Abstract is missing.
- Semantic Document Classification Based on Semantic Similarity Computation and Correlation AnalysisShuo Yang, Ran Wei, Jingzhi Guo. 3-18 [doi]
- An Equity-Based Incentive Mechanism for Decentralized Virtual World Content StorageBingqing Shen, Jingzhi Guo, Weiming Tan. 19-32 [doi]
- A Group-Centric Physical Education Supporting System for Intelligent Campus ApplicationLei Wang, Hongyan Yu, Yang Cao, Xiaofan Zhou, Lihong Jiang, Hongming Cai. 33-47 [doi]
- Speech Evaluation Based on Deep Learning Audio CaptionLiu Zhang, Hanyi Zhang, Jin Guo, Detao Ji, Qing Liu, Cheng Xie. 51-66 [doi]
- Cross-language Keyword Analysis of Digital Transformation for BusinessZiboud Van Veldhoven, Rongjia Song, Jan Vanthienen. 67-80 [doi]
- API Prober - A Tool for Analyzing Web API Features and Clustering Web APIsShang-Pin Ma, Ming-Jen Hsu, Hsiao-Jung Chen, Yu-Sheng Su. 81-96 [doi]
- Design a Distributed Fog Computing Scheme to Enhance Processing Performance in Real-Time IoT ApplicationsShin-Jer Yang, Wan-Lin Lu. 99-112 [doi]
- Design Issues of a Hybrid Wrapping Attack Protecting Scheme in Cloud Computing EnvironmentShin-Jer Yang, Yu-Hsuan Huang. 113-127 [doi]
- Developing a Microservices Software System with Spring Could - A Case Study of Meeting SchedulerWen-Tin Lee, Tseng-Chung Lu. 128-140 [doi]
- Towards Identification and Validation of Web ThemesYan-Ting Chen, Bao An Nguyen, Kuan-Yu Ho, Hsi-Min Chen. 143-160 [doi]
- A Customer-Oriented Assortment Selection in the Big Data EnvironmentMorteza Saberi, Zahra Saberi, Mehdi Rajabi Asadabadi, Omar Khadeer Hussain, Elizabeth Chang 0001. 161-172 [doi]
- Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional NetworksWen-Hui Lin, Ping Wang 0007, Bao-Hua Wu, Ming-Sheng Jhou, Kuo-Ming Chao, Chi-Chun Lo. 173-183 [doi]
- Software Requirements Prioritization with the Goal-Oriented Requirement LanguageAbderrahmane Leshob, Pierre Hadaya, Laurent Renard. 187-198 [doi]
- Theoretical Aspects of Music Definition Language and Music Manipulation LanguageHanchao Li, Xiang Fei, Ming Yang, Kuo-Ming Chao, Chaobo He. 199-207 [doi]
- Evaluation of Varying Visual Intensity and Position of a Recommendation in a Recommending Interface Towards Reducing Habituation and Improving SalesPiotr Sulikowski. 208-218 [doi]
- Mechanics and Quality of Agent-Informational Clustering in Social NetworksDaria A. Yakovleva, Olga A. Tsukanova. 221-235 [doi]
- Knowledge Graph Construction for Intelligent Analysis of Social Networking User OpinionTingyu Xie, Yichun Yang, Qi Li, Xiaoying Liu, Hongwei Wang 0001. 236-247 [doi]
- The Study of Predicting Social Topic TrendsSung-Shun Weng, Huai-Wen Hsu. 248-262 [doi]
- Intelligent Car Parking System Based on Blockchain Processing ReengineeringQuanyi Hu, Simon Fong, Peng Qin, Jingzhi Guo, Yong Zhang, Dan Xu, Yuanlan Chen, Jerome Yen. 265-273 [doi]
- A Smart Contract-Based Risk Warning Blockchain Symbiotic System for Cross-border ProductsBin Wu, Yinsheng Li, Xu Liang. 274-289 [doi]
- BYOD Security and Risk Challenges in Oman Organisationskhoula Al Harthy, Nazaraf Shah. 290-301 [doi]
- IoT-Driven Business Model InnovationRicardo Henríquez, F. Xavier Martínez de Osés, Jesús E. Martínez Marín. 302-314 [doi]
- Acoustic Signal Processing for Acoustic Source Localisation in an Elastic SolidHongyu You, Ming Yang, Xiang Fei, Kuo-Ming Chao, Hanchao Li. 317-329 [doi]
- Design of a Healthy Diet Control System for the Elderly Group by Using Raspberry PiChing-Lung Lin, Shu-Chi Lin, Yung-Te Liu, Huang-Liang Lin, Yuan-Chang Huang, Po-Hsun Huang. 330-341 [doi]
- A Web Service Composition Method Based on OpenAPI Semantic AnnotationsAndrei Netedu, Sabin C. Buraga, Paul Diac, Liana Tucar. 342-357 [doi]
- GWMA Algorithm for Host Overloading Detection in Cloud Computing EnvironmentJen-Hsiang Chen, Shin-Li Lu. 358-370 [doi]
- Privacy Preserving Government Data Sharing Based on Hyperledger BlockchainYurong Hao, Chunhui Piao, Yongbin Zhao, Xuehong Jiang. 373-388 [doi]
- Deep Learning for Trust-Related Attacks Detection in Social Internet of ThingsMariam Masmoudi, Wafa Abdelghani, Ikram Amous, Florence Sèdes. 389-404 [doi]
- Clustering-Anonymity Method for Privacy Preserving Table Data SharingLiping Liu, Chunhui Piao, Huirui Cao. 405-420 [doi]
- Blockchain-Based Food Traceability: A Dataflow PerspectiveXingchen Liu, Jiaqi Yan, Jinbei Song. 421-431 [doi]
- An Artifact for Learning the TOGAF Architecture Development MethodPierre Hadaya, Abderrahmane Leshob, Julien Nicolas de Verteuil. 435-449 [doi]
- OCBLA: A Storage Space Allocation Method for Outbound ContainersXinyu Chen, Wenbin Hu. 450-463 [doi]
- The Construction of a Domain Knowledge Graph and Its Application in Supply Chain Risk AnalysisWanyue Zhang, Yonggang Liu, Lihong Jiang, Nazaraf Shah, Xiang Fei, Hongming Cai. 464-478 [doi]
- Towards Self-automatable and Unambiguous Smart Contracts: Machine Natural LanguagePeng Qin, Jingzhi Guo, Bingqing Shen, Quanyi Hu. 479-491 [doi]
- A Content Based e-Commerce Recommendation Approach Under the Veristic FrameworkImen Benzarti, Hafedh Mili, Amandine Paillard. 495-514 [doi]
- Knowledge Graph Construction for Intelligent Maintenance of Power PlantsYangkai Du, Jiayuan Huang, Shuting Tao, Hongwei Wang. 515-526 [doi]
- SPUNTB: A Stowage Planning via the Unified Neutral Theory of Biodiversity and BiogeographyZongzhao Xie, Wenbin Hu. 527-540 [doi]
- A Big Data and Visual Analytics System for Port Risk WarningJie Song, Yinsheng Li, Xu Liang. 541-558 [doi]
- Privacy as a Service: Anonymisation of NetFlow TracesAshref Aloui, Mounira Msahli, Talel Abdessalem, Sihem Mesnager, Stéphane Bressan. 561-571 [doi]
- Game Analytics Research: Status and TrendsYanhui Su. 572-589 [doi]
- PCA Based Energy Network Temporal and Spatial Data Analysis and PredictionYifan Yin, Yan Sun, Han Yu, Zhuming Bi, Boyi Xu, Hongming Cai. 590-605 [doi]
- A Behavior-Item Based Hybrid Intention-Aware Frame for Sequence RecommendationYan Chen 0031, Jiangwei Zeng, Haiping Zhu, Feng Tian, Yu Liu, Qidong Liu, Qinghua Zheng. 606-620 [doi]