Economics at your fingertips  

Journal of Database Management (JDM)

1990 - 2016

Current editor(s): Keng Siau

From IGI Global
Series data maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 27, issue 4, 2016

Inherent Fusion: Towards Scalable Multi-Modal Similarity Search pp. 1-23 Downloads
Petra Budikova, Michal Batko, David Novak and Pavel Zezula
Model Driven Engineering for Quality of Service Management: A Research Note on the Case of Real-Time Database Management Systems pp. 24-38 Downloads
Salwa M'barek, Leila Baccouche and Henda Ben Ghezala
Technology-Mediated Synchronous Virtual Education: An Empirical Study pp. 39-63 Downloads
Xiaofeng Chen and Keng Siau

Volume 27, issue 3, 2016

Path Expressions in SQL: A User Study on Query Formulation pp. 1-22 Downloads
Marko Junkkari, Johanna Vainio, Kati Iltanen, Paavo Arvola, Heidi Kari and Jaana Kekäläinen
Understanding Gender Differences in Media Perceptions of Hedonic Systems: A Comparison of 2D versus 3D Media pp. 23-37 Downloads
Fiona Fui-Hoon Nah and Brenda Eschenbrenner
An Empirical Investigation of the Perceived Benefits of Agile Methodologies Using an Innovation-Theoretical model pp. 38-63 Downloads
Nancy A. Bonner, Nisha Kulangara, Sridhar Nerur and James. T. C. Teng

Volume 27, issue 2, 2016

A Novel Approach to Managing the Dynamic Nature of Semantic Relatedness pp. 1-26 Downloads
Youngseok Choi, Jungsuk Oh and Jinsoo Park
Towards a Normal Form and a Query Language for Extended Relations Defined by Regular Expressions pp. 27-48 Downloads
András Benczúr and Gyula I. Szabó
Predicting Software Abnormal State by using Classification Algorithm pp. 49-65 Downloads
Yongquan Yan and Ping Guo

Volume 27, issue 1, 2016

Agility Facilitators for Contemporary Software Development pp. 1-28 Downloads
Dinesh Batra, Weidong Xia and Shekhar Rathor
Dealing with Dangerous Data: Part-Whole Validation for Low Incident, High Risk Data pp. 29-57 Downloads
Cecil Eng Huang Chua and Veda C. Storey
Cognitive Neuroscience in Information Systems Research pp. 58-73 Downloads
Yeli Zhao and Keng Siau

Volume 26, issue 4, 2015

Adoption and Use of Open Source Infrastructure Software by Large Corporations: The Case of MySQL pp. 1-17 Downloads
RadhaKanta Mahapatra, Rashid Manzar and Vikram S. Bhadauria
Parallel Skyline Computation Exploiting the Lattice Structure pp. 18-43 Downloads
Markus Endres and Werner Kießling
An Emergent Model of End-users' Acceptance of Enterprise Resource Planning Systems: A Grounded Theory Approach pp. 44-66 Downloads
Fiona Fui-Hoon Nah and Xin Tan

Volume 26, issue 3, 2015

Parallel GPU-based Plane-Sweep Algorithm for Construction of iCPI-Trees pp. 1-20 Downloads
Witold Andrzejewski and Pawel Boinski
Considering User Intention in Differential Graph Queries pp. 21-40 Downloads
Elena Vasilyeva, Maik Thiele, Christof Bornhövd and Wolfgang Lehner
Temporal Data Management and Processing with Column Oriented NoSQL Databases pp. 41-70 Downloads
Yong Hu and Stefan Dessloch
Scaling with Confidence: Entity Resolution under Weighted Constraints pp. 71-91 Downloads
Qing Wang and Zeyu Shen

Volume 26, issue 2, 2015

Modeling and Implementing Scientific Hypothesis pp. 1-13 Downloads
Fabio Porto, Ramon G. Costa, Ana Maria de C. Moura and Bernardo Gonçalves
A Novel Multidimensional Approach to Integrate Big Data in Business Intelligence pp. 14-31 Downloads
Alejandro Maté, Hector Llorens, Elisa de Gregorio, Roberto Tardío, David Gil, Rafa Muñoz-Terol and Juan Trujillo
A Distributed System for The Management of Fine-grained Provenance pp. 32-47 Downloads
Salmin Sultana and Elisa Bertino
Discovering and Analysing Ontological Models From Big RDF Data pp. 48-61 Downloads
Carlos R. Rivero, Inma Hernández, David Ruiz and Rafael Cochuelo

Volume 26, issue 1, 2015

Benchmark for Approximate Query Answering Systems pp. 1-29 Downloads
Francesco Di Tria, Ezio Lefons and Filippo Tangorra
Using Temporal Versioning and Integrity Constraints for Updating Geographic Databases and Maintaining Their Consistency pp. 30-59 Downloads
Wassim Jaziri, Najla Sassi and Dhouha Damak
From Data Quality to Big Data Quality pp. 60-82 Downloads
Carlo Batini, Anisa Rula, Monica Scannapieco and Gianluigi Viscusi

Volume 25, issue 4, 2014

A Scalable Algorithm for One-to-One, Onto, and Partial Schema Matching with Uninterpreted Column Names and Column Values pp. 1-16 Downloads
Boris Rabinovich and Mark Last
Data Modeling: An Ontological Perspective of Pointers pp. 17-37 Downloads
Hock Chuan Chan, Chuan-Hoo Tan and Hock-Hai Teo
SEDRIS Transmittal Storing and Retrieval System using Relational Databases pp. 38-65 Downloads
Yongkwon Kim, Heejung Yang and Chin-Wan Chung

Volume 25, issue 3, 2014

Novice Designer Performance Comparison Between the Entity Relationship Event Network and the Event-Based Logical Relational Design Techniques pp. 1-27 Downloads
Dinesh Batra and Nicole Wishart
Improving Business Intelligence Traceability and Accountability: An Integrated Framework of BI Product and Metacontent Map pp. 28-47 Downloads
Chin-Hoong Chee, William Yeoh, Shijia Gao and Gregory Richards
Privacy-Preserving Outsourced Similarity Search pp. 48-71 Downloads
Stepan Kozak, David Novak and Pavel Zezula

Volume 25, issue 2, 2014

Enabling Resource Access Visibility for Automated Enterprise Services pp. 1-28 Downloads
Kaushik Dutta and Debra VanderMeer
Mindfully Experimenting with IT: Cases on Corporate Social Media Introduction pp. 29-51 Downloads
Robin S. Poston and William J. Kettinger
Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation pp. 52-74 Downloads
Han Li, Krishnamurty Muralidhar, Rathindra Sarathy and Xin (Robert) Luo

Volume 25, issue 1, 2014

Compression Schemes with Data Reordering for Ordered Data pp. 1-28 Downloads
Chun-Hee Lee and Chin-Wan Chung
Information Extraction from Microarray Data: A Survey of Data Mining Techniques pp. 29-58 Downloads
Alessandro Fiori, Alberto Grand, Giulia Bruno, Francesco Gavino Brundu, Domenico Schioppa and Andrea Bertotti
User Resistance to Software Migration: The Case on Linux pp. 59-79 Downloads
Hee-Woong Kim, Hock Chuan Chan and So-Hyun Lee

Volume 24, issue 4, 2013

Improving Sequence Diagram Modeling Performance: A Technique Based on Chunking, Ordering, and Patterning pp. 1-25 Downloads
Thant Syn and Dinesh Batra
The Impact of Conflict Judgments between Developers and Testers in Software Development pp. 26-50 Downloads
Xihui Zhang, Jasbir S. Dhaliwal, Mark L. Gillenson and Thomas F. Stafford
CAM: A Conceptual Modeling Framework based on the Analysis of Entity Classes and Association Types pp. 51-80 Downloads
Sofia J. Athenikos and Il-Yeol Song

Volume 24, issue 3, 2013

Design Science Research: The Road Traveled and the Road That Lies Ahead pp. 1-8 Downloads
Matti Rossi, Ola Henfridsson, Kalle Lyytinen and Keng Siau
Using the Viable System Model for Methodical Assessment of Variety in Organizations: The Story of Designing a Method pp. 9-30 Downloads
Christoph Rosenkranz and Roland Holten
An Information Systems Design Theory for an Expert System for Training pp. 31-50 Downloads
Juan Manuel Gómez Reynoso, Lorne Olfman, Terry Ryan and Tom Horan
Truth or Dare: The Ontology Question in Design Science Research pp. 51-66 Downloads
Sandeep Purao

Volume 24, issue 2, 2013

Modeling Data for Enterprise Systems with Memories pp. 1-12 Downloads
Tamara Babaian and Wendy Lucas
Cross-Correlation Measure for Mining Spatio-Temporal Patterns pp. 13-34 Downloads
James Ma, Daniel Zeng, Huimin Zhao and Chunyang Liu
Investigating Goal-Oriented Requirements Engineering for Business Processes pp. 35-71 Downloads
Geert Poels, Ken Decreus, Ben Roelens and Monique Snoeck

Volume 24, issue 1, 2013

Automated Insertion of Exception Handling for Key and Referential Constraints pp. 1-19 Downloads
Kaiping Liu, Hee Beng Kuan Tan and Xu Chen
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph pp. 20-35 Downloads
Kaiping Liu, Hee Beng Kuan Tan and Xu Chen
Development of an E-Healthcare Information Security Risk Assessment Method pp. 36-57 Downloads
June Wei, Binshan Lin and Meiga Loho-Noya
Page updated 2017-09-29