Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 106 matches
- 1995
- Frédéric Adam, Ciaran Murphy, Martin Fahy:
Cumulative research in DSS: A practical example. ECIS 1995: 1225-1234 - Amir Albadvi, James Backhouse:
A method for dynamic systems development. ECIS 1995: 851-864 - David K. Allen:
IS strategy formulation in higher education institutions. ECIS 1995: 1045-1052 - Kemal Altinkemer, M. U. Kaiwani:
Selected issues in the design and pricing of virtual reality. ECIS 1995: 627-634 - David Ambaye, Alison Hayman:
Causes of IT failures in teams. ECIS 1995: 1181-1192 - Rafael Andreu, J. E. Richard, Josep Valor:
Business process re-engineering: A new framework and a field study in Spain. ECIS 1995: 1039-1044 - Trislyn S. L. Ang, David Arnott, Peter A. O'Donnell:
An approach for supporting problem formulation in decision support development. ECIS 1995: 1009-1016 - T. Auer:
Beyond IS implementation: A skill-based approach to IS use. ECIS 1995: 193-206 - Chrisanthi Avgerou, Paul Frissen, Dag Wiese Schartum, John Taylor, Geoff Walsham:
Panel: Information systems and public administration reform: Contributions from European research programmes. ECIS 1995: 1293 - Barbro Back, Guido Osteroom, Kaisa Sere, Michiel C. van Wezel:
Intelligent IS within business: bankruptcy predictions using neural networks. ECIS 1995: 99-112 - James Backhouse, Gurpreet Dhillon:
Electronic thesaurus for clinical terms: A methodological approach. ECIS 1995: 591-600 - George J. Bakehouse, Sam J. Waters:
Information management problem classification and error modelling in IS. ECIS 1995: 1031-1038 - Megan Baker, Anne C. Rouse:
Getting and Keeping software quality certification: Some associated issues. ECIS 1995: 1077-1086 - Joan A. Ballantine, Robert D. Galliers, Philip Powell:
Daring to be different: Capital appraisal and technology investments. ECIS 1995: 87-98 - Stuart J. Barnes:
The development of a context and process model of IS introduction and evaluation. ECIS 1995: 1257-1275 - Jacques-André Bartoli, Jean-Louis Le Moigne, Walter Baets, G. Colombo, M. Da Costa Martins, Jean-Louis Ermine, José Parets-Llorca, M. Singh:
Panel: Strategic information systems: The design of intelligent organizations. ECIS 1995: 1279-1281 - Richard L. Baskerville, Jan Pries-Heje:
Grounding the theory in action research. ECIS 1995: 837-850 - Erik F. Bassie, Jos J. M. Trienekens, A. T. M. Aerts, Paul M. J. Giesberts:
Quality assurance software application requirements (QUASAR) for industrial manufacturing. ECIS 1995: 1087-1094 - D. Bechard, Henri Barki, Jon Hartwick:
An assessment of equity and user information satisfaction in an IS development context. ECIS 1995: 235-246 - Paul Belleflamme:
Electronic data interchange links as a form of vertical restraints. ECIS 1995: 1053-1060 - Birgitta Bergvall-Kåreborn, Anita Grahn:
Evaluating normative aspects in systems design. ECIS 1995: 979-984 - Paul Beynon-Davies:
IS failure and risk assessment: The case of the London ambulance service computer-aided dispatch system. ECIS 1995: 1153-1170 - Subach Bhatnagar:
IT for technology and development: Search for a role model. ECIS 1995: 367-378 - Tim Brady, David Targett:
Strategic use of information in retail value chains. ECIS 1995: 615-626 - Hans Ulrich Buhl, Gerhard Satzger, Andrea Wirth:
An optimization approach integrating technical and financial objectives. ECIS 1995: 337-352 - Janice M. Burn, Gert Jan Hofstede, Ernest Jordan, Malcolm Sainsbury, Panagiotis Lybereas:
Panel: Effective transfer and diffusion of information technology across multi-cultural environments. ECIS 1995: 1299-1300 - Sven A. Carlsson, Dorothy E. Leidner, Joyce J. Elam:
The impacts of executive IS use: A cross-cultural study of Swedish and US executives. ECIS 1995: 391-404 - Angèle L. M. Cavaye:
Leveraging a strategic IS across European national boundaries. ECIS 1995: 379-390 - Angèle L. M. Cavaye, J. K. Christiansen:
A framework for estimating power of subunits to explain IS implementation. ECIS 1995: 293-306 - H. K. Cheung, Janice M. Burn:
Managing the effective transformation of IS services structures in multinational companies. ECIS 1995: 453-470
skipping 76 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 07:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint