Information Technology Reference
In-Depth Information
systems development: A social action theoretic analysis.
Accounting, Management and Information Technolo-
gies, 6 , 1-64.
Hu, J., Shima, K., Oehlmann, R., Zhao, J., Takemura, Y.,
& Matsumoto, K. (2004). An empirical study of audience
impressions of B2C Web pages in Japan, China and the
UK . Electronic Commerce Research and Applications ,
(3), 176-189.
Hoffman, D. L., Novak, T. P., & Chatterjee, P. (1995).
Commercial scenario for the Web: Opportunities and
challenges. Journal of Computer-Mediated Communi-
cation, Special Issues on Electronic Commerce , 1 (3).
[Electronic version available online at http://jcmc.indiana.
edu/vol1/issue3/hoffman.html].
Huang, W., Tan, C. L., & Loew, W. K. (2003). Model-
based chart image recognition. In Proceedings of the
International Workshop on Graphics Recognition
(GREC), (pp. 87-99).
Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Build-
ing consumer trust online. CACM , 42 (4), 80-85.
Hui, S., & Jha, G. (2000). Data mining for customer
service support. Information and Management, 38 (1),
1-14.
Hofman, D. (2007). Supply chain measurement: Turning
data into action. Supply Chain Management Review,
11 (8), 20-26.
Hume, D. (1748). An enqiry concerning human un-
derstanding. In J. Fieser, editor, The writings of David
Hume, [electronic version], Retreived 03/01/2008, from
http://www.infomotions.com/etexts/philosophy/1700-
1799/hume-enquiry-65.txt
Hohl, F. (1998) Time limited Blackbox security: Protect-
ing mobile agents from malicious hosts. In G. Vigna
(Ed.), Mobile agents and security, LNCS 1419 (pp. 92-
113). Springer.
Izatt, M., Chan, P., & Brecht, T. (1999, June). Agents:
Towards an environment for parallel, distributed and
mobile Java applications. In Proceedings of the 1999
ACM Conference on Java Grande (pp. 15-24).
Hohl, F. (1998). A model of attacks of malicious hosts
against mobile agents. In Fourth Workshop on Mobile
Object Systems (MOS'98): Secure Internet Mobile
Computations . Retrieved from http://cuiwww.unige.
ch/~ecoopws/ws98/papers/hohl.ps
JADE Project. (n.d.). Jade white paper. Retrieved March
27, 2006, from http://jade.cselt.it/
Holland, J., Holyoak, K., Nisbett, R., & Thagard, P.
(1989). Induction: Processes of inference, learning, and
discovery . Cambridge, MA: The MIT Press.
Jafar, M. A. (2007). Content-based image classification
and retrieval: A rule-based system using rough sets
framework. International Journal of Intelligent Informa-
tion Technologies, 3 (3), 41-58.
Holsapple, C., & Singh, M., (2000,July/September). To-
ward a unified view of electronic commerce, electronic
business, and collaborative commerce: A knowledge
management approach. Knowledge and Process Man-
agement , 7(3), 159.
Jain, A. K., & Dubes, R. C. (1988). Algorithms for cluster-
ing data. Englewood Cliffs, NJ: Prentice- Hall.
Jain, A.,Murty, M., & Flynn, P. (1999). Data clustering:
A review. ACM Computing Surveys, 31 (3), 255- 323.
Hoover, K. D. (2001). Causality in macroeconomics .
Cambridge: Cambridge University Press.
Jain, C. L. (2004). Benchmarking forecasting error. The
Journal of Business Forecasting Methods & Systems,
23 (3), 8.
Hoover, K. D. (2008). Causality in economics and
econometrics. In Durlauf, S. and Blume, L., editors,
The New Palgrave Dictionary of Economics (2 nd ed.) ,
London: MacMillan
Jain, C. L. (2004). Benchmarking forecasting software
and systems. The Journal of Business Forecasting
Methods & Systems, 23 (3), 13.
Horvath & Partner. (2001). Balanced Scorecard um-
setzen (2 nd ed.). Stuttgart: Schäffer-Poeschel Verlag. (in
German)
Search WWH ::




Custom Search