default search action
Information Systems Frontiers, Volume 16
Volume 16, Number 1, March 2014
- Ching-Hsien Hsu, Jianhua Ma, Mohammad S. Obaidat:
Dynamic intelligence towards merging cloud and communication services. 1-5 - Jingqi Yang, Chuanchang Liu, Yanlei Shang, Bo Cheng, Zexiang Mao, Chunhong Liu, Lisha Niu, Junliang Chen:
A cost-aware auto-scaling approach using the workload prediction in service clouds. 7-18 - JongBeom Lim, Taeweon Suh, Joon-Min Gil, Heon-Chang Yu:
Scalable and leaderless Byzantine consensus in cloud computing environments. 19-34 - Guodong Wang, Yongmao Ren, Ke Dou, Jun Li:
IDTCP: An effective approach to mitigating the TCP incast problem in data center networks. 35-44 - Hung-Yi Teng, Chien-Nan Lin, Ren-Hung Hwang:
A self-similar super-peer overlay construction scheme for super large-scale P2P applications. 45-58 - Haoyi Xiong, Daqing Zhang, Daqiang Zhang, Vincent Gauthier, Kun Yang, Monique Becker:
MPaaS: Mobility prediction as a service in telecom cloud. 59-75 - Luis Javier Suarez Meza, Julián Andrés Zúñiga, Edgar Camilo Pedraza, Juan Carlos Corrales:
Fully automated resource retrieval in telecommunications and internet converged environments. 77-93 - Feng Xia, Fangwei Ding, Jie Li, Xiangjie Kong, Laurence T. Yang, Jianhua Ma:
Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing. 95-111 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
Enhanced Dynamic Authentication Scheme (EDAS). 113-127 - Jianxin Liao, Di Yang, Tonghong Li, Jingyu Wang, Qi Qi, Xiaomin Zhu:
A scalable approach for content based image retrieval in cloud datacenter. 129-141 - Shangguang Wang, Ching-Hsien Hsu, Zhongjun Liang, Qibo Sun, Fangchun Yang:
Multi-user web service selection based on multi-QoS prediction. 143-152 - Fatih Çavdur, Soundar R. T. Kumara:
A network view of business systems. 153-162
Volume 16, Number 2, April 2014
- Juan M. Alberola, Vicente J. Botti, Jose M. Such:
Advances in infrastructures and tools for multiagent systems. 163-167 - Álvaro Carrera, Carlos Angel Iglesias, Mercedes Garijo:
Beast methodology: An agile testing methodology for multi-agent systems based on behaviour driven development. 169-182 - Bexy Alfonso, Vicente J. Botti, Antonio Garrido, Adriana Giret:
A MAS-based infrastructure for negotiation and its application to a water-right market. 183-199 - Natalia Criado, Jose M. Such, Vicente J. Botti:
Norm reasoning services. 201-223 - Ricard L. Fogués, Jose M. Such, Agustín Espinosa, Ana García-Fornes:
BFF: A tool for eliciting tie strength and user communities in social networking services. 225-237 - Juan M. Alberola, Luis Búrdalo, Vicente Julián, Andrés Terrasa, Ana García-Fornes:
An adaptive framework for monitoring agent organizations. 239-256 - Pratyush Bharati, Chen Zhang, Abhijit Chaudhury:
Social media assimilation in firms: Investigating the roles of absorptive capacity and institutional pressures. 257-272 - Jung-Yu Lai, Khire Rushikesh Ulhas, Jian-Da Lin:
Assessing and managing e-commerce service convenience. 273-289 - Wei-Feng Tung, Soe-Tsyr Yuan, Yen-Cheng Wu, Patrick Hung:
Collaborative service system design for music content creation. 291-302 - Ricardo Tesoriero, José A. Gallud, María Dolores Lozano, Víctor M. Ruiz Penichet:
Enhancing visitors' experience in art museums using mobile technologies. 303-327 - Kjell Hausken:
Returns to information security investment: Endogenizing the expected loss. 329-336
Volume 16, Number 3, July 2014
- Paul Gray, Anat Hovav:
Using scenarios to understand the frontiers of IS. 337-345 - Anat Hovav:
Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript). 347-352 - M. Lynne Markus, Kevin Mentzer:
Foresight for a responsible future with ICT. 353-368 - Phillip Olla, Jyoti Choudrie:
Mobile technology utilization for social development in developing countries: An ethnographic futures research study. 369-382 - Kutoma Wakunuma, Bernd Carsten Stahl:
Tomorrow's ethics and today's response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. 383-397 - Fang Fang, Manoj Parameswaran, Xia Zhao, Andrew B. Whinston:
An economic mechanism to manage operational security risks for inter-organizational information systems. 399-416 - Yuxiang Zhao, Qinghua Zhu:
Evaluation on crowdsourcing research: Current status and future direction. 417-434 - Gang Li, Mingchuan Wei:
Everything-as-a-service platform for on-demand virtual enterprises. 435-452 - Naiqiao Du, Xiaojun Ye, Jianmin Wang:
A schema aware ETL workflow generator. 453-471 - Fatih Çavdur, Soundar R. T. Kumara:
Network mining: Applications to business data. 473-490 - Torsten J. Gerpott, Sandra Thomas, Michael Weichert:
Usage of established and novel mobile communication services: Substitutional, independent or complementary? - An empirical study of residential mobile network operator customers in Germany. 491-507 - Qiong Liu, Zhen Liu:
A comparison of improving multi-class imbalance for internet traffic classification. 509-521
Volume 16, Number 4, September 2014
- Mohammad Mehedi Hassan, M. Shamim Hossain, A. M. Jehad Sarkar, Eui-Nam Huh:
Cooperative game-based distributed resource allocation in horizontal dynamic cloud federation platform. 523-542 - Li Yan, Zong Min Ma, Fu Zhang:
Algebraic operations in fuzzy object-oriented databases. 543-556 - Youzhong Wang, Daniel Zeng, Bin Zhu, Xiaolong Zheng, Fei-Yue Wang:
Patterns of news dissemination through online news media: A case study in China. 557-570 - Bernard Kamsu-Foguem, Germaine Tchuenté-Foguem, Clovis Foguem:
Using conceptual graphs for clinical guidelines representation and knowledge visualization. 571-589 - Placide Poba-Nzaou, Sylvestre Uwizeyemungu, Louis Raymond, Guy Paré:
Motivations underlying the adoption of ERP systems in healthcare organizations: Insights from online stories. 591-605 - Ricardo Colomo Palacios, Israel González-Carrasco, José Luis López Cuadrado, António Trigo, João Eduardo Quintela Varajão:
I-Competere: Using applied intelligence in search of competency gaps in software project managers. 607-625 - Hung-Pin Shih, Echo Huang:
Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community. 627-641 - Tridib Bandyopadhyay, Dengpan Liu, Vijay S. Mookerjee, Allen Wilhite:
Dynamic competition in IT security: A differential games approach. 643-661 - Jakub Malý, Martin Necaský, Irena Mlýnková:
Efficient adaptation of XML data using a conceptual model. 663-696 - Yen-Hao Hsieh, Soe-Tsyr Yuan, Hsiao-Chen Liu:
Service interaction design: A Hawk-Dove game based approach to managing customer expectations for oligopoly service providers. 697-713 - Xiaomo Liu, G. Alan Wang, Aditya Johri, Mi Zhou, Weiguo Fan:
Harnessing global expertise: A comparative study of expertise profiling methods for online communities. 715-727 - Oluwasola Oni, Anastasia Papazafeiropoulou:
Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption. 729-747
Volume 16, Number 5, November 2014
- Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:
Guest editorial: Information reuse, integration, and reusable systems. 749-752 - Xianshu Zhu, Tim Oates:
Finding story chains in newswire articles using random walks. 753-769 - Zhan Bu, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
An FAR-SW based approach for webpage information extraction. 771-785 - Tao Meng, Mei-Ling Shyu:
Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection. 787-799 - Taghi M. Khoshgoftaar, Kehan Gao, Amri Napolitano, Randall Wald:
A comparative study of iterative and non-iterative feature selection techniques for software defect prediction. 801-822 - Bolong Zeng, Li Tan:
A unified framework for evaluating test criteria in model-checking-assisted test case generation. 823-834 - Samuel A. Ajila, Angad S. Gakhar, Chung-Horng Lung:
Aspectualization of code clones - an algorithmic approach. 835-851 - Chung-Horng Lung, Samuel A. Ajila, Wen-Lin Liu:
Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures. 853-866 - Nicolás Poggi, David Carrera, Ricard Gavaldà, Eduard Ayguadé, Jordi Torres:
A methodology for the evaluation of high response time on E-commerce users and sales. 867-885 - Wei-Tsong Wang, Wen-Hung Chang:
A study of virtual product consumption from the expectancy disconfirmation and symbolic consumption perspectives. 887-908 - Artur Siurdyban:
Understanding the IT/business partnership: A business process perspective. 909-922 - Benny C. F. Cheung, Jacky S. L. Ting, Albert H. C. Tsang, Wing Bun Lee:
A methodological approach to optimizing RFID deployment. 923-937 - Shiwei He, Rui Song, Sohail S. Chaudhry:
Service-oriented intelligent group decision support system: Application in transportation management. 939-951 - Ni Li, Minghui Sun, Zhuming Bi, Zeya Su, Chao Wang:
A new methodology to support group decision-making for IoT-based emergency response systems. 953-977
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.