The SCEAS System
Navigation Menu

Conferences in DBLP

(isecs)
2008 (conf/isecs/2008)


  1. The Application of Genetic Algorithm in Vehicle Routing Problem. [Citation Graph (, )][DBLP]


  2. The Algorithm of Obtaining Best Rules Based on Rough Set. [Citation Graph (, )][DBLP]


  3. An Algorithm of Topic Distillation Based on Anchor Text. [Citation Graph (, )][DBLP]


  4. A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. [Citation Graph (, )][DBLP]


  5. A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. [Citation Graph (, )][DBLP]


  6. A New Web Text Clustering Algorithm Based on DFSSM. [Citation Graph (, )][DBLP]


  7. Cloud Model-based Data Attributes Reduction for Clustering. [Citation Graph (, )][DBLP]


  8. Construction of Learning Algorithm based on SGA Bayesian Network. [Citation Graph (, )][DBLP]


  9. Improved Algorithm for Tate Pairing Computation. [Citation Graph (, )][DBLP]


  10. A Deadline and Cost Constrained Optimization Algorithm for Scheduling Applications in Grids Based on Proportional Share Systems. [Citation Graph (, )][DBLP]


  11. A Scheme of Workflow Management System Based on Web Services. [Citation Graph (, )][DBLP]


  12. High Efficiency Association Rules Mining Algorithm for Bank Cost Analysis. [Citation Graph (, )][DBLP]


  13. Dynamic Reconfiguration Method for Web Service Based on Policy. [Citation Graph (, )][DBLP]


  14. Research on Customers Demand Forecasting for E-business Web Site Based on LS-SVM. [Citation Graph (, )][DBLP]


  15. An XML based Flexible Security E-Commerce Mode. [Citation Graph (, )][DBLP]


  16. The Design and Implementation of the Distribution Resource Planning Management System Based on WEB. [Citation Graph (, )][DBLP]


  17. Research on High-accuracy Position Prediction Algorithm in Online Game. [Citation Graph (, )][DBLP]


  18. A Reliable Web Service Implementation Approach for Large Commercial Applications. [Citation Graph (, )][DBLP]


  19. The Factors Influencing Chinese Online Shopper's Satisfaction in Web2.0 Era. [Citation Graph (, )][DBLP]


  20. A Novel Constructing Algorithm of E-learning Community. [Citation Graph (, )][DBLP]


  21. Study on EAI Based on Web Services and SOA. [Citation Graph (, )][DBLP]


  22. Research on the Techniques for Effectively Searching and Retrieving Information from Internet. [Citation Graph (, )][DBLP]


  23. Research on Grid Resource Discovery Scheme Integrated P2P Mode. [Citation Graph (, )][DBLP]


  24. Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. [Citation Graph (, )][DBLP]


  25. A P2P E-commerce Related Network Security Issue: P2P Worm. [Citation Graph (, )][DBLP]


  26. Reputation-based Trust Update in Network Environment. [Citation Graph (, )][DBLP]


  27. An Efficient Approach for Point Coverage Problem of Sensor Network. [Citation Graph (, )][DBLP]


  28. The Research and Design of Grid-based Business Intelligence Network-BGBIN. [Citation Graph (, )][DBLP]


  29. Design of Network Interface in Distributed Data Acquisition System for E-Commerce. [Citation Graph (, )][DBLP]


  30. A Preliminary Study of Coordinated Worm Networks. [Citation Graph (, )][DBLP]


  31. To Select the Service in Context Aware Systems Using Concept Similarity Mechanism. [Citation Graph (, )][DBLP]


  32. Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty. [Citation Graph (, )][DBLP]


  33. Definitions and Analysis of Integrity in Strand Spaces Model. [Citation Graph (, )][DBLP]


  34. Enforcing Information Flow Constraints in RBAC Environments. [Citation Graph (, )][DBLP]


  35. A New Steganalysis Method Using High-pass Filter for JPEG Image. [Citation Graph (, )][DBLP]


  36. An Extended RBAC Model for Uniform Implementation of Role Hierarchy and Constraint. [Citation Graph (, )][DBLP]


  37. A New Modeling Method for the Data Analysis Solution in Business. [Citation Graph (, )][DBLP]


  38. ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings. [Citation Graph (, )][DBLP]


  39. A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. [Citation Graph (, )][DBLP]


  40. Approach to Missing Data Recovery. [Citation Graph (, )][DBLP]


  41. Research on a New Effective Data Mining Method Based on Neural Networks. [Citation Graph (, )][DBLP]


  42. Study on Data Enriching Algorithm Based on Rough Set in E-commerce. [Citation Graph (, )][DBLP]


  43. Automatic Video Summarization by Affinity Propagation Clustering and Semantic Content Mining. [Citation Graph (, )][DBLP]


  44. Circuit Failure Diagnosis Analysis and Research Based On Neural Network. [Citation Graph (, )][DBLP]


  45. An Entropy-based Approach for Supplier Selection with Interval Information. [Citation Graph (, )][DBLP]


  46. An Agent Bilateral Multi-issue Alternate Bidding Negotiation Protocol Based on Reinforcement Learning and its Application in E-commerce. [Citation Graph (, )][DBLP]


  47. Application of Fuzzy Ontology to Information Retrieval for Electronic Commerce. [Citation Graph (, )][DBLP]


  48. Dynamic Pricing by Multiagent Reinforcement Learning. [Citation Graph (, )][DBLP]


  49. Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement. [Citation Graph (, )][DBLP]


  50. The Impact of Perceived Value on User Acceptance of Mobile Commerce. [Citation Graph (, )][DBLP]


  51. Exploring Mobile User Acceptance Based on UTAUT and Contextual Offering. [Citation Graph (, )][DBLP]


  52. Study on Trust in Mobile Commerce Adoption - A Conceptual Model. [Citation Graph (, )][DBLP]


  53. An m-Business Model Based on Session Initiation Protocol. [Citation Graph (, )][DBLP]


  54. A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System. [Citation Graph (, )][DBLP]


  55. Key Technology and System Design in Mobile Supply Chain Management. [Citation Graph (, )][DBLP]


  56. Research on Influencing Factors of Consumer Initial Trust Based on Mobile Commerce. [Citation Graph (, )][DBLP]


  57. Compare and Analysis of Security Strategy in WAP and I-Mode Network. [Citation Graph (, )][DBLP]


  58. Application Analysis of M-commerce in Digitized Urban Management. [Citation Graph (, )][DBLP]


  59. A Study on M-Commerce Industry Development and Market Structure in China. [Citation Graph (, )][DBLP]


  60. An Anomaly Intrusion Detection Model Based on Limited Labeled Instances. [Citation Graph (, )][DBLP]


  61. Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. [Citation Graph (, )][DBLP]


  62. An Executable Code Authorization Model for Secure Operating System. [Citation Graph (, )][DBLP]


  63. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. [Citation Graph (, )][DBLP]


  64. An Architecture for Differentiated Security Service. [Citation Graph (, )][DBLP]


  65. Cryptanalysis of the LCSS RFID Authentication Protocol. [Citation Graph (, )][DBLP]


  66. A Key-dependent Cipher DSDP. [Citation Graph (, )][DBLP]


  67. A Novel Trust Collecting Mechanism Based on Publish/Subscribe Scheme in Grid Computing. [Citation Graph (, )][DBLP]


  68. A Complete (alpha, k)-Anonymity Model for Sensitive Values Individuation Preservation. [Citation Graph (, )][DBLP]


  69. A Multi-Dimensional K-Anonymity Model for Hierarchical Data. [Citation Graph (, )][DBLP]


  70. Efficient Fair Contract Signing Protocol from Bilinear Pairings. [Citation Graph (, )][DBLP]


  71. Research on PKI Model Based on NTRU. [Citation Graph (, )][DBLP]


  72. A Distributed Electronic Authentication Scheme in E-Business System. [Citation Graph (, )][DBLP]


  73. A New Image Encryption Algorithm Based on Multiple Chaos System. [Citation Graph (, )][DBLP]


  74. Pattern Analysis Applied on Steganalysis for Binary Text Images. [Citation Graph (, )][DBLP]


  75. Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. [Citation Graph (, )][DBLP]


  76. A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. [Citation Graph (, )][DBLP]


  77. An Information Assurance Framework on Trusted Autonomic Communications. [Citation Graph (, )][DBLP]


  78. Independent Coordination Solutions of Dynamic Information Security. [Citation Graph (, )][DBLP]


  79. An Information Security Model Based on P2P Network. [Citation Graph (, )][DBLP]


  80. Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. [Citation Graph (, )][DBLP]


  81. Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption. [Citation Graph (, )][DBLP]


  82. Unified Certificate Validation System DNS-OCSP. [Citation Graph (, )][DBLP]


  83. One New BRAS Model Based on Trusted Network. [Citation Graph (, )][DBLP]


  84. Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation. [Citation Graph (, )][DBLP]


  85. 5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. [Citation Graph (, )][DBLP]


  86. Cancelable Voiceprint Templates Based on Knowledge Signatures. [Citation Graph (, )][DBLP]


  87. Cross Cookie: A Cookie Protocol for Web Mashups. [Citation Graph (, )][DBLP]


  88. Preservation of Privacy in Publishing Social Network Data. [Citation Graph (, )][DBLP]


  89. A Flexible Approach to Measuring Network Security Using Attack Graphs. [Citation Graph (, )][DBLP]


  90. TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. [Citation Graph (, )][DBLP]


  91. Tamper Difficult Technique for Data Residing on Passive Storage. [Citation Graph (, )][DBLP]


  92. Metadata Management for Distributed Multimedia Storage System. [Citation Graph (, )][DBLP]


  93. Research on Storage Security Based on Trusted Computing Platform. [Citation Graph (, )][DBLP]


  94. Information Security Game Analysis with Penalty Parameter. [Citation Graph (, )][DBLP]


  95. An Introduction to Data Capturing. [Citation Graph (, )][DBLP]


  96. Modification and Improvement on Group Signature Scheme without Random Oracles. [Citation Graph (, )][DBLP]


  97. Servicing Work Safety Supervision System for Electric Locomotive Based on Configuration Software. [Citation Graph (, )][DBLP]


  98. JSON Based Decentralized SSO Security Architecture in E-Commerce. [Citation Graph (, )][DBLP]


  99. Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm. [Citation Graph (, )][DBLP]


  100. Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System. [Citation Graph (, )][DBLP]


  101. Research on the Automatic Summarization Model based on Genetic Algorithm and Mathematical Regression. [Citation Graph (, )][DBLP]


  102. A Gossip-based Opinion Diffusion Model via Uninorm Aggregation Operator. [Citation Graph (, )][DBLP]


  103. Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. [Citation Graph (, )][DBLP]


  104. A Formal Model of Trust and Security for Task-Oriented Information System. [Citation Graph (, )][DBLP]


  105. Grey Relational Evaluation on Vendor Selection Based on E-business. [Citation Graph (, )][DBLP]


  106. Information Intelligent System based on Web Data Mining. [Citation Graph (, )][DBLP]


  107. Using Criterion-Based Access Control for Multilevel Database Security. [Citation Graph (, )][DBLP]


  108. The Simplified Inductive Approach to Verifying Security Protocols. [Citation Graph (, )][DBLP]


  109. Design and Implementation of the Airline Luggage Inspection System Base on Link Structure of QR Code. [Citation Graph (, )][DBLP]


  110. Probability of Attack Based on System Vulnerability Life Cycle. [Citation Graph (, )][DBLP]


  111. SOA-based Enterprise Service Bus. [Citation Graph (, )][DBLP]


  112. A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. [Citation Graph (, )][DBLP]


  113. Processing Intrusion Detection Alerts in Large-scale Network. [Citation Graph (, )][DBLP]


  114. Biometrics Authentication System on Open Network and Security Analysis. [Citation Graph (, )][DBLP]


  115. Information Security Problem Research Based on Game Theory. [Citation Graph (, )][DBLP]


  116. Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. [Citation Graph (, )][DBLP]


  117. High Speed Serial Interface & Some Key Technology Research. [Citation Graph (, )][DBLP]


  118. E-business Enterprise Credit Risk Evaluation Based on Markov Chain. [Citation Graph (, )][DBLP]


  119. The Credit Risk Analysis and Prevention of Third Party Payment Platform. [Citation Graph (, )][DBLP]


  120. Cash Management and Its Risk Control under No-Stationary Uncertain Demand. [Citation Graph (, )][DBLP]


  121. An Opponent's Negotiation Behavior Model to Facilitate Buyer-seller Negotiations in Supply Chain Management. [Citation Graph (, )][DBLP]


  122. Hindrances to the Development of Tourism E-Commerce in China. [Citation Graph (, )][DBLP]


  123. Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  124. Research of C2C E-Business Trust Evaluation Model Based on Entropy Method. [Citation Graph (, )][DBLP]


  125. Exploring Influencing Factors in E-Commerce Transaction Behaviors. [Citation Graph (, )][DBLP]


  126. An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel. [Citation Graph (, )][DBLP]


  127. A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System. [Citation Graph (, )][DBLP]


  128. Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. [Citation Graph (, )][DBLP]


  129. An Abstract Interpretation Frame of the Calculus of Boxed Ambients Based on the Ambient Occurrence Counting. [Citation Graph (, )][DBLP]


  130. A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity. [Citation Graph (, )][DBLP]


  131. General Service Pricing Strategies Research Based on Dynamic Stochastic Wealth Model. [Citation Graph (, )][DBLP]


  132. A Versatile SOA-based E-Business Platform. [Citation Graph (, )][DBLP]


  133. The Analysis of Supply Chain Procurement Strategy in E-Commerce. [Citation Graph (, )][DBLP]


  134. Study of the Model of E-commerce Personalized Recommendation System Based on Data Mining. [Citation Graph (, )][DBLP]


  135. Knowledge and Trust in E-consumers' Online Shopping Behavior. [Citation Graph (, )][DBLP]


  136. Taxonomy for Personalized Recommendation Service. [Citation Graph (, )][DBLP]


  137. The Research of Supplier Selection Based on Hybrid Decision-Making Index and VIKOR Method. [Citation Graph (, )][DBLP]


  138. A Collaboration Model for E-government Based on Semantics and Multi-agent. [Citation Graph (, )][DBLP]


  139. Research and Application of Customer Churn Analysis in Chain Retail Industry. [Citation Graph (, )][DBLP]


  140. Integrated Routing Wasp Algorithm and Scheduling Wasp Algorithm for Job Shop Dynamic Scheduling. [Citation Graph (, )][DBLP]


  141. Customer Satisfaction Evaluation for Mobile Commerce Based on Fuzzy Comprehensive Evaluation. [Citation Graph (, )][DBLP]


  142. Development of Internet-based Long-range Manufacture Quality Monitoring System. [Citation Graph (, )][DBLP]


  143. Business Process-Oriented Software Architecture for Supporting Business Process Change. [Citation Graph (, )][DBLP]


  144. Automobile Enterprise's Mixed Sale Mode Based on E-commerce Supply Chain Management. [Citation Graph (, )][DBLP]


  145. A Regression-based Coordination for Concurrent Negotiation. [Citation Graph (, )][DBLP]


  146. The Study on Electronic Commerce and Development of International Logistics. [Citation Graph (, )][DBLP]


  147. Research on Representation of Preference of Negotiator in Negotiation Support System. [Citation Graph (, )][DBLP]


  148. Study on an E-Commerce System based on Multi-Agent Technology. [Citation Graph (, )][DBLP]


  149. Research on the Security of Information and Data in the Communication. [Citation Graph (, )][DBLP]


  150. Design of Customer Relationship Management Systems Based on Data Mining. [Citation Graph (, )][DBLP]


  151. Assessing the Impact of Information Technology on Supply Chain Management. [Citation Graph (, )][DBLP]


  152. Analysis of Electronic Innovation of Securities Trading in China using a Hypercube Model. [Citation Graph (, )][DBLP]


  153. The Online Third-party Payment Strategies under Price War. [Citation Graph (, )][DBLP]


  154. Key Technologies for Security Enhancing of Payment Gateway. [Citation Graph (, )][DBLP]


  155. An Approach to Separating Security Concerns in E-Commerce Systems at the Architecture Level. [Citation Graph (, )][DBLP]


  156. Study on Mobile E-commerce Security Payment System. [Citation Graph (, )][DBLP]


  157. An ID-based Transferable Off-line E-Cash System with Revokable Anonymity. [Citation Graph (, )][DBLP]


  158. ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. [Citation Graph (, )][DBLP]


  159. Recommender Oriented to Complicate Task in E-commerce. [Citation Graph (, )][DBLP]


  160. Responsibility of Net-bank in Electronic Payment. [Citation Graph (, )][DBLP]


  161. A Research of Trust Based on E-Commerce. [Citation Graph (, )][DBLP]


  162. The Mechanism Design of Third Party Assure-Payment Platform. [Citation Graph (, )][DBLP]


  163. Optimization of an Indicator System for Measuring E-Business: An Empirical Study by Firms. [Citation Graph (, )][DBLP]


  164. The Reconstruction, Exploration and Innovation of Logos of E-commerce. [Citation Graph (, )][DBLP]


  165. A New Co-evolutionary Genetic Algorithm for Traveling Salesman Problem. [Citation Graph (, )][DBLP]


  166. Antecedents and Consequences of Process Innovation on E-Commerce. [Citation Graph (, )][DBLP]


  167. The Relationships between the Antecedents of Innovativeness and Business Performance. [Citation Graph (, )][DBLP]


  168. Research on the Shift of Default Risk in Supply Chain Based on the Credit Default Swap. [Citation Graph (, )][DBLP]


  169. Test Case Reduction Technique for BPEL-based Testing. [Citation Graph (, )][DBLP]


  170. Research on a New E-voting Method based on the Cellular Phone. [Citation Graph (, )][DBLP]


  171. A Study on the Factors Influencing Knowledge Transfer among Organizations in Strategic Alliances. [Citation Graph (, )][DBLP]


  172. Ownership Motivation and Corporate Performance in IT Industry under the Wave of E-Commerce: An Empirical Study based on Chinese Public Companies. [Citation Graph (, )][DBLP]


  173. Research on the Application of CSCW in Shipbuilding Industry. [Citation Graph (, )][DBLP]


  174. Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China. [Citation Graph (, )][DBLP]


  175. Research on e-Commerce Application Architecture Based on the Integration of Workflow and Agile Service. [Citation Graph (, )][DBLP]


  176. Application of Streaming Media Technology in Electronic Commerce. [Citation Graph (, )][DBLP]


  177. A Study of Consumer Trust Formation in Electronic-Commerce. [Citation Graph (, )][DBLP]


  178. Research and Application on OLAP-based Farm Products Examination Model. [Citation Graph (, )][DBLP]


  179. Formalization and Verification of Inter-organizational Workflow Modeling for E-Commerce. [Citation Graph (, )][DBLP]


  180. An Analysis of Knowledge Sharing Incentive Mechanism inside the Enterprise Based on Evolutionary Game. [Citation Graph (, )][DBLP]


  181. The Fuzzy Evaluation of E-Commerce Customer Satisfaction Utilizing Fuzzy TOPSIS. [Citation Graph (, )][DBLP]


  182. Content Based Image Watermarking in the Ridgelet Domain. [Citation Graph (, )][DBLP]


  183. A Watermarking Protocol for Piracy Tracing. [Citation Graph (, )][DBLP]


  184. A Wavelet Digital Watermarking Algorithm Based on Chaotic Mapping. [Citation Graph (, )][DBLP]


  185. A Zero-Watermark Algorithm with Real-Mean for 2D Engineering Graphic. [Citation Graph (, )][DBLP]


  186. A Statistics-Based Watermarking Scheme Robust to Print-and-Scan. [Citation Graph (, )][DBLP]


  187. Robust Image Watermarking Algorithm against Shearing. [Citation Graph (, )][DBLP]


  188. An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson’s Visual Model. [Citation Graph (, )][DBLP]


  189. An Effective Fragile Document Watermarking Technique. [Citation Graph (, )][DBLP]


  190. A Numeric Watermark Method Based on Valve-Value Surface. [Citation Graph (, )][DBLP]


  191. A Watermarking Algorithm Based on MA and DWT. [Citation Graph (, )][DBLP]


  192. Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity. [Citation Graph (, )][DBLP]


  193. A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection. [Citation Graph (, )][DBLP]


  194. A Large Capacity Blind Information Hiding Algorithm. [Citation Graph (, )][DBLP]


  195. A Novel Image Scrambling and Watermarking Scheme Based on Cellular Automata. [Citation Graph (, )][DBLP]


  196. Robust Algorithm of Digital Image Watermarking Based on Discrete Wavelet Transform. [Citation Graph (, )][DBLP]


  197. Research on an Advanced Novel Watermarking Technology with Higher Robustness. [Citation Graph (, )][DBLP]


  198. Histogram Specification-based Audio Watermarking Technology against Filtering Attacks in Time Domain. [Citation Graph (, )][DBLP]


  199. Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. [Citation Graph (, )][DBLP]


  200. Research and Design on Reputation Services (RS) System. [Citation Graph (, )][DBLP]


  201. Using Methods of Association Rules Mining Optimizationin in Web-Based Mobile-Learning System. [Citation Graph (, )][DBLP]


  202. Research on the Construction of Customer-centered Integrative Knowledge Push System. [Citation Graph (, )][DBLP]


  203. Comparative Research of Modeling Methods for Workflow Process. [Citation Graph (, )][DBLP]


  204. A Modified Resource Limited Artificial Immune System. [Citation Graph (, )][DBLP]


  205. The Research on Multi-agent Framework for Decision Support System and Its Application. [Citation Graph (, )][DBLP]


  206. Scalable Trust in Multi-agent E-commerce System. [Citation Graph (, )][DBLP]


  207. Analysis of Business Intelligence and Its Derivative - Financial Intelligence. [Citation Graph (, )][DBLP]


  208. A Modeling Framework for the Planning of Logistics Nodes in Strategic Supply Chain Based on Complex Network. [Citation Graph (, )][DBLP]


  209. Research on Entropy Model of Order Degree of Fractal Supply Chain Network. [Citation Graph (, )][DBLP]


  210. ACEAC: A Novel Access Control Model for Cooperative Editing with Workflow. [Citation Graph (, )][DBLP]


  211. The Classification of Urban Logistics Infrastructure: Evidence from the Yangtze River Delta Region in China. [Citation Graph (, )][DBLP]


  212. Management Innovation and Development of Manufacturer-Retailer Relationships for Large Electric Appliances Chain Stores in China. [Citation Graph (, )][DBLP]


  213. Enterprise E-Business Transformation: A Case Study in China. [Citation Graph (, )][DBLP]


  214. Electronic Time Stamping Safety and Efficiency Optimize Technique Research. [Citation Graph (, )][DBLP]


  215. Research on Witkey Model Based on TRIZ. [Citation Graph (, )][DBLP]


  216. Context Active RBAC and its Applications. [Citation Graph (, )][DBLP]


  217. Study on Information Technology Capabilities based on Value Net Theory. [Citation Graph (, )][DBLP]


  218. A Novel Method for Wheel Rim Recognition. [Citation Graph (, )][DBLP]


  219. Design of the Knowledge Management Integrated System Based on TRIZ. [Citation Graph (, )][DBLP]


  220. Development Course for Information Platform Based on MDA. [Citation Graph (, )][DBLP]


  221. The Application of RFID Technology in the Warehouse Management Information System. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002