-
1
المؤلفون: Sarah Knoop, Ronald Mak, Y. Pan, Shahram Ebadollahi, Xinxin Zhu, Yardena Peres, W. F. Cody, Martin S. Kohn, David Gotz, J. M. Jasinski, Ching-Hua Chen-Ritzo, Reza Yaesoubi, Amnon Shabo, Y. Y. Y. Tao, H. Nelken, Joseph Phillip Bigus, S. Glissmann, Tanveer Syeda-Mahmood, Wang-Chiew Tan, Boaz Carmeli, Cheryl A. Kieliszewski, Sreeram Ramakrishnan, Patricia G. Selinger, Melissa Cefkin, Ariel Farkash, Sondra R. Renly, Michal Rosen-Zvi, Pei-Yun Hsueh, Jianying Hu, Jimeng Sun, Paul P. Maglio, Murray Campbell, Peter J. Haas, James H. Kaufman, Alexandre V. Evfimievski, Henry Chang, Tyrone Grandison, M. J. H. Hsiao, Daniel Gruhl, Hani Neuvirth, Robert Sorrentino, Chalapathy Neti
المصدر: IBM Journal of Research and Development. 55:6:1-6:14
مصطلحات موضوعية: Engineering, Actuarial science, General Computer Science, business.industry, Best practice, eMix, Information technology, Risk analysis (engineering), Analytics, Identity theft, Health care, business, Database transaction, Productivity