Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic H. - Information Systems
Topic H.2.0 - General

A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
page 730 - 753
Vol.3 / Issue 6
I. Caballero, A. Caro, C. Calero, M. Piattini:
IQM3: Information Quality Management Maturity Model
page 3658 - 3685
Vol.14 / Issue 22
D. Cristofor, L. Cristofor, D. A. Simovici:
Galois Connections and Data Mining
page 60 - 73
Vol.6 / Issue 1
M. Masud, M.S. Hossain, A. Alamri, A. Almogren, M. Zakariah:
Synchronizing Data through Update Queries in Interoperable E-Health and Technology Enhanced Learning Data Sharing Systems
page 1439 - 1453
Vol.21 / Issue 11
A. Nikiforova, J. Bicevskis, Z. Bicevska, I. Oditis:
User-Oriented Approach to Data Quality Evaluation
page 107 - 126
Vol.26 / Issue 1