Information Technology Reference
In-Depth Information
Jain, C. L. (2004). Business forecasting practices in
2003. The Journal of Business Forecasting Methods &
Systems, 23 (3), 2.
Kaldewaij, A., & Schoenmakers, B. (1990). Searching
by elimination. SCP, 14 , 243-254.
Kantor, P., Boros, E., Melamed, B., Menkov, V., Shapira,
B., & Neu, D. (2000). Capturing human intelligence in
the Net. Communications of the ACM, 43 (8), 112-115.
Jarke, M., Jeusfeld, M., Quix, C., & Vassiliadis, P.
(1999). Architecture and quality in data warehouses:
An extended repository approach. Information Systems,
24 (3), 229-253.
Kaplan, R., & Norton, D. (1992). The balanced scorecard:
Measures that drive performance. Harvard Business
Review , 70 (1), 71-79.
Jarvenpaa, S. L, Tranctinsky, N., & Vitale, M. (2000).
Consumer trust in an Internet store. Information Technol-
ogy and Management Journal , 1 (1-2), 45-71.
Kaplan, R., & Norton, D. (1996). The balanced score-
card: Translating strategy into action . Boston: Harvard
Business School Press.
Jennings, N. R., & Wooldridge, M. (1998). Agent technol-
ogy: Foundations, applications, and markets . London:
Springer.
Karagiannis, D., & Kühn, H. (2002). Metamodelling
platforms - invited paper (No. 2455). Berlin: Springer
Verlag.
Jennings, N., Sycara, K., & Wooldridge, M. (1998). A
roadmap of agent research and development. Interna-
tional Journal of Autonomous Agents and Multi-Agent
Systems, 1 (1), 7-38.
Karypis, G., & Kumar, V. (1999). A fast and high quality
multilevel scheme for partitioning rrregular graphs. SIAM
Journal of Scientific Computing, 20 (1), 359-392.
Jensen, K. (1996). Coloured Petri Nets: Basic concepts,
analysis methods and practical use. 2 nd ed., Vol. 1, EATCS
Monographs on Theoretical Computer Science . London:
Springer.
Karypis, G., Han, E.-H., & Kumar, V. (1999). CHAME-
LEON: A hierarchical clustering algorithm using dynamic
modeling. IEEE Computer, 32 (8), 68-75.
Kasanen, E., Lukka, K., Siitonen, A. (1993). The con-
structive approach in management accounting research.
Journal of Management Accounting Research, 5 (3),
243-64.
Joachims, T. (1999). Making large-scale SVM learning
practical. Advances in Kernel Methods - Support Vec-
tor Learning.
Jonsson, E. (1997). A quantitative model of the security
intrusion process based on attacker behavior. IEEE
Transactions on Software Engineering, 23 (4).
Kasiran, M. K., & Meziane, F. (2002). An information
framework for a merchant trust agent in electronic com-
merce. In H. Yin, N. Allinson, R. Freeman, J. Keane,
& Hubbard S. (Eds), Intelligent data engineering and
automated learning , (pp. 243-248). Springer.
Jøsang, A. (1998). Modelling trust in information society.
Unpublished doctoral thesis, Department of Telemat-
ics, Norwegian University of Science and Technology,
Trondheim, Norway.
Kasiran, M. K., & Meziane, F. (2004). The usage of third
party endorsement in ecommerce websites. In proceed-
ings of the 7 th International Conference on Work with
Computing Systems (WWCS2004) , (pp.794-798). Kuala
Lumpur, Malaysia.
Josephson, J., & Josephson, S. (1994). Abductive infer-
ence, computation, philosophy, technology . New York:
Cambridge University Press.
Kahle, B., & Medlar. A. (1991). An information system
for corporate users: Wide area information servers.
ConneXions—The Interoperability Report , 5 (11), 2-9.
Kaufman, L., & Rousseeuw, P. J. (1990). Finding groups
in data: An introduction to cluster analysis. New York:
Wiley.
Search WWH ::




Custom Search