Works matching IS 13873326 AND DT 2006 AND VI 8 AND IP 3
Results: 7
An attack-norm separation approach for detecting cyber attacks.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 163, doi. 10.1007/s10796-006-8731-y
- By:
- Publication type:
- Article
A data mining approach to database compression.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 147, doi. 10.1007/s10796-006-8777-x
- By:
- Publication type:
- Article
Optimum design of electronic communities as economic entities.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 179, doi. 10.1007/s10796-006-8778-9
- By:
- Publication type:
- Article
Splitting methods for decision tree induction: An exploration of the relative performance of two entropy-based families.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 195, doi. 10.1007/s10796-006-8779-8
- By:
- Publication type:
- Article
Interplay of cost and adoption of tele-medicine in Sub-Saharan Africa: The case of tele-cardiology in Ethiopia.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 211, doi. 10.1007/s10796-006-8780-2
- By:
- Publication type:
- Article
The rise and fall of the competitive local exchange carriers in the U.S.: An institutional perspective.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 225, doi. 10.1007/s10796-006-8781-1
- By:
- Publication type:
- Article
Social influence process in the acceptance of a virtual community service.
- Published in:
- Information Systems Frontiers, 2006, v. 8, n. 3, p. 241, doi. 10.1007/s10796-006-8782-0
- By:
- Publication type:
- Article