Abstract is missing.
- A Contextual Data Selection Tool for an Enhanced Business Process AnalysisPierre-Aymeric Masse, Nassim Laga, Jacques Simonin. 1-8 [doi]
- Towards a Hybrid Deep-Learning Method for Music Classification and Similarity MeasurementHanchao Li, Xiang Fei, Kuo-Ming Chao, Ming Yang, Chaobo He. 9-16 [doi]
- A Framework for Criminal Network Analysis Using Big DataMd Ileas Pramanik, Wenping Zhang, Raymond Y. K. Lau, Chunping Li. 17-23 [doi]
- FEATURE: New Product Development Using Feature-Drift Based Framework for Unique Aspect RecommendationMonireh Alsadat Mirtalaie, Omar Khadeer Hussain, Elizabeth Chang. 24-31 [doi]
- Applying Probabilistic Model Checking to Express Delivery Location Selection and OptimizationYonghua Zhu, Xiaoyi Xue, Kai Zhang, Shunyi Mao, Honghao Gao. 32-39 [doi]
- A Web of Things Based Device-Adaptive Service Composition FrameworkJunjie Mao, Hongming Cai, Wei Wang, Chenxi Huang, Fengming Chen, Boyi Xu. 40-47 [doi]
- A Secure Anonymous Authentication Scheme for Electronic Medical Records SystemsWenjin Lei, Yidong Li, Yingpeng Sang, Hong Shen. 48-55 [doi]
- An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector MachinePing Wang, Kuo-Ming Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo. 56-63 [doi]
- Clustering-Based Algorithms to Semantic Summarizing Graph with Multi-attributes' Hierarchical StructuresChong Sun, Xiantao Cai, Yiran Hu, Wen Ying Chen, Jun Tie. 64-70 [doi]
- Cloud for e-Learning: Determinants of Its Adoption by University Students in a Developing CountryAbdulwahab Ali Almazroi, Haifeng Shen, Kung-Keat Teoh, Muhammad Ali Babar. 71-78 [doi]
- Automatic Document Exchange: Semantic Inference on a Received Tabular DocumentShuo Yang, Jingzhi Guo. 79-84 [doi]
- K-Anonymity through the Enhanced Clustering MethodMd Ileas Pramanik, Raymond Y. K. Lau, Wenping Zhang. 85-91 [doi]
- Predicting and Visualizing Consumer Sentiments in Online Social MediaLiqiao Zhang, Hui Yuan, Raymond Y. K. Lau. 92-99 [doi]
- Personas in O2O Mobile Healthcare: A Method for Identifying and Creating User GroupsTingting Liu, Jiawei Du, Hongming Cai, Ray Farmer, Lihong Jiang, Fenglin Bu. 100-107 [doi]
- Cost Optimization in Virtual World Redundancy ManagementBingqing Shen, Jingzhi Guo, C. L. Philip Chen. 108-114 [doi]
- P2P Lending Platforms Bankruptcy Prediction Using Fuzzy SVM with Region InformationMenghan Wang, Xiaolin Zheng, Mengying Zhu, Zhongkai Hu. 115-122 [doi]
- Memory-Based Data Management for Large-Scale Distributed RenderingRan Zheng, Jinli Jia, Hai Jin, Xinqiao Lv, Shuai Yang. 123-128 [doi]
- Applying Augmented Reality Technology to E-Learning: Science Educational AR Products as an ExampleZhou Rongting, Song Yiran, He Tongliang, Fahad Asmi. 129-133 [doi]
- The Impact of e-Commerce Development Level on Location Choice of Foreign Retail Companies in ChinaQiqi Lei, Jianquan Guo, Chengji Liang. 134-138 [doi]
- Multi-facilities Location and Allocation Problem of Three-Echelon Supply Chain Based on an Improved Genetic AlgorithmZhishuo Liu, Han Li, Pengfei Gao. 139-144 [doi]
- TUNE: Tree Mining-Based Approach for Dual-Fuel Engine Performance Management of Heavy Duty TrucksAtefe Zakeri, Elizabeth Chang, Omar Khadeer Hussain. 145-150 [doi]
- Design Concepts and Operation Principles for Smart Intra-Vaginal Health Monitoring DevicesJacek Lewandowski, Kuo-Ming Chao, Wojciech Nizanski. 151-157 [doi]
- Differential-Privacy-Based Citizen Privacy Preservation in E-Government ApplicationsYajuan Shi, Chunhui Piao, Xiao Pan. 158-163 [doi]
- Exploiting Client Logs to Support the Construction of Adaptive e-Commerce ApplicationsLeandro G. Vasconcelos, Rafael D. C. Santos, Laércio A. Baldochi. 164-169 [doi]
- Study of Innovation Approach for Business Model in Internet EnterprisesXiao Nan, Qu Wenfeng. 170-175 [doi]
- Random Attractor of the Stochastic Lattice Reversible Selkov Equations with Additive NoisesHongyan Li. 176-181 [doi]
- Dust and Reflection Removal from Videos Captured in Moving CarZhiyong Huang, Biao Xiong, Cao Tian, Jing Zhan, Xiang Fei, Nazaraf Shah. 182-187 [doi]
- Can You Call the Software in Your Device be Firmware?Rashedul Hassan, Konstantinos Markantonakis, Raja Naeem Akram. 188-195 [doi]
- Cost-Efficient Cooperative Sharing of a Complete Wi-Fi Signature Scheme for Indoor Localization in Shopping MallsMin Zhang, Juntao Wang, Xiaotie Deng. 196-201 [doi]
- Credibility of Word-of-Mouth in Mobile Services: An Empirical AnalysisQijun Qiu. 202-207 [doi]
- Customer Context Based Transactions in Mobile Commerce Business EnvironmentP. V. Pushpa. 208-213 [doi]
- Research on Hybrid-Cloud-Based User Privacy Protection of O2O PlatformChunhui Piao, Yang Zuo, Changyou Zhang. 214-219 [doi]
- Leveraging Track Relationships for Web Service RecommendationFatma Slaimi, Sana Sellami, Omar Boucelma, Ahlem Ben Hassine. 220-225 [doi]
- A New Placement Optimization Approach in Hybrid Cloud Based on Genetic AlgorithmWissem Abbes, Zied Kechaou, Adel M. Alimi. 226-231 [doi]
- The Pricing of Cloud Computing with Preferential PoliciesRui Zhang, Bingyong Tang. 232-237 [doi]
- A Generic Commercial Business Model for Customer Oriented Business TransactionsP. V. Pushpa. 238-243 [doi]
- Towards a Business-Pattern Approach for UML Models Derivation from Business Process ModelsAbderrahmane Leshob. 244-249 [doi]
- Testing of AJAX-Based Web Applications Using Hierarchical State ModelChien-Hung Liu, Chia-Jung Wu, Hsi-Min Chen. 250-256 [doi]
- Design of a Secure Mobile Business Communication Platform Utilizing Next Generation Web TechnologiesHannes Stadler, Marcel Großmann, Udo R. Krieger. 257-263 [doi]
- MASA: A Cross-Platform Component Architecture for Building Mobile Applications with Service CachingShang-Pin Ma, Chi-Chia Li, Chen-Yuan Fan, Wen-Tin Lee, Nien-Lin Hsueh. 264-269 [doi]
- Item Sorting Platform Based on Cloud ComputingMinbiao Han, Jianfei Yang, Zhou Fang, Zhiyuan Fang. 270-275 [doi]
- An Application of Using Bluetooth Indoor Positioning, Image Recognition and Augmented RealityChang-Yen Tsai, Kuo-Hsun Hsu. 276-281 [doi]
- A Recommender System for Healthcare Based on Human-Centric ModelingZheyun Zhong, Yinsheng Li. 282-286 [doi]
- Multi-stage Layout Optimization for Reverse Logistics Network of Rural E-Commerce under B2C Mode: A Case Study of E-Commerce Enterprises on 3C ProductsFeng Cao, Jianquan Guo, Chengji Liang. 287-292 [doi]
- Investigation into the Regular and Chaotic States of Microblogging Networks as Applied to Social Media MonitoringAndrey V. Dmitriev, Olga A. Tsukanova, Svetlana V. Maltseva. 293-298 [doi]
- Optimal Strategies for a Closed-Loop Hybrid System with Supply Disruption in E-Commerce EnvironmentXinyue Wang, Jianquan Guo, Chengji Liang. 299-304 [doi]
- Factors Affecting Customer Satisfaction and Intentions to Adopt m-Service in ChinaFahad Asmi, Rongting Zhou, Tongliang He, Feifei Han. 305-310 [doi]
- Pinyin-Senses Input Method for Semantic Document Exchange in E-BusinessGuangyi Xiao, Jingzhi Guo, Zhiguo Gong, Renfa Li. 311-315 [doi]
- Multiobjective Optimization for forward and Reverse Logistics Network Design in Rural AreasYufeng Zhuang, Hang Zhao, Chi Zhang. 316-321 [doi]
- Internet Usage, High-Tech Talent and Location Choice: Evidence from Chinese ICT Investments in the United StatesJuan Jiang, Jiang Wang. 322-325 [doi]