


default search action
ICSEB 2017: Hong Kong, SAR, China
- Proceedings of the International Conference on Software and e-Business, ICSEB 2017, Hong Kong, December 28-30, 2017. ACM 2017

Data Analysis and Soft Computing
- Foni Agus Setiawan, Eko Kuswardono Budiardjo, Tjan Basaruddin

, Siti Aminah
:
A Systematic Literature Review on Combining Ontology with Bayesian Network to Support Logical and Probabilistic Reasoning. 1-12 - Jiaxue Li, Wei Song, Simon Fong

:
Real-time Analysis and Visualization for Big Data of Energy Consumption. 13-16 - Kai Shuang, Xintao Ren, Jian Chen, Xiaohan Shan, Peng Xu:

Combining Word Order and CNN-LSTM for Sentence Sentiment Classification. 17-21 - Randell Gimenez, Melvin Gaviola, Mary Jane Sabellano, Ken Gorro

:
Emotion Classification of Duterte Administration Tweets Using Hybrid Approach. 22-27 - Joshua L. Lee, Patricia B. Awayan, Eduardo Mendoza:

A Comparative Study: Different Automatic Approaches of Stars Generation for Reviews. 28-32 - Nathar Shah, Chris H. Messom:

Tree Structure for Expressive MapReduce Framework. 33-37
Software design and program development
- Jiaming Fang

, Juan Li, Ruping Wang
:
Mobile Travel Apps' Adoption: Integrating Perceived Characteristics of Innovation and Software Quality. 38-42 - Umair Sabir, Farooque Azam

, Muhammad Waseem Anwar
:
A Comprehensive Investigation of Model Driven Architecture (MDA) for Reverse Engineering. 43-48 - Meennapa Rukhiran, Paniti Netinant

:
Aspect-Oriented Approach for Supporting House Bookkeeping Software Design. 49-54 - Syed Rizwan

, Tiantian Wang, Xiaohong Su, Salahuddin
:
Empirical Study on Software Bug Prediction. 55-59 - Yao Wang, Na Li, Feifan Zhang:

A Feature-oriented Domain Design Approach to FX Derivatives Trading System. 60-65 - Wira Zanoramy A. Zakaria, Mohd Faizal Abdollah, Othman Mohd, Aswami Fadillah Mohd Ariffin:

The Rise of Ransomware. 66-70 - Ashraf Saleh

, Roesnita Ismail
, Norasikin Fabil
:
Evaluating Usability for Mobile Application: A MAUEM Approach. 71-77
Computer Information Technology and Applications
- Yoekleng Kuy, Isara Anantavrasilp:

The Effect of Sizes of the Feature Sets on Intrusion Detection Performances. 78-84 - Yazan Alshboul, Kevin Streff:

Beyond Cybersecurity Awareness: Antecedents and Satisfaction. 85-91 - Jyh-Jeng Wu, Shu-Hua Chien, Yu-Peng Lee, Thoung-Han Lee:

Online community support for the marketing of cosmetic medicine. 92-96 - Xia Liu, Shenhao Tu, Run Zhang, Qian Wu, Yuantao Song:

Research on Potential Damage Estimation of Household Appliances Based on gcForest Model. 97-101 - Masayuki Hirayama:

Usability test method for embedded systems Considering with visually impaired. 102-106 - Wen-Hua Chen:

A Comparison of Teachers' Supportive Behaviour in Middle High School Classroom in Taiwan, Shanghai-China, and Finland: Evidence from PISA 2012. 107-112 - Li Qiong, Bo Wang, Hong Wu:

Targeting Algorithm Based on ITSM. 113-116 - Guntur Dharma Putra

, Selo Sulistyo
:
Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANET. 117-122
Business Intelligence and Economic Management
- Yong Wang, Rongbing Hu:

A Research on Modern Commercial Circulation Development Strategies in the Context of New-type Urbanization: A Case Study of Zhejiang Province. 123-127 - Wenxuan Zheng:

Bank Lines of Credit Will Be the Supplement to Cash in Corporate Liqudity Management. 128-132 - Gaurav Gupta

, Indranil Bose:
A bibliometric analysis of two decades of research on business models. 133-135

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














