Journal Contents: Journal of Database Management (JDM)

View the Journal of Database Management (JDM) home page for complete details.
Volume 35 (2024)
Issue 1
Article 10
RDF(S) Store in Object-Relational Databases (pages 1-32)
Zongmin Ma (Nanjing University of Aeronautics and Astronautics, China), Daiyi Li (Nanjing University of Aeronautics and Astronautics, China), Jiawen Lu (Nanjing University of Aeronautics and Astronautics, China), Ruizhe Ma (University of Massachusetts, Lowell, USA), Li Yan (Nanjing University of Aeronautics and Astronautics, China)
Article 15
An Efficient NoSQL-Based Storage Schema for Large-Scale Time Series Data (pages 1-21)
Ruizhe Ma (University of Massachusetts, Lowell, USA), Weiwei Zhou (Nanjing University of Aeronautics and Astronautics, China), Zongmin Ma (Nanjing University of Aeronautics and Astronautics, China)
Article 19
A Sample-Aware Database Tuning System With Deep Reinforcement Learning (pages 1-25)
Zhongliang Li (Nanjing University of Aeronautics and Astronautics, China), Yaofeng Tu (Nanjing University of Aeronautics and Astronautics, China), Zongmin Ma (Nanjing University of Aeronautics and Astronautics, China)
Article 71
Narrativization in Information Systems Development (pages 1-30)
Pasi Raatikainen (Tampere University, Finland), Samuli Pekkola (University of Jyväskylä, Finland), Maria Mäkelä (Tampere University, Finland)
Article 71
Optimal Information Acquisition and Sharing Decisions: Joint Reviews on Crowdsourcing Product Design (pages 1-34)
Jizi Li (Wuhan University of Science and Technology, China), Xiaodie Wang (Huazhong University of Science and Technology, China), Justin Z. Zhang (University of North Florida, USA), Longyu Li (Fudan University, China)
Article 76
Intrusion Detection System: A Comparative Study of Machine Learning-Based IDS (pages 1-25)
Amit Singh (Government of India, India), Jay Prakash (Vijay Singh Pathik Government (PG) College, India), Gaurav Kumar (Bennett University, India), Praphula Kumar Jain (GLA University, India), Loknath Sai Ambati (Oklahoma City University, USA)
Article 88
Handling Imbalanced Data With Weighted Logistic Regression and Propensity Score Matching methods: The Case of P2P Money Transfers (pages 1-37)
Lavlin Agrawal (North Carolina Agricultural and Technical State University, USA), Pavankumar Mulgund (University of Memphis, USA), Raj Sharman (University at Buffalo, USA)
Volume 34 (2023)
Issue 1
Article 19
The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis (pages 1-23)
Nan Feng (Changchun University of Finance and Economics, China), Yuguang Wang (Changchun Guanghua University, China), Zhiguo Chen (Jilin University, China), Tingting Song (Changchun University of Finance and Economics, China)
Article 20
Prediction of the Stock Market From Linguistic Phrases: A Deep Neural Network Approach (pages 1-22)
Prajwal Eachempati (Ernst and Young Limited, Dublin, Ireland), Praveen Ranjan Srivastava (Indian Institute of Management, Rohtak, India)
Article 22
The Effects of Atmospherics and Influencers on Purchase Intention in Social Commerce (pages 1-23)
Pranay Sindhu (Indian Institute of Management Kashipur, India), Kumkum Bharti (Indian Institute of Management Kashipur, India)
Article 36
Adaptive Modularized Recurrent Neural Networks for Electric Load Forecasting (pages 1-18)
Fangwan Huang (Fuzhou University, China), Shijie Zhuang (Fuzhou University, China), Zhiyong Yu (Fuzhou University, China), Yuzhong Chen (Fuzhou University, China), Kun Guo (Fuzhou University, China)
Article 39
Credit Risk Models for Financial Fraud Detection: A New Outlier Feature Analysis Method of XGBoost With SMOTE (pages 1-20)
Huosong Xia (Wuhan Textile University, China), Wuyue An (Wuhan Textile University, China), Zuopeng (Justin) Zhang (University of North Florida, USA)
Article 40
An Enhanced Energy-Efficient Web Service Composition Algorithm Based on the Firefly Algorithm (pages 1-19)
Yifei Xue (Northeast Forestry University, China), Jian Wang (Northeast Forestry University, China), Weipeng Jing (Northeast Forestry University, China)
Article 50
Frequent Itemset Mining Algorithm Based on Linear Table (pages 1-21)
Jun Lu (Heilongjiang University, China), Wenhe Xu (Heilongjiang University, China), Kailong Zhou (Heilongjiang University, China), Zhicong Guo (Heilongjiang University, China)
Article 51
Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode (pages 1-29)
Junfeng Man (Hunan First Normal University, China), Longqian Zhao (Nanjing University of Aeronautics and Astronautics, China), Bowen Xu (Virginia Polytechnic Institute and State University, USA), Cheng Peng (Hunan University of Technology, China), Junjie Jiang (Hunan University of Technology, China), Yi Liu (Hunan University of Technology, China)
Article 51
Multi-Feature Video Recommendation Based on Hypergraph Convolution for Mobile Edge Environment (pages 1-18)
Haiyan Wang (Nanjing University of Posts and Telecommunications, China), Jun Hong (Nanjing University of Posts and Telecommunications, China), Kaixiang You (Nanjing University of Posts and Telecommunications, China), Jian Luo (Nanjing University of Posts and Telecommunications, China)
Article 52
Selecting Rotation Constants on SIMON-Type Ciphers (pages 1-23)
Kai Zhang (Shanghai Jiao Tong University, China & PLA SSF Information Engineering University, China), Xuejia Lai (Shanghai Jiao Tong University, China), Jie Guan (PLA SSF Information Engineering University, China), Bin Hu (PLA SSF Information Engineering University, China)
Article 52
Technological Solutions for Digital Identity: A Computer Vision-Based Approach to Mitigate Imaging Errors (pages 1-17)
Harish Kumar (Indian Institute of Management, Kashipur, India), Rameshwar Shivadas Ture (Indian Institute of Management, Kashipur, India), M. P. Gupta (Indian Institute of Technology, Delhi, India), R. S. Sharma (National Health Authority, Government of India, India)
Article 53
Semi-Supervised Event Extraction Incorporated With Topic Event Frame (pages 1-26)
Gongqing Wu (Hefei University of Technology, China), Zhuochun Miao (Hefei University of Technology, China), Shengjie Hu (Hefei University of Technology, China), Yinghuan Wang (Hefei University of Technology, China), Zan Zhang (Hefei University of Technology, China), Xianyu Bao (Shenzhen Academy of Inspection and Quarantine, China)
Article 54
A Distributed Spatial Index With High Update Efficiency for Location-Based Real-Time Services (pages 1-28)
Junhua Fang (Soochow University, China), Zonglei Zhang (Soochow University, China)
Article 55
Artificial Intelligence and Machine Learning for Job Automation: A Review and Integration (pages 1-12)
Gang Peng (California State University, Fullerton, USA), Rahul Bhaskar (California State University, Fullerton, USA)
Article 56
Knowledge Extraction From National Standards for Natural Resources: A Method for Multi-Domain Texts (pages 1-23)
Taiyu Ban (University of Science and Technology of China, China), Xiangyu Wang (College of Data Science, University of Science and Technology of China, China), Xin Wang (Department of Computer Science and Technology, University of Science and Technology of China, China), Jiarun Zhu (Department of Computer Science and Technology, University of Science and Technology of China, China), Lvzhou Chen (College of Data Science, University of Science and Technology of China, China), Yizhan Fan (College of Data Science, University of Science and Technology of China, China)
Article 57
A Blockchain-Based System for Aid Delivery: Concept Development, Data Modeling, and Validation (pages 1-35)
Mehmet Demir (Toronto Metropolitan University, Canada), Ozgur Turetken (Toronto Metropolitan University, Canada), Alexander Ferworn (Toronto Metropolitan University, Canada), Mehdi Kargar (Toronto Metropolitan University, Canada)
Article 58
Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction (pages 1-20)
Jeng-Shyang Pan (Shandong University of Science and Technology, China), Pei Hu (Shandong University of Science and Technology, China), Tien-Szu Pan (National Kaohsiung University of Science and Technology, Taiwan), Shu-Chuan Chu (Shandong University of Science and Technology, China)
Article 86
Text Detection Model for Historical Documents Using CNN and MSER (pages 1-23)
Rankang Li (Southwest University, China), Shanxiong Chen (Southwest University, China), Fujia Zhao (Southwest University, China), Xiaogang Qiu (Southwest University, China)
Article 87
A Truss-Based Framework for Graph Similarity Computation (pages 1-18)
Yanwei Zheng (Shandong University, China), Zichun Zhang (Shandong University, China), Qi Luo (Shandong University, China), Zhenzhen Xie (Shandong University, China), Dongxiao Yu (Shandong University, China)
Issue 2
Article 13
Security of Medical Images Using a Key-Based Encryption Algorithm in the RDWT-RSVD Domain: SeMIE (pages 1-20)
Monu Singh (National Institute of Technology, Patna, India), Amit Kumar Singh (National Institute of Technology, Patna, India)
Article 14
Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis (pages 1-26)
Farhan Ullah (School of Software, Northwestern Polytechnical University, Xi'an, China), Xiaochun Cheng (Department of Computer Science, Swansea University, Bay Campus, Fabian Way, Swansea, UK), Leonardo Mostarda (Computer Science Department, Camerino University, Camerino, Italy), Sohail Jabbar (Department of Computational Science, The University of Faisalabad, Faisalabad, Pakistan)
Article 15
Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks (pages 1-25)
Maryam Bukhari (Department of Computer Science, COMSATS University Islamabad, Attock, Pakistan), Sadaf Yasmin (Department of Computer Science, COMSATS University Islamabad, Attock, Pakistan), Saira Gillani (Department of Information technology and Computer science, University of Central Punjab, Lahore, Pakistan), Muazzam Maqsood (Department of Computer Science, COMSATS University Islamabad, Attock, Pakistan), Seungmin Rho (Department of Industrial Security, Chung-Ang University, Seoul, South Korea), Sang Soo Yeo (Department of Computer Engineering, Mokwon University, Daejeon, South Korea)
Article 65
Intrusion Detection System for IoE-Based Medical Networks (pages 1-18)
Parul Lakhotia (Netaji Subhas University of Technology, Delhi, India), Rinky Dwivedi (Maharaja Surajmal Institute of Technology, Delhi, India), Deepak Kumar Sharma (Indira Gandhi Delhi Technical University for Women, Delhi, India), Nonita Sharma (Indira Gandhi Delhi Technical University for Women, Delhi, India)
Article 76
A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography (pages 1-22)
R. Gurunath (CHRIST University (Deemed), India), Debabrata Samanta (Christ University (Deemed), India)
Article 99
Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything (pages 1-33)
Erukala Suresh Babu (National Institute of Technology, Warangal, India), Bhukya Padma (National Institute of Technology, Warangal, India), Soumya Ranjan Nayak (School of Computer Engineering, KIIT (Deemed University), Bhubaneswar, India), Nazeeruddin Mohammad (Prince Mohammad Bin Fahd University, Saudi Arabia), Uttam Ghosh (Meharry Medical College, USA)
Issue 3
Article 36
CNN-Based Vessel Meeting Knowledge Discovery From AIS Vessel Trajectories (pages 1-38)
Peng Chen (Dalian Neusoft University of Information, China), Shuang Liu (Dalian Minzu University, China), Niko Lukač (University of Maribor, Slovenia)
Article 43
Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window (pages 1-16)
Hongjie Wan (Nanjing University of Posts and Telecommunications, China), Junchen Ma (Nanjing University of Posts and Telecommunications, China), Qiumei Yu (Key Laboratory of Urban Land Resources Monitoring and Simulation MNR, China), Guozi Sun (Nanjing University of Posts and Telecommunications, China), Hansen He (Nanjing Jiangshipin Data Technology Co. Ltd., China), Huakang Li (XJTLU Entrepreneur College, China)
Article 44
Neural Super-Resolution in Real-Time Rendering Using Auxiliary Feature Enhancement (pages 1-13)
Zhihua Zhong (Zhejiang University City College, China), Guanlin Chen (Zhejiang University City College, China), Rui Wang (Zhejiang University City College, China), Yuchi Huo (Zhejiang University City College, China)
Article 45
Overview of Internet of Medical Things Security Based on Blockchain Access Control (pages 1-20)
Yikai Liu (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Fenglan Ju (Financial Department, North China University of Science and Technology, Tangshan, China), Qunwei Zhang (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Meng Zhang (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Zezhong Ma (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Mingduo Li (State Key Laboratory of Process Automation in Mining and Metallurgy, Beijing, China & Beijing Key Laboratory of Process Automation in Mining and Metallurgy, Beijing, China), Aimin Yang (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China), Fengchun Liu (College of Science, North China University of Science and Technology, Tangshan, China & Hebei Key Laboratory of Data Science and Application, Tangshan, China & The Key Laboratory of Engineering Computing in Tangshan City, Tangshan, China)
Article 46
One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding (pages 1-18)
Yalan Feng (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology, Anhui University, Hefei, China), Huabin Wang (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology, Anhui University, Hefei, China), Dailei Zhang (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology, Anhui University, Hefei, China), Jiahao Li (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology, Anhui University, Hefei, China), Liang Tao (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology, Anhui University, Hefei, China)
Article 47
Finger Vein Recognition Based on a Histogram of Competitive Gabor Directional Binary Statistics (pages 1-19)
Min Li (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology Anhui University, Hefei, China), Huabin Wang (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology Anhui University, Hefei, China), Leqian Li (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology Anhui University, Hefei, China), Dailei Zhang (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology Anhui University, Hefei, China), Liang Tao (Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, School of Computer Science and Technology Anhui University, Hefei, China)
Article 49
Origin-Oriented Shuffled Frog Leaping Vehicle Routing Multiobjective Optimization Algorithm (pages 1-24)
Liqun Liu (Gansu Agricultural University, China), Renyuan Gu (Gansu Agricultural University, China), Jiuyuan Huo (Lanzhou Jiaotong University, China), Yubo Zhou (Gansu Agricultural University, China)
Article 53
Video Object Counting With Scene-Aware Multi-Object Tracking (pages 1-13)
Yongdong Li (Guangdong Industry Polytechnic, China), Liang Qu (North China Sea Environmental Monitoring Center, State Oceanic Administration, China), Guiyan Cai (Guangzhou Medical University, China), Guoan Cheng (School of Information and Electrical Engineering, Qingdao Harbour Vocational and Technical College, China), Long Qian (School of Computer Science and Technology, Ocean University of China, China), Yuling Dou (School of Computer Science and Technology, Ocean University of China, China), Fengqin Yao (School of Computer Science and Technology, Ocean University of China, China), Shengke Wang (School of Computer Science and Technology, Ocean University of China, China)
Article 53
TransFusion Model Fusion Mechanism Based on Transformer for Traffic Flow Prediction (pages 1-14)
Xintong Song (Harbin Institute of Technology, China), Donghua Yang (Harbin Institute of Technology, China), Yutong Wang (Harbin Institute of Technology, China), Hongzhi Wang (Harbin Institute of Technology, China), Jinbao Wang (Harbin Institute of Technology, China), Bo Zheng (CnosDB, China)
Article 54
Target Detection for Motion Images Using the Improved YOLO Algorithm (pages 1-17)
Tian Zhang (College of Computer Science and Technology, ChangChun Normal University, ChangChun, China)
Article 56
A Benchmark for Performance Evaluation of a Multi-Model Database vs. Polyglot Persistence (pages 1-20)
Feng Ye (Hohai University, China), Xinjun Sheng (Hohai University, China), Nadia Nedjah (State University of Rio de Janeiro, Brazil), Jun Sun (Hohai University, China), Peng Zhang (Jiangsu Provincial Water Conservancy Engineering Planning Office, China)
Article 75
Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease (pages 1-17)
Hui Li (Beijing University of Chemical Technology, China), Yifei Zhu (Beijing University of Chemical Technology, China)
Article 96
Completion of Parallel app Software User Operation Sequences Based on Temporal Context (pages 1-17)
Haiyi Liu (Kunming University of Science and Technology, China), Ying Jiang (Kunming University of Science and Technology, China), Yongquan Chen (Kunming University of Science and Technology, China)
Article 97
Incorporating I Ching Knowledge Into Prediction Task via Data Mining (pages 1-16)
Wenjie Liu (Nanjing University of Posts and Telecommunications, China), Sai Chen (Nanjing University of Posts and Telecommunications, China), Guoyao Huang (Nanjing University of Posts and Telecommunications, China), Lingfeng Lu (Nanjing University of Posts and Telecommunications, China), Huakang Li (Xi'an Jiaotong-Liverpool University, China), Guozi Sun (Nanjing University of Posts and Telecommunications, China)
Volume 33 (2022)
Issue 1
Article 31
Fighting Pandemics with Physical Distancing Management Technologies (pages 1-16)
Veda C. Storey (Georgia State University, USA), Roman Lukyanenko (HEC Montréal, Canada), Camille Grange (HEC Montréal, Canada)
Article 32
Index Key Compression and On-the-Fly Reconstruction of In-Memory Indexes (pages 1-17)
Yongsik Kwon (Seoul National University, South Korea & SAP Labs Korea, South Korea), Cheol Ryu (Seoul National University, South Korea), Sang Kyun Cha (Seoul National University, South Korea), Arthur H. Lee (State University of New York Korea, South Korea), Kunsoo Park (Seoul National University, South Korea), Bongki Moon (Seoul National University, South Korea)
Article 33
Knowledge Graph Entity Alignment Using Relation Structural Similarity (pages 1-19)
Yanhui Peng (Nanjing University of Science and Technology, China), Jing Zhang (Nanjing University of Science and Technology, China), Cangqi Zhou (Nanjing University of Science and Technology, China), Shunmei Meng (Nanjing University of Science and Technology, China)
Article 33
Article 55
HyTM-AP Hybrid Transactional Memory Scheme Using Abort Prediction and Adaptive Retry Policy for Multi-Core In-Memory Databases (pages 1-22)
Hyeong-Jin Kim (Chonbuk National University, South Korea), Hyun-Jo Lee (Chonbuk National University, South Korea), Yong-Ki Kim (Vision College of Jeonju, South Korea), Jae-Woo Chang (Chonbuk National University, South Korea)
Article 56
A Temporal JSON Data Model and Its Query Languages (pages 1-29)
Ruizhe Ma (University of Massachusetts Lowell, USA), Zhangbing Hu (Nanjing University of Aeronautics and Astronautics, China), Li Yan (Nanjing University of Aeronautics and Astronautics, China)
Article 57
Applications of Big Data Analytics in Investment Management: A Review and Future Research Agenda Using TCM Framework (pages 1-32)
Prajwal Eachempati (Trinity Business School Trinity College Dublin, Ireland), Praveen Ranjan Srivastava (Indian Institute of Management, Rohtak, India)
Article 58
Process-Based Knowledge Organization (pages 1-18)
Henry H. Bi (Willamette University, USA)
Article 59
A Quantitative Function for Estimating the Comparative Values of Software Test Cases (pages 1-33)
Yao Shi (University of North Carolina Wilmington, USA), Mark L. Gillenson (University of Memphis, USA), Xihui Zhang (University of North Alabama, USA)
Article 60
Adversarial Training for Predicting the Trend of the COVID-19 Pandemic (pages 1-16)
Haishuai Wang (Zhejiang Provincial Key Laboratory of Service Robot, College of Computer Science, Zhejiang University, China), Jiali Ma (Tianjin Normal University, China), Ziping Zhao (Tianjin Normal University, China), Zhenyi Jia (Shanghai Jiaotong University Affiliated Sixth People's Hospital, China), Zhenyan Ji (Beijing Jiaotong University, China), Jun Wu (Beijing Jiaotong University, China)
Article 68
Bringing Credibility Through Portals: Examining the Multiple Information Sources on Information Quality and Credibility (pages 1-26)
Yi-Chen Lee (Department of Information Management, National Taiwan University, Taipei City, Taiwan), Bo-Chun Shen (Department of Information Management, National Taiwan University, Taipei City, Taiwan), Choon Ling Sia (Department of Information Management, National Taiwan University, Taipei City, Department of Information Systems, City University of Hong Kong, Hong Kong)
Article 69
Emotional and Rational Components in Software Testing Service Evaluation: Antecedents and Impacts (pages 1-39)
Colin G. Onita (San Jose State University, USA), Jasbir S. Dhaliwal (University of Memphis, USA), Xihui Zhang (University of North Alabama, USA)
Article 70
Query Relaxation and Result Ranking for Uncertain Spatiotemporal XML Data (pages 1-19)
Luyi Bai (Northeastern University, China), Jinyao Wang (Northeastern University, China), Chengyu Zhang (Northeastern University, China), Xiangfu Meng (Liaoning Technical University, China)
Article 71
Research on Reverse Skyline Query Algorithm Based on Decision Set (pages 1-28)
Lan Huang (College of Computer Science and Technology, Jilin University, China), Yuanwei Zhao (College of Software, Jilin University, China), Pedro Mestre (CITAB and Centro Algoritmi, University of Tras-os-Montes and Alto Douro, Portugal), Laipeng Han (Horizon Robotics, China), Kangping Wang (Key Lab of Symbolic Computation and Knowledge Engineering, Ministry of Education, China), Wenjuan Gao (Library of Changchun University, China), Rui Zhang (College of Computer Science and Technology, Jilin University, China)
Article 92
Measuring the Determining Factors of Financial Development of Commercial Banks in Selected SAARC Countries (pages 1-21)
Arodh Lal Karn (Xi'an Jiaotong-Liverpool University, China), Girish Santosh Bagale (NMIMS University, India), Bhavana Raj Kondamudi. (Institute of Public Enterprise, India), Deepesh Kumar Srivastava (Institute of Management Technology, Dubai, UAE), Ravi Kumar Gupta (Madan Mohan Malaviya University of Technology, India), Sudhakar Sengan (PSN College of Engineering and Technology, India)
Issue 2
Article 11
Circuit Implementation of Respiratory Information Extracted from Electrocardiograms (pages 1-12)
Shi Cheng (Nantong University, China), JinBao Zhang (Nantong University, China), Zhan Gao (Nantong University, China), Jiehua Wang (Nantong University, China)
Article 13
Random Forest Algorithm Based on Linear Privacy Budget Allocation (pages 1-19)
Yanling Dong (North China University of Science and Technology, China), Shufen Zhang (North China University of Science and Technology, China), Jingcheng Xu (North China University of Science and Technology, China), Haoshi Wang (North China University of Science and Technology, China), Jiqiang Liu (Beijing Jiaotong University, China)
Article 14
An Efficient Method of Tooth Segmentation Under Massive Medical Data (pages 1-22)
Tian Ma (Xi'an University of Science and Technology, China), Yizhou Yang (Xi'an University of Science and Technology, China), Yun Li (Xi'an University of Science and Technology, China), Zhanli Li (Xi'an University of Science and Technology, China), Yuancheng Li (Xi'an University of Science and Technology, China)
Article 88
Deep Unsupervised Weighted Hashing for Remote Sensing Image Retrieval (pages 1-19)
Weipeng Jing (Northeast Forestry University, China), Zekun Xu (Northeast Forestry University, China), Linhui Li (Northeast Forestry University, China), Jian Wang (Aerospace Information Research Institute, China), Yue He (Northeast Forestry University, China), Guangsheng Chen (Northeast Forestry University, China)
Issue 3
Article 38
Deep Convolutional Neural Networks With Transfer Learning for Automobile Damage Image Classification (pages 1-16)
Xiaoguang Tian (Purdue University Fort Wayne, USA), Henry Han (Baylor University, USA)
Issue 4
Issue 5
Article 61
College English Intelligent Writing Score System Based on Big Data Analysis and Deep Learning Algorithm (pages 1-26)
Fei Qin (Liaocheng University, China & De La Salle University, Philippines)
Volume 32 (2021)
Issue 1
Blockchain and Smart Contract: A Review
Guest Editorial Preface
Hemang Subramanian (Florida International University, USA), Rong Liu (Stevens Institute of Technology, USA)
Article 1
On Elastic Incentives for Blockchain Oracles (pages 1-26)
Renita M. Murimi (University of Dallas, USA), Grace Guiling Wang (New Jersey Institute of Technology, USA)
Article 2
Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology (pages 27-48)
Atefeh Mashatan (Ryerson University, Canada), Victoria Lemieux (University of British Columbia, Canada), Seung Hwan (Mark) Lee (Ryerson University, Canada), Przemysław Szufel (SGH Warsaw School of Economics, Poland), Zachary Roberts (Ryerson University, Canada)
Article 3
Enhancing the Retailer Gift Card via Blockchain: Trusted Resale and More (pages 49-68)
Yuan Lu (Institute of Software, Chinese Academy of Sciences, China), Qiang Tang (New Jersey Institute of Technology, USA), Guiling Wang (New Jersey Institute of Technology, USA)
Article 4
Privacy Preserving Data Mining as Proof of Useful Work: Exploring an AI/Blockchain Design (pages 69-85)
Hjalmar K. Turesson (York University, Canada), Henry Kim (blockchain.lab, York University, Canada), Marek Laskowski (blockchain.lab, York University, Canada), Alexandra Roatis (Aion Network, Canada)
Issue 2
Article 1
An Infodemiological Analysis of Google Trends in COVID-19 Outbreak: Predict Case Numbers and Attitudes of Different Societies (pages 1-19)
Adem Doganer (Kahramanmaras Sutcu Imam University, Turkey), Zuopeng (Justin) Zhang (University of North Florida, USA)
Article 2
Fear of Missing Out (FOMO) Toward ICT Use During Public Health Emergencies: An Investigation on Predictors and Outcomes (pages 20-35)
Xiaokang Song (School of Management and Engineering, Nanjing University, China), Shijie Song (School of Information Management, Nanjing University, China), Yuxiang (Chris) Zhao (School of Economics and Management, Nanjing University of Science and Technology, China), Hua Min (Department of Health Administration and Policy, George Mason University, USA), Qinghua Zhu (School of Information Management, Nanjing University, China)
Article 3
Profiling the Users of High Influence on Social Media in the Context of Public Events (pages 36-49)
Lu An (Center for Studies of Information Resources, Wuhan University, China & School of Information Management, Wuhan University, China), Junyang Hu (School of Information Management, Wuhan University, China), Manting Xu (School of Information Management, Wuhan University, China), Gang Li (Center for Studies of Information Resources, Wuhan University, China), Chuanming Yu (Zhongnan University of Economics and Law, China)
Article 4
Affording Twitter in Emergency Situations: The Occurrence of Rumor Sense-Making (pages 50-66)
Milad Mirbabaie (University of Bremen, Germany), Ireti Amojo (Freie Universität Berlin, Germany), Stefan Stieglitz (University of Duisburg-Essen, Germany)
Article 5
Research Commentary on IS/IT Role in Emergency and Pandemic Management: Current and Future Research (pages 67-75)
Wen-Lung Shiau (Zhejiang University of Technology, China), Keng Siau (City University of Hong Kong, Hong Kong SAR), Yuan Yu (Wuhan University, China), Jia Guo (Zhejiang University of Technology, China)
Article 6
Distinguishing Personality Recognition and Quantification of Emotional Features Based on Users' Information Behavior in Social Media (pages 76-91)
Chunnian Liu (School of Management, Nanchang University, China), Qi Tian (School of Management, Nanchang University, China), Mengqiu Chen (School of Management, Nanchang University, China)
Issue 3
Article 1
Missing Data in OLAP Cubes: Challenges and Strategies (pages 1-28)
Monica Chiarini Tremblay (William & Mary, USA), Alan R. Hevner (University of South Florida, USA)
Article 2
The Paradoxical Effect of Social Media Usage on Developer Creativity and the Moderating Role of Openness to Experience (pages 29-45)
Yumeng Miao (Xidian University, China), Rong Du (Xidian University, China), Veda C. Storey (Georgia State University, USA)
Article 3
Learn From the Rumors: International Comparison of COVID-19 Online Rumors Between China and the United Kingdom (pages 46-68)
Fei Liu (Research Institute of Smart Senior Care, School of Information, Renmin University of China, China), Meiyun Zuo (Research Institute of Smart Senior Care, School of Information, Renmin University of China, China)
Article 4
A Requirements Engineering Framework for Software Startup Companies (pages 69-94)
Sudhaman Parthasarathy (Thiagarajar College of Engineering, India), Maya Daneva (University of Twente, the Netherlands)
Article 5
A Review on the Integration of Deep Learning and Service-Oriented Architecture (pages 95-119)
Marcelo Fantinato (University of Sao Paulo, Brazil), Sarajane Marques Peres (University of Sao Paulo, Brazil), Eleanna Kafeza (Zayed University, UAE), Dickson K. W. Chiu (The University of Hong Kong, Hong Kong), Patrick C. K. Hung (Ontario Tech University, Canada)
Issue 4
Article 1
Text-Image Retrieval With Salient Features (pages 1-13)
Xia Feng (Civil Aviation University of China, China), Zhiyi Hu (Civil Aviation University of China, China), Caihua Liu (Civil Aviation University of China, China), W. H. Ip (University of Saskatchewan, Canada), Huiying Chen (The Hong Kong Polytechnic University, Hong Kong)
Article 2
Biomedical Ontology Matching Through Attention-Based Bidirectional Long Short-Term Memory Network (pages 14-27)
Xingsi Xue (Fujian University of Technology, China), Chao Jiang (Fujian University of Technology, China), Jie Zhang (Yulin Normal University, China), Cong Hu (Guilin University of Electronic Technology, China)
Article 3
SinGAN-Based Asteroid Surface Image Generation (pages 28-47)
Yundong Guo (Zhejiang University, China), Jeng-Shyang Pan (Shandong University of Science and Technology, China), Chengbo Qiu (Innovation Academy for Microsatellites, Chinese Academy of Sciences, China), Fang Xie (Aerospace Information Research Institute, Chinese Academy of Sciences, China), Hao Luo (Zhejiang University, China), Huiqiang Shang (Zhejiang University, China), Zhenyu Liu (Zhejiang University, China), Jianrong Tan (Zhejiang University, China)
Article 4
Low-Quality Error Detection for Noisy Knowledge Graphs (pages 48-64)
*Chenyang Bu (Ministry of Education Key Laboratory of Knowledge Engineering with Big Data, School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China), Xingchen Yu (Hefei University of Technology, China), Yan Hong (Hefei University of Technology, China), Tingting Jiang (Hefei University of Technology, China)
Article 5
Convolutional Recurrent Neural Networks for Text Classification (pages 65-82)
Shengfei Lyu (University of Science and Technology of China, China), Jiaqi Liu (University of Science and Technology of China, China)
Volume 31 (2020)
Issue 1
Article 1
Detecting Expressional Anomie in Social Media via Fine-grained Content Mining (pages 1-19)
Qingqing Zhou (Nanjing Normal University, Nanjing, Jiangsu Province, China), Ming Jing (Nanjing Normal University, Jiangsu Province, China)
Article 2
Optimizing Semi-Stream CACHEJOIN for Near-Real- Time Data Warehousing (pages 20-37)
M. Asif Naeem (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Erum Mehmood (School of Science and Technology, University of Management and Technology, Lahore, Pakistan), M. G. Abbas Malik (Universal College of Learning, Palmerston North, New Zealand), Noreen Jamil (National University FAST, Islamabad, Pakistan)
Article 3
Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis (pages 38-63)
Hemang Chamakuzhi Subramanian (Florida International University, Miami, USA), Suresh Malladi (Cybersecurity Researcher & Consultant, Fayetteville, USA)
Article 4
A Service Architecture Using Machine Learning to Contextualize Anomaly Detection (pages 64-84)
Brandon Laughlin (University of Ontario Institute of Technology, Oshawa, Canada), Karthik Sankaranarayanan (University of Ontario Institute of Technology, Oshawa, Canada), Khalil El-Khatib (Ontario Tech University, Oshawa, Canada)
Issue 2
Article 1
Experience Matters: The Role of Vicarious Experience in Secure Actions (pages 1-20)
Leigh A. Mutchler (James Madison University, Harrisonburg, USA), Merrill Warkentin (Mississippi State University, Starkville, USA)
Article 2
The Cultural Foundation of Information Security Behavior: Developing a Cultural Fit Framework for Information Security Behavior Control (pages 21-41)
Canchu Lin (State University of New York at Farmingdale, Farmingdale, USA), Anand S. Kunnathur (University of Toledo, Toledo, USA), Long Li (Louisiana State University at Alexandria, Alexandria, USA)
Article 3
Use of Qualitative Research to Generate a Function for Finding the Unit Cost of Software Test Cases (pages 42-63)
Mark L. Gillenson (University of Memphis, Memphis, USA), Thomas F. Stafford (Louisiana Tech University, Ruston, USA), Xihui “Paul” Zhang (University of North Alabama, Florence, USA), Yao Shi (University of Memphis, Memphis, USA)
Article 4
Research Challenges and Opportunities in Conducting Quantitative Studies on Large-Scale Agile Methodology (pages 64-73)
Dinesh Batra (Florida International University, Miami, USA)
Article 5
Artificial Intelligence (AI) Ethics: Ethics of AI and Ethical AI (pages 74-87)
Keng Siau (Missouri University of Science and Technology, Rolla, USA), Weiyu Wang (Missouri University of Science and Technology, Rolla, USA)
Issue 3
Article 1
Systems Analysis and Design Toolkit Based on Work System Theory and Its Extensions (pages 1-13)
Steven Alter (University of San Francisco, USA), Dominik Bork (Faculty of Computer Science, University of Vienna, Vienna, Austria)
Article 2
A Framework for Building Mature Business Intelligence and Analytics in Organizations (pages 14-39)
Amrita George (Marquette University, USA), Kurt Schmitz (Georgia State University, USA), Veda C. Storey (Georgia State University, USA)
Article 3
Creativity of Participants in Crowdsourcing Communities: The Effects of Promotion Focus and Extrinsic Motivation (pages 40-66)
Lingfei Zou (Huawei Technologies Co., Ltd, China), Shaobo Wei (University of Science and Technology of China, China), Weiling Ke (Southern University of Science and Technology, China), Kwok Kee Wei (Singapore Institute of Management, Singapore)
Article 4
The Rise of NoSQL Systems: Research and Pedagogy (pages 67-82)
Akhilesh Bajaj (University of Tulsa, USA), Wade Bick (University of Tulsa, USA)
Issue 4
Article 1
Investigating the Effects of Object-Relational Impedance Mismatch on the Efficiency of Object-Relational Mapping Frameworks (pages 1-23)
Derek Colley (Staffordshire University, UK), Clare Stanier (Staffordshire University, UK), Md Asaduzzaman (Staffordshire University, UK)
Article 2
Expert Detection and Recommendation Model With User-Generated Tags in Collaborative Tagging Systems (pages 24-45)
Mengmeng Shen (School of Economy and Management, Beihang University, China), Jun Wang (School of Economy and Management, Beihang University, China), Ou Liu (Operations and Information Management Department, Aston University, UK), Haiying Wang (Business Scool, University of Shanghai for Science and Technology, China)
Article 3
A Meta-Analysis of Ontological Guidance and Users' Understanding of Conceptual Models (pages 1-23)
Arash Saghafi (Tilburg University, The Netherlands), Yair Wand (University of British Columbia, Canada)
Article 4
Revising the Socio-Technical Perspective for the 21st Century: New Mechanisms at Work (pages 69-87)
Louise Harder Fischer (IT University of Copenhagen, Denmark), Richard Baskerville (Georgia State University, USA & Curtin University, Australia)
Volume 30 (2019)
Issue 1
Article 1
Using Ontology and Rule-Based Reasoning for Conceptual Data Models Synonyms Detection: A Case Study (pages 1-21)
Ljubica Kazi (University of Novi Sad, Technical Faculty “Mihajlo Pupin,” Zrenjanin, Serbia), Zoltan Kazi (University of Novi Sad, Technical Faculty “Mihajlo Pupin,” Zrenjanin, Serbia)
Article 2
Map-Side Join Processing of SPARQL Queries Based on Abstract RDF Data Filtering (pages 22-40)
Minjae Song (Yonsei University, Seoul, South Korea), Hyunsuk Oh (Yonsei University, Seoul, South Korea), Seungmin Seo (Yonsei University, Seoul, South Korea), Kyong-Ho Lee (Yonsei University, Seoul, South Korea)
Article 3
Designing Graph Databases With GRAPHED (pages 41-60)
Gustavo Cordeiro Galvão Van Erven (Ministry of Transparency and Office of the Comptroller General, Brasília, Brazil), Rommel Novaes Carvalho (Ministry of Transparency and Office of the Comptroller General, Brasília, Brazil), Waldeyr Mendes Cordeiro da Silva (Federal Institute of Goiás (IFG), Formosa, Brazil), Sergio Lifschitz (Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil), Harley Vera-Olivera (Universidade de Brasília, Brasília, Brazil), Maristela Holanda (University of Brasília (UnB), Brasília, Brazil)
Article 4
Artificial Intelligence, Machine Learning, Automation, Robotics, Future of Work and Future of Humanity: A Review and Research Agenda (pages 61-79)
Weiyu Wang (Missouri University of Science and Technology, USA), Keng Siau (City University of Hong Kong, Hong Kong SAR)
Issue 2
Special Issue on Intelligent Data Analysis and Management
Guest Editorial Preface
Gongzhu Hu (Central Michigan University, USA)
Article 1
Multi-Objective Optimization-Based Networked Multi-Label Active Learning (pages 1-26)
Lei Li (Hefei University of Technology, Hefei, China), Yuqi Chu (Luoyang Optoelectro Technology Development Center, Luoyang, China), Guanfeng Liu (Macquarie University, NSW, Australia), Xindong Wu (Mininglamp Academy of Sciences, Mininglamp Technologies, Beijing, China)
Article 2
Collaboration Matrix Factorization on Rate and Review for Recommendation (pages 27-43)
Zhicheng Wu (Beijing Jiaotong University, Beijing, China), Huafeng Liu (Beijing Jiaotong University, Beijing, China), Yanyan Xu (School of Information Science and Technology, Beijing Forestry University, Beijing, China), Liping Jing (Beijing Jiaotong University, Beijing, China)
Article 3
An Improved Approach to Audio Segmentation and Classification in Broadcasting Industries (pages 44-66)
Jingzhou Sun (School of Computer Science and Cybersecurity, Communication of China, Beijing, China), Yongbin Wang (School of Computer Science and Cybersecurity, Communication of China, Beijing, China)
Article 4
Artificial Intelligence, Machine Learning, and Autonomous Technologies in Mining Industry (pages 67-79)
Zeshan Hyder (Missouri University of Science and Technology, Rolla, USA), Keng Siau (Missouri University of Science and Technology, Rolla, USA), Fiona Nah (Missouri University of Science and Technology, Rolla, USA)
Issue 3
Special Issue on Managing Information Security Risks in Digital Business
Guest Editorial Preface
Xin (Robert) Luo (University of New Mexico, USA), Carol Hsu (Tongji University, China), Dionysios Demetis (University of Hull, UK)
Article 1
The Differential Effects of Interpersonal Justice and Injustice on Computer Abuse: A Regulatory Focus Theory Perspective (pages 1-17)
Feng Xu (College of Business, Mississippi State University, USA), Xiaorong Wang (School of Business Planning, Chongqing Technology and Business University, Chongqing, China), Botong Xue (College of Business, Mississippi State University, USA)
Article 2
It's Not My Fault: The Transfer of Information Security Breach Information (pages 18-37)
Tawei Wang (DePaul University, Chicago, USA), Yen-Yao Wang (Auburn University, Auburn, USA), Ju-Chun Yen (National Central University, Taoyuan City, Taiwan)
Article 3
Schema-Based JSON Data Stores in Relational Databases (pages 38-70)
Lubna Irshad (Nanjing University of Aeronautics and Astronautics, Nanjing, China), Li Yan (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China), Zongmin Ma (Nanjing University of Aeronautics and Astronautics, Nanjing, China)
Article 4
AFARTICA: A Frequent Item-Set Mining Method Using Artificial Cell Division Algorithm (pages 71-93)
Saubhik Paladhi (University of Kalyani, Kalyani, India), Sankhadeep Chatterjee (University of Calcutta, Kolkata, India), Takaaki Goto (Toyo University, Saitama, Japan), Soumya Sen (University of Calcutta, Kolkata, India)
Issue 4
Article 1
Factors Influencing Intention of Facebook Fans of Companies to Convert into Actual Buyers (pages 1-23)
Hsiu-Yuan Wang (Department of Hospitality Management, Chung Hua University, Hsinchu City, Taiwan), Jian-Hong Wang (School of Computer Science and Engineering, Yulin Normal University, Yulin, Guangxi, China), Hsing-Wen Wang (Department of Business Administration, National Changhua University of Education, Changhua County, Taiwan), Chi-Chun Chen (Department of Electronic Engineering, National Chin-Yi University of Technology, Taichung, Taiwan)
Article 2
Multi-Fuzzy-Objective Graph Pattern Matching with Big Graph Data (pages 24-40)
Lei Li (Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Hefei, China & School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China), Fang Zhang (Zhongxing Telecommunication Equipment Corporation, Nanjing, China), Guanfeng Liu (Macquarie University, Sydney Australia)
Article 3
Social Capital and Knowledge Networks of Software Developers: A Case Study (pages 41-80)
VenuGopal Balijepally (Oakland University, Rochester, USA), Sridhar Nerur (University of Texas at Arlington, Arlington, USA)
Volume 29 (2018)
Issue 1
Article 1
Beyond Micro-Tasks: Research Opportunities in Observational Crowdsourcing (pages 1-22)
Roman Lukyanenko (University of Saskatchewan, Saskatoon, Canada), Jeffrey Parsons (Memorial University of Newfoundland, St. John's, Canada)
Article 2
An Ontological Analysis Framework for Domain-Specific Modeling Languages (pages 23-42)
Michael Verdonck (Faculty of Economics and Business Administration, Ghent University, Gent, Belgium), Frederik Gailly (Faculty of Economics and Business Administration, Ghent University, Gent, Belgium)
Article 3
QGLG Automatic Energy Gear-Shifting Mechanism with Flexible QoS Constraint in Cyber-Physical Systems: Designing, Analysis, and Evaluation (pages 43-65)
Xindong You (Beijing Institute of Graphic Communication, Tsinghua University, Beijing, China), Yeli Li (Beijing Institute of Graphic Communication, Tsinghua University, Beijing, China), Zhenyang Zhu (Hangzhou Dianzi University, Hangzhou, China), Lifeng Yu (Hithink RoyalFlush Information Network Co., Ltd, Hangzhou, China), Dawei Sun (School of Information Engineering, China University of Geosciences, Beijing, China)
Issue 2
Article 1
Implicit Semantics Based Metadata Extraction and Matching of Scholarly Documents (pages 1-22)
Congfeng Jiang (School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China), Junming Liu (School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China), Dongyang Ou (School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China), Yumei Wang (School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China), Lifeng Yu (Hithink RoyalFlush Information Network Co., Ltd., Hangzhou, China)
Article 2
An Efficient Stochastic Update Propagation Method in Data Warehousing (pages 23-41)
Bijoy Bordoloi (Southern Illinois University Edwardsville, Edwardsville, USA), Bhushan Kapoor (California State University - Fullerton, Fullerton, USA), Tim Jacks (Southern Illinois University Edwardsville, Edwardsville, USA)
Article 3
To Evaluate or Not to Evaluate?: A Two-Process Model of Innovation Adoption Decision Making (pages 42-61)
Nan (Tina) Wang (Eastern Illinois University, Charleston, USA)
Article 4
A Novel Approach to Distributed Rule Matching and Multiple Firing Based on MapReduce (pages 62-84)
Tianyang Dong (College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, China), Qiang Cheng (College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, China), Bin Cao (College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, China), Jianwei Shi (College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, China)
Issue 3
Big Data Analytics and Artificial Intelligence in Cyber-Physical Systems: A Review of Challenges and Advances
Editorial Preface
Junsheng Zhang (IT Support Center, Institute of Scientific and Technical Information of China, Beijing, China), Yunchuan Sun (Business School, Beijing Normal University, Beijing, China)
Article 1
Research on Improved Method of Storage and Query of Large-Scale Remote Sensing Images (pages 1-16)
Jing Weipeng (Northeast Forestry University, Harbin, China), Tian Dongxue (Northeast Forestry University, Harbin, China), Chen Guangsheng (Northeast Forestry University, Harbin, China), Li Yiyuan (China Aerospace Construction Group Co., LTD, Beijing, China)
Article 2
Towards Real-Time Multi-Sensor Golf Swing Classification Using Deep CNNs (pages 17-42)
Libin Jiao (College of Information Science and Technology, Beijing Normal University, Beijing, China & Faculty of Electrical Engineering, University of Ljubljana, Ljubljana, Slovenia), Hao Wu (College of Information Science and Technology, Beijing Normal University, Beijing, China), Rongfang Bie (College of Information Science and Technology, Beijing Normal University, Beijing, China), Anton Umek (Faculty of Electrical Engineering, University of Ljubljana, Ljubljana, Slovenia), Anton Kos (Faculty of Electrical Engineering, University of Ljubljana, Ljubljana, Slovenia)
Article 3
Consumers' Stickiness to Mobile Payment Applications: An Empirical Study of WeChat Wallet (pages 43-66)
Elizabeth D. Matemba (Harbin Institute of Technology, Harbin, China), Guoxin Li (Harbin Institute of Technology, Harbin, China), Baraka J. Maiseli (University of Dar es Salaam, Dar es Salaam, Tanzania)
Article 4
Research on Methodology of Correlation Analysis of Sci-Tech Literature Based on Deep Learning Technology in the Big Data (pages 67-88)
Wen Zeng (Institute of Scientific and Technical Information of China, China), Hongjiao Xu (Institute of Scientific and Technical Information of China, China), Hui Li (Beijing Institute of Science and Technology Information, China), Xiang Li (Torch High Technology Industry Development Center, China)
Article 5
Detecting Users' Dietary Preferences and Their Evolutions via Chinese Social Media (pages 89-110)
Qingqing Zhou (Department of Information Management, Nanjing University of Science and Technology, Nanjing, China), Chengzhi Zhang (Department of Information Management, Nanjing University of Science and Technology, Nanjing, China)
Issue 4
Article 1
RDF Keyword Search by Query Computation (pages 1-27)
Zongmin Ma (Nanjing University of Aeronautics and Astronautics, Nanjing, China), Xiaoqing Lin (Eastern Liaoning University, Dandong, China), Li Yan (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China), Zhen Zhao (Bohai University, Jinzhou, China)
Article 2
Monitor and Detect Suspicious Transactions With Database Forensic Analysis (pages 28-50)
Harmeet Kaur Khanuja (MMCOE, SPPU, Maharashtra, India), Dattatraya Adane (Shri Ramdeobaba College of Engineering and Management, Nagpur, India)
Article 3
ICT R&D and Technology Knowledge Flows in Korea (pages 51-69)
Woo-Jin Jung (Yonsei University, Seoul, South Korea), Sang-Yong Tom Lee (Hanyang University, Seoul, South Korea)
Volume 28 (2017)
Issue 1
Special Issue on Ontological Analysis in Conceptual Modeling, Part 1
Guest Editorial Preface
Andrew Burton-Jones (University of Queensland, Brisbane, Australia), Peter Green (Queensland University of Technology, Brisbane, Australia), Jeffrey Parsons (Memorial University of Newfoundland, St. John's, Canada), Keng Siau (Missouri University of Science and Technology, Rolla, MO, USA)
Article 1
Thirty Years Later: Some Reflections on Ontological Analysis in Conceptual Modeling (pages 1-17)
Yair Wand (Sauder School of Business, University of British Columbia, Vancouver, Canada), Ron Weber (Faculty of Information Technology, Monash University, Melbourne, Australia & School of Business, University of Queensland, Brisbane, Australia)
Article 2
Conceptual Modeling Meets Domain Ontology Development: A Reconciliation (pages 18-30)
Veda C. Storey (Department of Computer Information Systems, Robinson College of Business, Georgia State University, Atlanta, GA, USA)
Article 3
A Framework for Managing Complexity in Information Systems (pages 31-42)
Mala Kaul (Department of Accounting and Information Systems, College of Business, University of Nevada, Reno, NV, USA), Veda C. Storey (Department of Computer Information Systems, Robinson College of Business, Georgia State University, Atlanta, GA, USA), Carson Woo (Sauder School of Business, University of British Columbia, Vancouver, Canada)
Article 4
Improving the Domain Independence of Data Provenance Ontologies: A Demonstration Using Conceptual Graphs and the W7 Model (pages 43-62)
Jun Liu (College of Business and Information Systems, Dakota State University, Madison, SD, USA), Sudha Ram (Eller College of Management, University of Arizona, Tucson, AZ, USA)
Issue 2
Special Issue on Ontological Analysis in Conceptual Modeling, Part 2
Guest Editorial Preface
Andrew Burton-Jones (University of Queensland, Brisbane, Australia), Peter Green (Queensland University of Technology, Brisbane, Australia), Jeffrey Parsons (Memorial University of Newfoundland, St. John's, Canada), Keng Siau (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA)
Article 1
Evaluation of the Ontological Completeness and Clarity of Object-Oriented Conceptual Modelling Grammars (pages 1-26)
Prabodha Tilakaratna (Faculty of Information Technology, Monash University, Malaysia), Jayantha Rajapakse (Faculty of Information Technology, Monash University, Melbourne, Australia)
Article 2
Effects of Domain Familiarity on Conceptual Modeling Performance (pages 27-55)
Jihae Suh (Seoul National University, Seoul, South Korea), Jinsoo Park (Business School, Seoul National University, Seoul, South Korea)
Article 3
Combined Use of Conceptual Models in Practice: An Exploratory Study (pages 56-88)
Mohammad Ali Jabbari Sabegh (School of Management, Queensland University of Technology, Brisbane, Australia), Jan Recker (School of Management, Queensland University of Technology, Brisbane, Australia)
Issue 3
Article 1
The Effects of Construct Redundancy on Readers' Understanding of Conceptual Models (pages 1-25)
Palash Bera (Operations and IT Management, John Cook School of Business, Saint Louis University, St. Louis, MO, USA), Geert Poels (Faculty of Economics and Business Administration, Ghent University, Gent, Belgium)
Article 2
Reengineering Probabilistic Relational Databases with Fuzzy Probability Measures into XML Model (pages 26-47)
Zongmin Ma (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, China), Chengwei Li (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China), Li Yan (College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China)
Article 3
Mobile Collaboration Support for Virtual Teams: The Case of Virtual Information Systems Development Teams (pages 48-69)
Keng Siau (Department of Business and Information Technology, Missouri University of Science and Technology, Rolla, MO, USA), Min Ling (University of Nebraska-Lincoln, Lincoln, NE, USA)
Issue 4
Article 1
Adapting Agile Practices for Data Warehousing, Business Intelligence, and Analytics (pages 1-23)
Dinesh Batra (College of Business Administration, Florida International University, Miami, FL, USA)
Article 2
Incorporating Spatial Queries into Semantic Sensor Streams on the Internet of Things (pages 24-39)
Sungkwang Eom (Yonsei University, Seoul, South Korea), Kyong-Ho Lee (Yonsei University, Seoul, South Korea)
Article 3
Agility in Software Development and Project Value: An Empirical Investigation (pages 40-59)
VenuGopal Balijepally (Oakland University, Rochester, MI, USA), Gerald DeHondt (Ball State University, Muncie, IN, USA), Vijayan Sugumaran (Department of Decision and Information Sciences, Oakland University, Rochester, MI, USA, & Department of Global Service Management, Sogang University, Seoul, Korea), Sridhar Nerur (University of Texas at Arlington, Arlington, TX, USA)
Article 4
Collaboration in Virtual Worlds: Impact of Task Complexity on Team Trust and Satisfaction (pages 60-78)
Fiona Fui-Hoon Nah (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA), Shu Z. Schiller (Wright State University, Dayton, OH, USA), Brian E. Mennecke (Iowa State University, Ames, IA, USA), Keng Siau (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA), Brenda Eschenbrenner (University of Nebraska at Kearney, Kearney, NE, USA), Parichart Sattayanuwat (University of Nebraska-Lincoln, Lincoln, NE, USA)
Volume 27 (2016)
Issue 1
Article 1
Agility Facilitators for Contemporary Software Development (pages 1-28)
Dinesh Batra (College of Business Administration, Florida International University, Miami, FL, USA), Weidong Xia (Florida International University, Miami, FL, USA), Shekhar Rathor (Florida International University, Miami, FL, USA)
Article 2
Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data (pages 29-57)
Cecil Eng Huang Chua (Information Systems and Operations Management Department, University of Auckland, Auckland, New Zealand), Veda C. Storey (Department of Computer Information Systems, J. Msck Robinson College of Business, Georgia State University, Atlanta, GA, USA)
Article 3
Cognitive Neuroscience in Information Systems Research (pages 58-73)
Yeli Zhao (School of Business Administration, Chinese University of Petroleum, Beijing, China), Keng Siau (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA)
Issue 2
Article 1
A Novel Approach to Managing the Dynamic Nature of Semantic Relatedness (pages 1-26)
Youngseok Choi (Brunel Business School, Brunel University London, London, UK), Jungsuk Oh (Business School, Seoul National University, Seoul, South Korea), Jinsoo Park (Business School, Seoul National University, Seoul, South Korea)
Article 2
Towards a Normal Form and a Query Language for Extended Relations Defined by Regular Expressions (pages 27-48)
András Benczúr (Eötvös Loránd University, Faculty of Informatics, Budapest, Hungary), Gyula I. Szabó (Eötvös Loránd University, Faculty of Informatics, Budapest, Hungary)
Article 3
Predicting Software Abnormal State by using Classification Algorithm (pages 49-65)
Yongquan Yan (School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China), Ping Guo (School of System Science, Beijing Normal University, Beijing, China)
Issue 3
Article 1
Path Expressions in SQL: A User Study on Query Formulation (pages 1-22)
Marko Junkkari (School of Information Sciences, University of Tampere, Tampere, Finland), Johanna Vainio (School of Information Sciences, University of Tampere, Tampere, Finland), Kati Iltanen (School of Information Sciences, University of Tampere, Tampere, Finland), Paavo Arvola (School of Information Sciences, University of Tampere, Tampere, Finland), Heidi Kari (School of Information Sciences, University of Tampere, Tampere, Finland), Jaana Kekäläinen (School of Information Sciences, University of Tampere, Tampere, Finland)
Article 2
Understanding Gender Differences in Media Perceptions of Hedonic Systems: A Comparison of 2D versus 3D Media (pages 23-37)
Fiona Fui-Hoon Nah (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA), Brenda Eschenbrenner (University of Nebraska at Kearney, Kearney, NE, USA)
Article 3
An Empirical Investigation of the Perceived Benefits of Agile Methodologies Using an Innovation-Theoretical model (pages 38-63)
Nancy A. Bonner (McLane College of Business, University of Mary Hardin-Baylor, Belton, TX, USA), Nisha Kulangara (Palumbo Donahue School of Business, Duquesne University, Pittsburgh, PA, USA), Sridhar Nerur (Department of Information Systems and Operations Management, University of Texas Arlington, Arlington, TX, USA), James. T. C. Teng (Department of Information Systems and Operations Management, University of Texas Arlington, Arlington, TX, USA)
Issue 4
Article 1
Inherent Fusion: Towards Scalable Multi-Modal Similarity Search (pages 1-23)
Petra Budikova (Masaryk University, Brno, Czech Republic), Michal Batko (Masaryk University, Brno, Czech Republic), David Novak (Masaryk University, Brno, Czech Republic), Pavel Zezula (Masaryk University, Brno, Czech Republic)
Article 2
Model Driven Engineering for Quality of Service Management: A Research Note on the Case of Real-Time Database Management Systems (pages 24-38)
Salwa M'barek (RIADI Laboratory, ENSI, Tunis, Tunisia), Leila Baccouche (INSAT, University of Carthage, Tunis, Tunisia), Henda Ben Ghezala (RIADI Laboratory, ENSI, Tunis, Tunisia)
Article 3
Technology-Mediated Synchronous Virtual Education: An Empirical Study (pages 39-63)
Xiaofeng Chen (Western Washington University, Bellingham, WA, USA), Keng Siau (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA)
Volume 26 (2015)
Issue 1
Article 1
Benchmark for Approximate Query Answering Systems (pages 1-29)
Francesco Di Tria (Dipartimento di Informatica, Università degli Studi di Bari Aldo Moro, Bari, Italy), Ezio Lefons (Dipartimento di Informatica, Università degli Studi di Bari Aldo Moro, Bari, Italy), Filippo Tangorra (Dipartimento di Informatica, Università degli Studi di Bari Aldo Moro, Bari, Italy)
Article 2
Using Temporal Versioning and Integrity Constraints for Updating Geographic Databases and Maintaining Their Consistency (pages 30-59)
Wassim Jaziri (Taibah University, Medina, Saudi Arabia and Sfax University, Sfax, Tunisia), Najla Sassi (Taibah University, Medina, Saudi Arabia and Sfax University, Sfax, Tunisia), Dhouha Damak (Sfax University, Sfax, Tunisia)
Article 3
From Data Quality to Big Data Quality (pages 60-82)
Carlo Batini (Department of Informatics, Systems and Communication (DISCo), University of Milano-Bicocca, Milan, Italy), Anisa Rula (Department of Informatics, Systems and Communication (DISCo), University of Milano-Bicocca, Milan, Italy), Monica Scannapieco (Italian National Institute of Statistics (Istat), Rome, Italy), Gianluigi Viscusi (CDM (MTEI-CSI), École Polytechnique Fédérale de Lausanne, Lausanne, Switzerland)
Issue 2
Special Issue on Modeling for Data-Intensive Computing (MoDID'12)
Guest Editorial Preface
Juan Trujillo (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), Il-Yeol Song (College of Computing and Informatics, Drexel University, Philadelphia, PA, USA), David Gil (Department of Computing Technology and Data Processing, University of Alicante, Alicante, Spain)
Article 1
Modeling and Implementing Scientific Hypothesis (pages 1-13)
Fabio Porto (Data Extreme Lab (DEXL), National Laboratory of Scientific Computing (LNCC), Petropolis, Brazil), Ramon G. Costa (Departamento de Ciência da Computação, Universidade Federal de Lavras, Lavras, Brazil), Ana Maria de C. Moura (Data Extreme Lab (DEXL), National Laboratory of Scientific Computing (LNCC), Petropolis, Brazil), Bernardo Gonçalves (Data Extreme Lab (DEXL), National Laboratory of Scientific Computing (LNCC), Petropolis, Brazil)
Article 2
A Novel Multidimensional Approach to Integrate Big Data in Business Intelligence (pages 14-31)
Alejandro Maté (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), Hector Llorens (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), Elisa de Gregorio (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), Roberto Tardío (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), David Gil (Department of Computing Technology and Data Processing, University of Alicante, Alicante, Spain), Rafa Muñoz-Terol (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), Juan Trujillo (Department of Software and Computing Systems, University of Alicante, Alicante, Spain)
Article 3
A Distributed System for The Management of Fine-grained Provenance (pages 32-47)
Salmin Sultana (Purdue University, West Lafayette, IN, USA), Elisa Bertino (Purdue University, West Lafayette, IN, USA)
Article 4
Discovering and Analysing Ontological Models From Big RDF Data (pages 48-61)
Carlos R. Rivero (Rochester Institute of Technology, Rochester, NY, USA), Inma Hernández (University of Seville, Seville, Spain), David Ruiz (University of Seville, Seville, Spain), Rafael Cochuelo (University of Seville, Seville, Spain)
Issue 3
Special Issue on ADBIS'2014 Conference
Guest Editorial Preface
Margita Kon-Popovska (Saints Cyril and Methodius University of Skopje, Skopje, Macedonia), Yannis Manolopoulos (Aristotle University of Thessaloniki, Thessaloniki, Greece), Goce Trajcevski (Northwestern University, Evanston, IL, USA)
Article 1
Parallel GPU-based Plane-Sweep Algorithm for Construction of iCPI-Trees (pages 1-20)
Witold Andrzejewski (Faculty of Computing, Poznan University of Technology, Poznan, Poland), Pawel Boinski (Faculty of Computing, Poznan University of Technology, Poznan, Poland)
Article 2
Considering User Intention in Differential Graph Queries (pages 21-40)
Elena Vasilyeva (SAP SE, Dresden, Germany), Maik Thiele (Database Technology Group, Technische Universität Dresden, Dresden, Germany), Christof Bornhövd (SAP Labs, LLC, Palo Alto, CA, USA), Wolfgang Lehner (Database Technology Group, Technische Universität Dresden, Dresden, Germany)
Article 3
Temporal Data Management and Processing with Column Oriented NoSQL Databases (pages 41-70)
Yong Hu (Group of Heterogeneous Information Systems, University of Kaiserslautern, Germany), Stefan Dessloch (Group of Heterogeneous Information Systems, University of Kaiserslautern, Germany)
Article 4
Scaling with Confidence: Entity Resolution under Weighted Constraints (pages 71-91)
Qing Wang (Research School of Computer Science, The Australian National University, Canberra, Australia), Zeyu Shen (Research School of Computer Science, The Australian National University, Canberra, Australia)
Issue 4
Article 1
Adoption and Use of Open Source Infrastructure Software by Large Corporations: The Case of MySQL (pages 1-17)
RadhaKanta Mahapatra (Department of Information Systems and Operations Management, University of Texas at Arlington, Arlington, TX, USA), Rashid Manzar (Department of Information Systems and Operations Management, University of Texas at Arlington, Arlington, TX, USA), Vikram S. Bhadauria (Management, Marketing and Information Systems Department, Southern Arkansas University, Magnolia, AR, USA)
Article 2
Parallel Skyline Computation Exploiting the Lattice Structure (pages 18-43)
Markus Endres (Department of Computer Science, University of Augsburg, Augsburg, Germany), Werner Kießling (Department of Computer Science, University of Augsburg, Augsburg, Germany)
Article 3
An Emergent Model of End-users' Acceptance of Enterprise Resource Planning Systems: A Grounded Theory Approach (pages 44-66)
Fiona Fui-Hoon Nah (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA), Xin Tan (Fairleigh Dickinson University, Teaneck, NJ, USA)
Volume 25 (2014)
Issue 1
Article 1
Compression Schemes with Data Reordering for Ordered Data (pages 1-28)
Chun-Hee Lee (Department of Computer Science, KAIST (Korea Advanced Institute of Science and Technology), Daejeon, Korea), Chin-Wan Chung (Department of Computer Science, KAIST (Korea Advanced Institute of Science and Technology), Daejeon, Korea)
Article 2
Information Extraction from Microarray Data: A Survey of Data Mining Techniques (pages 29-58)
Alessandro Fiori (Institute for Cancer Research and Tretment, Candiolo, Italy), Alberto Grand (IRCC, Institute for Cancer Research and Tretment, Candiolo, Italy), Giulia Bruno (Dipartimento di Ingegneria Gestionale e della Produzione, Politecnico di Torino, Torino, Italy), Francesco Gavino Brundu (Dipartimento di Automatica e Informatica, Politecnico di Torino,Torino, Italy), Domenico Schioppa (Department of Oncology, University of Torino Medical School, Candiolo, Italy), Andrea Bertotti (Department of Oncology, University of Torino Medical School, Candiolo, Italy)
Article 3
User Resistance to Software Migration: The Case on Linux (pages 59-79)
Hee-Woong Kim (Graduate School of Information, Yonsei University, Seoul, Korea), Hock Chuan Chan (Department of Information Systems, National University of Singapore, Singapore), So-Hyun Lee (Graduate School of Information, Yonsei University, Seoul, Korea)
Issue 2
Article 1
Enabling Resource Access Visibility for Automated Enterprise Services (pages 1-28)
Kaushik Dutta (Department of Information Systems, National University of Singapore, Singapore, Singapore), Debra VanderMeer (College of Business, Florida International University, Miami, FL, USA)
Article 2
Mindfully Experimenting with IT: Cases on Corporate Social Media Introduction (pages 29-51)
Robin S. Poston (Fogelman College of Business and Economics, University of Memphis, Memphis, TN, USA), William J. Kettinger (Fogelman College of Business and Economics, University of Memphis, Memphis, TN, USA)
Article 3
Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation (pages 52-74)
Han Li (School of Business, Minnesota State University Moorhead, Moorhead, MN, USA), Krishnamurty Muralidhar (Price College of Business, The University of Oklahoma, Norman, OK, USA), Rathindra Sarathy (Spears School of Business, Oklahoma State University, Stillwater, OK, USA), Xin (Robert) Luo (Anderson School of Management, The University of New Mexico, Albuquerque, NM, USA)
Issue 3
Article 1
Novice Designer Performance Comparison Between the Entity Relationship Event Network and the Event-Based Logical Relational Design Techniques (pages 1-27)
Dinesh Batra (Florida International University, Miami, FL, USA), Nicole Wishart (Florida International University, Miami, FL, USA)
Article 2
Improving Business Intelligence Traceability and Accountability: An Integrated Framework of BI Product and Metacontent Map (pages 28-47)
Chin-Hoong Chee (Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia), William Yeoh (School of Information and Business Analytics, Deakin University, Burwood, VIC, Australia), Shijia Gao (Faculty of Information Technology, Monash University, Caulfield East, VIC, Australia), Gregory Richards (Telfer School of Management, University of Ottawa, Ottawa, Ontario, Canada)
Article 3
Privacy-Preserving Outsourced Similarity Search (pages 48-71)
Stepan Kozak (Masaryk University, Brno, Czech Republic), David Novak (Masaryk University, Brno, Czech Republic), Pavel Zezula (Masaryk University, Brno, Czech Republic)
Issue 4
Article 1
A Scalable Algorithm for One-to-One, Onto, and Partial Schema Matching with Uninterpreted Column Names and Column Values (pages 1-16)
Boris Rabinovich (Department of Information Systems Engineering, Ben-Gurion University of the Negev, Beer Sheva, Israel), Mark Last (Department of Information Systems Engineering, Ben-Gurion University of the Negev, Beer Sheva, Israel)
Article 2
Data Modeling: An Ontological Perspective of Pointers (pages 17-37)
Hock Chuan Chan (National University of Singapore, Singapore), Chuan-Hoo Tan (College of Business, City University of Hong Kong, Hong Kong), Hock-Hai Teo (National University of Singapore, Singapore)
Article 3
SEDRIS Transmittal Storing and Retrieval System using Relational Databases (pages 38-65)
Yongkwon Kim (The School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea), Heejung Yang (The School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea), Chin-Wan Chung (The School of Computing, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea & The Chongqing Liangjang KAIST International Program, Chongqing University of Technology (CQUT), Chongqing, China)
Volume 24 (2013)
Issue 1
Article 1
Automated Insertion of Exception Handling for Key and Referential Constraints (pages 1-19)
Kaiping Liu (School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore), Hee Beng Kuan Tan (School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore), Xu Chen (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China)
Article 2
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph (pages 20-35)
Kaiping Liu (School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore), Hee Beng Kuan Tan (School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore), Xu Chen (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China)
Article 3
Development of an E-Healthcare Information Security Risk Assessment Method (pages 36-57)
June Wei (College of Business, University of West Florida, Pensacola, FL, USA), Binshan Lin (Department of Management/Marketing, College of Business Administration, Louisiana State University in Shreveport, Shreveport, LA, USA), Meiga Loho-Noya (College of Business, University of West Florida, Pensacola, FL, USA)
Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments
Book Review
Pethuru Raj (Infrastructure Architecture, SmartCloud Enterprise+, IBM Global Cloud Center of Excellence (CoE), IBM-India, Bangalore, India)
Issue 2
Article 1
Modeling Data for Enterprise Systems with Memories (pages 1-12)
Tamara Babaian (Bentley University, Waltham, MA, USA), Wendy Lucas (Bentley University, Waltham, MA, USA)
Article 2
Cross-Correlation Measure for Mining Spatio-Temporal Patterns (pages 13-34)
James Ma (Hasan School of Business, Colorado State University, Pueblo, CO, USA), Daniel Zeng (State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China & Department of MIS, Eller College of Management, University of Arizona, Tucson, AZ, USA), Huimin Zhao (Sheldon B. Lubar School of Business, University of Wisconsin—Milwaukee, Milwaukee, WI, USA), Chunyang Liu (National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China)
Article 3
Investigating Goal-Oriented Requirements Engineering for Business Processes (pages 35-71)
Geert Poels (Faculty of Economics and Business Administration, Ghent University, Gent, Belgium), Ken Decreus (Deloitte Consulting, Diegem, Belgium), Ben Roelens (Faculty of Economics and Business Administration, Ghent University, Gent, Belgium), Monique Snoeck (Faculty of Economics and Business, Katholieke Universiteit Leuven, Leuven, Belgium)
Issue 3
Article 1
Design Science Research: The Road Traveled and the Road That Lies Ahead (pages 1-8)
Matti Rossi (Aalto University School of Economics, Aalto, Finland), Ola Henfridsson (University of Warwick, Coventry, UK), Kalle Lyytinen (Case Western Reserve University, Cleveland, OH, USA), Keng Siau (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA)
Article 2
Using the Viable System Model for Methodical Assessment of Variety in Organizations: The Story of Designing a Method (pages 9-30)
Christoph Rosenkranz (Goethe-University Frankfurt am Main, Frankfurt, Germany), Roland Holten (Goethe-University Frankfurt am Main, Frankfurt, Germany)
Article 3
An Information Systems Design Theory for an Expert System for Training (pages 31-50)
Juan Manuel Gómez Reynoso (Autonomous University of Aguascalientes, Aguascalientes, Mexico), Lorne Olfman (Claremont Graduate University, Claremont, CA, USA), Terry Ryan (Claremont Graduate University, Claremont, CA, USA), Tom Horan (Claremont Graduate University, Claremont, CA, USA)
Article 4
Truth or Dare: The Ontology Question in Design Science Research (pages 51-66)
Sandeep Purao (College of Information Sciences and Technology, Penn State University, University Park, PA, USA)
Issue 4
Article 1
Improving Sequence Diagram Modeling Performance: A Technique Based on Chunking, Ordering, and Patterning (pages 1-25)
Thant Syn (School of Business Administration, University of Miami, Coral Gables, FL, USA), Dinesh Batra (College of Business Administration, Florida International University, Miami, FL, USA)
Article 2
The Impact of Conflict Judgments between Developers and Testers in Software Development (pages 26-50)
Xihui Zhang (Department of Computer Science and Information Systems, College of Business, University of North Alabama, Florence, AL, USA), Jasbir S. Dhaliwal (Fogelman College of Business and Economics, University of Memphis, Memphis, TN, USA), Mark L. Gillenson (Fogelman College of Business and Economics, University of Memphis, Memphis, TN, USA), Thomas F. Stafford (Fogelman College of Business and Economics, University of Memphis, Memphis, TN, USA)
Article 3
CAM: A Conceptual Modeling Framework based on the Analysis of Entity Classes and Association Types (pages 51-80)
Sofia J. Athenikos (College of Information Science and Technology, Drexel University, Philadelphia, PA, USA), Il-Yeol Song (College of Information Science and Technology, Drexel University, Philadelphia, PA, USA)
Volume 23 (2012)
Issue 1
Article 1
Knowledge Representation: A Conceptual Modeling Approach (pages 1-30)
Cecil Eng Huang Chua (University of Auckland, New Zealand), Veda C. Storey (Georgia State University, USA), Roger H. Chiang (University of Cincinnati, USA)
Article 2
Situational Method Engineering to Support Process-Oriented Information Logistics: Identification of Development Situations (pages 31-48)
Tobias Bucher (PHOENIX Group, Germany), Barbara Dinter (University of St. Gallen, Switzerland)
Article 3
An Interpreter Approach for Exporting Relational Data into XML Documents with Structured Export Markup Language (pages 49-77)
Joseph Fong (City University of Hong Kong, Hong Kong), Herbert Shiu (City University of Hong Kong, Hong Kong)
Article 4
A Unified Fuzzy Data Model: Representation and Processing (pages 78-102)
Avichai Meged (Bar-Ilan University, Israel), Roy Gelbard (Bar-Ilan University, Israel)
Issue 2
Article 1
Managing Data Security in E-Markets through Relationship Driven Access Control (pages 1-21)
Harry Wang (University of Delaware, USA), J. Leon Zhao (City University of Hong Kong, China), Guoqing Chen (Tsinghua University, China)
Article 2
An Alternative Fit through Problem Representation in Cognitive Fit Theory (pages 22-43)
Hock Chuan Chan (National University of Singapore, Singapore), Suparna Goswami (Technische Universität München, Germany), Hee-Woong Kim (Yonsei University, Korea)
Article 3
Compliance Assessments of Projects Adhering to Enterprise Architecture (pages 44-71)
Ralph Foorthuis (UWV Business Services, The Netherlands), Frank Hofman (Statistics Netherlands, The Netherlands), Sjaak Brinkkemper (Utrecht University, The Netherlands), Rik Bos (Utrecht University, The Netherlands)
Article 4
Toward a Formal Semantics for Control-Flow Process Models (pages 72-97)
Henry H. Bi (Willamette University, USA), John Nolt (University of Tennessee - Knoxville, USA)
Issue 3
Article 1
Analyzing the Cognitive Difficulties for Developing and Using UML Class Diagrams for Domain Understanding (pages 1-29)
Palash Bera (Operations and IT Management, John Cook School of Business, Saint Louis University, Saint Louis, MO, USA)
Article 2
Empirical Comparison of 3-D Virtual World and Face-to-Face Classroom for Higher Education (pages 30-49)
Xiaofeng Chen (Department of Information Services, University of Nebraska-Lincoln, Lincoln, NE, USA), Keng Siau (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA), Fiona Fui-Hoon Nah (Department of Business & Information Technology, Missouri University of Science and Technology, Rolla, MO, USA)
Article 3
Research Note: Ontology-Based Structuring of Conceptual Data Modeling Patterns (pages 50-64)
Wim Laurier (Ghent University, Ghent, Belgium, Faculté ESPO, Université Saint-Louis, Brussels, Belgium), Geert Poels (Department of Management Information Science and Operations Management, Faculty of Economics and Business Administration, Ghent University, Ghent, Belgium)
Issue 4
Article 1
A Conceptual Modeling Personalization Framework for OLAP (pages 1-16)
Irene Garrigós (School of Computer Science, University of Alicante, Alicante, Spain), Jesús Pardillo (Ericsson R&D, Madrid, Spain), Jose-Norberto Mazón (Department of Software and Computing Systems, University of Alicante, Alicante, Spain), Jose Zubcoff (Faculty of Science, University of Alicante, Alicante, Spain), Juan Trujillo (School of Computer Science, University of Alicante, Alicante, Spain), Rafael Romero (School of Computer Science, University of Alicante, Alicante, Spain)
Article 2
Effectively and Efficiently Designing and Querying Parallel Relational Data Warehouses on Heterogeneous Database Clusters: The F&A Approach (pages 17-51)
Ladjel Bellatreche (LIAS/ENSMA, Poitiers University, Futuroscope Chasseneuil Cedex, France), Alfredo Cuzzocrea (ICAR-CNR, ItalyF&AUniversity of Calabria, Renede, Italy), Soumia Benkrid (National High School for Computer Science (ESI), Algiers, Algeria)
Article 3
An Event-Oriented Data Modeling Technique Based on the Cognitive Semantics Theory (pages 52-74)
Dinesh Batra (College of Business Administration, Florida International University, Miami, FL, USA)
Volume 22 (2011)
Issue 1
Article 1
A Link-Based Ranking Algorithm for Semantic Web Resources: A Class-Oriented Approach Independent of Link Direction (pages 1-25)
Hyunjung Park (Seoul National University, Korea), Sangkyu Rho (Seoul National University, Korea), Jinsoo Park (Institute of Management Research, Seoul National University, Korea)
Article 2
A Study of Open Source Software Development from Control Perspective (pages 26-42)
Bo Xu (Fudan University, China), Zhangxi Lin (Texas Tech University, USA), Yan Xu (Del Mar College, USA)
Article 3
An MDA Approach and QVT Transformations for the Integrated Development of Goal-Oriented Data Warehouses and Data Marts (pages 43-68)
Jesús Pardillo (University of Alicante, Spain), Jose-Norberto Mazón (University of Alicante, Spain), Juan Trujillo (University of Alicante, Spain)
Article 4
Understanding Business Domain Models: The Effect of Recognizing Resource-Event-Agent Conceptual Modeling Structures (pages 69-101)
Geert Poels (Faculty of Economics and Business Administration, Ghent University, Belgium)
Article 5
A Survey of Approaches to Web Service Discovery in Service-Oriented Architectures (pages 102-132)
Marco Crasso (ISISTAN - UNICEN, Argentina), Alejandro Zunino (ISISTAN - UNICEN, Argentina), Marcelo Campo (ISISTAN - UNICEN, Argentina)
Issue 2
Article 1
Multi-Level Modeling of Web Service Compositions with Transactional Properties (pages 1-31)
K. Vidyasankar (Memorial University, Canada), Gottfried Vossen (University of Muenster, Germany)
Article 2
Service Composition and Interaction in a SOC Middleware Supporting Separation of Concerns with Flows and Views (pages 32-63)
Dickson K.W. Chiu (Dickson Computer Systems, Hong Kong), Qing Li (City University of Hong Kong, Hong Kong), Patrick C. K. Hung (University of Ontario, Canada), Zhe Shan (City University of Hong Kong, Hong Kong), S. C. Cheung (Hong Kong University of Science and Technology, Hong Kong), Yu Yang (City University of Hong Kong, Hong Kong), Matthias Farwick (University of Innsbruck, Austria)
Article 3
Ensuring Customised Transactional Reliability of Composite Services (pages 64-92)
Sami Bhiri (National University of Ireland, Galway, Ireland), Walid Gaaloul (Telecom & Management SudParis, France), Claude Godart (LORIA-INRIA, France), Olivier Perrin (LORIA-INRIA, France), Maciej Zaremba (National University of Ireland, Galway, Ireland), Wassim Derguech (National University of Ireland, Galway, Ireland)
Article 4
Leveraging Early Aspects in End-to-End Model Driven Development for Non-Functional Properties in Service Oriented Architecture (pages 93-123)
Hiroshi Wada (National ICT Australia, Australia), Junichi Suzuki (University of Massachusetts, Boston, USA), Katsuya Oba (OGIS International, Inc., USA)
Issue 3
Article 1
Complementing Business Process Verification by Validity Analysis: A Theoretical and Empirical Evaluation (pages 1-23)
Pnina Soffer (University of Haifa, Israel), Maya Kaner (Ort Braude College, Israel)
Article 2
Data Management and Data Administration: Assessing 25 Years of Practice (pages 24-45)
Peter Aiken (Virginia Commonwealth University, USA), Mark Gillenson (University of Memphis, USA), Xihui Zhang (University of North Alabama, USA), David Rafner (Richmond Group Fund Co., Ltd., USA)
Article 3
Research Review: A Systematic Literature Review on the Quality of UML Models (pages 46-70)
Marcela Genero (University of Castilla-La Mancha, Spain), Ana M. Fernández-Saez (University of Castilla-La Mancha, Spain), H. James Nelson (Southern Illinois University, USA), Geert Poels (Faculty of Economics and Business Administration, Ghent University, Belgium), Mario Piattini (University of Castilla-La Mancha, Spain)
Issue 4
Article 1
Semi-Automatic Composition of Situational Methods (pages 1-29)
Anat Aharoni (Kinneret College, Israel), Iris Reinhartz-Berger (University of Haifa, Israel)
Article 2
DocBase: Design, Implementation and Evaluation of a Document Database for XML (pages 30-56)
Arijit Sengupta (Wright State University, USA), Ramesh Venkataraman (Indiana University, USA)
Article 3
A Meta-Analysis Comparing Relational and Semantic Models (pages 57-72)
Keng Siau (Missouri University of Science and Technology, USA), Fiona F.H. Nah (University of Nebraska – Lincoln, USA), Qing Cao (Texas Tech University, USA)
Article 4
Extending Agile Principles to Larger, Dynamic Software Projects: A Theoretical Assessment (pages 73-92)
Dinesh Batra (Florida International University, USA), Debra VanderMeer (Florida International University, USA), Kaushik Dutta (National University of Singapore, Singapore)
Volume 21 (2010)
Issue 1
Article 1
Using Ontology Languages for Conceptual Modeling (pages 1-28)
Palash Bera (Texas A&M International University, USA), Anna Krasnoperova (Bootlegger, Canada), Yair Wand (University of British Columbia, Canada)
Article 2
Modeling Design Patterns for Semi-Automatic Reuse in System Design (pages 29-57)
Galia Shlezinger (Technion-Israel Institute of Technology, Israel), Iris Reinhartz-Berger (University of Haifa, Israel), Dov Dori (Technion-Israel Institute of Technology, Israel)
Article 3
Energy and Latency Efficient Access of Wireless XML Stream (pages 58-79)
Jun Pyo Park (Korea University, Korea), Chang-Sup Park (Dongduk Women’s University, Korea), Yon Dohn Chung (Korea University, Korea)
Article 4
Toward a Unified Model of Information Systems Development Success (pages 80-101)
Keng Siau (Missouri University of Science and Technology, USA), Yoanna Long (Colorado State University Pueblo, USA), Min Ling (University of Nebraska-Lincoln, USA)
Issue 2
Article 1
Representing Classes of Things and Properties in General in Conceptual Modelling: An Empirical Evaluation (pages 1-25)
Graeme Shanks (University of Melbourne, Australia), Daniel Moody (University of Twente, The Netherlands), Jasmina Nuredini (Simsion and Associates, Australia), Daniel Tobin (University of Melbourne, Australia), Ron Weber (Monash University, Australia)
Article 2
Information Search Patterns in E-Commerce Product Comparison Services (pages 26-40)
Fiona Fui-Hoon Nah (Missouri University of Science and Technology, USA), Weiyin Hong (University of Nevada, Las Vegas, USA), Liqiang Chen (University of Nebraska-Lincoln, USA), Hong-Hee Lee (Dankook University, South Korea)
Article 3
Antecedents of the Closeness of Human-Avatar Relationships in a Virtual World (pages 41-68)
Yi Zhao (City University of Hong Kong, China), Weiquan Wang (City University of Hong Kong, China), Yan Zhu (Tsinghua University, China)
Article 4
Antecedents of Online Game Dependency: The Implications of Multimedia Realism and Uses and Gratifications Theory (pages 69-99)
Kaunchin Chen (Western Michigan University, USA), Jengchung V. Chen (National Cheng Kung University, Taiwan), William H. Ross (University of Wisconsin, La Crosse, USA)
Issue 3
Article 1
Assigning Ontological Meaning to Workflow Nets (pages 1-35)
Pnina Soffer (University of Haifa, Israel), Maya Kaner (Ort Braude College, Israel), Yair Wand (University of British Columbia, Canada)
Article 2
Maintaining Mappings between Conceptual Models and Relational Schemas (pages 36-68)
Yuan An (Drexel University, USA), Xiaohua Hu (Drexel University, USA), Il-Yeol Song (Drexel University, USA)
Article 3
Impact of Flow and Brand Equity in 3D Virtual Worlds (pages 69-89)
Fiona Fui-Hoon Nah (Missouri University of Science and Technology, USA), Brenda Eschenbrenner (University of Nebraska-Lincoln, USA), David DeWester (University of Nebraska-Lincoln, USA), So Ra Park (University of Nebraska-Lincoln, USA)
Article 4
Cost and Service Capability Considerations on the Intention to Adopt Application Service Provision Services (pages 90-113)
Yurong Yao (Suffolk University, USA), Denis M. Lee (Suffolk University, USA), Yang W. Lee (Northeastern University, USA)
Issue 4
Article 1
Co-creation and Collaboration in a Virtual World: A 3D Visualization Design Project in Second Life (pages 1-13)
Keng Siau (Missouri University of Science and Technology, USA), Fiona Fui-Hoon Nah (Missouri University of Science and Technology, USA), Brian E. Mennecke (Iowa State University, USA), Shu Z. Schiller (Wright State University, USA)
Article 2
Transforming Activity-Centric Business Process Models into Information-Centric Models for SOA Solutions (pages 14-34)
Rong Liu (IBM T.J. Watson Research Center, USA), Frederick Y. Wu (IBM T.J. Watson Research Center, USA), Santhosh Kumaran (IBM T.J. Watson Research Center, USA)
Article 3
An Integrated Query Relaxation Approach Adopting Data Abstraction and Fuzzy Relation (pages 35-59)
Soon-Young Huh (Korea Advanced Institute of Science and Technology, Korea), Kae-Hyun Moon (Samsung Electronics Co., Korea), Jinsoo Park (Seoul National University, Korea)
Article 4
Accelerating Web Service Workflow Execution via Intelligent Allocation of Services to Servers (pages 60-90)
Konstantinos Stamkopoulos (University of Ioannina, Greece), Evaggelia Pitoura (University of Ioannina, Greece), Panos Vassiliadis (University of Ioannina, Greece), Apostolos Zarras (University of Ioannina, Greece)
Article 5
Matching Attributes across Overlapping Heterogeneous Data Sources Using Mutual Information (pages 91-110)
Huimin Zhao (University of Wisconsin-Milwaukee, USA)
Article 6
Disclosure Control of Confidential Data by Applying Pac Learning Theory (pages 111-123)
Ling He (Saginaw Valley State University, USA), Haldun Aytug (University of Florida, USA), Gary J. Koehler (University of Florida, USA)
Volume 20 (2009)
Issue 1
Article 1
Use Case Diagrams in Support of Use Case Modeling: Deriving Understanding from the Picture (pages 1-24)
Andrew Gemino (Simon Fraser University, Canada), Drew Parker (Simon Fraser University, Canada)
Article 2
Applying Learner-Centered Design Principles to UML Sequence Diagrams (pages 25-47)
Debra VanderMeer (Florida International University, USA), kaushik Dutta (Florida International University, USA)
Article 3
Ontology Based Object-Oriented Domain Modeling: Representing Behavior (pages 48-77)
Joerg Evermann (Memorial University of Newfoundland, Canada), Yair Wand (The University of British Columbia, Canada)
Issue 2
Article 1
General Strategy for Querying Web Sources in a Data Federation Environment (pages 1-18)
Aykut Firat (Northeastern University, USA), Lynn Wu (Massachusetts Institute of Technology, USA), Stuart Madnick (Massachusetts Institute of Technology, USA)
Article 2
The Quality of Online Privacy Policies: A Resource-Dependency Perspective (pages 19-37)
Veda C. Storey (Georgia State University, USA), Gerald C. Kane (Boston College, USA), Kathy Stewart Schwaig (Kennesaw State University, USA)
Article 3
Reverse Engineering from an XML Document into an Extended DTD Graph (pages 38-57)
Herbert Shiu (City University of Hong Kong, Hong Kong), Joseph Fong (City University of Hong Kong, Hong Kong)
Article 4
Efficient Filtering of Branch Queries for High-Performance XML Data Services (pages 58-83)
Ryan H. Choi (The University of New South Wales and National ICT Australia, Australia), Raymond K. Wong (The University of New South Wales and National ICT Australia, Australia)
Issue 3
Article 1
Towards Autonomic Workload Management in DBMSs (pages 1-17)
Baoning Niu (Taiyuan University of Technology, China and Queen’s University, Canada), Patrick Martin (Queen’s University, Canada), Wendy Powley (Queen’s University, Canada)
Article 2
OOXKSearch: A Search Engine for Answering XML Keyword and Loosely Structured Queries Using OO Techniques (pages 18-50)
Kamal Taha (The University of Texas at Arlington, USA), Ramez Elmasri (The University of Texas at Arlington, USA)
Article 3
Towards Structured Flexibility in Information Systems Development: Devising a Method for Method Configuration (pages 51-75)
Fredrik Karlsson (Örebro University, Sweden), Pär J. Ågerfalk (Uppsala University, Sweden and University of Limerick, Ireland)
Article 4
Cardinality-Aware Purely Relational XQuery Processor (pages 76-125)
Sherif Sakr (University of New South Wales, Australia)
Issue 4
Article 1
A Cost-Based Range Estimation for Mapping Top-k Selection Queries over Relational Databases (pages 1-25)
Anteneh Ayanso (Brock University, Canada), Paulo B. Goes (University of Arizona, USA), Kumar Mehta (George Mason University, USA)
Article 2
Designing Document SQL (DSQL): An Accessible yet Comprehensive Ad-Hoc Querying Frontend for Query (pages 26-53)
Arijit Sengupta (Wright State University, USA), V. Ramesh (Indiana University, USA)
Article 3
A Dynamic Grid File for High-Dimensional Data Cube Storage and Range-Sum Querying (pages 54-71)
Wen-Chi Hou (Southern Illinois University, USA), Xiaoguang Yu (Southern Illinois University, USA), Chih-Fang Wang (Southern Illinois University, USA), Cheng Luo (Coppin State University, USA), Michael Wainer (Southern Illinois University, USA)
Volume 19 (2008)
Issue 1
Article 1
Dimensions of UML Diagram Use: A Survey of Practitioners (pages 1-18)
Brian Dobing (University of Lethbridge, Canada), Jeffrey Parsons (Memorial University of Newfoundland, Canada)
Article 2
Conflicts, Compromises and Political Decisions: Methodological Challenges of Enterprise-Wide E-Business Architecture (pages 19-40)
Kari Smolander (Lappeenranta University of Technology, Finland), Matti Rossi (Helsinki School of Economics, Finland)
Article 3
BROOD: Business Rules-driven Object Oriented Design (pages 41-73)
Pericles Loucopoulos (Loughborough University, UK), Wan Mohd Nasir Wan Kadir (Universiti Teknologi Malaysia, Malaysia)
Article 4
Enhancing UML Models: A Domain Analysis Approach (pages 74-94)
Iris Reinhartz-Berger (University of Haifa, Israel), Arnon Sturm (Ben-Gurion University of the Negev, Israel)
Issue 2
Article 1
Bug Fixing Practices within Free/Libre Open Source Software Development Teams (pages 1-30)
Kevin Crowston (Syracuse University, USA), Barbar Scozzi (Politecnico di Bari, Italy)
Article 2
Exploring the Effects of Process Characteristics on Products Quality in Open Source Software Development (pages 31-57)
Stefan Koch (University of Economics and Business Administration, Austria), Christian Neumann (Vienna University of Economics and Business Administration, Austria)
Article 3
The Impact of Ideology on the Organizational Adoption of Open Source Software (pages 58-72)
Kris Ven (University of Antwerp, Belgium), Jan Verelst (University of Antwerp, Belgium)
Article 4
Adoption, Improvement, and Disruption: Predicting the Impact of Open Source Applications in Enterprise Software Markets (pages 73-94)
Michael Brydon (Simon Fraser University, Canada), Aidan R. Vining (Simon Fraser University, Canada)
Article 5
Delivering the Whole Product: Business Model Impacts and Agility Challenges in a Network of Open Source Firms (pages 95-108)
Joseph Feller (University College Cork, Ireland), Patrick Finnegan (University College Cork, Ireland), Jeremy Hayes (University College Cork, Ireland)
Issue 3
Article 1
A Multiple-Bits Watermark for Relational Data (pages 1-21)
Yingjiu Li (Singapore Management University, Singapore), Huiping Guo (California State University at Los Angeles, USA), Shuhong Wang (University of Wollongong, Australia)
Article 2
Using Iconic Graphics in Entity-Relationship Diagrams: The Impact on Understanding (pages 22-41)
Kamal Masri (Simon Fraser University, Canada), Drew Parker (Simon Fraser University, Canada), Andrew Gemino (Simon Fraser University, Canada)
Article 3
Web Services, Service-Oriented Computing, and Service-Oriented Architecture: Separating Hype from Reality (pages 42-54)
John Erickson (University of Nebraska - Omaha, USA), Keng Siau (Missouri University of Science and Technology, USA)
Article 4
Theories of Meaning in Schema Matching: A Review (pages 55-82)
Joerg Evermann (Memorial University of Newfoundland - St. John’s, Canada)
Issue 4
Article 1
An Open ECA Server for Active Applications (pages 1-20)
Florian Daniel (University of Trento, Italy), Giuseppe Pozzi (Politecnico di Milano, Italy)
Article 2
Evaluation of MDE Tools from a Metamodeling Perspective (pages 21-46)
João de Sousa Saraiva (INESC-ID/Instituto Superior Tecnico, Portugal), Alberto Rodrigues da Silva (INESC-ID/Instituto Superior Tecnico, Portugal)
Article 3
Relaxing Queries with Hierarchical Quantified Data Abstraction (pages 47-61)
Myung Keun Shin (Korea Advanced Institute of Science and Technology, South Korea), Soon Young Huh (Korea Advanced Institute of Science and Technology, South Korea), Donghyun Park (Inha University, South Korea), Wookey Lee (Inha University, South Korea)
Article 4
Reverse Engineering from an XML Document into an Extended DTD Graph (pages 62-80)
Herbert Shiu (City University of Hong Kong, Hong Kong), Joseph Fong (City University of Hong Kong, Hong Kong)
Article 5
Ontology for Data Mining and its Application to Mining Incomplete Data (pages 81-90)
Hai Wang (Saint Mary’s University, Canada), Shouhong Wang (University of Massachusetts Dartmouth, USA)
Article 6
3-D Virtual Worlds in Education: Applications, Benefits, Issues, and Opportunities (pages 91-110)
Brenda Eschenbrenner (University of Nebraska-Lincoln, USA), Fiona Fui-Hoon Nah (Missouri University of Science and Technology, USA), Keng Siau (Missouri University of Science and Technology, USA)
Volume 18 (2007)
Issue 1
Article 1
Semantics of the MibML Conceptual Modeling Grammar: An Ontological Analysis Using the Bunge-Wang-Weber Framework (pages 1-19)
Hong Zhang (Missouri State University, USA), Rajiv Kishore (State University of New York at Buffalo, USA), Ram Ramesh (State University of New York at Buffalo, USA)
Article 2
A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web (pages 20-42)
Henry M. Kim (York University, Canada), Arijit Sengupta (Wright State University, USA), Mark S. Fox (University of Toronto, Canada), Mehmet Dalkilic (Indiana University, USA)
Article 3
Semantic Integration and Knowledge Discovery for Environmental Research (pages 43-68)
Zhiyuan Chen (University of Maryland, Baltimore County (UMBC), USA), Aryya Gangopadhyay (University of Maryland, Baltimore County (UMBC), USA), George Karabatis (University of Maryland, Baltimore County (UMBC), USA), Michael McGuire (University of Maryland, Baltimore County (UMBC), USA), Claire Welty (University of Maryland, Baltimore County (UMBC), USA)
Article 4
Optimization of Multidimensional Aggregates in Data Warehouses (pages 69-93)
Russel Pears (Auckland University of Technology, New Zealand), Bryan Houliston (Auckland University of Technology, New Zealand)
Issue 2
Article 1
Categorizing Post-Deployment IT Changes: An Empirical Investigation (pages 1-24)
David Kang (Chapman University, USA)
Article 2
Social Network Structures in Open Source Software Development Teams (pages 25-40)
Yuan Long (Colorado State University-Pueblo, USA), Keng Siau (Missouri University of Science and Technology, USA)
Article 3
A Knowledge Integration Approach for Organizational Decision Support (pages 41-61)
Kee-Young Kwahk (Kookmin University, Korea), Hee-Woong Kim (National University of Singapore, Singapore), Hock Chuan Chan (National University of Singapore, Singapore)
Article 4
Temporal Aggregation Using a Multidimensional Index (pages 62-79)
Joon-Ho Woo (Korea Advanced Institute of Science & Technology (KAIST), Korea), Byung Suk Lee (University of Vermont, USA), Min-Jae Lee (Korea Advanced Institute of Science & Technology (KAIST), Korea), Woong-Kee Loh (Korea Advanced Institute of Science & Technology (KAIST), Korea), Kyu-Young Whang (Korea Advanced Institute of Science & Technology (KAIST), Korea)
Issue 3
Article 1
View Materialization in a Data Cube: Optimization Models and Heuristics (pages 1-20)
Vikas Agrawal (Fayetteville State University, USA), P. S. Sundararaghavan (The University of Toledo, USA), Mesbah U. Ahmed (The University of Toledo, USA), Udayan Nandkeolyar (The University of Toledo, USA)
Article 2
A Space-Efficient Protocol for Consistency of External View Maintenance on Data Warehouse Systems: A Proxy Approach (pages 21-47)
Shi-Ming Huang (National Chung Cheng University, Taiwan), David C. Yen (Miami University, USA), Hsiang-Yuan Hsueh (National Chung Cheng University, Taiwan)
Article 3
Intelligent Search for Experts Using Fuzzy Abstraction Hierarchy in Knowledge Management Systems (pages 48-68)
Kun-Woo Yang (Keimyung University, South Korea), Soon-Young Huh (KAIST Business School, South Korea)
Article 4
Information Mediation Using Metamodels: An Approach Using XML and Common Warehouse Metamodel (pages 69-82)
Luyin Zhao (The State University of New Jersey - Rutgers, USA), Keng Siau (Missouri University of Science and Technology, USA)
Issue 4
Article 1
Migrating Legacy Information Systems to Web Services Architecture (pages 1-25)
Shing-Han Li (Tatung University, Taiwan), Shi-Ming Huang (National Chung Cheng University, Taiwan), David C. Yen (Miami University, USA), Cheng-Chun Chang (National Chung Cheng University, Taiwan)
Article 2
Empirical Assessment of Factors Influencing Success of Enterprise Resource Planning Implementations (pages 26-50)
Fiona Fui-Hoon Nah (Missouri University of Science and Technology, USA), Zahidul Islam (Independent University, Bangladesh), Mathew Tan (Agilent Technologies, Malaysia)
Article 3
Design of a Data Model for Social Network Applications (pages 51-79)
Susanta Mitra (International Institute of Information Technology, India), Aditya Bagchi (Indian Statistical Institute, India), A.K. Bandyopadhyay (Jadavpur University, India)
Volume 17 (2006)
Issue 1
Article 1
The Critical Role of Information Processing in Creating an Effective Knowledge Organization (pages 1-15)
William R. King (University of Pittsburgh, USA)
Article 2
The Knowledge Transfer Process: From Field Studies to Technology Development (pages 16-32)
M. Millie Kwan (University of Hong Kong, Pokfulam, Hong Kong), Pak-Keung Cheung (University of Hong Kong, Pokfulam, Hong Kong)
Article 3
Article 4
Semantic Enrichment in Knowledge Repositories: Annotating Semantic Relationships Between Discussion Documents (pages 49-66)
Chih-Ping Wei (National Tsing Hua University, Taiwan, R.O.C.), Tsang-Hsiang Cheng (Southern Taiwan University of Technology, Taiwan, R.O.C.), Yi-Chung Pai (National Sun Yat-sen University, Taiwan, R.O.C.)
Article 5
Ontology-Supported Web Service Composition: An Approach to Service-Oriented Knowledge Management in Corporate Services (pages 67-84)
Ye Chen (University of Wisconsin-Madison, USA), Lina Zhou (University of Maryland, Baltimore County, USA), Dongsong Zhang (University of Maryland, Baltimore County, USA)
Article 6
Organizational Memory Management: Technological and Research Issues (pages 85-94)
Sree Nilakanta (Iowa State University, USA), L. L. Miller (Iowa State University, USA), Dan Zhu (Iowa State University, USA)
Issue 2
Article 1
Preparing Clinical Text for Use in Biomedical Research (pages 1-11)
John P. Pestian (Cincinnati Children’s Hospital Medical Center, University of Cincinnati, USA), Lukasz Itert (Nicolaus Copernicus University, Torun, Poland), Charlotte Anderson (Cincinnati Children’s Hospital Medical Center, University of Cincinnati, USA), Wlodzislaw Duch (Nicolaus Copernicus University, Torun, Poland)
Article 2
Physical Modeling of Data Warehouses Using UML Component and Deployment Diagrams: Design and Implementation Issues (pages 12-42)
Sergio Lujan-Mora (University of Alicante, Spain), Juan Trujillo (University of Alicante, Spain)
Article 3
Node Partitioned Data Warehouses: Experimental Evidence and Improvements (pages 43-61)
Pedro Furtado (University of Coimbra, Portugal)
Article 4
Data Warehouse Design to Support Customer Relationship Management Analysis (pages 62-84)
Colleen Cunningham (Drexel University, USA), Il-Yeol Song (Drexel University, USA), Peter P. Chen (Louisiana State University, USA)
Article 5
Evaluating XML-Extended OLAP Queries Based on Physical Algebra (pages 85-116)
Xuepeng Yin (Aalborg University, Denmark), Torben Bach Pedersen (Aalborg University, Denmark)
Issue 3
Article 2
A Framework for Efficient Association Rule Mining in XML Data (pages 19-40)
Ji Zhang (University of Toronto, Canada), Han Liu (Carnegie Mellon University, USA), Tok Wang Ling (National University of Singapore, Singapore), Robert M. Bruckner (Microsoft, USA), A Min Tjoa (Vienna University of Technology, Austria)
Article 3
Location-Aware Query Resolution for Location-Based Mobile Commerce: Performance Evaluation and Optimization (pages 41-65)
James E. Wyse (Memorial University of Newfoundland, Canada)
Article 4
Enterprise Application System Reengineering: A Business Component Approach (pages 66-91)
Shi-Ming Huang (National Chung Cheng University, Taiwan), Shin-Yuan Hung (National Chung Cheng University, Taiwan), David Yen (Miami University, USA), Shing-Han Li (Tatung University, Taiwan), Chun-Ju Wu (National Chung Cheng University, Taiwan)
Article 5
Elitist and Ensemble Strategies for Cascade Generalization (pages 92-107)
Huimin Zhao (University of Wisconsin - Milwaukee, USA), Atish P. Sinha (University of Wisconsin - Milwaukee, USA), Sudha Ram (University of Arizona, USA)
Issue 4
Article 1
Semantic Integrity Constraint Checking for Multiple XML Databases (pages 1-19)
Praveen Madiraju (Marquette University, USA), Rajshekhar Sunderraman (Georgia State University, USA), Shamkant B. Navathe (Georgia Institute of Technology, USA), Haibin Wang (Georgia Institute of Technology, USA)
Article 2
A Scalable Middleware for Web Databases (pages 20-46)
Athman Bouguettaya (Virginia Tech, USA), Zaki Malik (Virginia Tech, USA), Abdelmounaam Rezgui (Virginia Tech, USA), Lori Korff (Virginia Tech, USA)
Article 3
Extending the OBJECTIVE Benchmark for Evaluation of Active Rules in a Distributed Component Integration Environment (pages 47-69)
Ying Jin (California State University, Sacramento, USA), Susan D. Urban (Arizona State University, USA), Suzanne W. Dietrich (Arizona State University, USA)
Article 4
UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method (pages 70-89)
Amel Mammar (University of Luxembourg, Luxembourg), Régine Laleau (University of Paris 12, France)
Volume 16 (2005)
Issue 1
Article 1
On U.S. Homeland Security and Database Technology (pages 1-17)
Won Kim (Cyber Database Solutions, USA)
Article 2
Information Quality: Critical Ingredient for National Security (pages 18-32)
Larry P. English (Information Impact International Inc., USA)
Article 3
Semantic Association Identification and Knowledge Discovery for National Security Applications (pages 33-53)
Amit Sheth (University of Georgia, USA & Semagix, Inc., USA), Boanerges Aleman-Meza (University of Georgia, USA), I. Budak Arpinar (University of Georgia, USA), Clemens Bertram (Semagix, Inc., USA), Yashodhan Warke (Semagix, Inc., USA), Cartic Ramakrishanan (University of Georgia, USA), Chris Halaschek (University of Georgia, USA), Kemafar Anyanwu (University of Georgia, USA), David Avant (Semagix, Inc., USA), F. Sena Arpinar (Semagix, Inc., USA), Krys Kochut (University of Georgia, USA)
Article 4
Text Mining, Names and Security (pages 54-59)
Paul Thompson (Dartmouth College, USA)
Article 5
A Database Interface for Link Analysis (pages 60-74)
Mathew N. Smith (University of London, UK), Peter J.H. King (University of London, UK)
Article 6
Privacy-Preserving Data Mining: Development and Directions (pages 75-87)
Bhavani Thuraisingham (The MITRE Corporation, USA)
Issue 2
Article 1
Experimental Study of a Self-Tuning Algorithm for DBMS Buffer Pools (pages 1-20)
Patrick Martin (Queen’s University, Canada), Wendy Powley (Queen’s University, Canada), Min Zheng (Queen’s University, Canada), Keri Romanufa (IBM Toronto Laboratory, Canada)
Article 2
Evaluating the Dynamic Behavior of Database Applications (pages 21-45)
Zhen He (University of Vermont Burlington, USA), Jérôme Darmont (Universite Lumiere Lyon 2, France)
Article 3
Intelligent Cache Management for Mobile Data Warehouse Systems (pages 46-65)
Shi-Ming Huang (National Chung Cheng University, Taiwan), Binshan Lin (Louisiana State University in Shreveport, USA), Qun-Shi Deng (National Chung Cheng University, Taiwan)
Article 4
A Conceptual Design Methodology for Fuzzy Relational Databases (pages 66-83)
Z.M. Ma (Northeastern University, China)
Article 5
Conceptual Data Modeling Patterns: Representation and Validation (pages 84-106)
Dinesh Batra (Florida International University, USA)
Issue 3
Article 1
Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories (pages 1-20)
Nenad Jukic (Loyola University Chicago, USA), Svetlozar Nestorov (University of Chicago, USA), Susan V. Vrbsky (University of Alabama, USA), Allen Parrish (University of Alabama, USA)
Article 2
Article 3
Theoretical vs. Practical Complexity: The Case of UML (pages 40-57)
Keng Siau (Missouri University of Science and Technology, USA), John Erickson (University of Nebraska at Omaha, USA), LihYunn Lee (University of Nebraska-Lincoln, USA)
Article 4
An Investigation of the Impact of Organization Size on Data Quality Issues (pages 58-71)
G. Daryl Nord (Oklahoma State University, USA), Jeretta Horn Nord (Oklahoma State University, USA), Hongjiang Xu (Central Michigan University, USA)
Article 5
BACIIS: Biological and Chemical Information Integration System (pages 72-85)
Zina Ben Miled (Indiana University Purdue University, USA), Nianhua Li (Indiana University Purdue University, USA), Omran Bukhres (Indiana University Purdue University, USA)
Issue 4
Article 1
Creating a Dual-Agility Method: The Value of Method Engineering (pages 1-24)
B. Henderson-Sellers (University of Technology, Australia), M. K. Serour (University of Technology, Australia)
Article 2
On the Adaptation of an Agile Information Systems Development Method (pages 25-40)
Mehmet N. Aydin (University of Twente, The Netherlands), Frank Harmsen (Capgemini, The Netherlands), Kees van Slooten (University of Twente, The Netherlands), Robert A. Stagwee (University of Twente, The Netherlands)
Article 3
Is Extreme Programming Just Old Wine in New Bottles: A Comparison of Two Cases (pages 41-61)
Hilkka Merisalo-Rantanen (Helsinki School of Economics, Finland), Tuure Tuunanen (The University of Auckland Business School, New Zealand), Matti Rossi (Helsinki School of Economics, Finland)
Article 4
Assumptions Underlying Agile Software-Development Processes (pages 62-87)
Daniel Turk (Colorado State University, USA), France. Robert (Colorado State University, USA), Bernhard Rumpe (Braunschweig University of Technology, Germany)
Article 5
Agile Modeling, Agile Software Development, and Extreme Programming: The State of Research (pages 88-100)
John Erickson (University of Nebraska at Omaha, USA), Kalle Lyytinen (Case Western Reserve University, USA), Keng Siau (Missouri University of Science and Technology, USA)
Volume 15 (2004)
Issue 1
Article 1
A Systematic Approach to Flexible Specifications, Composition, and Restructuring of Workflow Activities (pages 1-40)
Ling Liu (Georgia Institute of Technology, USA), Carlton Pu (Georgia Institute of Technology, USA), Duncan Ruiz (Pontifical Catholic University of RS, Brazil)
Article 2
Applying UML and XML for Designing and Interchanging Information for Data Warehouses and OLAP Applications (pages 41-72)
Juan Trujillo (Universidad de Alicante, Spain), Sergio Lujan-Mora (Universidad de Alicante, Spain), Il-Yeol Song (Drexel University, USA)
Article 3
Informational and Computational Equivalence in Comparing Information Modeling Methods (pages 73-86)
Keng Siau (Missouri University of Science and Technology, USA)
Article 4
Process-Embedded Data Integrity (pages 87-103)
Yang W. Lee (Northeastern University, USA), Leo Pipino (University of Massachusetts, Lowell, USA), Diane M. Strong (Worcester Polytechnic Institute, USA), Richard Y. Wang (Massachusetts Institute of Technology, USA)
Issue 2
Article 1
ONTOMETRIC: A Method to Choose the Appropriate Ontology (pages 1-18)
Adolfo Lozano-Tello (Universidad de Extremadura, Spain), Asunción Gomez-Perez (Universidad Politecnica de Madrid, Spain)
Article 2
An Ontology of Data Modelling Languages: A Study Using a Common-Sense Realistic Ontology (pages 19-38)
Simon K. Milton (University of Melbourne, Australia), Ed Kazmierczak (University of Melbourne, Australia)
Article 3
A Template for Defining Enterprise Modelling Constructs (pages 39-73)
Andreas L. Opdahl (University of Bergen, Norway), Brian Henderson-Sellers (University of Technology, Sydney, Australia)
Article 4
An Evaluation of Inter-Organizational Workflow Modelling Formalisms (pages 74-104)
Aymeric Dussart (Robichaud Conseil, Canada), Benoit A. Aubert (HEC Montreal, Canada), Michel Patry (HEC Montreal, Canada)
Article 5
Applying Ontologies to Business and Systems Modelling Techniques and Perspectives: Lessons Learned (pages 105-117)
Peter Green (University of Queensland, Australia), Michael Rosemann (Queensland University of Technology, Australia)
Issue 3
Article 1
An Exploration of a Set Entropy-Based Hybrid Splitting Methods for Decision Tree Induction (pages 1-17)
Kweku-Muata Osei-Bryson (Virginia Commonwealth University, USA), Kendall Giles (Virginia Commonwealth University, USA)
Article 2
XTOPO: An XML-Based Topology for Information Highway on the Internet (pages 18-44)
Joseph Fong (City University of Hong Kong, Hong Kong), Hing Kwok Wong (City University of Hong Kong, Hong Kong)
Article 3
Scalable QSF-Trees: Retrieving Regional Objects in High-Dimensional Spaces (pages 45-59)
Ratko Orlandic (Illinois Institute of Technology, USA), Byunggu Yu (University of Wyoming, USA)
Article 4
An Efficient Concurrency Control Algorithm for High-Dimensional Index Structures (pages 60-72)
Seok Il Song (Chungju National University, Korea), Jae Soo Yoo (Chungbuk National University, Korea)
Article 5
Data Warehousing Interoperability for the Extended Enterprise (pages 73-84)
Aristides Triantafillakis (National & Kapodistrian University of Athens, Greece), Panagiotis Kanellis (National & Kapodistrian University of Athens, Greece), Drakoulis Martakos (National & Kapodistrian University of Athens, Greece)
Issue 4
Article 1
Application of Mobile Agents in Mobile Data Access Systems: A Prototype (pages 1-24)
Yu Jiao (The Pennsylvania State University, USA), Ali R. Hurson (The Pennsylvania State University, USA)
Article 2
Mobile Agents Based Self-Adaptive Join for Wide-Area Distributed Query Processing (pages 25-44)
J. P. Arcangeli (IRIT, Universite Paul Sabatier, France), A. Hameurlain (IRIT, Universite Paul Sabatier, France), F. Migeon (IRIT, Universite Paul Sabatier, France), F. Morvan (IRIT, Universite Paul Sabatier, France)
Article 3
Ex Ante Evaluations of Alternate Data Structures for End User Queries: Theory and Experimental Test (pages 45-70)
Paul L. Bowen (The University of Queensland, Australia), Fiona H. Rohde (The University of Queensland, Australia), Jay Basford (The University of Queensland, Australia)
Article 4
Semantic Heterogeneity in Multidatabase Systems: A Review and a Proposed Meta-Data Structure (pages 71-87)
Te-Wei Wang (Florida International University, USA), Kenneth E. Murphy (Willamette University, USA)
Article 5
Clustering Schema Elements for Semantic Integration of Heterogeneous Data Sources (pages 89-106)
Huimin Zhao (University of Wisconsin - Milwaukee, USA), Sudha Ram (University of Arizona, USA)
Volume 14 (2003)
Issue 1
Article 1
Methodology Evaluation Framework for Component-Based System Development (pages 1-26)
Ajantha Dahanayake (Delft University of Technology, The Netherlands), Henk Sol (Delft University of Technology, The Netherlands), Zoran Stojanovic (Delft University of Technology, The Netherlands)
Article 2
Federated Process Framework in a Virtual Enterprise Using an Object-Oriented Database and Extensible Markup Language (pages 27-47)
Kyoung-Il Bae (Korea Advanced Institute of Science and Technology, Korea), Jung-Hyun Kim (Korea Advanced Institute of Science and Technology, Korea), Soon-Young Huh (Korea Advanced Institute of Science and Technology, Korea)
Article 3
A New Approach to Secure Federated Information Bases Using Agent Technology (pages 48-68)
Edgar Weippl (Software Competence Center Hagenberg, Austria), Ludwig Klug (Software Competence Center Hagenberg, Austria), Wolfgang Essmayr (Software Competence Center Hagenberg, Austria)
Issue 2
Article 1
A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection (pages 1-13)
Richard L. Baskerville (University of Atlanta, USA), Victor Portougal (University of Auckland, New Zealand)
Article 2
Protecting Data through Perturbation Techniques: The Impact on Knowledge Discovery in Databases (pages 14-26)
Rick L. Wilson (Oklahoma State University, USA), Peter A. Rosen (Oklahoma State University, USA)
Article 3
Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks (pages 27-41)
Satyadeep Patnaik (Subex Technology Inc., USA), Brajendra Panda (University of Arkansas, USA)
Article 4
Integrating Digital Signatures with Relational Databases: Issues and Organizational Implications (pages 42-51)
Randal Reid (University of Alabama in Huntsville, USA), Gurpreet Dhillon (Virginia Commonwealth University, USA)
Article 5
The Contribution of IT Governance Solutions to the Implementation of Data Warehouse Practice (pages 52-69)
Sutee Sujitparapitaya (California State University, USA), Brian D. Janz (University of Memphis, USA), Mark Gillenson (University of Memphis, USA)
Issue 3
Article 1
Conceptual Modelling and Ontology: Possibilities and Pitfalls (pages 1-20)
Ron Weber (University of Queensland, Australia)
Article 2
Modeling Temporal Dynamics for Business Systems (pages 21-36)
Gove N. Allen (Tulane University, USA), Salvatore T. March (Vanderbilt University, USA)
Article 3
Transformations Between UML Diagrams (pages 37-55)
Petri Selonen (Tampere University of Technology, Finland), Kai Koskimies (Tampere University of Technology, Finland), Markku Sakkinen (University of Jyväskylä, Finland)
Article 4
RORIB: An Economic and Efficient Solution for Real-Time Online Remote Information Backup (pages 56-73)
Scott J. Lloyd (University of Rhode Island, USA), Joan Peckham (University of Rhode Island, USA), Qing Yang (Cornell University, USA), Jian Li (University of Rhode Island, USA)
Issue 4
Article 1
Data Protection Using Watermarking in E-Business (pages 1-13)
Alexander P. Pons (University of Miami, USA), Hassan Aljifri (University of Miami, USA)
Article 2
Managing Data Quality in Dynamic Decision Environments: An Information Product Approach (pages 14-32)
Ganesan Shankaranarayan (Boston University, USA), Mostafa Ziad (Suffolk University, USA), Richard Y. Wang (Massachusetts Institute of Technology, USA)
Article 3
XML Integration and Toolkit for B2B Applications (pages 33-58)
Christophe Nicolle (Universite de Bourgogne, France), Kokou Yetongnon (Universite de Bourgogne, France), Jean-Claude Simon (Universite de Bourgogne, France)
Article 4
IAIS: A Methodology to Enable Inter-Agency Information Sharing in eGovernment (pages 59-80)
Akhilesh Bajaj (Carnegie Mellon University, USA), Sudha Ram (University of Arizona, USA)
Volume 13 (2002)
Issue 1
Article 1
Common Sense Reasoning in Automated Database Design: An Empirical Test (pages 3-14)
Veda C. Storey (Georgia State University, USA), Robert C. Goldstein (University of British Columbia, Canada), Jason Ding (Pharm2B, China)
Article 2
The Soprano Extensible Object Storage System (pages 15-24)
Jung-Ho Ahn (Seoul National University, Korea), Hyoung-Joo Kim (Seoul National University, Korea)
Article 3
Benchmarking Data Mining Algorithms (pages 25-35)
Balaji Rajagopalan (Oakland University, USA), Ravi Krovi (University of Akron, USA)
Article 4
Issues in Mobile Electronic Commerce (pages 36-42)
Asuman Dogac (Middle East Technical University, Turkey), Arif Tumer (Middle East Technical University, Turkey)
Issue 2
Article 1
Human Factors Research on Data Modeling: A Review of Prior Research, An Extended Framework and Future Research Directions (pages 3-19)
Heikki Topi (Bentley College, USA), V. Ramesh (Indiana University, USA)
Article 2
Metaschemas for ER, ORM and UML Data Models: A Comparison (pages 20-30)
Terry Halpin (Microsoft Corporation, USA)
Article 3
Regression Testing of Database Applications (pages 31-42)
Ramzi A. Haraty (Lebanese American University in Beirut, Lebanon), Nashat Mansour (Lebanese American University in Beirut, Lebanon), Bassel A. Daou (University of Ottawa, Canada)
Article 4
The Use of Subtypes and Stereotypes in the UML Model (pages 43-50)
Brian Henderson-Sellers (University of Technology-Sydney, Australia)
Issue 3
Article 1
On Conceptual Micro-Object Modeling (pages 1-16)
Cecil E. Chua (Georgia State University, USA), Roger H. Chiang (University of Cincinnati, USA), Ee-Peng Lim (Nanyang Technological University, Singapore)
Article 2
Using Harel's Statecharts to Model Business Workflows (pages 17-34)
Wai Y. Mok (University of Alabama in Huntsville, USA), David Paper (Utah State University, USA)
Article 3
Normalization of Relations with Nulls in Candidate Keys (pages 35-45)
George C. Philip (University of Wisconsin-Oshkosh, USA)
Article 4
Representation and Storage of Motion Data (pages 46-63)
Roy Gelbard (Tel-Aviv University, Israel), Israel Spiegler (Tel-Aviv University, Israel)
Issue 4
Article 1
A Rigorous Approach for Mapping Workflows to Object-Oriented IS Models (pages 1-19)
Staf Joosten (Open University, The Netherlands & Ordina-Anazagoras, The Netherlands), Sandeep Purao (Georgia State University, USA)
Article 2
Dynamic Semantics of UML State Machines: A Metamodeling Perspective (pages 20-38)
Eladio Dominguez (Universidad de Zaragoza, Spain), Angel L. Rubio (Universidad de La Rioja, Spain), Maria A. Zapata (Universidad de Zaragoza, Spain)
Article 3
Online Analytical Mining of Path Traversal Patterns for Web Measurement (pages 39-61)
Joseph Fung (City University of Hong Kong, Hong Kong), H. K. Wong (City University of Hong Kong, Hong Kong)
Article 4
Database Technology for Global Support of a Medical Registry: An Implementation Case (pages 62-73)
Steven A. Conrad (Louisiana State University Health Sciences Center, USA), Binshan Lin (Louisiana State University - Shreveport, USA), Peter T. Rycus (Extracorporeal Life Support Organization, USA)
Volume 12 (2001)
Issue 1
Article 1
Object-Process Methodology Applied to Modeling Credit Card Transactions (pages 4-14)
Dov Dori (Massachusetts Institute of Technology, USA)
Article 2
FOOM - Functional and Object-Oriented Analysis and Design of Information Systems: An Integrated Methodology (pages 15-25)
Peretz Shoval (Ben-Gurion University of Negev, Israel), Judith Kabeli (Ben-Gurion University of Negev, Israel)
Article 3
Unified Modeling Language: A Complexity Analysis (pages 26-34)
Keng Siau (Missouri University of Science and Technology, USA), Qing Cao (University of Nebraska-Lincoln, USA)
Issue 2
Article 1
Using Weakly Structured Documents to Fill in a Classical Database (pages 3-13)
Frederique Laforest (Information Systems Laboratory, France), Andre Flory (Information Systems Laboratory, France)
Article 2
Providing Approximate Answers Using a Knowledge Abstraction Database (pages 14-24)
Soon-Young Huh (Korea Advanced Institute of Science and Technology, Korea), Jung-Whan Lee (SK Telecom, Korea)
Article 3
Hypermedia Document Management: A Metadata and Meta-Information System (pages 25-35)
Woojong Suh (Korea Advanced Institute of Science and Technology, Korea), Heeseok Lee (Korea Advanced Institute of Science and Technology, Korea)
Article 4
Mobile Computing at the Department of Defense (pages 36-48)
James Rodger (Indiana University of Pennsylvania, USA), Parag Pendharkar (Penn State University-Harrisburg, USA), Mehdi Khosrow-Pour (Penn State University-Harrisburg, USA)
Issue 3
Article 1
Mobile Commerce: Promises, Challenges and Research Agenda (pages 4-13)
Keng Siau (Missouri University of Science and Technology, USA), Ee-Peng Lim (Nanyang Technological University, Singapore), Zixing Shen (University of Nebraska-Lincoln, USA)
Article 2
A Prediction-Based Query Processing Strategy in Mobile Commerce Systems (pages 14-26)
Chiang Lee (National Cheng-Kung University, Taiwan), Chih-Horng Ke (National Cheng-Kung University, Taiwan)
Article 3
Mobile Commerce Agents in WAP-Based Services (pages 27-35)
Mihhail Matskin (Norwegian University of Science and Technology, Norway), Amund Tveit (Norwegian University of Science and Technology, Norway)
Article 4
A Framework for Analyzing Mobile Transaction Models (pages 36-47)
Roberto Hirsch (Universidad de Buenos Aires, Argentina), Andres Coratella (Universidad de Buenos Aires, Argentina), Miguel Felder (Universidad de Buenos Aires, Argentina), Eduardo Rodriguez (Universidad de Buenos Aires, Argentina)
Issue 4
Article 1
An Adaptive Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases (pages 3-14)
Latifur Khan (University of Texas-Dallas, USA), Dennis McLeod (University of Southern California-Los Angeles, USA), Cyrus Shahabi (University of Southern California-Los Angeles, USA)
Article 2
A Metadata Oriented Architecture for Building Datawarehouse (pages 15-25)
Heeseok Lee (Korea Advanced Institute of Science and Technology, Korea), Taehun Kim (Korea Advanced Institute of Science and Technology, Korea), Jongho Kim (Korea Advanced Institute of Science and Technology, Korea)
Article 3
The Development of Ordered SQL Packages to Support Data Warehousing (pages 26-39)
Wilfred Ng (Hong Kong University of Science and Technology, Hong Kong), Mark Levene (University of London, UK)
Article 4
Issues in Transaction-Time Temporal Object Database Systems (pages 40-51)
Kjetil Norvag (Norwegian University of Science and Technology, Norway)
Volume 11 (2000)
Issue 1
Article 1
Distributed Database Design for Mobile Geographical Applications (pages 3-15)
Manhoi Choy (Hong Kong University of Science and Technology, Hong Kong), Mei-Po Kwan (Ohio State University, USA), Hong V. Leong (Hong Kong Polytechnic University, Hong Kong)
Article 2
An Enterprise Model Repository: Architecture and System (pages 16-28)
Heeseok Lee (Korea Advanced Institute of Science and Technology, Korea), Jae-Woo Joung (Korea Advanced Institute of Science and Technology, Korea)
Article 3
Rich Base Schema: A Unified Framework for OODB Schema Version Management (pages 29-37)
Sang-Won Lee (Seoul National University, South Korea), Hyoung-Joo Kim (Seoul National University, South Korea)
Issue 2
Article 1
Database Cooperation: Classification and Middleware Tools (pages 3-11)
Paolo Atzeni (Universita di Roma Tre, Italy), Luca Cabibbo (Universita di Roma Tre, Italy), Giansalvatore Mecca (Universita della Basilicata, Italy)
Article 2
Binary Equivalents of Ternary Relationships in Entity-Relationship Modeling: A Logical Decomposition Approach (pages 12-19)
Trevor H. Jones (Duquesne University, USA), Il-Yeol Song (Drexel University, USA)
Article 3
Simplifying the Formulation of a Wide Range of Object-Oriented Complex Queries (pages 20-29)
Reda Alhajj (American University of Sharjah, UAE)
Issue 3
Article 1
Using Business Rules within a Design Process of Active Databases (pages 3-15)
Youssef Amghar (National Institute of Applied Science, France), Madjid Meziane (National Institute of Applied Science, France), Andre Flory (National Institute of Applied Science, France)
Article 2
Benchmarking OODBs with a Generic Tool (pages 16-27)
Jerome Darmont (Univesite Blaise Pascal, France), Michel Schnieder (Univesite Blaise Pascal, France)
Article 3
Performance Evaluation of Parallel S-Trees (pages 28-34)
Eleni Tousidou (Aristotle University, Greece), Michael Vassilakopoulos (Aristotle University, Greece), Yannis Manolopoulos (Aristotle University, Greece)
Issue 4
Article 1
Formal Approaches to Systems Analysis Using UML: An Overview (pages 4-13)
Jon Whittle (NASA Ames Research Center, USA)
Article 2
Extended Spatiotemporal UML: Motivations, Requirements and Constructs (pages 14-27)
Rosanne Price (Monash University, Australia), Nectaria Tryfona (Aalborg University, Denmark), Christian S. Jensen (Aalborg University, Denmark)
Article 3
Understanding the Role of Use Cases in UML: A Review and Research Agenda (pages 28-36)
Brian Dobing (University of Lethbridge, Canada), Jeffrey Parsons (Memorial University of Newfoundland, Canada)
Volume 10 (1999)
Issue 1
Article 1
Methodology of Schema Integration for New Database Applications: A Practitioner’s Approach (pages 2-18)
Joseph Fong (City University of Hong Kong, Hong Kong), Kamalakar Karlapalem (Hong Kong University of Science & Technology, China), Qing Li (Hong Kong Polytechnic University, China), Irene Kwan (Hong Kong Polytechnic University, China)
Article 2
Processing Ill-defined Spatial Operators in Geographic Databases: A Common-sense Approach (pages 19-35)
Ramesh Subramanian (University of Alaska Anchorage, USA)
Article 3
INDUSTRY AND PRACTICE: Solving the Partitioning Problem in Database Design (pages 36-38)
Chun Hung Cheng (The Chinese University of Hong Kong, Hong Kong), Chon-Huat Goh (Rutgers University, USA), Anita Lee-Post (University of Kentucky, USA)
Article 4
Data Mining: New Arsenal For Strategic Decision-making (pages 39-42)
Sufi M. Nazem (University of Nebraska-Omaha, USA), Bongsik Shin (University of Nebraska – Omaha, USA)
Article 5
The Expert’s Opinion (pages 43-44)
Anita Lee-Post (Journal of Database Management, USA)
Issue 2
Article 1
A View-Based Hypermedia Design Methodology (pages 3-13)
Heeseok Lee (Korea Advanced Institute of Science and Technology, Korea), Jongho Kim (Korea Advanced Institute of Science and Technology, Korea), Young Gul Kim (Korea Advanced Institute of Science and Technology, Korea), Seon H. Cho (Wang Computer Korea, South Korea)
Article 2
An Empirical Analysis of the Object-Oriented Database Concurrency Control Mechanism O2C2 (pages 14-26)
David Olsen (Utah State University, USA), Sudha Ram (University of Arizona, USA)
Article 3
Relational Data Modeling for Geographic Information Systems (pages 27-34)
Lawrence A. West Jr. (University of Central Florida, USA), Brian E. Mennecke (East Carolina University, USA)
Article 4
INDUSTRY AND PRACTICE: Data for the Masses (pages 35-37)
Joan Peckham (University of Rhode Island, USA)
Issue 3
Article 1
An Asynchronous Differential Join in Distributed Data Replications (pages 3-12)
Wookey Lee (Sungkyul University, Korea), Jooseok Park (KyungHee University, Korea), Suk-Ho Kang (Seoul National University, Korea)
Article 2
Knowledge and Object-Oriented Approach for Interoperability of Heterogeneous Information Management Systems (pages 13-25)
Chin-Wan Chung (Korea Advanced Institute of Science and Technology, Korea), Chang-Ryong Kim (Korea Advanced Institute of Science and Technology, Korea), Son Dao (Hughes Research Laboratories, USA)
Article 3
Knowledge-Based Systems as Database Design Tools: A Comparative Study (pages 26-40)
W. Amber Lo (Millersville University & Knowledge-Based Systems, Inc., USA), Joobin Choobineh (Texas A&M University, USA)
Article 4
INDUSTRY AND PRACTICE: Another Look at On Time and Within Budget: An Agency Theory Explanation (pages 41-42)
Robert C. Mahaney (University of Kentucky, USA), Albert L. Lederer (University of Kentucky, USA)
Issue 4
Article 1
Data Modeling in UML and ORM: A Comparison (pages 4-13)
Terry Halpin (Visio Corporation, USA), Anthony Bloesch (Visio Corporation, USA)
Article 2
Enhancing the ER Model with Integrity Methods (pages 14-23)
Mira Balaban (Ben-Gurion University of the Negev, Israel), Peretz Shoval (Ben-Gurion University of the Negev, Israel)
Article 3
A Case Study Evaluation of the Use of the Viable System Model in Information Systems Development (pages 24-32)
P. Kawalek (University of Warwick, UK), D.G. Wastell (University of Manchester, UK)
Article 4
CMU-WEB: A Conceptual Model for Designing Usable Web Applications (pages 33-43)
Akhilesh Bajaj (Carnegie Mellon University, USA), Ramayya Krishnan (Carnegie Mellon University, USA)
Article 5
Information Modeling and Method Engineering: A Psychological Perspective (pages 44-50)
Keng Siau (Missouri University of Science and Technology, USA)
Volume 9 (1998)
Issue 1
Article 1
View Maintenance for Materialized Transitive-Closure Relations (pages 3-13)
Ismail H. Toroslu (Middle East Technical University, Turkey)
Article 2
Temporal Interoperability in Multi+Temporal Databases (pages 14-23)
Fabio Grandi (Università degli Studi di Bologna, Italy)
Article 3
A Graphical Interface to Genome Multidatabases (pages 24-32)
Wang Chiew Tan (National University of Singapore, Singapore), Ke Wang (National University of Singapore, Singapore), Limsoon Wong (BioInformatics Centre & Institute of Systems Science, Singapore)
Article 4
INDUSTRY AND PRACTICE: What’s New? The Challenges of Emerging Information Technologies (pages 33-34)
Albert L. Lederer (University of Kentucky, USA), John “Skip” Benamati (Miami University (Ohio), USA)
Article 5
A Practical Perspective on Data Quality Issues (pages 35-37)
Shirley Becker (American University, USA)
Article 6
The Expert’s Opinion (pages 38-39)
Shirley Becker (American University, USA)
Issue 2
Article 1
Desirable Characteristics of Information Resource Dictionary Systems (pages 3-16)
Bijoy Bordoloi (Lingnan College, Hong Kong and University of Texas at Arlington, USA), Sumit Sircar (University of Texas at Arlington, USA), Bharat Lakhanpal (California State University at Fullerton, USA)
Article 2
Natural Language-Enabled Data Modeling: Improving Validation and Integration (pages 17-25)
Alexander Hars (University of Southern California, USA)
Article 3
A Comparative Study of Conceptual Data Modeling Techniques (pages 26-35)
Heeseok Lee (Korea Advanced Institute of Science and Technology, Korea), Byoung Gu Choi (Korea Advanced Institute of Science and Technology, South Korea)
Article 4
INDUSTRY AND PRACTICE: Initiating Change in Documentation Practices (pages 36-38)
Shirley Becker (American University, USA)
Article 5
The Expert’s Opinion: Is the Webmaster Position Becoming Obsolete? (pages 39-40)
Shirley Becker (American University, USA)
Issue 3
Article 1
Discovering Objects: Which Identification and Refinement Strategies Do Analysts Really Use? (pages 3-15)
Christopher G. Jones (Utah Valley State College, USA), Thomas Hilton (Utah State University, USA), Charles M. Lutz (Utah State University, USA)
Article 2
Fault-Tolerant Quorum Consensus Scheme for Replication Control in Mobile Distributed Database Systems: FTQC (pages 16-24)
Siwoo Byun (Korea Advanced Institute of Science and Technology, South Korea), Songchun Moon (Korea Advanced Institute of Science and Technology, South Korea)
Article 3
Database Interfaces: A Conceptual Framework and a Meta-Analysis on Natural Language Studies (pages 25-32)
Hock Chuan Chan (National University of Singapore, Singapore), Lai Huat Lim (National University of Singapore, Singapore)
Article 4
Article 5
Database and the Web (pages 35-36)
Mark Gillenson (University of Memphis, USA)
Article 6
The Expert’s Opinion: A Personal Perspective on the Use of Computing Technology (pages 37-38)
Shirley Becker (American University, USA)
Issue 4
Article 1
A Methodology of Constructing Canonical Form Database Schemas in a Multiple Heterogeneous Database Environment (pages 4-11)
Jeongseok Lim (University of Connecticut, USA), Dong-Guk Shin (University of Connecticut, USA)
Article 2
Integrated Functional and Executional Modeling of Software Using Web-Based Databases (pages 12-21)
Deepak Kulkarni (NASA Ames Research Center, USA), Roberta Blake Marietta (Caelum Research/NASA Ames, USA)
Article 3
Article 4
INDUSTRY AND PRACTICE: Electronic Commerce (pages 31-35)
Asuman Dogac (Middle East Technical University (METU), Turkey)
Volume 8 (1997)
Issue 1
Article 1
Entity-Relationship Modeling and Normalization Errors (pages 4-13)
Douglas B. Bock (Southern Illinois University at Edwardsville, USA)
Article 2
Temporal Object Modeling: Diagramming Conventions and Design Considerations (pages 14-24)
Richard Vidgen (University of Manchester Institute of Science and Technology, UK)
Article 3
On Estimators for Aggregate Relational Algebra Queries (pages 25-36)
Kaizheng Du (Case Western Reserve University, USA), Gultekin Ozsoyoglu (Case Western Reserve University, USA)
Article 4
Issue 2
Article 1
An Analysis of Semantic Overload in Database Access Systems Using Multi-table Query Formulation (pages 3-15)
Sangkyu Rho (Seoul National University, Korea), Salvatore T. March (University of Minnesota, USA)
Article 2
The Schema Mapper: An Expert System that Determines the Least Cost Physical File Structure in a Database Management System (pages 16-22)
Scott J. Lloyd (Eastern Illinois University, USA), Geoffery Steinberg (Kent State University, USA)
Article 3
Semantic Multigranularity Locking for Object-Oriented Database Management Systems (pages 23-33)
Kyoung-In Kwon (Korea Advanced Institute of Science and Technology, South Korea), Songchun Moon (Korea Advanced Institute of Science and Technology, South Korea)
Article 4
INDUSTRY AND PRACTICE: New Direction for Database Management Research (pages 34-35)
Sufi M. Nazem (University of Nebraska at Omaha, USA)
Issue 3
Article 1
Framework for a Geographic Districting DSS using an Intelligent Object-oriented Model (pages 3-15)
Ramesh Subramanian (University of Alaska-Anchorage, USA), Minnie Yen (University of Alaska-Anchorage, USA)
Article 2
A Unified Approach to the Design and Generation of Complex Database Schemata (pages 16-26)
J. Peckham (University of Rhode Island, USA), B. Mackellar (Western Connecticut State University, USA), J. Vorbach (St. John’s University, USA)
Article 3
The Effect of User View Characteristics on Database Design Performance of Novices (pages 27-36)
Dinesh Batra (Florida International University, USA)
Article 4
INDUSTRY AND PRACTICE: Teaching Design to Solve Business Problems (pages 37-38)
Raymond D. Frost (Central Connecticut State University, USA)
Issue 4
Article 1
An Efficient Data Structure for Organizing Multidimensional Data (pages 3-15)
Guang-Ho Cha (Tongmyong University of Information Technology, South Korea), Chin-Wan Chung (Korea Advanced Institute of Science and Technology, Korea)
Article 2
Data Clustering for Effective Mapping of Object Models to Relational Models (pages 16-24)
Narasimha Bolloju (City University of Hong Kong, Hong Kong), Kranti Toraskar (City University of Hong Kong, Hong Kong)
Article 3
A Crash Course in Metaphysics for the Database Designer (pages 25-30)
John M. Artz (George Washington University, USA)
Article 4
INDUSTRY AND PRACTICE: The Changing Mission of the Data/Information Profession (pages 31-35)
Judi Reeder (Data Management Association, USA)
Volume 7 (1996)
Issue 1
Article 1
INCAs: Managing Dynamic Workflows in Distributed Environments (pages 5-15)
Daniel Barbara (Bellcore, USA), Sharad Mehrotra (University of Illinois, USA), Marek Rusinkiewicz (University of Houston, USA)
Article 2
CORBA-Based Run-Time Architectures for Workflow Management Systems (pages 16-27)
J. A. Miller (University of Georgia, USA), A. P. Sheth (University of Georgia, USA), K. J. Kochut (University of Georgia, USA), X. Wang (University of Georgia, USA)
Article 3
Dynamic Integration in Multidatabase Systems (pages 28-40)
Wen-Syan Li (CIMIC, Rutgers University, USA), Chris Clifton (The MITRE Corporation, USA)
Issue 2
Article 1
Where Do Time Constraints Come From? Where Do They Go? (pages 4-11)
Krithi Ramamritham (University of Massachusetts, USA)
Article 2
Concurrency Control for Replicated Data in Distributed Real-Time Systems (pages 12-23)
Sang H. Son (University of Virginia, USA), Fengjie Zhang (University of Virginia, USA), Buhyun Hwang (University of Virginia, USA)
Article 3
The Impact of Network Layer on the Deadline Assignment Strategies in Distributed Real-Time Database Systems (pages 24-33)
Victor C.S. Lee (City University of Hong Kong, Hong Kong), Kam-Yiu Lam (City University of Hong Kong, Hong Kong), Kwok-Wa Lam (City University of Hong Kong, Hong Kong), Joseph K.Y. Ng (Hong Kong Baptist University, Hong Kong)
Issue 3
Article 1
An Efficient Index Structure for Spatial Databases (pages 3-16)
Kap S. Bang (Oklahoma State University, USA), Huizhu Lu (Oklahoma State University, USA)
Article 2
Managing Large Rule-Bases (pages 17-24)
Madhov Moganti (University of Missouri-Rolla, USA), Phanendra Babu Garimella (National University of Singapore, Singapore), Prasad Eswar Bandreddi (Dow Jones Telerate, USA)
Article 3
A Cost Model for Path Expressions in Object-Oriented Queries (pages 25-33)
Cetin Ozkan (Middle East Technical University, Turkey), Asuman Dogac (Middle East Technical University (METU), Turkey), Mehmet Altinel (Middle East Technical University, Turkey)
Article 4
INDUSTRY AND PRACTICE: Why Not SISP Too? (pages 34-35)
Albert L. Lederer (University of Kentucky, USA), Robert Mahaney (Blue Cross/Blue Shield of Kentucky, USA)
Issue 4
Article 1
Technology versus Methodology Support for Database Design: A Study of Designer Choice Related to Perception and Performance (pages 3-13)
Thomas E. Marshall (Auburn University, USA), Michael L. Gibson (Auburn University, USA)
Article 2
A Study of a Generic Schema for Management of Multidatabase Systems (pages 14-20)
Shirley A. Becker (The American University, USA), Rick Gibson (The American University, USA), Nancy L. Leist (Syntek Systems Corporation, Inc., USA)
Article 3
Implementing an Object-Oriented Deductive Database Using Temporal Reasoning (pages 21-34)
Nihan Kesim (Bilkent University, Turkey), Marek Sergot (Imperial College, UK)
Article 4
INDUSTRY AND PRACTICE: Research Issues in Multimedia Databases (pages 35-36)
Hasan Pirkul (University of Texas at Dallas, USA)
Volume 6 (1995)
Issue 1
Article 1
Adaptive Indexing in Very Large Databases (pages 4-13)
Andrew Johnson (Wayne State University, USA), Farshad Fotouhi (Wayne State University, USA)
Article 2
Multiple Query Optimization with Depth-First Branch-and-Bound and Dynamic Query Ordering (pages 14-19)
Ahmet Cosar (University of Minnesota, USA), Ee-Peng Lim (University of Minnesota, USA), Jaideep Srivastava (University of Minnesota, USA)
Issue 2
Article 1
The Information Repository: A Tool for Metadata Management (pages 3-12)
Noushin Ashrafi (University of Massachusetts at Boston, USA), Jean-Pierre Kuilboer (University of Massachusetts at Boston, USA)
Article 2
Implementation of an Interface to Multiple Databases (pages 13-21)
Elizabeth R. Towell (Northern Illinois University, USA), William D. Haseman (University of Wisconsin-Milwaukee, USA)
Article 3
Performance Studies of Locking Protocols for Real-time Databases With Earliest Deadline First (pages 22-32)
Kam-Yiu Lam (City University of Hong Kong, Hong Kong), Sheung-Lun Hung (City University of Hong Kong, Hong Kong), Ken Chee-Keung Law (City University of Hong Kong, Hong Kong)
Article 4
INDUSTRY AND PRACTICE: A Challenge to Database Researchers (pages 33-33)
Hasan Pirkul (The Ohio State University, USA)
Issue 3
Article 1
Naturalness of Graphical Queries Based on the Entity Relationship Model (pages 3-14)
Hock Chuan Chan (National University of Singapore, Singapore)
Article 2
Comparing Object-Oriented and Extended-Entity-Relationship Data Models (pages 15-22)
Bill C. Hardgrave (University of Arkansas, USA), Nikunj P. Dalal (Oklahoma State University, USA)
Article 3
Semantic Resolution in Multi-Database Environments (pages 23-30)
Elizabeth R. Towell (Northern Illinois University, USA), William D. Haseman (University of Wisconsin-Milwaukee, USA)
Article 4
INDUSTRY AND PRACTICE: Object-Oriented Database: How Wide is the Application Range? (pages 31-34)
Mark L. Gillenson (University of Miami, USA)
Issue 4
Article 1
Data Management Issues in Information Systems (pages 3-13)
Carl Stephen Guynes (University of North Texas, USA), Michael T. Vanecek (University of North Texas, USA)
Article 2
Database Pointers in Navigational and Object–Oriented Database Management Systems: A Comparison (pages 14-23)
Mark Gillenson (University of Memphis, USA), Raymond D. Frost (Central Connecticut State University, USA), Michael G. Kilpatrick (University of Miami, USA)
Article 3
Towards a Comprehensive Concurrency Control Mechanism for Object-Oriented Databases (pages 24-35)
David H. Olsen (University of Akron, USA), Sudha Ram (University of Arizona, USA)
Volume 5 (1994)
Issue 1
Article 1
An ER Based Methodology for Modeling User Views and Detecting Derived Relationships (pages 3-17)
Dinesh Batra (Florida International University, USA), Jeffrey A. Hoffer (Indiana University, USA)
Article 2
A Paradigm For Natural Language Explanation Of Database Queries: A Semantic Data Model Approach (pages 18-30)
Vesper Owei (Georgia Institute of Technology, USA), Kunihiko Higa (Georgia Institute of Technology, USA)
Article 3
Knowledge-Based Information Retrieval for Group Decision Support Systems (pages 31-35)
Milam Aiken (University of Mississippi, USA), Chittibabu Govindarajulu (University of Mississippi, USA)
Article 4
INDUSTRY AND PRACTICE: How Clean is your Data? (pages 36-42)
Huw Price (BitbyBit International Ltd., UK)
Issue 2
Article 1
Real-Time Object-Oriented Database Support For Program Stock Trading (pages 3-18)
Victor Fay Wolfe (University of Rhode Island, USA), Kam Fui Lau (University of Rhode Island, USA), Stu Westin (University of Rhode Island, USA)
Article 2
Case Base Management Systems: Providing Database Support to Case-based Reasoners (pages 19-29)
Radha Mahapatra (Texas A&M University, USA), Arun Sen (Texas A&M University, USA)
Article 3
INDUSTRY AND PRACTICE: A Metadata Management System to Support Data Interoperability, Reuse and Sharing (pages 30-42)
Stephanie Cammarata (RAND Corporation, USA), Iris Kameny (RAND Corporation, USA), Judy Lender (RAND Corporation, USA), Corrinne Replogle (RAND Corporation, USA)
Issue 3
Article 1
A Functionality-Oriented Criteria Set for Evaluating Information Resource Dictionary Systems (pages 3-17)
Bijoy Bordoloi (University of Texas at Arlington, USA), Sumit Sircar (University of Texas at Arlington, USA), Craig Slinkman (University of Texas at Arlington, USA), Nitant Chakranarayan (Database Consultants, Inc., USA)
Article 2
From “Make or Buy” to “Make and Buy”: Tailoring Information Systems Through Integration Engineering (pages 18-30)
Karl Kurbel (University of Muenster, Germany), Claus Rautenstrauch (University of Muenster, Germany), Bernhard Opitz (TRIGON Gesellschaft fuer Organisationsberatung und Projektabwicklung mbH, Germany), Rolf Scheuch (TRIGON Gesellschaft fuer Organisationsberatung und Projektabwicklung mbH, Germany)
Article 3
INDUSTRY AND PRACTICE: The Database Designer is a Person Too! (pages 31-35)
John M. Artz (George Washington University, USA)
Issue 4
Article 1
TOS: A Temporal Object-Oriented System (pages 3-15)
Farshad Fotouhi (Wayne State University, USA), Imran Ahmad (Wayne State University, USA), William I. Grosky (Wayne State University, USA), Abad Shah (King Saud University, Kingdom of Saudi Arabia)
Article 2
An Experimental Study of Object-Oriented Query Language and Relational Query Language for Novice Users (pages 16-27)
Chun-Zhi Wu (National University of Singapore, Singapore), Hock-Chuan Chan (National University of Singapore, Singapore), Hock-Hai Teo (National University of Singapore, Singapore), Kwok-Kee Wei (National University of Singapore, Singapore)
Article 3
OO and EER Conceptual Schemas: A Comparison of User Comprehension (pages 28-38)
Peretz Shoval (Ben-Gurion University of the Negev, Israel), Israel Frumermann (Ben-Gurion University of the Negev, Israel)
Article 4
INDUSTRY AND PRACTICE: An Empirical Investigation of the Effectiveness of Object-Oriented Database Design (pages 39-40)
Chetan Sankar (Auburn University, USA), Debasis Rath (Auburn University, USA)
Volume 4 (1993)
Issue 1
Article 1
On Non-Constrained, Constrained and Mandatory Many-to-Many Relationship Types (pages 3-15)
Peretz Shoval (Ben-Gurion University of the Negev, Israel)
Article 2
Effects of Graphical Versus Textual Representation of Database Structure on Query Performance (pages 16-24)
Wesley Jamison (University of Pittsburgh at Greensburg, USA), James T.C. Teng (University of South Carolina, USA)
Article 3
Roles of Resource and Data Contention on the Performance of Replicated Distributed Database Systems (pages 25-38)
Kam-Yiu Lam (City Polytechnic of Hong Kong, Hong Kong), Sheung-Lun Hung (City Polytechnic of Hong Kong, Hong Kong)
Issue 2
Article 1
Lock-Based Concurrency Control in Distributed Real-Time Database Systems (pages 3-17)
Özgür Ulusoy† (Bilkent University, Turkey)
Article 2
A Hypertext Development Methodology (pages 18-29)
Paul J.A. Van Vliet (Oklahoma State University, USA), Rick L. Wilson (Oklahoma State University, USA)
Article 3
Behavioral Aspects of Data Production and Their Impact on Data Quality (pages 30-38)
Dov Te’Eni (Case Western Reserve University, USA)
Article 4
The Expert’s Opinion (pages 39-41)
Robert Marcus (Boeing Computer Services, USA)
Issue 3
Article 1
Database Design Support: An Empirical Investigation of Perceptions and Performance (pages 4-16)
Chetan Sankar (Auburn University, USA), Thomas E. Marshall (Auburn University, USA)
Article 2
The Evolution of the Meta-Data Concept: Dictionaries, Catalogs, and Repositories (pages 17-26)
Mark L. Gillenson (University of Miami, USA), Raymond D. Frost (Central Connecticut State University, USA)
Article 3
Selecting a Database Partitioning Technique (pages 27-39)
Le Gruenwald (The University of Oklahoma, USA), Margaret H. Eich (Southern Methodist University, USA)
Issue 4
Article 1
A Survey of SQL Language (pages 4-16)
Hock Chuan Chan (National University of Singapore, Singapore), Hong Jun Lu (National University of Singapore, Singapore), Kwok Kee Wei (National University of Singapore, Singapore)
Article 2
The Quality of Data Representations Developed by NonExpert Designers: An Experimental Study (pages 17-29)
Dinesh Batra (Florida International University, USA), Peeter J. Kirs (Florida International University, USA)
Article 3
Accuracy in Modeling with Extended Entity Relationship and Object Oriented Data Models (pages 30-39)
Douglas B. Bock (Southern Illinois University at Edwardsville, USA), Terence Ryan (Indiana University at South Bend, USA)
Article 4
INDUSTRY AND PRACTICE: Don’t Forget the People in Database Management! (pages 40-44)
Albert L. Lederer (Oakland University, USA)
Volume 3 (1992)
Issue 1
Article 1
Real World Knowledge for Databases (pages 1-21)
Veda C. Storey (University of Rochester, USA)
Article 2
An Empirical Study on the Determinants of Effective Database Management (pages 22-34)
James T.C. Teng (University of South Carolina, USA), Varun Grover (University of South Carolina, USA)
Article 3
The Expert’s Opinion (pages 35-40)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)
Issue 2
Article 1
Article 2
Performance Comparison of Static vs. Dynamic Two Phase Locking Protocols (pages 12-23)
Sheung-Lun Hung (City Polytechnic of Hong Kong, Hong Kong), Kam-Yiu Lam (City Polytechnic of Hong Kong, Hong Kong)
Article 3
On the Distributed Database Union Operation (pages 24-35)
Rajiv M. Dewan (Northwestern University, USA)
Issue 3
Article 1
DBDesigner: A Tool for Object-Oriented Database Applications (pages 3-11)
Shuguang Hong (Georgia State University, USA), Joshua Duhl (Ontos, Inc., USA), Craig Harris (Ontos, Inc., USA)
Article 2
Data, Knowledge & Information in Database and Knowledge-Based Systems (pages 12-20)
Roger H.L. Chiang (University of Rochester, USA), Terence M. Barron (University of Rochester, USA), Veda C. Storey (University of Rochester, USA)
Article 3
E-R Approach to Distributed Heterogeneous Database Systems for Integrated Manufacturing (pages 21-29)
Hemant Jain (University of Wisconsin-Milwaukee, USA), Mohammed I. Bu-Hulaiga (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Issue 4
Article 1
The Impact of Conceptual Data Models on End-User Performance (pages 4-16)
Prashant Palvia (Memphis State University, USA), Chechen Liao (Memphis State University, USA), Pui-Lai To (Memphis State University, USA)
Article 2
Providing Services to Users Through Data Networks: A Case Study of a Credit Reporting Company (pages 17-26)
Jennifer Gastley (Auburn University, USA), Charles A. Snyder (Auburn University, USA), Chetan Sankar (Auburn University, USA)
Article 3
Object-Oriented System Design (pages 27-37)
John E. Gessford (California State University, Long Beach, USA)
Article 4
The Expert’s Opinion (pages 38-41)
Jeffrey S. Arpan (University of South Carolina, USA)
Volume 2 (1991)
Issue 1
Article 1
Evaluation Criteria for Data Dictionaries (pages 1-6)
Chetan Sankar (Auburn University, USA)
Article 2
Methods for the Identification of Data Outliers in Interactive SQL (pages 7-18)
Ronald Dattero (Florida Atlantic University, USA), Edna M. White (Florida Atlantic University, USA), Marius A. Janson (University of Missouri-St. Louis, USA)
Article 3
Direct Perfect Hashing Functions for External Files (pages 19-29)
M.V. Ramakrishna (Michigan State University, USA), Yuchi Bannai (Canon Inc., Japan)
Article 4
The Expert’s Opinion (pages 30-34)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)
Issue 2
Article 1
Analysis of X.500 Distributed Directory Refresh Strategies (pages 1-14)
David W. Bachmann (The University of Michigan, USA), Kevin H. Klinge (Bellcore, USA), Michael A. Bauer (The University of Western Ontario, Canada), Sailesh Makkapati (The University of Michigan, USA), J. Michael Bennett (The University of Western Ontario, Canada), Jacob Slonim (IBM Canada Laboratory - Toronto, Canada), Guy A. Fasulo (Chevron Information Technology Corporation, USA), Toby J. Teorey (The University of Michigan, USA), Michael H. Kamlet (Bell Laboratories, USA)
Article 2
Using Regression to Compromise Statistical Databases: A Modification of the Attribute Correlation Modeling Approach (pages 15-22)
Myun J. Cheon (University of South Carolina, USA), Patrick R. Philipoom (University of South Carolina, USA)
Article 3
Design and Implementation of a Three-Step Intensional Query Processing Scheme (pages 23-36)
Il-Yeol Song (Drexel University, USA), Hyoung-Joo Kim (Seoul National University, South Korea)
Article 4
The Expert’s Opinion (pages 37-41)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)
Issue 3
Article 1
A Knowledge-Based Approach to Conceptual Information Retrieval from Full Text (pages 1-7)
Inien Syu (University of Central Florida, USA), Sheau-Dong Lang (University of Central Florida, USA)
Article 2
Data Modeling for Non-Standard Data (pages 8-21)
Elizabeth Rose (Carroll College, USA)
Article 3
Meronymic Relationships (pages 22-36)
Veda C. Storey (University of Rochester, USA)
Article 4
The Expert’s Opinion (pages 37-41)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)
Issue 4
Article 1
Article 2
Knowledge Based System and Database Management System: An Integrative Framework (pages 12-26)
G. Premkumar (Iowa State University, USA)
Article 3
Configuring Geographically Distributed Videotex Databases: Model and Solution Procedure (pages 27-37)
Deb Ghosh (Louisiana State University, USA), Mysore Ramaswamy (Louisiana State University, USA)
Article 4
The Expert’s Opinion (pages 38-40)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)
Volume 1 (1990)
Issue 1
Article 1
Human Factors Studies of Database Query Languages: SQL as a Metric (pages 2-11)
Charles Welty (University of Southern Maine, USA)
Article 2
Assuring Database Integrity (pages 12-27)
David Stemple (University of Massachusetts, USA), Eric Simon (INRIA, France), Subhasish Mazumdar (University of Massachusetts, USA), Matthias Jarke (University of Passau, Germany)
Article 3
On Negative Information in Deductive Databases (pages 28-41)
Marek A. Suchenek (The Wichita State University, USA), Rajshekhar Sunderraman (The Wichita State University, USA)
Article 4
The Expert’s Opinion (pages 42-46)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)
Issue 2
Article 1
An Analytical and Empirical Comparison of End-User Logical Database Design Methods (pages 1-17)
Olivia R. Sheng (University of Arizona, USA), Kunihiko Higa (Georgia Institute of Technology, USA)
Article 2
Production Rules for General Database Users (pages 18-29)
Levent V. Orman (Cornell University, USA)
Article 3
Distributed Fragmented Database Set Queries (pages 30-47)
Clive C. Sanford (University of North Texas, USA), Robert E. Markland (University of South Carolina, USA), Patrick R. Philipoom (University of South Carolina, USA), Kenneth Darby-Dowman (The Polytechnic of Central London, UK)
Article 4
The Expert’s Opinion (pages 48-50)
Mohammad Dadashzadeh (Information Resources Management Journal, USA)