Journal: Information Systems Frontiers

Volume 14, Issue 3

477 -- 479Shiguo Lian, Jean-Henry Morin, Stefanos Gritzalis, Gregory L. Heileman. Special issue on ubiquitous multimedia services
481 -- 497Athanasios Loukas, Dimitrios Damopoulos, Sofia-Anna Menesidou, Maria Eleni Skarkala, Georgios Kambourakis, Stefanos Gritzalis. MILC: A secure and privacy-preserving mobile instant locator with chatting
499 -- 515Ray-I Chang, Te-Chih Wang, Chia-Hui Wang, Jen-Chang Liu, Jan-Ming Ho. Effective distributed service architecture for ubiquitous video surveillance
517 -- 526Yuan Dong, Shiguo Lian. Automatic and fast temporal segmentation for personalized news consuming
527 -- 540Rodrigo Roman, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, Marta Bel. Advanced secure multimedia services for digital homes
541 -- 553Emmanouil A. Panaousis, Christos Politis, Konstantinos Birkos, Christos A. Papageorgiou, Tasos Dagiuklas. Security model for emergency real-time communications in autonomous networks
555 -- 569Evelina Pencheva, Ivaylo Atanasov. Third party application control on quality of service in IP based multimedia networks
571 -- 584Mark Umberger, Satja Lumbar, Iztok Humar. Modeling the influence of network delay on the user experience in distributed home-automation networks
585 -- 600Sayyen Teoh, Shan Ling Pan, Anand Ramchand. Resource management activities in healthcare information systems: A process perspective
601 -- 616Seungwok Han, Hee Yong Youn, Ohyoung Song. Efficient category-based service discovery on multi-agent platform
617 -- 632Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi. Secure XML querying based on authorization graphs
633 -- 645Yung-Ming Li, Jhih-Hua Jhang-Li, Ting-Kai Hwang, Ping-Wen Chen. Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost
647 -- 651Selwyn Piramuthu. Vulnerabilities of RFID protocols proposed in ISF
653 -- 668Namho Lee, Jae Kwon Bae, Chulmo Koo. A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment
669 -- 692Hamideh Afsarmanesh, Simon Samwel Msanjila, Luis M. Camarinha-Matos. Technological research plan for active ageing
693 -- 709She-I Chang, David C. Yen, I-Cheng Chang, Jung-Chu Chou. Study of the digital divide evaluation model for government agencies-a Taiwanese local government's perspective
711 -- 723ChunLin Li, Layuan Li. Collaboration among mobile agents for efficient energy allocation in mobile grid
725 -- 739Maja Stula, Damir Krstinic, Ljiljana Seric. Intelligent forest fire monitoring system
741 -- 764Gary F. Templeton, James F. Dowdy Jr.. CASE-mediated organizational and deutero learning at NASA
765 -- 788Haluk Demirkan, Sagnika Sen, Michael Goul, Jason Nichols. Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows
789 -- 808Jungyub Woo, Nenad Ivezic, Hyunbo Cho. Agile test framework for business-to-business interoperability
809 -- 822Md. Enamul Kabir, Hua Wang, Elisa Bertino. A role-involved purpose-based access control model