Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             15 results found
no title author magazine year volume issue page(s) type
1 Addressing the valuation problem in multi-round combinatorial auctions Chakraborty, Soumyakanti
2014
17 5 p. 1145-1160
article
2 Advances in secure knowledge management in the big data era Hota, Chittaranjan
2015
17 5 p. 983-986
article
3 Analysis of a multistage attack embedded in a video file Nath, Hiran V.
2015
17 5 p. 1029-1037
article
4 Does better Internet access lead to more adoption? A new empirical study using household relocation Ma, Junzhao
2014
17 5 p. 1097-1110
article
5 Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service Kapoor, Kawaljeet Kaur
2014
17 5 p. 1039-1056
article
6 Game-theoretic strategies for IDS deployment in peer-to-peer networks Narang, Pratik
2015
17 5 p. 1017-1028
article
7 How business process reengineering affects information technology investment and employee performance under different performance measurement Huang, Shaio Yan
2014
17 5 p. 1133-1144
article
8 IPTV parental control: A collaborative model for the Social Web Fernández-Vilas, Ana
2014
17 5 p. 1161-1176
article
9 Measurements of mislead threshold of company graph distortion Huang, Shaio Yan
2014
17 5 p. 1111-1132
article
10 Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013 Lee, Jaeung
2015
17 5 p. 997-1005
article
11 Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts Hossain, Mohammad Alamgir
2014
17 5 p. 1057-1076
article
12 Secure and privacy preserving data processing support for active authentication Sun, Yan
2015
17 5 p. 1007-1015
article
13 Social balance in signed networks Zheng, Xiaolong
2014
17 5 p. 1077-1095
article
14 Surviving advanced persistent threats in a distributed environment – Architecture and analysis Mehresh, Ruchika
2015
17 5 p. 987-995
article
15 Understanding health information technology adoption: A synthesis of literature from an activity perspective Sun, Jun
2014
17 5 p. 1177-1190
article
                             15 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands