Results 1 - 10
of
236,999
Formal Ontology and Information Systems
, 1998
"... Research on ontology is becoming increasingly widespread in the computer science community, and its importance is being recognized in a multiplicity of research fields and application areas, including knowledge engineering, database design and integration, information retrieval and extraction. We sh ..."
Abstract
-
Cited by 897 (11 self)
- Add to MetaCart
shall use the generic term information systems, in its broadest sense, to collectively refer to these application perspectives. We argue in this paper that so-called ontologies present their own methodological and architectural peculiarities: on the methodological side, their main peculiarity
A framework for information systems architecture.
- IBM Syst. J.,
, 1987
"... With increasing size and complexity of the implementations of information systems, it is necessary to use some logical construct (or architecture) for defining and controlling the interfaces and the integration of all of the components of the system. This paper defines information systems architect ..."
Abstract
-
Cited by 546 (0 self)
- Add to MetaCart
With increasing size and complexity of the implementations of information systems, it is necessary to use some logical construct (or architecture) for defining and controlling the interfaces and the integration of all of the components of the system. This paper defines information systems
Mediators in the architecture of future information systems
- IEEE COMPUTER
, 1992
"... The installation of high-speed networks using optical fiber and high bandwidth messsage forwarding gateways is changing the physical capabilities of information systems. These capabilities must be complemented with corresponding software systems advances to obtain a real benefit. Without smart softw ..."
Abstract
-
Cited by 1135 (20 self)
- Add to MetaCart
The installation of high-speed networks using optical fiber and high bandwidth messsage forwarding gateways is changing the physical capabilities of information systems. These capabilities must be complemented with corresponding software systems advances to obtain a real benefit. Without smart
A Set Of Principles For Conducting And Evaluating Interpretive Field Studies In Information Systems
, 1999
"... This article discusses the conduct and evaluation of interpretive research in information systems. While the conventions for evaluating information systems case studies conducted according to the natural science model of social science are now widely accepted, this is not the case for interpretive f ..."
Abstract
-
Cited by 914 (6 self)
- Add to MetaCart
This article discusses the conduct and evaluation of interpretive research in information systems. While the conventions for evaluating information systems case studies conducted according to the natural science model of social science are now widely accepted, this is not the case for interpretive
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
, 2002
"... We describe a peer-to-peer system which has provable consistency and performance in a fault-prone environment. Our system routes queries and locates nodes using a novel XOR-based metric topology that simplifies the algorithm and facilitates our proof. The topology has the property that every message ..."
Abstract
-
Cited by 834 (3 self)
- Add to MetaCart
message exchanged conveys or reinforces useful contact information. The system exploits this information to send parallel, asynchronous query messages that tolerate node failures without imposing timeout delays on users.
Paradox lost? Firm-level evidence on the returns to information systems.
- Manage Sci
, 1996
"... T he "productivity paradox" of information systems (IS) is that, despite enormous improvements in the underlying technology, the benefits of IS spending have not been found in aggregate output statistics.One explanation is that IS spending may lead to increases in product quality or varie ..."
Abstract
-
Cited by 465 (23 self)
- Add to MetaCart
T he "productivity paradox" of information systems (IS) is that, despite enormous improvements in the underlying technology, the benefits of IS spending have not been found in aggregate output statistics.One explanation is that IS spending may lead to increases in product quality
The DeLone and McLean model of information systems success: a ten-year update
- JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
, 2003
"... ..."
The Nature of Theory in Information Systems
- MIS Quarterly
, 2006
"... The aim of this research essay is to examine the structural nature of theory in information systems. Despite the importance of theory, questions relating to its form and structure are neglected in comparison with questions relating to epistemology. The essay addresses issues of causality, explanatio ..."
Abstract
-
Cited by 289 (6 self)
- Add to MetaCart
The aim of this research essay is to examine the structural nature of theory in information systems. Despite the importance of theory, questions relating to its form and structure are neglected in comparison with questions relating to epistemology. The essay addresses issues of causality
The protection of information in computer systems
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract
-
Cited by 824 (2 self)
- Add to MetaCart
of protecting information in computers. Access The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians. Access control list A list of principals that are authorized to have access to some object. Authenticate To verify the identity of a person
Managing Trust in a Peer-2-Peer Information System
, 2001
"... Managing trust is a problem of particular importance ...In this paper we illustrate that the problem needs to be addressed at both the data management and the semantic, i.e. trust management, level and we devise a method of how trust assessments can be performed by using at both levels scalable peer ..."
Abstract
-
Cited by 397 (26 self)
- Add to MetaCart
peer-to-peer mechanisms. We expect that such methods are an important factor if fully decentralized peer-to-peer systems should become the platform for more serious applications than simple file exchange
Results 1 - 10
of
236,999