Information Technology Reference
In-Depth Information
MSE (2005).
Microsoft Search Engine, Beta
. Retrieved
January 23, 2005, from http://beta.search.msn.com
Ng, R., & Han, J. (1994). Efficient and effective cluster-
ing methods for spatial data mining. In
Proceedings of
the 20th International Conference on Very Large Data
Bases
. Santiago, Chile.
Muansuwan, N., Sirinaovakul, B., & Thepruangchai, P.
(2004). Intelligent tutoring and knowledge base creation
for the subject of computer programming. In
Proceedings
of tencon 2004
(p. 353-356). IEEE.
Ngai, E. W. T., & Wat, F. K. T. (2002). A literature re-
view and classification of electronic commerce research.
Information & Management
, (39), 415-429.
Mukherjee, S., Osuna, E., & Girosi, F. (1997). Nonlinear
prediction of chaotic time series using support vector
machines. Paper presented at the {IEEE} Workshop on
Neural Networks for Signal Processing {VII}, Ameila
Island, FL, USA.
Nigam, K., McCallum, A. K., Thrun, S., and Mitchell,
T. M. (1998). Learning to classify text from labeled and
unlabeled documents. In
Proceedings of AAAI-98, 15
th
Conference of the American Association for Artificial
Intelligence
(pp.792-799). Madison: AAAI Press.
Nag, B. (2007). A Blackboard agent community archi-
tecture in a supply chain environment.
Design Principles
and Practices
,
1
(1), 91-104.
Nijssen, G. M., & Halpin, T. A.(1989).
Conceptual Schema
and Relational Database Design: A fact oriented ap-
proach
. New York:Prentice Hall.
Nah, F., & Davis, S. (2002). HCI research issues in e-
commerce.
Journal of Electronic Commerce Research
,
3
(3), 98-113.
Nodine, M., Bohrer, W., & Ngu, A. (1999). Semantic
brokering over dynamic heterogeneous data sources
in InfoSleuth.
15
th
International Conference on Data
Engineering
, 358-365.
Naraine, R. (2003). B2C e-commerce market will reach
$90 billion in 2003. Retrieved from http://gcis.ca/cdne-
497-apr-26-2003.html
Norrmann, A., & Jansson, U. (2004). Ericsson's proactive
supply chain risk management approach after a serious
sub-supplier accident.
International Journal of Physical
Distribution & Logistics Management.
34
(5), 434-456.
National Fraud InformationCentre (no date).
Fraud
information centre.
Retrieved from http://wwwfraud.
org/2002intstats htm
Oliveira, S. R. M., Zaiane, O. R., & Saygin, Y. (2004).
Secure association rule sharing. In
8th Pacific-Asia
Conference on Knowledge Discovery and Data Mining
2004,
(Lecture Notes in Artificial Intelligence, 3056,
pp. 74-85).
Neches, R., Fikes R., Finin, T., Gruber, T., Patil, R., Sena-
tor, T., & Swartout, W. R. (1991). Enabling technology
for knowledge sharing.
AI Magazine, 12
(3), 36-56.
Nefti, S. (2002, October 6-9). New algorithm for sim-
plification of rule base generated by automated fuzzy
modeling.
IEEE International Conference on Systems,
Man and Cybernetics, 2
, 190-195.
Open Financial Exchange (OFX). (2006).
Open Financial
Exchange home page.
Retrieved from March 27, 2006,
from http://www.ofx.net/ofx/default.asp
Nefti, S., & Djouani, K. (2002, October). Fuzzy model-
ing of MIMO non linear system: Complexity reduction
.
IEEE International Conference on Systems
,
Man and
Cybernetics,
2, 185-189.
Orlikowski, W., & Iacono, C. (2001). Research Commen-
tary: Desperately Seeking the “IT” in IT Research - A
Call to Theorizing the IT Artifact.
Information Systems
Research
, 12(2), 121-134.
Nelson, K. (1996).
Language in cognitive development:
Emergence of the mediated mind
. Cambridge University
Press.
Ortega, M., & Lin, L. (2004). Control theory applica-
tions to the production-inventory problem: A review.
International Journal of Production Research, 42
(11),
2303-2322.
Search WWH ::
Custom Search