Journal articles on the topic 'Agent-oriented information technology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 41 journal articles for your research on the topic 'Agent-oriented information technology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dostatni, Ewa, Jacek Diakun, Adam Hamrol, and Waldemar Mazur. "Application of agent technology for recycling‐oriented product assessment." Industrial Management & Data Systems 113, no. 6 (June 21, 2013): 817–39. http://dx.doi.org/10.1108/imds-02-2013-0062.
Full textMasloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.
Full textMusumba, George Wamamu, Ruth Diko Wario, and Patrick Kanyi Wamuyu. "Towards an Agent-Oriented Business Collaboration Model." International Journal of Distributed Artificial Intelligence 10, no. 2 (July 2018): 1–27. http://dx.doi.org/10.4018/ijdai.2018070101.
Full textStenin, A. A., V. P. Pasko, M. A. Soldatova, and I. G. Drozdovich. "MULTI-AGENT LATENT SEMANTIC INTERNET TECHNOLOGY FOR THE FORMATION OF A SUBJECT-ORIENTED KNOWLEDGE MODEL." Radio Electronics, Computer Science, Control, no. 3 (October 9, 2021): 166–74. http://dx.doi.org/10.15588/1607-3274-2021-3-14.
Full textLUCK, MICHAEL. "Foundations of multi-agent systems: issues and directions." Knowledge Engineering Review 12, no. 3 (September 1997): 307–8. http://dx.doi.org/10.1017/s026988899700310x.
Full textAlsetoohy, Omar, and Baker Ayoun. "Intelligent agent technology." Journal of Hospitality and Tourism Technology 9, no. 1 (March 12, 2018): 109–24. http://dx.doi.org/10.1108/jhtt-04-2017-0028.
Full textWu, Chao-Lin, Chun-Feng Liao, and Li-Chen Fu. "Service-Oriented Smart-Home Architecture Based on OSGi and Mobile-Agent Technology." IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews) 37, no. 2 (March 2007): 193–205. http://dx.doi.org/10.1109/tsmcc.2006.886997.
Full textSingh Chowhan, Rahul. "Mobile Agent based Workflow Management System (MAWFMS) for Information Flow and Business Processes." Oriental journal of computer science and technology 11, no. 1 (March 23, 2018): 40–49. http://dx.doi.org/10.13005/ojcst11.01.08.
Full textVerdaasdonk, Peter. "An Object-Oriented Model for Ex Ante Accounting Information." Journal of Information Systems 17, no. 1 (March 1, 2003): 43–61. http://dx.doi.org/10.2308/jis.2003.17.1.43.
Full textDavies, Benjamin, Iza Romanowska, Kathryn Harris, and Stefani A. Crabtree. "Combining Geographic Information Systems and Agent-Based Models in Archaeology: Part 2 of 3." Advances in Archaeological Practice 7, no. 2 (May 2019): 185–93. http://dx.doi.org/10.1017/aap.2019.5.
Full textXia, Xiao Peng, and Guang Sheng Ren. "Research on Manufacturing Execution System Oriented to Agile Manufacturing." Key Engineering Materials 419-420 (October 2009): 397–400. http://dx.doi.org/10.4028/www.scientific.net/kem.419-420.397.
Full textChen, Shang-Yuan. "An Agent-Based Smart Skin for Building Smart Homes." Open House International 32, no. 2 (June 1, 2007): 74–88. http://dx.doi.org/10.1108/ohi-02-2007-b0009.
Full textWang, Min Jie, Y. J. Cai, and W. G. Yan. "Study on Key Technologies of DNC System Oriented Networked Manufacturing." Key Engineering Materials 291-292 (August 2005): 667–72. http://dx.doi.org/10.4028/www.scientific.net/kem.291-292.667.
Full textAfaneh, Suha, and Issam Al Hadid. "Airport Enterprise Service Bus with Three Levels Self-Healing Architecture (AESB-3LSH)." International Journal of Space Technology Management and Innovation 3, no. 2 (July 2013): 1–23. http://dx.doi.org/10.4018/ijstmi.2013070101.
Full textAhn, Jinho. "Novel Directory Service and Message Delivery Mechanism Enabling Scalable Mobile Agent Communication." Mobile Information Systems 4, no. 4 (2008): 333–49. http://dx.doi.org/10.1155/2008/376805.
Full textYi, Zhen Zhen, Ke Zhao, Ya Tao Li, and Wei Xu. "Research on Knowledge-Based Intelligent Tutoring System." Applied Mechanics and Materials 55-57 (May 2011): 1424–29. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.1424.
Full textSusilowati, Wandika Wita, and Suyatno Suyatno. "Teacher competence in implementing higher-order thinking skills oriented learning in elementary schools." Premiere Educandum : Jurnal Pendidikan Dasar dan Pembelajaran 11, no. 1 (June 1, 2021): 1. http://dx.doi.org/10.25273/pe.v11i1.7762.
Full textTan, Siti Sehat, Rima Purnamayan, Adhe Phoppy WE, Sigid Handoko, Catur Oktivian I.H., and Muhammad Yusron. "Institutional strengthening of farmer groups on sustainable intercropping in Majalengka Regency, West Java Province." E3S Web of Conferences 306 (2021): 02038. http://dx.doi.org/10.1051/e3sconf/202130602038.
Full textXu, Xiaoyan, Yi Mei, Yanhong Sun, and Xiaoli Zhu. "Analysis of the Effectiveness of Promotion Strategies of Social Platforms for the Elderly with Different Levels of Digital Literacy." Applied Sciences 11, no. 9 (May 10, 2021): 4312. http://dx.doi.org/10.3390/app11094312.
Full textBardone, Emanuele, and Davide Secchi. "Inquisitiveness: distributing rational thinking." Team Performance Management: An International Journal 23, no. 1/2 (March 14, 2017): 66–81. http://dx.doi.org/10.1108/tpm-10-2015-0044.
Full textMykhailov, Dmytro. "A moral analysis of intelligent decision-support systems in diagnostics through the lens of Luciano Floridi’s information ethics." Human Affairs 31, no. 2 (April 1, 2021): 149–64. http://dx.doi.org/10.1515/humaff-2021-0013.
Full textRojc, Matej, Zdravko Kačič, Marko Presker, and Izidor Mlakar. "TTS-driven Embodied Conversation Avatar for UMB-SmartTV." International Journal of Computers and Communications 15 (April 14, 2021): 1–7. http://dx.doi.org/10.46300/91013.2021.15.1.
Full textCalmet, Jacques, and Marvin Oliver Schneider. "Decision Making Modeled as a Theorem Proving Process." International Journal of Decision Support System Technology 4, no. 3 (July 2012): 1–11. http://dx.doi.org/10.4018/jdsst.2012070101.
Full textMurthy, Uday S., and Guido L. Geerts. "An REA Ontology-Based Model for Mapping Big Data to Accounting Information Systems Elements." Journal of Information Systems 31, no. 3 (May 1, 2017): 45–61. http://dx.doi.org/10.2308/isys-51803.
Full textFan, Ying, and Run Hong Niu. "To tweet or not to tweet? Exploring the effectiveness of service recovery strategies using social media." International Journal of Operations & Production Management 36, no. 9 (September 5, 2016): 1014–36. http://dx.doi.org/10.1108/ijopm-10-2013-0461.
Full textMaffei, Antonio, and Mauro Onori. "Evolvable Production Systems: Environment for New Business Models." Key Engineering Materials 467-469 (February 2011): 1592–97. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1592.
Full textRincon, Jaime, Vicente Julian, and Carlos Carrascosa. "FLaMAS: Federated Learning Based on a SPADE MAS." Applied Sciences 12, no. 7 (April 6, 2022): 3701. http://dx.doi.org/10.3390/app12073701.
Full textHulchiy, Olesia P., Iryna M. Khomenko, Nadiia M. Zakharova, and Olena O. Zelikovska. "ОПЫТ ИСПОЛЬЗОВАНИЯ SMART-ТЕХНОЛОГИЙ В ПОСЛЕДИПЛОМНОМ ОБРАЗОВАНИИ ВРАЧЕЙ ПРОФИЛАКТИЧЕСКОЙ МЕДИЦИНЫ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 236. http://dx.doi.org/10.33407/itlt.v65i3.1882.
Full textKaur, Harpreet. "DO WE REALLY NEED COMPUTERS IN CLASSROOM INSTRUCTIONS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 64–66. http://dx.doi.org/10.24297/ijct.v2i3a.2673.
Full textEvans, Lois, Patricia Franks, and Hsuanwei Michelle Chen. "Voices in the cloud: social media and trust in Canadian and US local governments." Records Management Journal 28, no. 1 (March 19, 2018): 18–46. http://dx.doi.org/10.1108/rmj-11-2016-0041.
Full textSingh, Aarti, Anu Sharma, and Nilanjan Dey. "Semantics and Agents Oriented Web Personalization." International Journal of Service Science, Management, Engineering, and Technology 6, no. 2 (April 2015): 35–49. http://dx.doi.org/10.4018/ijssmet.2015040103.
Full textTarovik, O. V., A. G. Topaj, A. B. Krestyantsev, and A. A. Kondratenko. "Arctic Marine Transport System Simulation: Multidisciplinary Approach Fundamentals and Practical Experience." Arctic: Ecology and Economy, no. 1(25) (March 2017): 86–101. http://dx.doi.org/10.25283/2223-4594-2017-1-86-101.
Full textSgurev, Vassil, Vladimir Jotsov, and Mincho Hadjiski. "Intelligent Systems: Methodology, Models, and Applications in Emerging Technologies." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 1 (January 20, 2005): 3–4. http://dx.doi.org/10.20965/jaciii.2005.p0003.
Full textChengqi Zhang*, Ling Guan**, and Zheru Chi. "Introduction to the Special Issue on Learning in Intelligent Algorithms and Systems Design." Journal of Advanced Computational Intelligence and Intelligent Informatics 3, no. 6 (December 20, 1999): 439–40. http://dx.doi.org/10.20965/jaciii.1999.p0439.
Full textZeer, E. F., E. E. Symanyuk, and E. V. Lebedeva. "Transprofessionalism as a Predictor for the Preadaptation of an Agent to the Professional Future." Sibirskiy Psikhologicheskiy Zhurnal, no. 79 (2021): 89–107. http://dx.doi.org/10.17223/17267080/79/6.
Full textScafuto, Isabel Cristina, Priscila Rezende, and Marcos Mazzieri. "International Journal of Innovation - IJI completes 7 years." International Journal of Innovation 8, no. 2 (August 31, 2020): 137–43. http://dx.doi.org/10.5585/iji.v8i2.17965.
Full textKhan, Majid Ali, Shankar K. Vaithianathan, Kresimir Sivoncik, and Ladislau Boloni. "TOWARDS AN AGENT FRAMEWORK FOR GRID COMPUTING." International Journal of Computing, August 1, 2014, 56–62. http://dx.doi.org/10.47839/ijc.2.3.230.
Full textLosh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.
Full textCampbell, Sian Petronella. "On the Record: Time and The Self as Data in Contemporary Autofiction." M/C Journal 22, no. 6 (December 4, 2019). http://dx.doi.org/10.5204/mcj.1604.
Full textAl Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.
Full textCampanioni, Chris. "How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship." M/C Journal 21, no. 5 (December 6, 2018). http://dx.doi.org/10.5204/mcj.1463.
Full text