Mining-A Prospector's Tale. 47-57
Volume 8, Number 2, February 2006
- Henk Jonkers, Marc M. Lankhorst, Hugo W. L. ter Doest, Farhad Arbab, Hans Bosma, Roel J. Wieringa:
Enterprise architecture: Management tool and blueprint for the organisation. 63-66 - Frank G. Goethals, Monique Snoeck, Wilfried Lemahieu, Jacques Vandenbulcke:
Management and enterprise architecture click: The FAD(E)E framework. 67-79 - Åsa Lindström, Pontus Johnson, Erik Johansson, Mathias Ekstedt, Mårten Simonsson:
A survey on CIO concerns-do enterprise architecture frameworks support them? 81-90 - Gerrit Versteeg, Harry Bouwman:
Business architecture: A new paradigm to relate business strategy to ICT. 91-102 - Danny Greefhorst, Henk Koning, Hans van Vliet:
The many faces of architectural descriptions. 103-113 - Pavel Balabko, Alain Wegmann:
Systemic classification of concern-based design methods in the context of enterprise architecture. 115-131 - Ali Fatolahi, Fereidoon Shams:
An investigation into applying UML to the Zachman framework. 133-143
Volume 8, Number 3, July 2006
- Chin-Feng Lee, S. Wesley Changchien, Wei-Tse Wang, Jau-Ji Shen:
A data mining approach to database compression. 147-161 - Nong Ye, Toni Farley, Deepak Lakshminarasimhan:
An attack-norm separation approach for detecting cyber attacks. 163-177 - Levent V. Orman:
Optimum design of electronic communities as economic entities. 179-194 - Kweku-Muata Osei-Bryson, Kendall Giles:
Splitting methods for decision tree induction: An exploration of the relative performance of two entropy-based families. 195-209 - Mengistu Kifle, Victor Wacham A. Mbarika, Pratim Datta:
Interplay of cost and adoption of tele-medicine in Sub-Saharan Africa: The case of tele-cardiology in Ethiopia. 211-223 - Qing Hu, C. Derrick Huang:
The rise and fall of the competitive local exchange carriers in the U.S.: An institutional perspective. 225-239 - Jaeki Song, Yong Jin Kim:
Social influence process in the acceptance of a virtual community service. 241-252
Volume 8, Number 4, September 2006
- Muhammad Younas, Kuo-Ming Chao, Ying Huang:
Web and distributed information systems: Special issue of the journal of information systems frontiers. 253-254 - Hiroyuki Morohoshi, Runhe Huang, Jianhua Ma:
A user-friendly platform for developing and accessing grid services. 255-269 - Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks. 271-284 - Irfan Awan:
Mobility management for m-commerce requests in wireless cellular networks. 285-295 - Leonard Barolli, Akio Koyama, Arjan Durresi, Giuseppe De Marco:
A web-based e-learning system for increasing study efficiency by stimulating learner's motivation. 297-306 - Yinsheng Li, Xiaohua Lu, Kuo-Ming Chao, Ying Huang, Muhammad Younas:
The realization of service-oriented e-Marketplaces. 307-319 - Jane Yung-jen Hsu, Kwei-Jay Lin, Tsung-Hsiang Chang, Chien-Ju Ho, Han-Shen Huang, Wan-rong Jih:
Parameter learning of personalized trust models in broker-based distributed trust management. 321-333
Volume 8, Number 5, December 2006
- Lawrence A. Gordon, Martin P. Loeb:
Economic aspects of information security: An emerging field of research. 335-337 - Kjell Hausken:
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. 338-349 - Ashish Arora, Anand Nandkumar, Rahul Telang:
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. 350-362 - J. C. Poindexter, Julia Brande Earp, David L. Baumer:
An experimental economics approach toward quantifying online privacy choices. 363-374 - Hong Joo Lee, Hyung Jun Ahn, Jong Woo Kim, Sung Joo Park:
Capturing and reusing knowledge in engineering change management: A case of automobile development. 375-394 - Youcef Baghdadi:
Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing. 395-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.