Information Technology Reference
In-Depth Information
MSE (2005). Microsoft Search Engine, Beta . Retrieved
January 23, 2005, from http://beta.search.msn.com
Ng, R., & Han, J. (1994). Efficient and effective cluster-
ing methods for spatial data mining. In Proceedings of
the 20th International Conference on Very Large Data
Bases . Santiago, Chile.
Muansuwan, N., Sirinaovakul, B., & Thepruangchai, P.
(2004). Intelligent tutoring and knowledge base creation
for the subject of computer programming. In Proceedings
of tencon 2004 (p. 353-356). IEEE.
Ngai, E. W. T., & Wat, F. K. T. (2002). A literature re-
view and classification of electronic commerce research.
Information & Management , (39), 415-429.
Mukherjee, S., Osuna, E., & Girosi, F. (1997). Nonlinear
prediction of chaotic time series using support vector
machines. Paper presented at the {IEEE} Workshop on
Neural Networks for Signal Processing {VII}, Ameila
Island, FL, USA.
Nigam, K., McCallum, A. K., Thrun, S., and Mitchell,
T. M. (1998). Learning to classify text from labeled and
unlabeled documents. In Proceedings of AAAI-98, 15 th
Conference of the American Association for Artificial
Intelligence (pp.792-799). Madison: AAAI Press.
Nag, B. (2007). A Blackboard agent community archi-
tecture in a supply chain environment. Design Principles
and Practices , 1 (1), 91-104.
Nijssen, G. M., & Halpin, T. A.(1989). Conceptual Schema
and Relational Database Design: A fact oriented ap-
proach . New York:Prentice Hall.
Nah, F., & Davis, S. (2002). HCI research issues in e-
commerce. Journal of Electronic Commerce Research ,
3 (3), 98-113.
Nodine, M., Bohrer, W., & Ngu, A. (1999). Semantic
brokering over dynamic heterogeneous data sources
in InfoSleuth. 15 th International Conference on Data
Engineering , 358-365.
Naraine, R. (2003). B2C e-commerce market will reach
$90 billion in 2003. Retrieved from http://gcis.ca/cdne-
497-apr-26-2003.html
Norrmann, A., & Jansson, U. (2004). Ericsson's proactive
supply chain risk management approach after a serious
sub-supplier accident. International Journal of Physical
Distribution & Logistics Management. 34 (5), 434-456.
National Fraud InformationCentre (no date). Fraud
information centre. Retrieved from http://wwwfraud.
org/2002intstats htm
Oliveira, S. R. M., Zaiane, O. R., & Saygin, Y. (2004).
Secure association rule sharing. In 8th Pacific-Asia
Conference on Knowledge Discovery and Data Mining
2004, (Lecture Notes in Artificial Intelligence, 3056,
pp. 74-85).
Neches, R., Fikes R., Finin, T., Gruber, T., Patil, R., Sena-
tor, T., & Swartout, W. R. (1991). Enabling technology
for knowledge sharing. AI Magazine, 12 (3), 36-56.
Nefti, S. (2002, October 6-9). New algorithm for sim-
plification of rule base generated by automated fuzzy
modeling. IEEE International Conference on Systems,
Man and Cybernetics, 2 , 190-195.
Open Financial Exchange (OFX). (2006). Open Financial
Exchange home page. Retrieved from March 27, 2006,
from http://www.ofx.net/ofx/default.asp
Nefti, S., & Djouani, K. (2002, October). Fuzzy model-
ing of MIMO non linear system: Complexity reduction .
IEEE International Conference on Systems , Man and
Cybernetics, 2, 185-189.
Orlikowski, W., & Iacono, C. (2001). Research Commen-
tary: Desperately Seeking the “IT” in IT Research - A
Call to Theorizing the IT Artifact. Information Systems
Research , 12(2), 121-134.
Nelson, K. (1996). Language in cognitive development:
Emergence of the mediated mind . Cambridge University
Press.
Ortega, M., & Lin, L. (2004). Control theory applica-
tions to the production-inventory problem: A review.
International Journal of Production Research, 42 (11),
2303-2322.
Search WWH ::




Custom Search