default search action
Search dblp for Publications
export results for "toc:db/journals/ijsita/ijsita8.bht:"
@article{DBLP:journals/ijsita/Ayed17, author = {Ahmed Ben Ayed}, title = {Permission Request Pattern Recognition in Android Malware Applications}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {1}, pages = {37--49}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017010103}, doi = {10.4018/IJSITA.2017010103}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Ayed17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/AzabouKFSV17, author = {Maha Azabou and Ka{\"{\i}}s Khrouf and Jamel Feki and Chantal Soul{\'{e}}{-}Dupuy and Nathalie Vall{\`{e}}s}, title = {Yet Another Multidimensional Model for {XML} Documents}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {3}, pages = {73--90}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017070105}, doi = {10.4018/IJSITA.2017070105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/AzabouKFSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/BendaoudY17, author = {Zakaria Bendaoud and Khadidja Yachba}, title = {Towards {A} Decision Support System for Optimization of Container Placement in a Container Terminal}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {3}, pages = {59--72}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017070104}, doi = {10.4018/IJSITA.2017070104}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/BendaoudY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/BouougadaBBM17, author = {Benamar Bouougada and Djelloul Bouchiha and Abdelghani Bouziane and Mimoun Malki}, title = {Ontology Authoring and Linked Data Generation from Web Applications}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {4}, pages = {52--66}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017100105}, doi = {10.4018/IJSITA.2017100105}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/BouougadaBBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/DomdouzisAAD17, author = {Konstantinos Domdouzis and Babak Akhgar and Simon Andrews and Tony Day}, title = {Identification of Critical Factors in Large Crisis Decision Making Processes Using Computational Tools: The Case of {ATHENA}}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {2}, pages = {11--28}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017040102}, doi = {10.4018/IJSITA.2017040102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/DomdouzisAAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Heard17, author = {Irvin Renzell Heard}, title = {An Empirical Analysis of Mobile Learning Acceptance in Puerto Rico's Higher Learning Institutions}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {2}, pages = {1--10}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017040101}, doi = {10.4018/IJSITA.2017040101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Heard17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Hernandez17, author = {Michael Kevin Hernandez}, title = {Survey of the Different Type of Data Analytics Algorithms}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {1}, pages = {50--64}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017010104}, doi = {10.4018/IJSITA.2017010104}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Hernandez17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/KouidriY17, author = {Siham Kouidri and Belabbas Yagoubi}, title = {Dynamic Data Replication Based on Tasks scheduling for Cloud Computing Environment}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {4}, pages = {40--51}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017100104}, doi = {10.4018/IJSITA.2017100104}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/KouidriY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Lokbani17, author = {Ahmed Chaouki Lokbani}, title = {A New Metric of Validation for Automatic Text Summarization by Extraction}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {3}, pages = {20--40}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017070102}, doi = {10.4018/IJSITA.2017070102}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Lokbani17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Mensah17, author = {Isaac Kofi Mensah}, title = {Tackling the {ICT} Infrastructure Gap for the Successful Implementation of E-Government Projects}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {2}, pages = {40--56}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017040104}, doi = {10.4018/IJSITA.2017040104}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Mensah17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/MensahM17, author = {Isaac Kofi Mensah and Jianing Mi}, title = {Citizens' Trust and E-government Services Adoption: The Role of Demographic Factors}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {1}, pages = {21--36}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017010102}, doi = {10.4018/IJSITA.2017010102}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/MensahM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/NaikLM17, author = {Ramesh Ram Naik and Maheshkumar B. Landge and C. Namrata Mahender}, title = {Plagiarism Detection in Marathi Language Using Semantic Analysis}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {4}, pages = {30--39}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017100103}, doi = {10.4018/IJSITA.2017100103}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/NaikLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/NairC17, author = {Jessy Nair and Aarthy Chellasamy}, title = {Technological Change Perspective for {ERP} Implementation in Small and Medium Enterprises}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {2}, pages = {29--39}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017040103}, doi = {10.4018/IJSITA.2017040103}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/NairC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/NesrineMLH17, author = {Lehireche Nesrine and Malki Mimoun and Ahmed Lehireche and Reda Mohamed Hamou}, title = {On Demand {ETL} of {RDB} to {RDF} Mapping for Linked Enterprise Data}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {3}, pages = {91--100}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017070106}, doi = {10.4018/IJSITA.2017070106}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/NesrineMLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/OuhabMBB17, author = {Abdelkrim Ouhab and Mimoun Malki and Djamel Berrabah and Faouzi Boufar{\`{e}}s}, title = {An Unsupervised Entity Resolution Framework for English and Arabic Datasets}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {4}, pages = {16--29}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017100102}, doi = {10.4018/IJSITA.2017100102}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsita/OuhabMBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Reddi17, author = {Sivaranjani Reddi}, title = {Privacy Preserving Data Mining Using Time Series Data Aggregation}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {4}, pages = {1--15}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017100101}, doi = {10.4018/IJSITA.2017100101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Reddi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/SadekDB17, author = {Menaceur Sadek and Makhlouf Derdour and Abdelkrim Bouramoul}, title = {Personalized Online Analytical Processing in Big Data Context Using User Profile and Search Context}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {4}, pages = {67--80}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017100106}, doi = {10.4018/IJSITA.2017100106}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/SadekDB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Tiwari17, author = {Shamik Tiwari}, title = {A Blind Restoration Approach for Defocused Barcode Images}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {3}, pages = {41--58}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017070103}, doi = {10.4018/IJSITA.2017070103}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Tiwari17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/WilliamsM17, author = {Le Shanda Michelle Williams and Michael H. McGivern}, title = {Women in the Military Who Have Shattered the Glass Ceiling: {A} Phenomenological Study}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {1}, pages = {1--20}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017010101}, doi = {10.4018/IJSITA.2017010101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/WilliamsM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsita/Yahlali17, author = {Mebarka Yahlali}, title = {A Survey on Bio-Inspired Method for Detection of Spamming}, journal = {Int. J. Strateg. Inf. Technol. Appl.}, volume = {8}, number = {3}, pages = {1--19}, year = {2017}, url = {https://doi.org/10.4018/IJSITA.2017070101}, doi = {10.4018/IJSITA.2017070101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsita/Yahlali17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.