


default search action
Information Systems Frontiers, Volume 16
Volume 16, Number 1, March 2014
- Ching-Hsien Hsu, Jianhua Ma, Mohammad S. Obaidat

:
Dynamic intelligence towards merging cloud and communication services. 1-5 - Jingqi Yang, Chuanchang Liu, Yanlei Shang, Bo Cheng

, Zexiang Mao, Chunhong Liu, Lisha Niu, Junliang Chen:
A cost-aware auto-scaling approach using the workload prediction in service clouds. 7-18 - JongBeom Lim, Taeweon Suh, Joon-Min Gil, Heon-Chang Yu

:
Scalable and leaderless Byzantine consensus in cloud computing environments. 19-34 - Guodong Wang, Yongmao Ren

, Ke Dou, Jun Li:
IDTCP: An effective approach to mitigating the TCP incast problem in data center networks. 35-44 - Hung-Yi Teng, Chien-Nan Lin, Ren-Hung Hwang

:
A self-similar super-peer overlay construction scheme for super large-scale P2P applications. 45-58 - Haoyi Xiong

, Daqing Zhang, Daqiang Zhang, Vincent Gauthier
, Kun Yang, Monique Becker:
MPaaS: Mobility prediction as a service in telecom cloud. 59-75 - Luis Javier Suarez Meza, Julián Andrés Zúñiga, Edgar Camilo Pedraza, Juan Carlos Corrales

:
Fully automated resource retrieval in telecommunications and internet converged environments. 77-93 - Feng Xia

, Fangwei Ding, Jie Li, Xiangjie Kong
, Laurence T. Yang, Jianhua Ma:
Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing. 95-111 - Toan-Thinh Truong, Minh-Triet Tran

, Anh Duc Duong:
Enhanced Dynamic Authentication Scheme (EDAS). 113-127 - Jianxin Liao, Di Yang, Tonghong Li

, Jingyu Wang
, Qi Qi, Xiaomin Zhu:
A scalable approach for content based image retrieval in cloud datacenter. 129-141 - Shangguang Wang

, Ching-Hsien Hsu, Zhongjun Liang, Qibo Sun, Fangchun Yang:
Multi-user web service selection based on multi-QoS prediction. 143-152 - Fatih Çavdur

, Soundar R. T. Kumara:
A network view of business systems. 153-162
Volume 16, Number 2, April 2014
- Juan M. Alberola

, Vicente J. Botti
, Jose M. Such:
Advances in infrastructures and tools for multiagent systems. 163-167 - Álvaro Carrera

, Carlos Angel Iglesias
, Mercedes Garijo
:
Beast methodology: An agile testing methodology for multi-agent systems based on behaviour driven development. 169-182 - Bexy Alfonso, Vicente J. Botti

, Antonio Garrido
, Adriana Giret
:
A MAS-based infrastructure for negotiation and its application to a water-right market. 183-199 - Natalia Criado

, Jose M. Such, Vicente J. Botti
:
Norm reasoning services. 201-223 - Ricard L. Fogués, Jose M. Such, Agustín Espinosa

, Ana García-Fornes
:
BFF: A tool for eliciting tie strength and user communities in social networking services. 225-237 - Juan M. Alberola

, Luis Búrdalo, Vicente Julián
, Andrés Terrasa
, Ana García-Fornes
:
An adaptive framework for monitoring agent organizations. 239-256 - Pratyush Bharati

, Chen Zhang, Abhijit Chaudhury:
Social media assimilation in firms: Investigating the roles of absorptive capacity and institutional pressures. 257-272 - Jung-Yu Lai, Khire Rushikesh Ulhas, Jian-Da Lin:

Assessing and managing e-commerce service convenience. 273-289 - Wei-Feng Tung, Soe-Tsyr Yuan, Yen-Cheng Wu, Patrick Hung:

Collaborative service system design for music content creation. 291-302 - Ricardo Tesoriero

, José A. Gallud
, María Dolores Lozano
, Víctor M. Ruiz Penichet
:
Enhancing visitors' experience in art museums using mobile technologies. 303-327 - Kjell Hausken:

Returns to information security investment: Endogenizing the expected loss. 329-336
Volume 16, Number 3, July 2014
- Paul Gray, Anat Hovav:

Using scenarios to understand the frontiers of IS. 337-345 - Anat Hovav:

Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript). 347-352 - M. Lynne Markus, Kevin Mentzer:

Foresight for a responsible future with ICT. 353-368 - Phillip Olla, Jyoti Choudrie:

Mobile technology utilization for social development in developing countries: An ethnographic futures research study. 369-382 - Kutoma Wakunuma

, Bernd Carsten Stahl
:
Tomorrow's ethics and today's response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. 383-397 - Fang Fang, Manoj Parameswaran, Xia Zhao, Andrew B. Whinston:

An economic mechanism to manage operational security risks for inter-organizational information systems. 399-416 - Yuxiang Zhao

, Qinghua Zhu:
Evaluation on crowdsourcing research: Current status and future direction. 417-434 - Gang Li, Mingchuan Wei:

Everything-as-a-service platform for on-demand virtual enterprises. 435-452 - Naiqiao Du, Xiaojun Ye, Jianmin Wang

:
A schema aware ETL workflow generator. 453-471 - Fatih Çavdur

, Soundar R. T. Kumara:
Network mining: Applications to business data. 473-490 - Torsten J. Gerpott, Sandra Thomas, Michael Weichert:

Usage of established and novel mobile communication services: Substitutional, independent or complementary? - An empirical study of residential mobile network operator customers in Germany. 491-507 - Qiong Liu, Zhen Liu:

A comparison of improving multi-class imbalance for internet traffic classification. 509-521
Volume 16, Number 4, September 2014
- Mohammad Mehedi Hassan, M. Shamim Hossain, A. M. Jehad Sarkar, Eui-Nam Huh:

Cooperative game-based distributed resource allocation in horizontal dynamic cloud federation platform. 523-542 - Li Yan, Zong Min Ma

, Fu Zhang:
Algebraic operations in fuzzy object-oriented databases. 543-556 - Youzhong Wang, Daniel Zeng, Bin Zhu, Xiaolong Zheng

, Fei-Yue Wang:
Patterns of news dissemination through online news media: A case study in China. 557-570 - Bernard Kamsu-Foguem, Germaine Tchuenté-Foguem, Clovis Foguem:

Using conceptual graphs for clinical guidelines representation and knowledge visualization. 571-589 - Placide Poba-Nzaou, Sylvestre Uwizeyemungu, Louis Raymond, Guy Paré:

Motivations underlying the adoption of ERP systems in healthcare organizations: Insights from online stories. 591-605 - Ricardo Colomo-Palacios

, Israel González-Carrasco
, José Luis López Cuadrado, António Trigo
, João Eduardo Quintela Varajão
:
I-Competere: Using applied intelligence in search of competency gaps in software project managers. 607-625 - Hung-Pin Shih, Echo Huang:

Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community. 627-641 - Tridib Bandyopadhyay, Dengpan Liu, Vijay S. Mookerjee, Allen Wilhite

:
Dynamic competition in IT security: A differential games approach. 643-661 - Jakub Malý, Martin Necaský

, Irena Mlýnková
:
Efficient adaptation of XML data using a conceptual model. 663-696 - Yen-Hao Hsieh, Soe-Tsyr Yuan, Hsiao-Chen Liu:

Service interaction design: A Hawk-Dove game based approach to managing customer expectations for oligopoly service providers. 697-713 - Xiaomo Liu, G. Alan Wang

, Aditya Johri, Mi Zhou, Weiguo Fan
:
Harnessing global expertise: A comparative study of expertise profiling methods for online communities. 715-727 - Oluwasola Oni, Anastasia Papazafeiropoulou:

Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption. 729-747
Volume 16, Number 5, November 2014
- Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:

Guest editorial: Information reuse, integration, and reusable systems. 749-752 - Xianshu Zhu, Tim Oates:

Finding story chains in newswire articles using random walks. 753-769 - Zhan Bu

, Chengcui Zhang, Zhengyou Xia, Jiandong Wang:
An FAR-SW based approach for webpage information extraction. 771-785 - Tao Meng, Mei-Ling Shyu:

Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection. 787-799 - Taghi M. Khoshgoftaar, Kehan Gao, Amri Napolitano, Randall Wald:

A comparative study of iterative and non-iterative feature selection techniques for software defect prediction. 801-822 - Bolong Zeng, Li Tan:

A unified framework for evaluating test criteria in model-checking-assisted test case generation. 823-834 - Samuel A. Ajila

, Angad S. Gakhar, Chung-Horng Lung:
Aspectualization of code clones - an algorithmic approach. 835-851 - Chung-Horng Lung, Samuel A. Ajila

, Wen-Lin Liu:
Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures. 853-866 - Nicolás Poggi

, David Carrera
, Ricard Gavaldà
, Eduard Ayguadé
, Jordi Torres
:
A methodology for the evaluation of high response time on E-commerce users and sales. 867-885 - Wei-Tsong Wang, Wen-Hung Chang:

A study of virtual product consumption from the expectancy disconfirmation and symbolic consumption perspectives. 887-908 - Artur Siurdyban

:
Understanding the IT/business partnership: A business process perspective. 909-922 - Benny C. F. Cheung

, Jacky S. L. Ting, Albert H. C. Tsang, Wing Bun Lee
:
A methodological approach to optimizing RFID deployment. 923-937 - Shiwei He, Rui Song, Sohail S. Chaudhry

:
Service-oriented intelligent group decision support system: Application in transportation management. 939-951 - Ni Li, Minghui Sun, Zhuming Bi, Zeya Su, Chao Wang:

A new methodology to support group decision-making for IoT-based emergency response systems. 953-977

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














