International Conference on eTechnologies最新文献

筛选
英文 中文
PHEN: Parkinson Helper Emergency Notification System Using Bayesian Belief Network 基于贝叶斯信念网络的帕金森助手紧急通知系统
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_14
H. Mcheick, Malak Khreis, Hala Sweidan, I. Zaarour
{"title":"PHEN: Parkinson Helper Emergency Notification System Using Bayesian Belief Network","authors":"H. Mcheick, Malak Khreis, Hala Sweidan, I. Zaarour","doi":"10.1007/978-3-319-17957-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_14","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114181128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Examining the Effects of Perceived Enjoyment and Habit on Smartphone Addiction: The Role of User Type 研究感知享受和习惯对智能手机成瘾的影响:用户类型的作用
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_15
Chongyang Chen, Kem Z. K. Zhang, Sesia J. Zhao
{"title":"Examining the Effects of Perceived Enjoyment and Habit on Smartphone Addiction: The Role of User Type","authors":"Chongyang Chen, Kem Z. K. Zhang, Sesia J. Zhao","doi":"10.1007/978-3-319-17957-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_15","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Testing Policy-Based e-Health Monitoring Processes Using TTCN-3 使用TTCN-3测试基于策略的电子健康监测流程
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_13
B. Stepien, Benjamin Eze, L. Peyton
{"title":"Testing Policy-Based e-Health Monitoring Processes Using TTCN-3","authors":"B. Stepien, Benjamin Eze, L. Peyton","doi":"10.1007/978-3-319-17957-5_13","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_13","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Quality-Driven SOA Systems Refactoring Through Planning 通过计划实现质量驱动的SOA系统重构
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_18
Mathieu Nayrolles, É. Beaudry, Naouel Moha, Petko Valtchev, A. Hamou-Lhadj
{"title":"Towards Quality-Driven SOA Systems Refactoring Through Planning","authors":"Mathieu Nayrolles, É. Beaudry, Naouel Moha, Petko Valtchev, A. Hamou-Lhadj","doi":"10.1007/978-3-319-17957-5_18","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_18","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geolocation Hazards in Geosocial Networks 地理社交网络中的地理位置危害
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_5
Zakaria Sahnoune, Cheu Yien Yep, Esma Aïmeur
{"title":"Geolocation Hazards in Geosocial Networks","authors":"Zakaria Sahnoune, Cheu Yien Yep, Esma Aïmeur","doi":"10.1007/978-3-319-17957-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_5","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding Consumer Participation on Companies' Brand Microblogs 了解消费者对企业品牌微博的参与
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_8
Kem Z. K. Zhang, M. Benyoucef, Sesia J. Zhao
{"title":"Understanding Consumer Participation on Companies' Brand Microblogs","authors":"Kem Z. K. Zhang, M. Benyoucef, Sesia J. Zhao","doi":"10.1007/978-3-319-17957-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_8","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122086085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Technology Artifacts in the Regulatory Compliance of Business Processes: A Meta-Analysis 业务流程法规遵从性中的信息技术工件:元分析
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_6
O. Akhigbe, Daniel Amyot, Gregory Richards
{"title":"Information Technology Artifacts in the Regulatory Compliance of Business Processes: A Meta-Analysis","authors":"O. Akhigbe, Daniel Amyot, Gregory Richards","doi":"10.1007/978-3-319-17957-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_6","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards Automating Business Process Compensation Scoping Logic 迈向自动化业务流程补偿范围逻辑
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_2
A. Boubaker, H. Mili, Abderrahmane Leshob, Yasmine Charif
{"title":"Towards Automating Business Process Compensation Scoping Logic","authors":"A. Boubaker, H. Mili, Abderrahmane Leshob, Yasmine Charif","doi":"10.1007/978-3-319-17957-5_2","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_2","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recommender Engines Under the Influence of Popularity 受人气影响的推荐引擎
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_9
G. Blot, P. Saurel, F. Rousseaux
{"title":"Recommender Engines Under the Influence of Popularity","authors":"G. Blot, P. Saurel, F. Rousseaux","doi":"10.1007/978-3-319-17957-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_9","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information Flow-Based Security Levels Assessment for Access Control Systems 基于信息流的门禁系统安全级别评估
International Conference on eTechnologies Pub Date : 2015-05-12 DOI: 10.1007/978-3-319-17957-5_7
S. Boulares, K. Adi, L. Logrippo
{"title":"Information Flow-Based Security Levels Assessment for Access Control Systems","authors":"S. Boulares, K. Adi, L. Logrippo","doi":"10.1007/978-3-319-17957-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-17957-5_7","url":null,"abstract":"","PeriodicalId":306729,"journal":{"name":"International Conference on eTechnologies","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信