default search action
ICSEB 2017: Hong Kong, SAR, China
- Proceedings of the International Conference on Software and e-Business, ICSEB 2017, Hong Kong, December 28-30, 2017. ACM 2017
Data Analysis and Soft Computing
- Foni Agus Setiawan, Eko Kuswardono Budiardjo, T. Basaruddin, Siti Aminah:
A Systematic Literature Review on Combining Ontology with Bayesian Network to Support Logical and Probabilistic Reasoning. 1-12 - Jiaxue Li, Wei Song, Simon Fong:
Real-time Analysis and Visualization for Big Data of Energy Consumption. 13-16 - Kai Shuang, Xintao Ren, Jian Chen, Xiaohan Shan, Peng Xu:
Combining Word Order and CNN-LSTM for Sentence Sentiment Classification. 17-21 - Randell Gimenez, Melvin Gaviola, Mary Jane Sabellano, Ken Gorro:
Emotion Classification of Duterte Administration Tweets Using Hybrid Approach. 22-27 - Joshua L. Lee, Patricia B. Awayan, Eduardo Mendoza:
A Comparative Study: Different Automatic Approaches of Stars Generation for Reviews. 28-32 - Nathar Shah, Chris H. Messom:
Tree Structure for Expressive MapReduce Framework. 33-37
Software design and program development
- Jiaming Fang, Juan Li, Ruping Wang:
Mobile Travel Apps' Adoption: Integrating Perceived Characteristics of Innovation and Software Quality. 38-42 - Umair Sabir, Farooque Azam, Muhammad Waseem Anwar:
A Comprehensive Investigation of Model Driven Architecture (MDA) for Reverse Engineering. 43-48 - Meennapa Rukhiran, Paniti Netinant:
Aspect-Oriented Approach for Supporting House Bookkeeping Software Design. 49-54 - Syed Rizwan, Tiantian Wang, Xiaohong Su, Salahuddin:
Empirical Study on Software Bug Prediction. 55-59 - Yao Wang, Na Li, Feifan Zhang:
A Feature-oriented Domain Design Approach to FX Derivatives Trading System. 60-65 - Wira Zanoramy A. Zakaria, Mohd Faizal Abdollah, Othman Mohd, Aswami Fadillah Mohd Ariffin:
The Rise of Ransomware. 66-70 - Ashraf Saleh, Roesnita Ismail, Norasikin Fabil:
Evaluating Usability for Mobile Application: A MAUEM Approach. 71-77
Computer Information Technology and Applications
- Yoekleng Kuy, Isara Anantavrasilp:
The Effect of Sizes of the Feature Sets on Intrusion Detection Performances. 78-84 - Yazan Alshboul, Kevin Streff:
Beyond Cybersecurity Awareness: Antecedents and Satisfaction. 85-91 - Jyh-Jeng Wu, Shu-Hua Chien, Yu-Peng Lee, Thoung-Han Lee:
Online community support for the marketing of cosmetic medicine. 92-96 - Xia Liu, Shenhao Tu, Run Zhang, Qian Wu, Yuantao Song:
Research on Potential Damage Estimation of Household Appliances Based on gcForest Model. 97-101 - Masayuki Hirayama:
Usability test method for embedded systems Considering with visually impaired. 102-106 - Wen-Hua Chen:
A Comparison of Teachers' Supportive Behaviour in Middle High School Classroom in Taiwan, Shanghai-China, and Finland: Evidence from PISA 2012. 107-112 - Li Qiong, Bo Wang, Hong Wu:
Targeting Algorithm Based on ITSM. 113-116 - Guntur Dharma Putra, Selo Sulistyo:
Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET. 117-122
Business Intelligence and Economic Management
- Yong Wang, Rongbing Hu:
A Research on Modern Commercial Circulation Development Strategies in the Context of New-type Urbanization: A Case Study of Zhejiang Province. 123-127 - Wenxuan Zheng:
Bank Lines of Credit Will Be the Supplement to Cash in Corporate Liqudity Management. 128-132 - Gaurav Gupta, Indranil Bose:
A bibliometric analysis of two decades of research on business models. 133-135
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.