Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
130 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
11
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
What to Expect from Software Experience Exploitation
Kurt Schneider
10.3217/jucs-008-06-0570
28-06-2002
Unique: 321 | Total: 356
| Access Period:
570-580
HTML
XML
PDF
Research Article
Ontology-Based Skills Management: Goals, Opportunities and Challenges
Jacqueline Reich
,
Peter Brockhausen
,
Thorsten Lau
,
Ulrich Reimer
10.3217/jucs-008-05-0506
28-05-2002
Unique: 343 | Total: 430
| Access Period:
506-515
HTML
XML
PDF
Research Article
How Do Frequency and Duration of Messaging Affect Impression Development in Computer-Mediated Communication?
Yuliang Liu
,
Dean Ginther
,
Paul Zelhart
10.3217/jucs-007-10-0893
28-10-2001
Unique: 394 | Total: 506
| Access Period:
893-913
HTML
XML
PDF
Research Article
Knowledge Management More Effort - More Success?
Barbara Tillian
10.3217/jucs-007-07-0602
28-07-2001
Unique: 377 | Total: 443
| Access Period:
602-609
HTML
XML
PDF
Research Article
Methodologies and Tools For Continuous Improvement of Systems
William Schindel
,
Gloria Rogers
10.3217/jucs-006-03-0289
28-03-2000
Unique: 323 | Total: 372
| Access Period:
289-323
HTML
XML
PDF
Research Article
Wonders of the Invisible Workplace: IT and Process Reinvention
Patricia Carlson
10.3217/jucs-006-03-0256
28-03-2000
Unique: 327 | Total: 379
| Access Period:
256-271
HTML
XML
PDF
Research Article
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
Ahmad Baraani-Dastjerdi
,
Josef Pieprzyk
,
Reihaneh Safavi-Naini
,
Janusz Getta
10.3217/jucs-003-06-0730
28-06-1997
Unique: 375 | Total: 439
| Access Period:
730-753
HTML
XML
PDF
Research Article
Generalizing BIAS Specifications
Evgenija Popova
,
Christian Ullrich
10.3217/jucs-003-01-0023
28-01-1997
Unique: 297 | Total: 332
| Access Period:
23-41
HTML
XML
PDF
Research Article
Software Patents and The Internet
Jenny Shearer
,
Arnould Vermeer
10.3217/jucs-001-05-0312
28-05-1995
Unique: 342 | Total: 409
| Access Period:
312-319
HTML
XML
PDF
Research Article
Levels of Anonymity
Bill Flinn
,
Hermann Maurer
10.3217/jucs-001-01-0035
28-01-1995
Unique: 371 | Total: 441
| Access Period:
35-47
HTML
XML
PDF
11
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK