default search action
Nenad Jukic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Dinko Bacic, Curt A. Gilstrap, Nenad Jukic:
Physiological and Socio-Behavioral Determinants of Viral Video User Engagement. MIPRO 2023: 19-24 - [c14]Dinko Bacic, Ariana Krbanjevic, Nenad Jukic:
Exploring Pie Charts and Part-To-Whole Alternatives: Eye-tracking Approach. MIPRO 2023: 25-29 - 2022
- [j28]Svetlozar Nestorov, Dinko Bacic, Nenad Jukic, Mary Malliaris:
Framework for entity extraction with verification: application to inference of data set usage in research publications. Electron. Libr. 40(4): 453-471 (2022)
2010 – 2019
- 2019
- [j27]Svetlozar Nestorov, Boris Jukic, Nenad Jukic, Abhishek Sharma, Sippo Rossi:
Generating insights through data preparation, visualization, and analysis: Framework for combining clustering and data visualization techniques for low-cardinality sequential data. Decis. Support Syst. 125 (2019) - [j26]Svetlozar Nestorov, Nenad Jukic, Sippo Rossi:
Design and Implementation of a Data Visualization Course with a Real-World Project Component in an Undergraduate Information Systems Curriculum. J. Inf. Syst. Educ. 30(3): 202-211 (2019) - 2017
- [j25]Nenad Jukic, Boris Jukic, Abhishek Sharma, Svetlozar Nestorov, Benjamin Korallus Arnold:
Expediting analytical databases with columnar approach. Decis. Support Syst. 95: 61-81 (2017) - 2016
- [c13]Svetlozar Nestorov, Nenad Jukic, San Cannon, Abhishek Sharma, Kelly Bryant:
Towards Extracting Detailed Metadata from Academic Research Articles. AMCIS 2016 - 2015
- [j24]Nenad Jukic, Heikki Topi:
Teradata University Network: collaboration between industry and academia for improving education. Inroads 6(2): 50-56 (2015) - [j23]Nenad Jukic, Abhishek Sharma, Svetlozar Nestorov, Boris Jukic:
Augmenting Data Warehouses with Big Data. Inf. Syst. Manag. 32(3): 200-209 (2015) - 2013
- [j22]Boris Jukic, Nenad Jukic, Svetlozar Nestorov:
Process and Data Logic Integration: Logical Links between UML Use Case Narratives and ER Diagrams. J. Comput. Inf. Technol. 21(3): 161-170 (2013) - [c12]Nenad Jukic, Melanie K. Ruiz, Sarah N. Shea, Svetlozar Nestorov, Susan V. Vrbsky, Miguel Velasco, Boris Jukic:
Data Modeling in the Cloud. AMCIS 2013 - [c11]Boris Jukic, Nenad Jukic, Svetlozar Nestorov:
Framework for integrating process and data logic: Connecting UML use cases and ER diagrams. ITI 2013: 109-115 - 2012
- [j21]Nenad Jukic, Boris Jukic:
Modeling-Centered Data Warehousing Learning: Methods, Concepts and Resources. Int. J. Bus. Intell. Res. 3(4): 74-95 (2012) - [c10]Miguel Velasco, Nenad Jukic:
Increasing actionability of in-house corporate prediction markets. ITI 2012: 85-90 - 2011
- [j20]Nenad Jukic, Svetlozar Nestorov, Miguel Velasco, Jami Eddington:
Uncovering Actionable Knowledge in Corporate Data with Qualified Association Rules. Int. J. Bus. Intell. Res. 2(2): 1-21 (2011) - [j19]Boris Jukic, Nenad Jukic, Dawn Harris:
Feasibility Frontier - A Method for Aligning Competitive Strategy with the Choice of IT Architectures. J. Organ. Comput. Electron. Commer. 21(2): 158-175 (2011) - 2010
- [j18]Nenad Jukic, Boris Jukic:
Bridging the Knowledge Gap between Transactional Databases and Data Warehouses. J. Comput. Inf. Technol. 18(2) (2010) - [j17]Nenad Jukic, John Nicholas:
A Framework for Collecting and Defining Requirements for Data Warehousing Projects. J. Comput. Inf. Technol. 18(4) (2010) - [j16]Nenad Jukic, Miguel Velasco:
Data Warehousing Requirements Collection and Definition: Analysis of a Failure. Int. J. Bus. Intell. Res. 1(3): 66-76 (2010) - [j15]Boris Jukic, Nenad Jukic:
Information System Planning and Decision Making Framework: A Case Study. Inf. Syst. Manag. 27(1): 61-71 (2010) - [c9]Miguel Velasco, Nenad Jukic:
A Framework for In-House Prediction Markets. NDT (1) 2010: 120-127
2000 – 2009
- 2009
- [j14]Boris Jukic, Nenad Jukic, Miguel Velasco:
Enterprise Information Systems Change, Adaptation and Adoption: A Qualitative Study and Conceptualization Framework. Inf. Resour. Manag. J. 22(1): 63-87 (2009) - [j13]Nenad Jukic, Svetlozar Nestorov:
Qualified Association-Rule Mining - Expanding Public Safety Data Insight. Int. J. Comput. Their Appl. 16(2): 98-104 (2009) - [j12]Boris Jukic, David A. Kravitz, Nenad Jukic, Amanuel Tekleab, Laurie Meamber, Anthony Dashnaw:
Multilevel Information Presentation Strategy and Customer Reaction: An Empirical Investigation in an Online Setting. J. Organ. Comput. Electron. Commer. 19(3): 173-195 (2009) - [c8]Nenad Jukic, Boris Jukic:
Bridging the knowledge gap between operational databases and data warehouses. ITI 2009: 403-408 - 2008
- [j11]Nenad Jukic, Paul Gray:
Teradata University Network: A No Cost Web-Portal for Teaching Database, Data Warehousing, and Data-Related Subjects. J. Inf. Syst. Educ. 19(4): 395-402 (2008) - [j10]Nenad Jukic, Paul Gray:
Using real data to invigorate student learning. ACM SIGCSE Bull. 40(2): 6-10 (2008) - [c7]Nenad Jukic, Paul Gray, Boris Jukic:
Zero-installation, zero-maintenance, zero-cost portal for database-related educational use. ITI 2008: 141-146 - 2006
- [j9]Nenad Jukic:
Modeling strategies and alternatives for data warehousing projects. Commun. ACM 49(4): 83-88 (2006) - [j8]Nenad Jukic, Svetlozar Nestorov:
Comprehensive data warehouse exploration with qualified association-rule mining. Decis. Support Syst. 42(2): 859-878 (2006) - 2005
- [j7]Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, Allen S. Parrish:
Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories. J. Database Manag. 16(3): 1-20 (2005) - 2003
- [j6]Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky:
Closing the key loophole in MLS databases. SIGMOD Rec. 32(2): 15-20 (2003) - [c6]Svetlozar Nestorov, Nenad Jukic:
Ad-Hoc Association-Rule Mining within the Data Warehouse. HICSS 2003: 232 - 2002
- [j5]Nenad Jukic, Boris Jukic, Laurie Meamber, George S. Nezlek:
Implementing Polyinstantiation as a Strategy for Electronic Commerce Customer Relationship Management. Int. J. Electron. Commer. 7(2): 9-30 (2002) - [j4]Boris Jukic, Nenad Jukic, Manoj Parameswaran:
Data Models for Information Sharing in E-Partnerships: Analysis, Improvements, and Relevance. J. Organ. Comput. Electron. Commer. 12(2): 175-195 (2002) - [c5]Nenad Jukic, Boris Jukic, Laurie Meamber, George S. Nezlek:
Improving E-business Customer Relationship Management Systems with Multilevel Secure Data Models. HICSS 2002: 174
1990 – 1999
- 1999
- [j3]Nenad Jukic, Susan V. Vrbsky, Allen S. Parrish, Brandon Dixon, Boris Jukic:
A Belief-Consistent Multilevel Secure Relational Data Model. Inf. Syst. 24(5): 377-400 (1999) - [c4]Chuanxue Bi, Nenad Jukic:
A security paradigm for Web databases. ACM Southeast Regional Conference 1999 - 1998
- [c3]Nenad Jukic, Susan V. Vrbsky:
Joining relations in the belief-consistent multilevel secure relational model. ACM Southeast Regional Conference 1998: 289-296 - 1997
- [j2]Nenad Jukic, Susan V. Vrbsky:
Asserting Beliefs in MLS Relational Models. SIGMOD Rec. 26(3): 30-35 (1997) - [c2]John C. Lusth, Nenad Jukic:
Filtering SQL via the principles of pandemonium. ACM Southeast Regional Conference 1997: 11-14 - [c1]Susan V. Vrbsky, Sasa Tomic, Nenad Jukic:
Concurrency Control for Approximate Query Processing of Real-Time Database Systems. RTDB 1997: 227-246 - 1996
- [j1]Nenad Jukic, Susan V. Vrbsky:
Feasibility of Aggregates in Time Constrained Queries. Inf. Syst. 21(7): 595-614 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint