Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 408 matches
- 2008
- Abdelnasser Abdelaal, Hesham H. Ali:
A Graph Theoretic Approach for Analysis and Design of Community Wireless Networks. AMCIS 2008: 310 - Abdelnasser Abdelaal, Hesham H. Ali:
A Content-Based Pricing Model for Municipal and Community Wireless Networks. AMCIS 2008: 385 - Chon Abraham, Iris A. Junglas, Mike Willis:
Enabling an Agile Information Supply Chain in Service Oriented Architectures with Web Services. AMCIS 2008: 402 - Aisha Abuelmaatti, Yacine Rezgui:
Virtual Organizations in Practice: A European Perspective. AMCIS 2008: 142 - Shamel Addas, Alain Pinsonneault:
IT and NPD Performance: Unveiling the Mediating Effects of Process Integration and Knowledge Integration. AMCIS 2008: 316 - Anouck Adrot, Daniel Robey:
Information Technology, Improvisation and Crisis Response: Review of Literature and Proposal for Theory. AMCIS 2008: 397 - Miguel I. Aguirre-Urreta, George M. Marakas, Michael E. Ellis, Wenying Nan Sun:
A Monte Carlo Investigation of Partial Least Squares, With Implications for Both Structural and Measurement Models. AMCIS 2008: 246 - Somasheker Akkaladevi, Xin (Robert) Luo:
Bottlenecks in the Process of Improving ICT Infastructure in Developing Countries: A Chinese Perspective. AMCIS 2008: 398 - Mutaz M. Al-Debei, Ramzi El-Haddadeh, David E. Avison:
Defining the Business Model in the New World of Digital Business. AMCIS 2008: 300 - Ibrahim M. Al-Jabri, Ahmad Al-Hadab:
End User Adoption of ERP Systems: Investigation of Four Beliefs. AMCIS 2008: 104 - Shafi Al-Shafi, Vishanth Weerakkody:
The Use of Wireless Internet Parks to Facilitate Adoption and Diffusion of E-Government Services: An Empirical Study in Qatar. AMCIS 2008: 322 - Forough Karimi Alaghehband, Shikui Wu, Suzanne Rivard, Sylvain Goyette:
Revising the IT Outsourcing Decision Model: A Transaction Cost Perspective. AMCIS 2008: 196 - Andreas Albers, Christian Kahl:
Prototypical Implementation of an Intermediary Platform for Context-Sensitive Mobile Marketing Applications. AMCIS 2008: 159 - Paulette S. Alexander, James G. Alexander:
The Economic Sciences and the Information Age: Lessons from the Nobel Laureates. AMCIS 2008: 130 - Noora Alghatam:
The Appropriation and Enactment of E-Government Projects by ICT Professionals: A Case Study of Dubai. AMCIS 2008: 219 - Maged Ali, Laurence D. Brooks:
Culture and IS: A Criticism of Predefined Cultural Archetypes Studies. AMCIS 2008: 62 - Khaled A. Alshare, Peggy Lane:
A Conceptual Model for Explaining Violations of the Information Security Policy (ISP): A Cross Cultural Perspective. AMCIS 2008: 366 - Steven Alter:
Seeking Synergies Between Four Views of Service in the IS Field. AMCIS 2008: 76 - Donald L. Amoroso, Pamila Dembla, Hui Wang, Martina E. Greiner, Pengpeng Liu:
Understanding Music Sharing Behavior in China: Development of an Instrument. AMCIS 2008: 38 - Reem Ayouby, Anne-Marie Croteau:
Acculturation to the Global Culture, Ethnic Identification and the Adoption of Social Computing. AMCIS 2008: 61 - Henning Baars, Xuanpu Sun, Jens Strüker, Daniel Gille:
Profiling Benefits of RFID Applications. AMCIS 2008: 288 - Kallol Kumar Bagchi, Peeter Kirs:
A Preliminary Investigation of the Moderating Affects of National Culture and Regulation on the Relationship Between Innovation and Performanve of Information Service Firms. AMCIS 2008: 63 - Janet L. Bailey, Robert B. Mitchell, Bradley K. Jensen:
Analysis of Student Vulnerabilities to Phishing. AMCIS 2008: 271 - Akhilesh Bajaj, Robert Russell:
Leveraging Group Cohesiveness to Form Workflow Teams. AMCIS 2008: 347 - Sumit Bakshi, S. Krishna:
The Impact of Virtuality on the Flexibility of Virtual Teams in Software Development Projects. AMCIS 2008: 230 - Peter Baloh, Katharina Uthicke, Gyewan Moon, Choi Jaekwon:
A Business Process Oriented Method of KM Solution Design: The Case of Samsung Electronics Anycall Gumi. AMCIS 2008: 223 - Tridib Bandyopadhyay, Herbert J. Mattord:
Defending Cyber Terrorism - A Game Theoretic Modeling Approach. AMCIS 2008: 318 - Gaurav Bansal, Fatemeh Zahedi, David Gefen:
Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online. AMCIS 2008: 178 - Gianilda A. Baro, Alok Chakrabarti, Fadi Deek:
Organizational and Informational System Factors in Post-Merger Technology Integration. AMCIS 2008: 359 - Vikraman Baskaran, Rajeev K. Bali, Hisbel Arochena, Raouf N. Gorgui-Naguib, Mohd Khanapi Abd Khanapi, Bharat Shah, Aziz Guergachi, C. Cyrne, Nilmini Wickramasinghe:
Health Informatics: A UK and Canadian Perspective on Current and Future Challenges. AMCIS 2008: 111
skipping 378 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 05:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint