World Conference on Information Technology最新文献

筛选
英文 中文
Information fusion with dempster-shafer evidence theory for software defect prediction 基于dempster-shafer证据理论的信息融合软件缺陷预测
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2010.12.100
Aytunç Paksoy, Mehmet Göktürk
{"title":"Information fusion with dempster-shafer evidence theory for software defect prediction","authors":"Aytunç Paksoy, Mehmet Göktürk","doi":"10.1016/j.procs.2010.12.100","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.100","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A tool for evaluating event based middleware 用于评估基于事件的中间件的工具
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2011.01.005
C. Ivan, V. Dădârlat
{"title":"A tool for evaluating event based middleware","authors":"C. Ivan, V. Dădârlat","doi":"10.1016/j.procs.2011.01.005","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.005","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133650411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The analysis of correlation between Information Technology (IT) and educational planning 信息技术(IT)与教育规划的相关性分析
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2011.01.041
M. Damavandi, Zohreh Bagherzadeh, S. Shahmir
{"title":"The analysis of correlation between Information Technology (IT) and educational planning","authors":"M. Damavandi, Zohreh Bagherzadeh, S. Shahmir","doi":"10.1016/j.procs.2011.01.041","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.041","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy cognitive mapping in factor elimination: A case study for innovative power and risks 因子消除中的模糊认知映射:创新动力与风险的个案研究
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2010.12.181
Ayça Altay, G. Kayakutlu
{"title":"Fuzzy cognitive mapping in factor elimination: A case study for innovative power and risks","authors":"Ayça Altay, G. Kayakutlu","doi":"10.1016/j.procs.2010.12.181","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.181","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Suspicious activity reporting using dynamic bayesian networks 使用动态贝叶斯网络报告可疑活动
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2010.12.162
Saleha Raza, Sajjad Haider
{"title":"Suspicious activity reporting using dynamic bayesian networks","authors":"Saleha Raza, Sajjad Haider","doi":"10.1016/j.procs.2010.12.162","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.162","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124837272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Early childhood teachers' thoughts and practices about the use of computers in early childhood education 幼儿教师对计算机在幼儿教育中应用的思考与实践
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2011.01.050
Özlem Yurt, Nilgün Cevher-Kalburan
{"title":"Early childhood teachers' thoughts and practices about the use of computers in early childhood education","authors":"Özlem Yurt, Nilgün Cevher-Kalburan","doi":"10.1016/j.procs.2011.01.050","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.050","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127173865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A novel intrusion detection system by using intelligent data mining in weka environment 基于weka环境的智能数据挖掘入侵检测系统
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2010.12.198
Muamer N. Mohammad, N. Sulaiman, Osama Abdulkarim Muhsin
{"title":"A novel intrusion detection system by using intelligent data mining in weka environment","authors":"Muamer N. Mohammad, N. Sulaiman, Osama Abdulkarim Muhsin","doi":"10.1016/j.procs.2010.12.198","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.198","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Condition aware robust routing algorithm with cross layer technique for ad hoc situations 基于交叉层技术的条件感知鲁棒路由算法
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2010.12.116
Mehdi Rajabzadeh, F. Adibniya, M. Ghasemzadeh
{"title":"Condition aware robust routing algorithm with cross layer technique for ad hoc situations","authors":"Mehdi Rajabzadeh, F. Adibniya, M. Ghasemzadeh","doi":"10.1016/j.procs.2010.12.116","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.116","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125396303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Barriers to e-teaching and e-learning 电子教学和电子学习的障碍
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2010.12.129
A. Assareh, M. H. Bidokht
{"title":"Barriers to e-teaching and e-learning","authors":"A. Assareh, M. H. Bidokht","doi":"10.1016/j.procs.2010.12.129","DOIUrl":"https://doi.org/10.1016/j.procs.2010.12.129","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
The effect of sport activity and gender differences on self-perception in adolescents 体育活动与性别差异对青少年自我知觉的影响
World Conference on Information Technology Pub Date : 1900-01-01 DOI: 10.1016/j.procs.2011.01.044
Sheida Ghanbari Ghooshchy, Shilan Kameli, M. Jahromi
{"title":"The effect of sport activity and gender differences on self-perception in adolescents","authors":"Sheida Ghanbari Ghooshchy, Shilan Kameli, M. Jahromi","doi":"10.1016/j.procs.2011.01.044","DOIUrl":"https://doi.org/10.1016/j.procs.2011.01.044","url":null,"abstract":"","PeriodicalId":345840,"journal":{"name":"World Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130816546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信