Works matching IS 13873326 AND DT 2008 AND VI 10 AND IP 1
Results: 9
A decision support system for locating VHF/UHF radio jammer systems on the terrain.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 111, doi. 10.1007/s10796-007-9046-3
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2008
- By:
- Publication type:
- Editorial
Market reaction to patent infringement litigations in the information technology industry.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 61, doi. 10.1007/s10796-007-9036-5
- By:
- Publication type:
- Article
Building effective online game websites with knowledge-based trust.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 47, doi. 10.1007/s10796-007-9060-5
- By:
- Publication type:
- Article
A scalable multi-level feature extraction technique to detect malicious executables.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 33, doi. 10.1007/s10796-007-9054-3
- By:
- Publication type:
- Article
Spectrum acquisition strategies adopted by wireless carriers in the USA.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 77, doi. 10.1007/s10796-007-9056-1
- By:
- Publication type:
- Article
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 103, doi. 10.1007/s10796-007-9059-y
- By:
- Publication type:
- Article
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 3, doi. 10.1007/s10796-007-9035-6
- By:
- Publication type:
- Article
Formalising theories of trust for authentication protocols.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 19, doi. 10.1007/s10796-007-9049-0
- By:
- Publication type:
- Article