Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic H. - Information Systems

H.I. Abdalla, A.A. Amer, H. Mathkour:
A Novel Vertical Fragmentation, Replication and Allocation Model in DDBSs
page 1469 - 1487
Vol.20 / Issue 10
Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi:
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
page 1174 - 1198
Vol.25 / Issue 9
T. Baars, M. Spruit:
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study
page 1662 - 1678
Vol.18 / Issue 12
D. Beneventano, S. Bergamaschi, F. Guerra, M. Vincini:
The SEWASIE Network of Mediator Agents for Semantic Search
page 1936 - 1969
Vol.13 / Issue 12
C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
page 79 - 106
Vol.20 / Issue 2
A. Calì, D. Calvanese, D. Martinenghi:
Dynamic Query Optimization under Access Limitations and Dependencies
page 33 - 62
Vol.15 / Issue 1
L. Carafoli, F. Mandreoli, R. Martoglia, W. Penzo:
A Data Management Middleware for ITS Services in Smart Cities
page 228 - 246
Vol.22 / Issue 2
C.-M. Chen, T.-Y. Wu, R. Tso, M. Mambo, M.-E. Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
page 406 - 418
Vol.21 / Issue 3
B. Chidlovskii, L. Lecerf:
Stacked Dependency Networks for Layout Document Structuring
page 2998 - 3010
Vol.14 / Issue 18
D. Cristofor, D. Simovici:
Finding Median Partitions Using Information-Theoretical-Based Genetic Algorithms
page 153 - 172
Vol.8 / Issue 2
F. Einsele, R. Ingold, J. Hennebert:
A Language-Independent, Open-Vocabulary System Based on HMMs for Recognition of Ultra Low Resolution Words
page 2982 - 2997
Vol.14 / Issue 18
D. Ewald, H. Zarzycki, Ł. Apiecionek, a.M. Czerniak:
Ordered Fuzzy Numbers Applied in Bee Swarm Optimization Systems
page 1475 - 1494
Vol.26 / Issue 11
J. Fan, Y. Zheng, X. Tang:
Key-Insulated Signcryption
page 1351 - 1374
Vol.19 / Issue 10
F.A. Ferrarotti, A.L. Paoletti, J.M. Turull Torres:
Redundant Relations in Relational Databases: A Model Theoretic Perspective
page 2934 - 2955
Vol.16 / Issue 20
L. Gao, M. Wang, X.S. Wang:
Evaluating Trigger Conditions on Streaming Time Series with User-given Quality Requirements
page 1397 - 1410
Vol.11 / Issue 8
S. Ginsburg, N. C. Shu, D. A. Simovici:
Automatic Data Restructuring
page 243 - 286
Vol.5 / Issue 4
S. Hartmann, S. Link:
Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner
page 112 - 156
Vol.15 / Issue 1
D. L. Hicks, K. Tochtermann:
Personal Digital Libraries and Knowledge Management
page 550 - 565
Vol.7 / Issue 7
M. Johnson, R. Rosebrugh, R. Wood:
Algebras and Update Strategies
page 729 - 748
Vol.16 / Issue 5
D. Karahoca:
Meta-Cognitive Tool Development for History Teaching: Investigating how Software Usability Affects Student Achievements
page 619 - 638
Vol.19 / Issue 5
D. Karahoca, A. Karahoca, A. Kurnaz:
Analyzing Communication Dimensions in a Ubiquitous Learning Environment
page 124 - 145
Vol.22 / Issue 1
M. Kirchberg:
Using Abstract State Machines to Model ARIES-based Transaction Processing
page 157 - 194
Vol.15 / Issue 1
S. O. Kuznetsov:
On the Intractability of Computing the Duquenne-Guigues Base
page 927 - 933
Vol.10 / Issue 8
M. Lamia, M. Hafidi, A. Tricot, O. Benmesbah:
Implementing Flipped Classroom that Used a Context Aware Mobile Learning System into Learning Process
page 1531 - 1553
Vol.25 / Issue 12
G.C. Lapasini Leal, A.P. Chaves, E.H.M. Huzita, M.E. Delamaro:
An Integrated Approach of Software Development and Test Processes to Distributed Teams
page 2686 - 2705
Vol.18 / Issue 19
J.Y. Lee, Y. Duan, J.C. Oh, W. Du, H. Blair, L. Wang, X. Jin:
Social Network Based Reputation Computation and Document Classification
page 532 - 553
Vol.18 / Issue 4
A. Menezes Leitão:
UCL-GLORP - An ORM for Common Lisp
page 3333 - 3357
Vol.14 / Issue 20
H. Liu, L. Chen, Z. Davar, M.R. Pour:
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
page 473 - 482
Vol.21 / Issue 3
Z. Liu, H. Yan, Z. Lin, L. Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
page 454 - 472
Vol.21 / Issue 3
J. Maniamma, H. Wagatsuma:
A Semantic Web-based Representation of Human-logical Inference for Solving Bongard Problems
page 1343 - 1363
Vol.26 / Issue 10
H. Maurer, K. Tochtermann:
On a New Powerful Model for Knowledge Management and its Applications
page 85 - 96
Vol.8 / Issue 1
S. Moya, S. Grau, D. Tost:
First-Person Locomotion in 3D Virtual Environments: a Usability Analysis
page 1026 - 1045
Vol.20 / Issue 7
M. Poblet:
Rule of Law on the Go: New Developments of Mobile Governance
page 498 - 512
Vol.17 / Issue 3
M. Poblet, P. Casanovas, J.-M. López-Cobo, N. Casellas:
ODR, Ontologies, and Web 2.0
page 618 - 634
Vol.17 / Issue 4
C. Qin, Z. Xue, Q. Feng, X. Huang:
Selecting Parameters of an Improved Doubly Regularized Support Vector Machine based on Chaotic Particle Swarm Optimization Algorithm
page 603 - 618
Vol.23 / Issue 7
M. Rajaei, M.S. Haghjoo, E.K. Miyaneh:
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
page 268 - 305
Vol.21 / Issue 2
D. Ramhorst:
A Guided Tour through the Siemens Business Services Knowledge Management Framework
page 610 - 622
Vol.7 / Issue 7
K.-D. Schewe, B. Thalheim, Q. Wang:
Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States
page 2028 - 2057
Vol.15 / Issue 10
D.-W. Seo, H.-U. Chae, B.-W. Kim, W.-H. Choi, K.-H. Jo:
Human Tracking based on Multiple View Homography
page 2463 - 2484
Vol.15 / Issue 13
M. Shahriari, S. Haefele, R. Klamma:
Using Content to Identify Overlapping Communities in Question Answer Forums
page 907 - 931
Vol.23 / Issue 9
G. Timbrell, S. Koller, N. Schefe, S. N. Lindstaedt:
A Knowledge Infrastructure Hierarchy Model for Call-Centre Processes
page 546 - 564
Vol.11 / Issue 4
K. Tochtermann, H. Maurer:
Knowledge Management and Environmental Informatics
page 517 - 536
Vol.6 / Issue 5
M. Topolski:
The Modified Principal Component Analysis Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type B-CLL
page 734 - 746
Vol.26 / Issue 6
S. de Amo, M.H.F. Alves:
Incremental Maintenance of Data Warehouses Based on Past Temporal Logic Operators
page 1035 - 1064
Vol.10 / Issue 9

Topic H.2.m - Miscellaneous