Статті в журналах з теми "Agent-oriented information technology"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-41 статей у журналах для дослідження на тему "Agent-oriented information technology".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Dostatni, Ewa, Jacek Diakun, Adam Hamrol, and Waldemar Mazur. "Application of agent technology for recycling‐oriented product assessment." Industrial Management & Data Systems 113, no. 6 (June 21, 2013): 817–39. http://dx.doi.org/10.1108/imds-02-2013-0062.
Повний текст джерелаMasloboev, A. V. "A multi-agent technology for network-centric control information support of regional security." Informacionno-technologicheskij vestnik, no. 2 (July 30, 2018): 92–102. http://dx.doi.org/10.21499/2409-1650-2018-2-92-102.
Повний текст джерелаMusumba, George Wamamu, Ruth Diko Wario, and Patrick Kanyi Wamuyu. "Towards an Agent-Oriented Business Collaboration Model." International Journal of Distributed Artificial Intelligence 10, no. 2 (July 2018): 1–27. http://dx.doi.org/10.4018/ijdai.2018070101.
Повний текст джерелаStenin, A. A., V. P. Pasko, M. A. Soldatova, and I. G. Drozdovich. "MULTI-AGENT LATENT SEMANTIC INTERNET TECHNOLOGY FOR THE FORMATION OF A SUBJECT-ORIENTED KNOWLEDGE MODEL." Radio Electronics, Computer Science, Control, no. 3 (October 9, 2021): 166–74. http://dx.doi.org/10.15588/1607-3274-2021-3-14.
Повний текст джерелаLUCK, MICHAEL. "Foundations of multi-agent systems: issues and directions." Knowledge Engineering Review 12, no. 3 (September 1997): 307–8. http://dx.doi.org/10.1017/s026988899700310x.
Повний текст джерелаAlsetoohy, Omar, and Baker Ayoun. "Intelligent agent technology." Journal of Hospitality and Tourism Technology 9, no. 1 (March 12, 2018): 109–24. http://dx.doi.org/10.1108/jhtt-04-2017-0028.
Повний текст джерелаWu, Chao-Lin, Chun-Feng Liao, and Li-Chen Fu. "Service-Oriented Smart-Home Architecture Based on OSGi and Mobile-Agent Technology." IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews) 37, no. 2 (March 2007): 193–205. http://dx.doi.org/10.1109/tsmcc.2006.886997.
Повний текст джерелаSingh Chowhan, Rahul. "Mobile Agent based Workflow Management System (MAWFMS) for Information Flow and Business Processes." Oriental journal of computer science and technology 11, no. 1 (March 23, 2018): 40–49. http://dx.doi.org/10.13005/ojcst11.01.08.
Повний текст джерелаVerdaasdonk, Peter. "An Object-Oriented Model for Ex Ante Accounting Information." Journal of Information Systems 17, no. 1 (March 1, 2003): 43–61. http://dx.doi.org/10.2308/jis.2003.17.1.43.
Повний текст джерелаDavies, Benjamin, Iza Romanowska, Kathryn Harris, and Stefani A. Crabtree. "Combining Geographic Information Systems and Agent-Based Models in Archaeology: Part 2 of 3." Advances in Archaeological Practice 7, no. 2 (May 2019): 185–93. http://dx.doi.org/10.1017/aap.2019.5.
Повний текст джерелаXia, Xiao Peng, and Guang Sheng Ren. "Research on Manufacturing Execution System Oriented to Agile Manufacturing." Key Engineering Materials 419-420 (October 2009): 397–400. http://dx.doi.org/10.4028/www.scientific.net/kem.419-420.397.
Повний текст джерелаChen, Shang-Yuan. "An Agent-Based Smart Skin for Building Smart Homes." Open House International 32, no. 2 (June 1, 2007): 74–88. http://dx.doi.org/10.1108/ohi-02-2007-b0009.
Повний текст джерелаWang, Min Jie, Y. J. Cai, and W. G. Yan. "Study on Key Technologies of DNC System Oriented Networked Manufacturing." Key Engineering Materials 291-292 (August 2005): 667–72. http://dx.doi.org/10.4028/www.scientific.net/kem.291-292.667.
Повний текст джерелаAfaneh, Suha, and Issam Al Hadid. "Airport Enterprise Service Bus with Three Levels Self-Healing Architecture (AESB-3LSH)." International Journal of Space Technology Management and Innovation 3, no. 2 (July 2013): 1–23. http://dx.doi.org/10.4018/ijstmi.2013070101.
Повний текст джерелаAhn, Jinho. "Novel Directory Service and Message Delivery Mechanism Enabling Scalable Mobile Agent Communication." Mobile Information Systems 4, no. 4 (2008): 333–49. http://dx.doi.org/10.1155/2008/376805.
Повний текст джерелаYi, Zhen Zhen, Ke Zhao, Ya Tao Li, and Wei Xu. "Research on Knowledge-Based Intelligent Tutoring System." Applied Mechanics and Materials 55-57 (May 2011): 1424–29. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.1424.
Повний текст джерелаSusilowati, Wandika Wita, and Suyatno Suyatno. "Teacher competence in implementing higher-order thinking skills oriented learning in elementary schools." Premiere Educandum : Jurnal Pendidikan Dasar dan Pembelajaran 11, no. 1 (June 1, 2021): 1. http://dx.doi.org/10.25273/pe.v11i1.7762.
Повний текст джерелаTan, Siti Sehat, Rima Purnamayan, Adhe Phoppy WE, Sigid Handoko, Catur Oktivian I.H., and Muhammad Yusron. "Institutional strengthening of farmer groups on sustainable intercropping in Majalengka Regency, West Java Province." E3S Web of Conferences 306 (2021): 02038. http://dx.doi.org/10.1051/e3sconf/202130602038.
Повний текст джерелаXu, Xiaoyan, Yi Mei, Yanhong Sun, and Xiaoli Zhu. "Analysis of the Effectiveness of Promotion Strategies of Social Platforms for the Elderly with Different Levels of Digital Literacy." Applied Sciences 11, no. 9 (May 10, 2021): 4312. http://dx.doi.org/10.3390/app11094312.
Повний текст джерелаBardone, Emanuele, and Davide Secchi. "Inquisitiveness: distributing rational thinking." Team Performance Management: An International Journal 23, no. 1/2 (March 14, 2017): 66–81. http://dx.doi.org/10.1108/tpm-10-2015-0044.
Повний текст джерелаMykhailov, Dmytro. "A moral analysis of intelligent decision-support systems in diagnostics through the lens of Luciano Floridi’s information ethics." Human Affairs 31, no. 2 (April 1, 2021): 149–64. http://dx.doi.org/10.1515/humaff-2021-0013.
Повний текст джерелаRojc, Matej, Zdravko Kačič, Marko Presker, and Izidor Mlakar. "TTS-driven Embodied Conversation Avatar for UMB-SmartTV." International Journal of Computers and Communications 15 (April 14, 2021): 1–7. http://dx.doi.org/10.46300/91013.2021.15.1.
Повний текст джерелаCalmet, Jacques, and Marvin Oliver Schneider. "Decision Making Modeled as a Theorem Proving Process." International Journal of Decision Support System Technology 4, no. 3 (July 2012): 1–11. http://dx.doi.org/10.4018/jdsst.2012070101.
Повний текст джерелаMurthy, Uday S., and Guido L. Geerts. "An REA Ontology-Based Model for Mapping Big Data to Accounting Information Systems Elements." Journal of Information Systems 31, no. 3 (May 1, 2017): 45–61. http://dx.doi.org/10.2308/isys-51803.
Повний текст джерелаFan, Ying, and Run Hong Niu. "To tweet or not to tweet? Exploring the effectiveness of service recovery strategies using social media." International Journal of Operations & Production Management 36, no. 9 (September 5, 2016): 1014–36. http://dx.doi.org/10.1108/ijopm-10-2013-0461.
Повний текст джерелаMaffei, Antonio, and Mauro Onori. "Evolvable Production Systems: Environment for New Business Models." Key Engineering Materials 467-469 (February 2011): 1592–97. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.1592.
Повний текст джерелаRincon, Jaime, Vicente Julian, and Carlos Carrascosa. "FLaMAS: Federated Learning Based on a SPADE MAS." Applied Sciences 12, no. 7 (April 6, 2022): 3701. http://dx.doi.org/10.3390/app12073701.
Повний текст джерелаHulchiy, Olesia P., Iryna M. Khomenko, Nadiia M. Zakharova та Olena O. Zelikovska. "ОПЫТ ИСПОЛЬЗОВАНИЯ SMART-ТЕХНОЛОГИЙ В ПОСЛЕДИПЛОМНОМ ОБРАЗОВАНИИ ВРАЧЕЙ ПРОФИЛАКТИЧЕСКОЙ МЕДИЦИНЫ". Information Technologies and Learning Tools 65, № 3 (1 липня 2018): 236. http://dx.doi.org/10.33407/itlt.v65i3.1882.
Повний текст джерелаKaur, Harpreet. "DO WE REALLY NEED COMPUTERS IN CLASSROOM INSTRUCTIONS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 64–66. http://dx.doi.org/10.24297/ijct.v2i3a.2673.
Повний текст джерелаEvans, Lois, Patricia Franks, and Hsuanwei Michelle Chen. "Voices in the cloud: social media and trust in Canadian and US local governments." Records Management Journal 28, no. 1 (March 19, 2018): 18–46. http://dx.doi.org/10.1108/rmj-11-2016-0041.
Повний текст джерелаSingh, Aarti, Anu Sharma, and Nilanjan Dey. "Semantics and Agents Oriented Web Personalization." International Journal of Service Science, Management, Engineering, and Technology 6, no. 2 (April 2015): 35–49. http://dx.doi.org/10.4018/ijssmet.2015040103.
Повний текст джерелаTarovik, O. V., A. G. Topaj, A. B. Krestyantsev, and A. A. Kondratenko. "Arctic Marine Transport System Simulation: Multidisciplinary Approach Fundamentals and Practical Experience." Arctic: Ecology and Economy, no. 1(25) (March 2017): 86–101. http://dx.doi.org/10.25283/2223-4594-2017-1-86-101.
Повний текст джерелаSgurev, Vassil, Vladimir Jotsov, and Mincho Hadjiski. "Intelligent Systems: Methodology, Models, and Applications in Emerging Technologies." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 1 (January 20, 2005): 3–4. http://dx.doi.org/10.20965/jaciii.2005.p0003.
Повний текст джерелаChengqi Zhang*, Ling Guan**, and Zheru Chi. "Introduction to the Special Issue on Learning in Intelligent Algorithms and Systems Design." Journal of Advanced Computational Intelligence and Intelligent Informatics 3, no. 6 (December 20, 1999): 439–40. http://dx.doi.org/10.20965/jaciii.1999.p0439.
Повний текст джерелаZeer, E. F., E. E. Symanyuk, and E. V. Lebedeva. "Transprofessionalism as a Predictor for the Preadaptation of an Agent to the Professional Future." Sibirskiy Psikhologicheskiy Zhurnal, no. 79 (2021): 89–107. http://dx.doi.org/10.17223/17267080/79/6.
Повний текст джерелаScafuto, Isabel Cristina, Priscila Rezende, and Marcos Mazzieri. "International Journal of Innovation - IJI completes 7 years." International Journal of Innovation 8, no. 2 (August 31, 2020): 137–43. http://dx.doi.org/10.5585/iji.v8i2.17965.
Повний текст джерелаKhan, Majid Ali, Shankar K. Vaithianathan, Kresimir Sivoncik, and Ladislau Boloni. "TOWARDS AN AGENT FRAMEWORK FOR GRID COMPUTING." International Journal of Computing, August 1, 2014, 56–62. http://dx.doi.org/10.47839/ijc.2.3.230.
Повний текст джерелаLosh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.
Повний текст джерелаCampbell, Sian Petronella. "On the Record: Time and The Self as Data in Contemporary Autofiction." M/C Journal 22, no. 6 (December 4, 2019). http://dx.doi.org/10.5204/mcj.1604.
Повний текст джерелаAl Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.
Повний текст джерелаCampanioni, Chris. "How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship." M/C Journal 21, no. 5 (December 6, 2018). http://dx.doi.org/10.5204/mcj.1463.
Повний текст джерела