{"title":"Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities","authors":"Yijia Guo, Yuanwei Hou, Yongle Hao, W. Xu","doi":"10.1007/978-3-030-50399-4_28","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_28","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129989092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Choice Between Foreign Direct Investment and Export with Industry Competition and Marginal Cost","authors":"Chun-ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang, Zolzaya Batjargal","doi":"10.1007/978-3-030-50399-4_49","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_49","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocol Design for Boarding Confirmation Through Arduino Sensing","authors":"Jiyoon Kim, S. Ahn, Jiyoung Lim","doi":"10.1007/978-3-030-50399-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_8","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132195415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Blockchain Technology in Data Management of University Scientific Research","authors":"Xiao-Feng Zhang","doi":"10.1007/978-3-030-50399-4_60","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_60","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130674273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Inventory Model for Perishable Items Under Upstream and Downstream Trade Credit","authors":"Ya-Lan Chan, Sue-Ming Hsu, Mei-Hua Liao","doi":"10.1007/978-3-030-50399-4_54","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_54","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123018556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiuser Channel Access with RTS-CTS Algorithm for Li-Fi Communications","authors":"Hyunhee Park","doi":"10.1007/978-3-030-50399-4_22","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_22","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investor Sentiment and Governance Mechanisms","authors":"Mei-Hua Liao, Chieh-Lin He, Ruirui Cui, Ya-Lan Chan","doi":"10.1007/978-3-030-50399-4_57","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_57","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal of a Disaster Evacuation Support System Using Beacon","authors":"Tomoyuki Ishida, Kanae Sakamoto","doi":"10.1007/978-3-030-50399-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_11","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131854584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the Risk of Data Breach Incidents at the Firm Level","authors":"Kazuki Ikegami, Hiroaki Kikuchi","doi":"10.1007/978-3-030-50399-4_14","DOIUrl":"https://doi.org/10.1007/978-3-030-50399-4_14","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}