


default search action
IT Professional, Volume 19
Volume 19, Number 1, January - February 2017
- San Murugesan

:
IT Pro 2017: A Look Ahead. 3-5 - George F. Hurlburt

:
Superintelligence: Myth or Pressing Reality? 6-11 - Naser Al-Falahy

, Omar Y. K. Alani
:
Technologies for 5G Networks: Challenges and Opportunities. 12-20 - Karthik Reddy Nalla, Hosam El-Ocla:

Mobile DNUN: Danger Notification and User Navigation. 21-26 - Shu-Man Chang, Yan-Yuen Poon, Chun-Yi Lin, Yung-Hsiu Lin, Ping Pete Chong, Her-Kun Chang:

IT-Enabled Support for Anesthesia Preoperative Evaluation Clinics. 27-33 - Sherif Sakr

:
Big Data Processing Stacks. 34-41 - Mario Silic

, Andrea Back:
Open Source Software Adoption: Lessons from Linux in Munich. 42-47 - Ariel I. La Paz:

How to Become a Strategist CIO. 48-55 - Karim Touloum, Djilali Idoughi, Ahmed Seffah:

User Experience in Service Design: A Case Study from Algeria. 56-58 - Timothy R. Weil:

VPKI Hits the Highway: Secure Communication for the Connected Vehicle Program. 59-63 - Seth Earley:

The Evolving Role of the CDO. 64-69 - George O. Strawn:

IT and Future Unemployment: Part 2. 70-72
Volume 19, Number 2, March - April 2017
- Rajiv Ranjan

, Jedsada Phengsuwan, Philip James
, Stuart L. Barr
, Aad van Moorsel:
Urban Risk Analytics in the Cloud. 4-9 - Ishaya Peni Gambo

, Hettie Abimbola Soriyan:
ICT Implementation in the Nigerian Healthcare System. 12-15 - Chamil Kulatunga, Laurence Shalloo, William Donnelly, Eric Robson, Stepan Ivanov

:
Opportunistic Wireless Networking for Smart Dairy Farming. 16-23 - Darren O'Neill, Cathryn Peoples:

A Web-Based Portal for Assessing Citizen Well-Being. 24-30 - Fayaz Akhtar, Mubashir Husain Rehmani

:
Energy Harvesting for Self-Sustainable Wireless Body Area Networks. 32-40 - Sukhpal Singh

, Inderveer Chana, Maninder Singh
:
The Journey of QoS-Aware Autonomic Cloud Computing. 42-49 - Jorge Pereira, Evaldo O. da Silva, Thaís Batista

, Flávia Coimbra Delicato, Paulo F. Pires, Samee U. Khan
:
Cloud Adoption in Brazil. 50-56 - Akito Monden

, Masateru Tsunoda, Mike Barker, Kenichi Matsumoto:
Examining Software Engineering Beliefs about System Testing Defects. 58-64 - Seth Earley:

Getting Your Data House in Order: Zions Bancorporation Case Study. 66-69 - George O. Strawn, Candace Strawn:

Erich Bloch: Mastermind of Computer Technology and Science Administration. 70-72
Volume 19, Number 3, 2017
- Claudio Giovanni Demartini, Lorenzo Benussi:

Do Web 4.0 and Industry 4.0 Imply Education X.0? 4-7 - Jennifer Q. Trelewicz:

Big Data and Big Money: The Role of Data in the Financial Sector. 8-10 - Maxim Bakaev

:
The Russian Reversal: From Developed to Emerging IT. 11-13 - Saeid Abolfazli, Maria R. Lee:

Mobile Data Analytics. 14-16 - Panagiotis Kasnesis

, Charalampos Z. Patrikakis
, Iakovos S. Venieris:
Changing Mobile Data Analysis through Deep Learning. 17-23 - Muhammad Habib Ur Rehman

, Aisha Batool
, Chee Sun Liew
, Ying Wah Teh
, Atta ur Rehman Khan
:
Execution Models for Mobile Data Analytics. 24-30 - Yunfei Feng

, Carl K. Chang, Ming Hua:
Recognizing Activities of Daily Living to Improve Well-Being. 31-37 - Chiung-I Chang, Jui-Chih Ho:

A Two-Layer Clustering Model for Mobile Customer Analysis. 38-44 - Jonas Sjöström, Pär J. Ågerfalk, Alan R. Hevner:

Scrutinizing Privacy and Accountability in Online Psychosocial Care. 45-51 - Edoardo Patti, Angelo Mollame, David Erba, Daniele Dalmasso, Anna Osello, Enrico Macii, Andrea Acquaviva:

Information Modeling for Virtual and Augmented Reality. 52-60 - Alfredo J. Perez

, Sherali Zeadally, Scott Griffith:
Bystanders' Privacy. 61-65 - Seth Earley:

The Role of the Chief Data Officer: Managing Expectations. 66-69 - George O. Strawn:

IT, Unemployment, and Ideology. 70-72
Volume 19, Number 4, 2017
- Sunil Mithas

, F. Warren McFarlan:
What Is Digital Intelligence? 3-6 - George F. Hurlburt

:
How Much to Trust Artificial Intelligence? 7-11 - Yousef Farhaoui

:
Teaching Computer Sciences in Morocco: An Overview. 12-15 - Haluk Demirkan

, Seth Earley, Robert R. Harmon:
Cognitive Computing. 16-20 - Monideepa Tarafdar, Cynthia Mathis Beath, Jeanne W. Ross:

Enterprise Cognitive Computing Applications: Opportunities and Challenges. 21-27 - Arvind Agarwal

, Balaji Ganesan, Ankush Gupta, Nitisha Jain, Hima Karanam, Arun Kumar, Nishtha Madaan, Vitobha Munigala, Srikanth Tamilselvam:
Cognitive Compliance for Financial Regulations. 28-35 - Christopher Asakiewicz, Edward A. Stohr, Shrey Mahajan, Lalitkumar Pandey:

Building a Cognitive Application Using Watson DeepQA. 36-44 - Cheng Wu, Yiming Wang:

Cognitive Communication in Rail Transit: Awareness, Adaption, and Reasoning. 45-54 - Wei Cai

, Yuanfang Chi, Victor C. M. Leung:
Cognitive Gaming. 55-62 - Seth Earley:

The Problem With AI. 63-67 - Nir Kshetri:

Can Blockchain Strengthen the Internet of Things? 68-72
Volume 19, Number 5, 2017
- Sunil Mithas

, Thomas Kude, Sorel Reisman:
Digitization and Disciplined Autonomy / COMPSAC 2017: Highlights. 4-10 - Nir Kshetri, Jeffrey M. Voas:

Do Crypto-Currencies Fuel Ransomware? 11-15 - Irena Bojanova, Jeffrey M. Voas:

Trusting the Internet of Things. 16-19 - Jason R. C. Nurse, Sadie Creese, David De Roure

:
Security Risk Assessment in Internet of Things Systems. 20-26 - Hokeun Kim

, Edward A. Lee:
Authentication and Authorization for the Internet of Things. 27-33 - Ted H. Szymanski

:
Security and Privacy for a Green Internet of Things. 34-41 - Kaoru Ota

, Teerawat Kumrai
, Mianxiong Dong, Jay Kishigami, Minyi Guo:
Smart Infrastructure Design for Smart Cities. 42-49 - Simon Fong

, Jinan Fiaidhi
, Sabah Mohammed
, Luiz Abel Moutinho:
Managing Diabetes Therapy through Datastream Mining. 50-57 - George O. Strawn, Candace Strawn:

Norbert Wiener: Mastermind of Cybernetics. 58-60 - César A. Collazos, Manuel Ortega

, Antoni Granollers, Huizilopoztli Luna-García, Habib Fardoun:
Usability Evaluation Trends in Ibero-American Countries. 61-64
Volume 19, Number 6, November / December 2017
- San Murugesan

:
Stay Professionally Fit, Always. 4-7 - Nir Kshetri, Jeffrey M. Voas:

The Economics of "Fake News". 8-12 - Bernard Ijesunor Akhigbe, Oyinkansola Onyinyechi Akhigbe, Ishaya Peni Gambo

, Babajide Samuel Afolabi
:
ICT: An Emerging Paradigm for Success in Nigeria. 13-17 - Timothy R. Weil:

IEEE CS 28th Software Technology Conference. 18-20 - George F. Hurlburt

, George K. Thiruvathukal, Maria R. Lee:
The Graph Database: Jack of All Trades or Just Not SQL? 21-25 - Zuopeng Justin Zhang

:
Graph Databases for Knowledge Management. 26-32 - Noa Roy-Hubara, Lior Rokach, Bracha Shapira

, Peretz Shoval:
Modeling Graph Database Schema. 34-43 - Jans Aasman:

Transmuting Information to Knowledge with an Enterprise Knowledge Graph. 44-51 - Fidel Paniagua Diez

, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda
, José María Sierra Camara
:
Modeling XACML Security Policies Using Graph Databases. 52-57 - Shin Morishima, Hiroki Matsutani:

High-Performance with an In-GPU Graph Database Cache. 58-64 - Rick Kuhn, M. S. Raunak, Raghu Kacker:

It Doesn't Have to Be Like This: Cybersecurity Vulnerability Trends. 66-70 - George O. Strawn:

IT and 21st Century Employment. 71-73 - Seth Earley:

The Problem of Personalization: AI-Driven Analytics at Scale. 74-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














