Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

48 49 50
hits: 1,523,465
491.
  • An extension of trust and T... An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry
    Tung, Feng-Cheng; Chang, Su-Chao; Chou, Chi-Min International journal of medical informatics (Shannon, Ireland), 05/2008, Volume: 77, Issue: 5
    Journal Article
    Peer reviewed

    Abstract Purpose Ever since National Health Insurance was introduced in 1995, the number of insurants increased to over 96% from 50 to 60%, with a continuous satisfaction rating of about 70%. ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
492.
Full text
493.
  • Agile supply chain strategy... Agile supply chain strategy and supply chain performance: complementary roles of supply chain practices and information systems capability for agility
    Tarafdar, Monideepa; Qrunfleh, Sufian International journal of production research, 02/2017, Volume: 55, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    The paper examines the mediating effect of supply chain (SC) practices on the relationship between agile supply chain (ASC) strategy and SC performance. It further examines the moderating effect of ...
Full text
Available for: BFBNIB, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
494.
Full text
495.
  • Neutralization: New Insight... Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
    Siponen, Mikko; Vance, Anthony MIS quarterly, 09/2010, Volume: 34, Issue: 3
    Journal Article
    Peer reviewed

    Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers ...
Full text
Available for: BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
496.
  • Data Series Progressive Sim... Data Series Progressive Similarity Search with Probabilistic Quality Guarantees
    Gogolou, Anna; Tsandilas, Theophanis; Echihabi, Karima ... Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, 06/2020
    Conference Proceeding
    Open access

    Existing systems dealing with the increasing volume of data series cannot guarantee interactive response times, even for fundamental tasks such as similarity search. Therefore, it is necessary to ...
Full text
Available for: NUK, UL

PDF
497.
  • Transfer learning for class... Transfer learning for class imbalance problems with inadequate data
    Al-Stouhi, Samir; Reddy, Chandan K. Knowledge and information systems, 07/2016, Volume: 48, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    A fundamental problem in data mining is to effectively build robust classifiers in the presence of skewed data distributions. Class imbalance classifiers are trained specifically for skewed ...
Full text
Available for: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
498.
  • Event stream-based process ... Event stream-based process discovery using abstract representations
    van Zelst, Sebastiaan J.; van Dongen, Boudewijn F.; van der Aalst, Wil M. P. Knowledge and information systems, 02/2018, Volume: 54, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    The aim of process discovery, originating from the area of process mining, is to discover a process model based on business process execution data. A majority of process discovery techniques relies ...
Full text
Available for: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
499.
  • "Blockchain for the IoT: Pr... "Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data"
    Chanson, Mathieu; Bogner, Andreas; Bilgeri, Dominik ... Journal of the Association for Information Systems, 2019, Volume: 20, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    An ever growing variety of smart, connected Internet of Things (IoT) devices poses completely new challenges for businesses regarding security and privacy. In fact, the adoption of smart products may ...
Full text
Available for: CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
500.
  • Using Topsoil Analysis to D... Using Topsoil Analysis to Determine and Map Changes in Ni Co Pollution
    Cetin, Mehmet; Aljama, Akram Mohamed Omar; Alrabiti, Osama B. Muragaa ... Water, air, and soil pollution, 08/2022, Volume: 233, Issue: 8
    Journal Article
    Peer reviewed

    The change in soil quality due to soil pollution significantly affects the ecosystem. The pollutants in the air also pass to the soil after a while, and therefore the soil is also the environment ...
Full text
Available for: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 1,523,465

Load filters