


default search action
Journal of Database Management, Volume 16
Volume 16, Number 1, 2005
- Won Kim:

On U.S. Homeland Security and Database Technology. 1-17 - Larry P. English:

Information Quality: Critical Ingredient for National Security. 18-32 - Amit P. Sheth, Boanerges Aleman-Meza, Ismailcem Budak Arpinar, Clemens Bertram, Yashodhan S. Warke, Cartic Ramakrishnan, Chris Halaschek, Kemafor Anyanwu

, David Avant, Fatma Sena Arpinar, Krys J. Kochut:
Semantic Association Identification and Knowledge Discovery for National Security Applications. 33-53 - Paul Thompson:

Text Mining, Names and Security. 54-59 - Mathew Neville Smith, Peter J. H. King:

A Database Interface for Link Analysis. 60-74 - Bhavani Thuraisingham:

Privacy-Preserving Data Mining: Development and Directions. 75-87
Volume 16, Number 2, 2005
- Patrick Martin, Wendy Powley, Min Zheng:

Experimental Study of a Self-Tuning Algorithm for DBMS Buffer Pools. 1-20 - Zhen He

, Jérôme Darmont
:
Evaluating the Dynamic Behavior of Database Applications. 21-45 - Shi-Ming Huang, Binshan Lin, Qun-Shi Deng:

Intelligent Cache Management for Mobile Data Warehouse Systems. 46-65 - Zongmin Ma

:
A Conceptual Design Methodology for Fuzzy Relational Databases. 66-83 - Dinesh Batra

:
Conceptual Data Modeling Patterns: Representation and Validation. 84-106
Volume 16, Number 3, 2005
- Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, Allen S. Parrish:

Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories. 1-20 - Pnina Soffer:

Refinement Equivalence in Model-Based Reuse: Overcoming Differences in Abstraction Level. 21-39 - Keng Siau

, John Erickson, Lihyunn Lee:
Theoretical vs. Practical Complexity: The Case of UML. 40-57 - G. Daryl Nord, Jeretta Horn Nord, Hongjiang Xu

:
An Investigation of the Impact of Organization Size on Data Quality Issues. 58-71 - Zina Ben-Miled, Nianhua Li, Omran A. Bukhres:

BACIIS: Biological and Chemical Information Integration System. 72-85
Volume 16, Number 4, 2005
- Brian Henderson-Sellers, M. K. Serour:

Creating a Dual-Agility Method: The Value of Method Engineering. 1-24 - Mehmet N. Aydin, Frank Harmsen

, Kees van Slooten, R. A. Stagwee:
On the Adaptation of an Agile Information Systems Development Method. 25-40 - Hilkka Merisalo-Rantanen, Tuure Tuunanen, Matti Rossi:

Is Extreme Programming Just Old Wine in New Bottles: A Comparison of Two Cases. 41-61 - Daniel E. Turk, Robert B. France, Bernhard Rumpe

:
Assumptions Underlying Agile Software-Development Processes. 62-87 - John Erickson, Kalle Lyytinen

, Keng Siau
:
Agile Modeling, Agile Software Development, and Extreme Programming: The State of Research. 88-99

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














