default search action
Search dblp for Publications
export results for "toc:db/journals/ijwa/ijwa5.bht:"
@article{DBLP:journals/ijwa/Ahmed13, author = {Eya Ben Ahmed}, title = {Challenges in Ontology-Based Association Rules Mining}, journal = {Int. J. Web Appl.}, volume = {5}, number = {4}, pages = {187--194}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n4/4.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/Ahmed13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/Benmerzoug13, author = {Djamel Benmerzoug}, title = {Architecting End-to-End Convergence of Cloud Services: An Agent-Based Approach}, journal = {Int. J. Web Appl.}, volume = {5}, number = {3}, pages = {107--116}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n3/1.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/Benmerzoug13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/BeseisoAI13, author = {Majdi Beseiso and Abdul Rahim Ahmad and Roslan Ismail}, title = {Email Ontology Learning System Based on Fuzzy Logic}, journal = {Int. J. Web Appl.}, volume = {5}, number = {1}, pages = {37--45}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n1/4.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/BeseisoAI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/BouanakaBZ13, author = {Mohamed Ali Bouanaka and Djamel Benmerzoug and Nacereddine Zarour}, title = {Interaction Protocols Based Approach for Reliable Web Services Composition}, journal = {Int. J. Web Appl.}, volume = {5}, number = {2}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n2/1.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/BouanakaBZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/BrionesCC13, author = {Jose Maria Briones and Mario Alejandro Coronel and Patricia Chavez{-}Burbano}, title = {Case of Study: Identity Theft in a University WLAN, Evil Twin and Cloned Authentication Web Interface}, journal = {Int. J. Web Appl.}, volume = {5}, number = {2}, pages = {66--73}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n2/2.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/BrionesCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/GhaliQMOA13, author = {Btihal El Ghali and Abderrahim El Qadi and Omar El Midaoui and Mohamed Ouadou and Driss Aboutajdine}, title = {Probabilistic Query Expansion Method Based on a Query Recommendation Algorithm}, journal = {Int. J. Web Appl.}, volume = {5}, number = {1}, pages = {1--12}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n1/1.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/GhaliQMOA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/Gharzouli13, author = {Mohamed Gharzouli}, title = {Reuse of Legacy Softwares in SOA, {A} Case Study of the "Next Version" Technique}, journal = {Int. J. Web Appl.}, volume = {5}, number = {4}, pages = {168--175}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n4/2.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/Gharzouli13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/GiasRIS13, author = {Alim Ul Gias and Rayhanur Rahman and Asif Imran and Kazi Sakib}, title = {TFPaaS: Test-first Performance as a Service to Cloud for Software Testing Environment}, journal = {Int. J. Web Appl.}, volume = {5}, number = {4}, pages = {153--167}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n4/1.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/GiasRIS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/GoutamVA13, author = {Deepshikha Goutam and Ashok Verma and Neha Agrawal}, title = {The study of the Cloud impact in the CloudSim Simulator Environment}, journal = {Int. J. Web Appl.}, volume = {5}, number = {4}, pages = {176--186}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n4/3.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/GoutamVA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/Gu13, author = {Yingqiong Gu}, title = {How long can Facebook survive? Complex Physics Model for Predicting the Life Cycle of Social Network}, journal = {Int. J. Web Appl.}, volume = {5}, number = {1}, pages = {46--48}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n1/5.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/Gu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/HamidaKA13, author = {Souraya Hamida and Okba Kazar and Youssef Amghar}, title = {An Agent Oriented Approach for Modeling Web Services in Mobile Environments}, journal = {Int. J. Web Appl.}, volume = {5}, number = {1}, pages = {13--26}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n1/2.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/HamidaKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/Jamil13, author = {Noreen Jamil}, title = {Constraint Solvers for User Interface Layout}, journal = {Int. J. Web Appl.}, volume = {5}, number = {3}, pages = {136--146}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n3/4.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/Jamil13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/LubaszewskiKD13, author = {Wieslaw Lubaszewski and Michal Korzycki and Krzysztof Dorosz}, title = {Semantic Approach for Web Information Monitoring}, journal = {Int. J. Web Appl.}, volume = {5}, number = {1}, pages = {27--36}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n1/3.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/LubaszewskiKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/RabhiE13, author = {Issam Rabhi and Imen Essoussi}, title = {QoS Testing and Symbolic Techniques for Composite Web Service}, journal = {Int. J. Web Appl.}, volume = {5}, number = {2}, pages = {91--101}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n2/4.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/RabhiE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/SazioC13, author = {Margaret Sazio and Miriam A. M. Capretz}, title = {Web Service Semantic Access Control}, journal = {Int. J. Web Appl.}, volume = {5}, number = {3}, pages = {117--127}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n3/2.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/SazioC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/Vijayalakshmi13, author = {C. Vijayalakshmi}, title = {An Integrated Development Environment to Establish Web Services in Grid Computing Using .NET Framework 4.5 and Visual Basic 2012}, journal = {Int. J. Web Appl.}, volume = {5}, number = {2}, pages = {74--90}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n2/3.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/Vijayalakshmi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwa/ZhaoCL13, author = {Xiping Zhao and Xiaodong Cheng and Xiaofei Li}, title = {Illegal Vehicle Parking Detection Based on Online Learning}, journal = {Int. J. Web Appl.}, volume = {5}, number = {3}, pages = {128--135}, year = {2013}, url = {http://www.dline.info/ijwa/fulltext/v5n3/3.pdf}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwa/ZhaoCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.