Information Technology Reference
In-Depth Information
Jain, C. L. (2004). Business forecasting practices in
2003.
The Journal of Business Forecasting Methods &
Systems, 23
(3), 2.
Kaldewaij, A., & Schoenmakers, B. (1990). Searching
by elimination.
SCP, 14
, 243-254.
Kantor, P., Boros, E., Melamed, B., Menkov, V., Shapira,
B., & Neu, D. (2000). Capturing human intelligence in
the Net.
Communications of the ACM, 43
(8), 112-115.
Jarke, M., Jeusfeld, M., Quix, C., & Vassiliadis, P.
(1999). Architecture and quality in data warehouses:
An extended repository approach.
Information Systems,
24
(3), 229-253.
Kaplan, R., & Norton, D. (1992). The balanced scorecard:
Measures that drive performance.
Harvard Business
Review
,
70
(1), 71-79.
Jarvenpaa, S. L, Tranctinsky, N., & Vitale, M. (2000).
Consumer trust in an Internet store.
Information Technol-
ogy and Management Journal
,
1
(1-2), 45-71.
Kaplan, R., & Norton, D. (1996).
The balanced score-
card: Translating strategy into action
. Boston: Harvard
Business School Press.
Jennings, N. R., & Wooldridge, M. (1998).
Agent technol-
ogy: Foundations, applications, and markets
. London:
Springer.
Karagiannis, D., & Kühn, H. (2002).
Metamodelling
platforms - invited paper
(No. 2455). Berlin: Springer
Verlag.
Jennings, N., Sycara, K., & Wooldridge, M. (1998). A
roadmap of agent research and development.
Interna-
tional Journal of Autonomous Agents and Multi-Agent
Systems, 1
(1), 7-38.
Karypis, G., & Kumar, V. (1999). A fast and high quality
multilevel scheme for partitioning rrregular graphs.
SIAM
Journal of Scientific Computing, 20
(1), 359-392.
Jensen, K. (1996). Coloured Petri Nets: Basic concepts,
analysis methods and practical use. 2
nd
ed., Vol. 1,
EATCS
Monographs on Theoretical Computer Science
. London:
Springer.
Karypis, G., Han, E.-H., & Kumar, V. (1999). CHAME-
LEON: A hierarchical clustering algorithm using dynamic
modeling.
IEEE Computer, 32
(8), 68-75.
Kasanen, E., Lukka, K., Siitonen, A. (1993). The con-
structive approach in management accounting research.
Journal of Management Accounting Research, 5
(3),
243-64.
Joachims, T. (1999). Making large-scale SVM learning
practical. Advances in Kernel Methods - Support Vec-
tor Learning.
Jonsson, E. (1997). A quantitative model of the security
intrusion process based on attacker behavior.
IEEE
Transactions on Software Engineering, 23
(4).
Kasiran, M. K., & Meziane, F. (2002). An information
framework for a merchant trust agent in electronic com-
merce. In H. Yin, N. Allinson, R. Freeman, J. Keane,
& Hubbard S. (Eds),
Intelligent data engineering and
automated learning
, (pp. 243-248). Springer.
Jøsang, A. (1998). Modelling trust in information society.
Unpublished doctoral thesis, Department of Telemat-
ics, Norwegian University of Science and Technology,
Trondheim, Norway.
Kasiran, M. K., & Meziane, F. (2004). The usage of third
party endorsement in ecommerce websites.
In proceed-
ings of the 7
th
International Conference on Work with
Computing Systems (WWCS2004)
, (pp.794-798). Kuala
Lumpur, Malaysia.
Josephson, J., & Josephson, S. (1994).
Abductive infer-
ence, computation, philosophy, technology
. New York:
Cambridge University Press.
Kahle, B., & Medlar. A. (1991). An information system
for corporate users: Wide area information servers.
ConneXions—The Interoperability Report
,
5
(11), 2-9.
Kaufman, L., & Rousseeuw, P. J. (1990).
Finding groups
in data: An introduction to cluster analysis.
New York:
Wiley.
Search WWH ::
Custom Search