Journal articles on the topic 'Electronic spreadsheets. End-user computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Electronic spreadsheets. End-user computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Panko, Raymond R., and Daniel N. Port. "End User Computing." Journal of Organizational and End User Computing 25, no. 3 (2013): 1–19. http://dx.doi.org/10.4018/joeuc.2013070101.
Full textJanvrin, Diane J. "Detecting Spreadsheet Errors: An Education Case." Issues in Accounting Education 23, no. 3 (2008): 435–54. http://dx.doi.org/10.2308/iace.2008.23.3.435.
Full textObrenović, Željko, and Dragan Gašević. "End-User Service Computing: Spreadsheets as a Service Composition Tool." IEEE Transactions on Services Computing 1, no. 4 (2008): 229–42. http://dx.doi.org/10.1109/tsc.2008.16.
Full textRAMAKRISHNAN, C. R., I. V. RAMAKRISHNAN, and DAVID S. WARREN. "XcelLog: a deductive spreadsheet system." Knowledge Engineering Review 22, no. 3 (2007): 269–79. http://dx.doi.org/10.1017/s026988890700118x.
Full textFachini, Ramon Faganello, Kleber Francisco Esposto, and Victor Claudio Bento Camargo. "A framework for development of advanced planning and scheduling (APS) systems in glass container industry." Journal of Manufacturing Technology Management 29, no. 3 (2018): 570–87. http://dx.doi.org/10.1108/jmtm-06-2017-0126.
Full textSisson, Roger L. "Managing microcomputers and end-user computing: Some critical issues." Telematics and Informatics 2, no. 2 (1985): 133–40. http://dx.doi.org/10.1016/s0736-5853(85)80006-x.
Full textYOON, C. Y. "An Evaluation System for End-User Computing Capability in a Computing Business Environment." IEICE Transactions on Information and Systems E91-D, no. 11 (2008): 2607–15. http://dx.doi.org/10.1093/ietisy/e91-d.11.2607.
Full textNedbaylov, A. A. "INFORMATION STRUCTURING FOR SOLVING TASKS IN SPREADSHEET ENVIRONMENT." Informatics and education, no. 2 (April 3, 2019): 42–46. http://dx.doi.org/10.32517/0234-0453-2019-34-2-42-46.
Full textDayal, Aveen, Naveen Paluru, Linga Reddy Cenkeramaddi, Soumya J., and Phaneendra K. Yalavarthy. "Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures." Electronics 10, no. 2 (2021): 182. http://dx.doi.org/10.3390/electronics10020182.
Full textAlfiansyah, Gamasiano, Andar Sifa’il Fajeri, Maya Weka Santi, and Selvia Juwita Swari. "Evaluasi Kepuasan Pengguna Electronic Health Record (EHR) Menggunakan Metode EUCS (End User Computing Satisfaction) di Unit Rekam Medis Pusat RSUPN Dr. Cipto Mangunkusumo." Jurnal Penelitian Kesehatan "SUARA FORIKES" (Journal of Health Research "Forikes Voice") 11, no. 3 (2020): 258. http://dx.doi.org/10.33846/sf11307.
Full textMorkevicius, Nerijus, Algimantas Venčkauskas, Nerijus Šatkauskas, and Jevgenijus Toldinas. "Method for Dynamic Service Orchestration in Fog Computing." Electronics 10, no. 15 (2021): 1796. http://dx.doi.org/10.3390/electronics10151796.
Full textNgowi, Lucas, Ellen Kalinga, and Nerey Mvungi. "Socio-Technical Perspective for Electronic Tax Information System in Tanzania." Tanzania Journal of Engineering and Technology 40, no. 1 (2021): 62–78. http://dx.doi.org/10.52339/tjet.v40i1.714.
Full textSAUTER, VICKI L., and LAURENCE A. MADEO. "AN EXPLORATORY ANALYSIS OF THE NEED FOR USER-ACQUAINTED DIAGNOSTIC SUPPORT SYSTEMS." International Journal of Information Technology & Decision Making 03, no. 03 (2004): 471–91. http://dx.doi.org/10.1142/s0219622004001148.
Full textCha, Hyun-Jong, Ho-Kyung Yang, and You-Jin Song. "A Study on the Design of Fog Computing Architecture Using Sensor Networks." Sensors 18, no. 11 (2018): 3633. http://dx.doi.org/10.3390/s18113633.
Full textZhu, Yong, Chao Huang, Zhihui Hu, Abdullah Al-Dhelaan, and Mohammed Al-Dhelaan. "Blockchain-Enabled Access Management System for Edge Computing." Electronics 10, no. 9 (2021): 1000. http://dx.doi.org/10.3390/electronics10091000.
Full textC. da Silva, Rodrigo A., and Nelson L. S. da Fonseca. "On the Location of Fog Nodes in Fog-Cloud Infrastructures." Sensors 19, no. 11 (2019): 2445. http://dx.doi.org/10.3390/s19112445.
Full textPurwandani, Indah. "Analisa Tingkat Kepuasan Pengguna Elearning Menggunakan EUCS dan Model Delone and McLean." Indonesian Journal on Software Engineering (IJSE) 4, no. 2 (2019): 99–106. http://dx.doi.org/10.31294/ijse.v4i2.5989.
Full textZhang, Jiawei, Ning Lu, Teng Li, and Jianfeng Ma. "Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing." Wireless Communications and Mobile Computing 2021 (September 2, 2021): 1–15. http://dx.doi.org/10.1155/2021/8513869.
Full textKirstein, T., G. Tröster, and P. Lukowicz. "Wearable Systems for Health Care Applications." Methods of Information in Medicine 43, no. 03 (2004): 232–38. http://dx.doi.org/10.1055/s-0038-1633863.
Full textHasson, Mushtaq, Ali A. Yassin, Abdulla J. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, and Hamid Alasadi. "Password authentication scheme based on smart card and QR code." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 1 (2021): 140. http://dx.doi.org/10.11591/ijeecs.v23.i1.pp140-149.
Full textZabala, Alaitz, Raffaele Vitulli, and Xavier Pons. "Impact of CCSDS-IDC and JPEG 2000 Compression on Image Quality and Classification." Journal of Electrical and Computer Engineering 2012 (2012): 1–13. http://dx.doi.org/10.1155/2012/761067.
Full textLi, Cheng, Li Yang, and Jianfeng Ma. "A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model." Wireless Communications and Mobile Computing 2020 (November 17, 2020): 1–16. http://dx.doi.org/10.1155/2020/8825623.
Full textLiu, Zhen, Jiawei Zhang, Yanan Li, and Yuefeng Ji. "Hierarchical MEC Servers Deployment and User-MEC Server Association in C-RANs over WDM Ring Networks." Sensors 20, no. 5 (2020): 1282. http://dx.doi.org/10.3390/s20051282.
Full textMitsis, Giorgos, Eirini Eleni Tsiropoulou, and Symeon Papavassiliou. "Data Offloading in UAV-Assisted Multi-Access Edge Computing Systems: A Resource-Based Pricing and User Risk-Awareness Approach." Sensors 20, no. 8 (2020): 2434. http://dx.doi.org/10.3390/s20082434.
Full textMamidisetti, Gowtham, and Ramesh Makala. "A Proposed Model for Trust Management: Insights from a Simulation Study in the Context of Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 7 (2020): 2983–88. http://dx.doi.org/10.1166/jctn.2020.9121.
Full textQin, Zhenquan, Zanping Cheng, Chuan Lin, Zhaoyi Lu, and Lei Wang. "Optimal Workload Allocation for Edge Computing Network Using Application Prediction." Wireless Communications and Mobile Computing 2021 (March 25, 2021): 1–13. http://dx.doi.org/10.1155/2021/5520455.
Full textXu, Rongxu, Wenquan Jin, and Dohyeun Kim. "Microservice Security Agent Based On API Gateway in Edge Computing." Sensors 19, no. 22 (2019): 4905. http://dx.doi.org/10.3390/s19224905.
Full textCastillo-Cara, Manuel, Edgar Huaranga-Junco, Milner Quispe-Montesinos, Luis Orozco-Barbosa, and Enrique Arias Antúnez. "FROG: A Robust and Green Wireless Sensor Node for Fog Computing Platforms." Journal of Sensors 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/3406858.
Full textShameer, A. P., and A. C. Subhajini. "Quality of Service Aware Resource Allocation Using Hybrid Opposition-Based Learning-Artificial Bee Colony Algorithm." Journal of Computational and Theoretical Nanoscience 16, no. 2 (2019): 588–94. http://dx.doi.org/10.1166/jctn.2019.7775.
Full textLi, Haifeng, Caihui Lan, Xingbing Fu, Caifen Wang, Fagen Li, and He Guo. "A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing." Sensors 20, no. 17 (2020): 4720. http://dx.doi.org/10.3390/s20174720.
Full textAvgeris, Marios, Dimitrios Spatharakis, Dimitrios Dechouniotis, Nikos Kalatzis, Ioanna Roussaki, and Symeon Papavassiliou. "Where There Is Fire There Is SMOKE: A Scalable Edge Computing Framework for Early Fire Detection." Sensors 19, no. 3 (2019): 639. http://dx.doi.org/10.3390/s19030639.
Full textErawantini, Feby, and Nugroho Setyo Wibowo. "Implementasi Rekam Medis Elektronik dengan Sistem Pendukung Keputusan Klinis." Jurnal Teknologi Informasi dan Terapan 6, no. 2 (2019): 75–78. http://dx.doi.org/10.25047/jtit.v6i2.115.
Full textBabu, L. R. Aravind, and J. Saravana Kumar. "A Novel Improved Grey Wolf Optimization Algorithm Based Resource Management Strategy for Big Data Systems." Journal of Computational and Theoretical Nanoscience 18, no. 4 (2021): 1227–32. http://dx.doi.org/10.1166/jctn.2021.9383.
Full textRuan, Jinjia, and Dongliang Xie. "Networked VR: State of the Art, Solutions, and Challenges." Electronics 10, no. 2 (2021): 166. http://dx.doi.org/10.3390/electronics10020166.
Full textRabbani, Imran Mujaddid, Muhammad Aslam, Ana Maria Martinez Enriquez, and Zeeshan Qudeer. "Service Association Factor (SAF) for Cloud Service Selection and Recommendation." Information Technology And Control 49, no. 1 (2020): 113–26. http://dx.doi.org/10.5755/j01.itc.49.1.23251.
Full textMA, Taylor, Bennett CL, Schoen MW, and Hoque S. "Advances in artificial neural networks as a disease prediction tool." Journal of Cancer Research & Therapy 9, no. 1 (2021): 1–11. http://dx.doi.org/10.14312/2052-4994.2021-1.
Full textReal and Araujo. "Navigation Systems for the Blind and Visually Impaired: Past Work, Challenges, and Open Problems." Sensors 19, no. 15 (2019): 3404. http://dx.doi.org/10.3390/s19153404.
Full textSingh, Hardeep, and Dean Sittig. "A Socio-technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks." Applied Clinical Informatics 07, no. 02 (2016): 624–32. http://dx.doi.org/10.4338/aci-2016-04-soa-0064.
Full textB D, Deebak, Fadi Al-Turjman, and Leonardo Mostarda. "A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems." Sensors 19, no. 18 (2019): 3821. http://dx.doi.org/10.3390/s19183821.
Full textBorejko, Tomasz, Krzysztof Marcinek, Krzysztof Siwiec, et al. "NaviSoC: High-Accuracy Low-Power GNSS SoC with an Integrated Application Processor." Sensors 20, no. 4 (2020): 1069. http://dx.doi.org/10.3390/s20041069.
Full textAkasiadis, Charilaos, Vassilis Pitsilis, and Constantine D. Spyropoulos. "A Multi-Protocol IoT Platform Based on Open-Source Frameworks." Sensors 19, no. 19 (2019): 4217. http://dx.doi.org/10.3390/s19194217.
Full textWright, Adam, Angela Ai, Joan Ash, et al. "Clinical decision support alert malfunctions: analysis and empirically derived taxonomy." Journal of the American Medical Informatics Association 25, no. 5 (2017): 496–506. http://dx.doi.org/10.1093/jamia/ocx106.
Full textMamaghani and Salvaggio. "Multispectral Sensor Calibration and Characterization for sUAS Remote Sensing." Sensors 19, no. 20 (2019): 4453. http://dx.doi.org/10.3390/s19204453.
Full textFrnda, Jaroslav, Marek Durica, Jan Nedoma, Stanislav Zabka, Radek Martinek, and Michal Kostelansky. "A Weather Forecast Model Accuracy Analysis and ECMWF Enhancement Proposal by Neural Network." Sensors 19, no. 23 (2019): 5144. http://dx.doi.org/10.3390/s19235144.
Full textPendrill, L. R., A. Allard, N. Fischer, P. M. Harris, J. Nguyen, and I. M. Smith. "Software to Maximize End-User Uptake of Conformity Assessment With Measurement Uncertainty, Including Bivariate Cases. The European EMPIR CASoft Project." NCSL International Measure 13, no. 1 (2021): 58–69. http://dx.doi.org/10.51843/measure.13.1.6.
Full textMahmud, Mahadzer. "Spreadsheet Solutions To Laplace's Equation: Seepage And Flow Net." Jurnal Teknologi, May 11, 1996, 53–67. http://dx.doi.org/10.11113/jt.v25.1008.
Full textFeoh, Gerson, and Putu WidaGunawan. "PENGUKURAN TINGKAT KEPUASAN PENGGUNA SITUS WEB PEMERINTAH (E-GOVERNMENT) KABUPATEN BADUNG." Jurnal Teknologi Informasi dan Komputer 2, no. 2 (2016). http://dx.doi.org/10.36002/jutik.v2i2.149.
Full textChakravarthi, SS, and RJ Kannan. "Detection of anomalies in cloud services using network flowdata analysis." International Journal of Electrical Engineering & Education, February 2, 2020, 002072092090143. http://dx.doi.org/10.1177/0020720920901436.
Full text"Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward." International Journal of Advanced Trends in Computer Science and Engineering 10, no. 3 (2021): 2533–39. http://dx.doi.org/10.30534/ijatcse/2021/1451032021.
Full textLiu, Chia-Hui, Tzer-Long Chen, Chien-Yun Chang, and Zhen-Yu Wu. "A reliable authentication scheme of personal health records in cloud computing." Wireless Networks, August 12, 2021. http://dx.doi.org/10.1007/s11276-021-02743-7.
Full text