Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,162,306 papers from all fields of science
Search
Sign In
Create Free Account
Association of Information Technology Professionals
Known as:
Certified Computer Professional
, DPMA
, Data Processing Management Association
Expand
The Association of Information Technology Professionals (AITP) is a professional association that focuses on information technology education for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
COBOL
Decision Sciences Institute
Health Insurance Portability and Accountability Act
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The coincidence of patent thickets—A comparative analysis
Timo Fischer
,
Philipp Ringler
2015
Corpus ID: 14378816
2014
2014
Legal Validity Metrics for Patent Offices and Law Firms – Recycling of Patent Court Appeal Decisions for Quality Management
C. Laub
2014
Corpus ID: 5836696
Review
2014
Review
2014
Interactive Translation Prediction vs. Conventional Post-editing in Practice: A Study with the CasMaCat Workbench
Germán Sanchis-Trilles
,
Vicente Alabau
,
+13 authors
E. Vidal
2014
Corpus ID: 4805499
We conducted a field trial in computer-assisted professional translation to compare Interactive Translation Prediction (ITP…
Expand
2012
2012
Policy-based spectrum management architecture
J. Boksiner
,
Yuriy Posherstnik
,
+5 authors
M. Sherman
IEEE Military Communications Conference
2012
Corpus ID: 19565258
The Department of Defense (DoD) is developing policy-based spectrum management (PBSM) concepts, architectures, and capabilities…
Expand
2011
2011
A Distributed Algorithm for Dynamic Spectrum Access Using Primary-Prioritised Markov Model
R. Surendran
,
K. Muthumeenakshi
,
S. Radha
International Conference on Process Automation…
2011
Corpus ID: 16612836
The wireless network medium has a large, but finite bandwidth. With increasing wireless network service providers, users, and…
Expand
2003
2003
The construction of BCA in China
Yuanhang Liu
,
Xian Liu
,
Jiubin Ju
International Conference on Computer Networks and…
2003
Corpus ID: 167706222
For cross-certification in the PKI (public key infrastructure), there are many mechanisms in the reality. This paper provides a…
Expand
Review
2002
Review
2002
Validating Instruments in MIS Research 1
D. Straub
2002
Corpus ID: 15656880
Calls for new directions in MIS research bring with them a call for renewed methodological .rigor. This article offers an…
Expand
1999
1999
Power-induced time division on asynchronous channels
J. M. Rulnick
,
N. Bambos
Wirel. Networks
1999
Corpus ID: 31361866
Time division multiple access offers certain well-known advantages over methods such as spread spectrum code division. Foremost…
Expand
Review
1989
Review
1989
Security concerns of system users: a proposed study of user preceptions of the adequacy of security measures
Dale L. Goodhue
,
D. Straub
[] Proceedings of the Twenty-Second Annual Hawaii…
1989
Corpus ID: 62137394
Based on previous work on individuals' attitudes and beliefs about their information systems environment, a theoretical model of…
Expand
Review
1988
Review
1988
Current and future uses of GDSS technology: report on a recent empirical study
D. Straub
,
R. Beauclair
[] Proceedings of the Twenty-First Annual Hawaii…
1988
Corpus ID: 28121454
This study looks at the actual ways in which group decision-support systems (GDSSs) are currently being utilized. The framework…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE