7,194 Hits in 2.9 sec

Guest editors' introduction

Gabriele Kotsis, David Taniar, Ismail Khalil, Eric Pardede
2010 Multimedia tools and applications  
He is a founding editor-in-chief of a number of international journals, including Intl J of Data Warehousing and Mining, Intl J of Business Intelligence and Data Mining, Mobile Information Systems, Journal  ...  ) and at the Copenhagen Business School (2002).  ... 
doi:10.1007/s11042-010-0503-5 fatcat:3c327flxnfgahfqf4j4jzavqqq

Guest Editors' Introduction

Asuman Dogac, Tim McGrath
2008 Journal of Theoretical and Applied Electronic Commerce Research  
Businesses and Government Organizations need to exchange documents to execute transactions with the parties they trade or collaborate with.  ...  Indeed, data interoperability in cross industry applications is handled by the mapping experts and data consultants who understand the semantic meaning of each entity in a specific interface and define  ...  The resulting conceptual model is transferred to XML schema serving as a basis for Web Services design and implementation. OASIS UBL TC Chair, December 2008  ... 
dblp:journals/jtaer/DogacM08 fatcat:ixlzeob765exflhopz6bprzz4e

Guest Editors' Introduction

Neil Jacobstein, Bruce W. Porter
2006 The AI Magazine  
I This editorial introduces the articles published in the AI Magazine special issue on Innovative Applications of Artificial Intelligence (IAAI), based on a selection of papers that appeared in the IAAI  ...  IAAI is the premier venue for learning about AI's impact through deployed applications and emerging AI application technologies.  ...  TEXTAL is currently available as a web service, and is incorporated as the automated structure determination component in the PHENIX crystallographic computing environment. Glenn S.  ... 
doi:10.1609/aimag.v27i3.1888 dblp:journals/aim/JacobsteinP06 fatcat:7t5givr2xzgfjn6zidfeenlrja

Guest Editors' Introduction

George O.M. Yee, Chunming Rong, Laurence T. Yang
2008 Journal of Computer Security  
It contains extended versions of four of the best papers from SSNDS-07. We are pleased to serve as guest editors for this special issue. We summarize each paper as follows.  ...  With the growing impact of the electronic society, security and its related areas privacy and trust, are now fundamentally important to the conduct of business via the Internet, involving the real-time  ...  It contains extended versions of four of the best papers from SSNDS-07. We are pleased to serve as guest editors for this special issue. We summarize each paper as follows.  ... 
doi:10.3233/jcs-2008-16301 fatcat:bxiy7vpus5hctalcmjgflr4g74

Guest Editors' Introduction: Social Computing

Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley
2007 IEEE Intelligent Systems  
It's attracted significant interest from not only researchers in computing and social sciences but also software and online game vendors, Web entrepreneurs, political analysts, and digital-government practitioners  ...  B roadly stated, social computing takes a computational approach to the study and modeling of social interactions and communications.  ...  Acknowledgments We acknowledge the support of research grants from the National Natural Science Foundation of China (60573078 and 60621001), Chinese Academy of Sciences (2F05N01), Chinese Ministry of Science  ... 
doi:10.1109/mis.2007.4338490 fatcat:k7uk5v2zlfd2ne472uqsugqwku

Guest Editor Introduction

Franca Bellarsi
2011 Ecozon@  
Guest Editor Introduction: "Ecospirit: Religion and the Environment"  ...  Acknowledgements Putting together a thematic section as guest-editor-even one devoted to ecospirituality-does not happen without considerable help at the very earthly and pragmatic level.  ...  Secondly, a number of peer reviewers supported Axel and myself by generously giving of their time and expertise despite their very busy lives.  ... 
doi:10.37536/ecozona.2011.2.2.416 fatcat:ewy2s4biivg3tn2uvkmpvh655u

Guest Editors' Introduction: Semantic Web Services

T. Payne, O. Lassila
2004 IEEE Intelligent Systems  
In "Value Webs: Using Ontologies to Bundle Real-World Services," Hans Akkermans and his colleagues present the business perspective of services, described in a formal semantic framework.  ...  ... 
doi:10.1109/mis.2004.29 fatcat:xueqyfa2drb5jdttebll2cfrea

Guest Editors' Introduction: Dependable Agent Systems

M. Greaves, V. Stavridou-Coleman, R. Laddaga
2004 IEEE Intelligent Systems  
The articles in this special issue of IEEE Intelligent Systems deal with this issue and discuss an emerging and exciting new approach to building these most challenging kinds of systems.  ...  computation, and the appearance of a potential solution.  ...  In turn, this connectivity has stimulated the creation of the first generation of Web-oriented software technologies such as Web Services and service-oriented architectures.  ... 
doi:10.1109/mis.2004.44 fatcat:h5bme7aytzey7lmd2c2xsvkyha

Linked Open Government Data [Guest editors' introduction]

Li Ding, Vassilios Peristeras, Michael Hausenblas
2012 IEEE Intelligent Systems  
Both US and UK governments made public commitments toward open data. IEEE INTELLIGENT SYSTEMS  ...  data on the Web, free of charge and with minimal constraints on reuse.  ... 
doi:10.1109/mis.2012.56 fatcat:6orfkkppmzfwldodl6kp5n3bnq

Ontology Issues and Applications Guest Editors' Introduction

Fred Freitas, Heiner Stuckenschmidt, Natalya F. Noy
2005 Journal of the Brazilian Computer Society  
investments to develop this technology and to enhance its applicability in business settings.  ...  Among the several ontology editors that appeared, Protégé [43] , WebODE [3] and OntoStudio (past OntoEdit) [45] can be mentioned as some of the most popular editors.  ... 
doi:10.1007/bf03192372 fatcat:4v655orvdbe6dhobk65mwlqdzu

Guest Editors' Introduction: Internet Data Centers

K. Kant, P. Mohapatra
2004 Computer  
However, the transition to a unified Ethernet fabric requires resolving several major challenges, including efficient implementation of the dominant protocol layers-for example, iSCSI, TCP, RDMA, and SSL-at  ...  the exposure of storage/IPC traffic on the Ethernet.  ...  distribution, Web servers, databases, and application services.  ... 
doi:10.1109/mc.2004.209 fatcat:bjpv7uhu4nfszex2fkz55q3why

Guest Editors' Introduction: Secure or Usable?

L.F. Cranor, S. Garfinkel
2004 IEEE Security and Privacy  
Currently a doctorial candidate at MIT's Computer Science and Artificial Intelligence Laboratory, Garfinkel's research interests include computer security, the usability of secure systems, and information  ...  Contact her through her Web site at Garfinkel is a researcher in the field of computer security and a frequent commentator on information technology.  ... 
doi:10.1109/msp.2004.69 fatcat:lrbvigwlc5efpbauishnjkhggu

Guest Editors' Introduction: Artificial Intelligence for Homeland Security

Hsinchun Chen, Fei-Yue Wang
2005 IEEE Intelligent Systems  
Terrorism became the most significant threat to national security because of its real and potential damage to our infrastructure, economy, and people.  ...  T he tragic events of 11 September 2001, and the subsequent anthrax letter contaminations had drastic effects on many aspects of US society.  ...  Justice/National Institute of Justice for sponsoring the Intelligence and Security Informatics conferences, which have helped foster and build a new community of ISI researchers.  ... 
doi:10.1109/mis.2005.88 fatcat:kf7abimdabbytm2xc2qpkasezq

Guest Editors' Introduction: Intelligent Systems for Interactive Entertainment

D. Goren-Bar, O. Mayora-Ibarra
2006 IEEE Intelligent Systems  
Finally, we thank all those who have helped support this special issue: the authors, reviewers, and IEEE Intelligent Systems' editor in chief and staff. IEEE INTELLIGENT  ...  Submission ✧ IEEE Guest Editors: Lora Aroyo Art Graesser Lewis Johnson  ... 
doi:10.1109/mis.2006.94 fatcat:huz4lxjrnba6ppmphy7facmjdq

Guest Editors' Introduction: Successful Software Product Line Practices

John D. McGregor, Dirk Muthig, Kentaro Yoshimura, Paul Jensen
2010 IEEE Software  
The software product line strategy is a blend of business and technical actions that lets an organization satisfy a wide range of customers, gain leverage with suppliers, meet the threats of substitute  ...  products, and deter other companies seeking to enter the market.  ...  for the Hitachi vignette; and Peter Bell for the System-Forge vignette.  ... 
doi:10.1109/ms.2010.74 fatcat:6satgxasn5eyvfkyklvp4t33hm
« Previous Showing results 1 — 15 out of 7,194 results