Search dblp for Publications

export results for "toc:db/journals/ijsita/ijsita8.bht:"

 download as .bib file

@article{DBLP:journals/ijsita/Ayed17,
  author       = {Ahmed Ben Ayed},
  title        = {Permission Request Pattern Recognition in Android Malware Applications},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {37--49},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017010103},
  doi          = {10.4018/IJSITA.2017010103},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Ayed17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/AzabouKFSV17,
  author       = {Maha Azabou and
                  Ka{\"{\i}}s Khrouf and
                  Jamel Feki and
                  Chantal Soul{\'{e}}{-}Dupuy and
                  Nathalie Vall{\`{e}}s},
  title        = {Yet Another Multidimensional Model for {XML} Documents},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {3},
  pages        = {73--90},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017070105},
  doi          = {10.4018/IJSITA.2017070105},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/AzabouKFSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BendaoudY17,
  author       = {Zakaria Bendaoud and
                  Khadidja Yachba},
  title        = {Towards {A} Decision Support System for Optimization of Container
                  Placement in a Container Terminal},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {3},
  pages        = {59--72},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017070104},
  doi          = {10.4018/IJSITA.2017070104},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/BendaoudY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/BouougadaBBM17,
  author       = {Benamar Bouougada and
                  Djelloul Bouchiha and
                  Abdelghani Bouziane and
                  Mimoun Malki},
  title        = {Ontology Authoring and Linked Data Generation from Web Applications},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {52--66},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017100105},
  doi          = {10.4018/IJSITA.2017100105},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/BouougadaBBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/DomdouzisAAD17,
  author       = {Konstantinos Domdouzis and
                  Babak Akhgar and
                  Simon Andrews and
                  Tony Day},
  title        = {Identification of Critical Factors in Large Crisis Decision Making
                  Processes Using Computational Tools: The Case of {ATHENA}},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {2},
  pages        = {11--28},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017040102},
  doi          = {10.4018/IJSITA.2017040102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/DomdouzisAAD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Heard17,
  author       = {Irvin Renzell Heard},
  title        = {An Empirical Analysis of Mobile Learning Acceptance in Puerto Rico's
                  Higher Learning Institutions},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {2},
  pages        = {1--10},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017040101},
  doi          = {10.4018/IJSITA.2017040101},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Heard17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Hernandez17,
  author       = {Michael Kevin Hernandez},
  title        = {Survey of the Different Type of Data Analytics Algorithms},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {50--64},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017010104},
  doi          = {10.4018/IJSITA.2017010104},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Hernandez17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/KouidriY17,
  author       = {Siham Kouidri and
                  Belabbas Yagoubi},
  title        = {Dynamic Data Replication Based on Tasks scheduling for Cloud Computing
                  Environment},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {40--51},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017100104},
  doi          = {10.4018/IJSITA.2017100104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/KouidriY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Lokbani17,
  author       = {Ahmed Chaouki Lokbani},
  title        = {A New Metric of Validation for Automatic Text Summarization by Extraction},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {3},
  pages        = {20--40},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017070102},
  doi          = {10.4018/IJSITA.2017070102},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Lokbani17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Mensah17,
  author       = {Isaac Kofi Mensah},
  title        = {Tackling the {ICT} Infrastructure Gap for the Successful Implementation
                  of E-Government Projects},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {2},
  pages        = {40--56},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017040104},
  doi          = {10.4018/IJSITA.2017040104},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Mensah17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/MensahM17,
  author       = {Isaac Kofi Mensah and
                  Jianing Mi},
  title        = {Citizens' Trust and E-government Services Adoption: The Role of Demographic
                  Factors},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {21--36},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017010102},
  doi          = {10.4018/IJSITA.2017010102},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/MensahM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NaikLM17,
  author       = {Ramesh Ram Naik and
                  Maheshkumar B. Landge and
                  C. Namrata Mahender},
  title        = {Plagiarism Detection in Marathi Language Using Semantic Analysis},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {30--39},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017100103},
  doi          = {10.4018/IJSITA.2017100103},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/NaikLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NairC17,
  author       = {Jessy Nair and
                  Aarthy Chellasamy},
  title        = {Technological Change Perspective for {ERP} Implementation in Small
                  and Medium Enterprises},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {2},
  pages        = {29--39},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017040103},
  doi          = {10.4018/IJSITA.2017040103},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/NairC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/NesrineMLH17,
  author       = {Lehireche Nesrine and
                  Malki Mimoun and
                  Ahmed Lehireche and
                  Reda Mohamed Hamou},
  title        = {On Demand {ETL} of {RDB} to {RDF} Mapping for Linked Enterprise Data},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {3},
  pages        = {91--100},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017070106},
  doi          = {10.4018/IJSITA.2017070106},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/NesrineMLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/OuhabMBB17,
  author       = {Abdelkrim Ouhab and
                  Mimoun Malki and
                  Djamel Berrabah and
                  Faouzi Boufar{\`{e}}s},
  title        = {An Unsupervised Entity Resolution Framework for English and Arabic
                  Datasets},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {16--29},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017100102},
  doi          = {10.4018/IJSITA.2017100102},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsita/OuhabMBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Reddi17,
  author       = {Sivaranjani Reddi},
  title        = {Privacy Preserving Data Mining Using Time Series Data Aggregation},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {1--15},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017100101},
  doi          = {10.4018/IJSITA.2017100101},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Reddi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/SadekDB17,
  author       = {Menaceur Sadek and
                  Makhlouf Derdour and
                  Abdelkrim Bouramoul},
  title        = {Personalized Online Analytical Processing in Big Data Context Using
                  User Profile and Search Context},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {67--80},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017100106},
  doi          = {10.4018/IJSITA.2017100106},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/SadekDB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Tiwari17,
  author       = {Shamik Tiwari},
  title        = {A Blind Restoration Approach for Defocused Barcode Images},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {3},
  pages        = {41--58},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017070103},
  doi          = {10.4018/IJSITA.2017070103},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Tiwari17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/WilliamsM17,
  author       = {Le Shanda Michelle Williams and
                  Michael H. McGivern},
  title        = {Women in the Military Who Have Shattered the Glass Ceiling: {A} Phenomenological
                  Study},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {1--20},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017010101},
  doi          = {10.4018/IJSITA.2017010101},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/WilliamsM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsita/Yahlali17,
  author       = {Mebarka Yahlali},
  title        = {A Survey on Bio-Inspired Method for Detection of Spamming},
  journal      = {Int. J. Strateg. Inf. Technol. Appl.},
  volume       = {8},
  number       = {3},
  pages        = {1--19},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSITA.2017070101},
  doi          = {10.4018/IJSITA.2017070101},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsita/Yahlali17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}