Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsita/ijsita9.bht:"
@article{DBLP:journals/ijsita/AbdelatifMM18, author = {Sahraoui Abdelatif and Derdour Makhlouf and Bouchra Marzak}, title = {A Multi-Objective {ACO} to Solve the Daily Carpool Problem}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {2}, pages = {50--60}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018040104}, doi = {10.4018/IJSITA.2018040104}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/AbdelatifMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Baporikar18, author = {Neeta Baporikar}, title = {Corporate Social Responsibility for Sustainable Strategy}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {3}, pages = {1--14}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018070101}, doi = {10.4018/IJSITA.2018070101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Baporikar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/DazaH18, author = {Ricardo Daza and Kathleen M. Hargiss}, title = {Factors Comprising Effective Risk Communication, Decision-Making, and Measurement of {IT} and {IA} Risk}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {1}, pages = {23--40}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018010102}, doi = {10.4018/IJSITA.2018010102}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/DazaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/DifE18, author = {Nassima Dif and Zakaria Elberrichi}, title = {A Multi-Verse Optimizer Approach for Instance Selection and Optimizing 1-NN Algorithm}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {2}, pages = {35--49}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018040103}, doi = {10.4018/IJSITA.2018040103}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsita/DifE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/EtemeN18, author = {Adolphe Ayissi Et{\'{e}}m{\'{e}} and Justin Moskolai Ngossaha}, title = {The Contribution of ICTs to Sustainable Urbanization and Health in Urban Areas in Cameroon}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {3}, pages = {59--75}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018070104}, doi = {10.4018/IJSITA.2018070104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/EtemeN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/GanesanMSA18, author = {Sangeetha Ganesan and Vijayalakshmi Muthuswamy and Ganapathy Sannasi and Kannan Arputharaj}, title = {A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {4}, pages = {15--37}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018100102}, doi = {10.4018/IJSITA.2018100102}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/GanesanMSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/HassenTG18, author = {Mariam Ben Hassen and Mohamed Turki and Fa{\"{\i}}ez Gargouri}, title = {Sensitive Business Processes: Characteristics, Representation, and Evaluation of Modeling Approaches}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {1}, pages = {41--77}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018010103}, doi = {10.4018/IJSITA.2018010103}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/HassenTG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/JallouliLA18, author = {Maryam Jallouli and Sonia Lajmi and Ikram Amous}, title = {A New Contextual Influencer User Measure to Improve the Accuracy of Recommender System}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {4}, pages = {38--51}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018100103}, doi = {10.4018/IJSITA.2018100103}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/JallouliLA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/JoshiSKP18, author = {Sudhanshu Joshi and Manu Sharma and Satinder Kumar and Manoj Kumar Pant}, title = {Co-Creation Among Small Scale Tourism Firm: Role of Information Communication and Technology in Productivity and Sustainability}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {4}, pages = {1--14}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018100101}, doi = {10.4018/IJSITA.2018100101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/JoshiSKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/MenschW18, author = {Scott E. Mensch and LeAnn Wilkie}, title = {Cell Phone Security: User Awareness of Security Issues and Mobile Device Management}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {3}, pages = {15--31}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018070102}, doi = {10.4018/IJSITA.2018070102}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/MenschW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Quispe18, author = {Azucena Quispe}, title = {Impact of Excessive Access Permissions and Insider Threat Opportunity in the Financial Industry: {A} Qualitative Study}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {3}, pages = {32--58}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018070103}, doi = {10.4018/IJSITA.2018070103}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Quispe18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Rahman18, author = {Nayem Rahman}, title = {Data Mining Techniques and Applications: {A} Ten-Year Update}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {1}, pages = {78--97}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018010104}, doi = {10.4018/IJSITA.2018010104}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Rahman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Rath18, author = {Mamata Rath}, title = {Big Data and IoT-Allied Challenges Associated With Healthcare Applications in Smart and Automated Systems}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {2}, pages = {18--34}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018040102}, doi = {10.4018/IJSITA.2018040102}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Rath18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Ray18, author = {Loye Lynn Ray}, title = {Enterprise Resource Planning Deployment and Business Process Reengineering at a Major University: {A} Case Study}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {1}, pages = {98--109}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018010105}, doi = {10.4018/IJSITA.2018010105}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Ray18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/StockhamL18, author = {Melia K. Stockham and Mary L. Lind}, title = {Digital Natives, Work Values, and Computer Self Efficacy}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {1}, pages = {1--22}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018010101}, doi = {10.4018/IJSITA.2018010101}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsita/StockhamL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/YachbaBB18, author = {Khadidja Yachba and Zakaria Bendaoud and Karim Bouamrane}, title = {Toward a Decision Support System for Regulation in an Urban Transport Network}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {9}, number = {2}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.4018/IJSITA.2018040101}, doi = {10.4018/IJSITA.2018040101}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsita/YachbaBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.