Kidnap 发表于 2025-3-28 18:21:44

http://reply.papertrans.cn/24/2367/236686/236686_41.png

纵火 发表于 2025-3-28 20:36:43

,Impact of IT Service Provider’s Expertise and Customer’s Sociability on Continuous Intention to Useects on relationship quality. Also, the two factors of relationship quality, trust and commitment, have positive effects on the intention to use. In addition, trust is positively related to commitment. In conclusion, service provider’s expertise and customers’ sociability are the factors of IT service’s success.

生锈 发表于 2025-3-29 02:48:18

ASF: Improving Android Security with Layered Structure Instrumentation, safety of these operations based on ASF. Our security framework is implemented through layered structure, with minimal change to the existing Android code. A case study is presented as a preliminary validation of the security framework that helps users protect privacies.

愤世嫉俗者 发表于 2025-3-29 06:04:48

Conference proceedings 2012ng for e-business, e-business strategic management and economics development, e-business education, entrepreneurship and e-learning, digital economy strategy, as well as internet and e-commerce policy.

Dawdle 发表于 2025-3-29 10:56:41

http://reply.papertrans.cn/24/2367/236686/236686_45.png

莎草 发表于 2025-3-29 12:40:16

http://reply.papertrans.cn/24/2367/236686/236686_46.png

arthroscopy 发表于 2025-3-29 18:50:38

http://reply.papertrans.cn/24/2367/236686/236686_47.png

obstinate 发表于 2025-3-29 21:59:03

https://doi.org/10.1007/978-0-387-68257-0c data, and a weighted sum of risk values constitutes the fitness to lead the evolution of populations. Experimental results demonstrate that the presented model and algorithm provide effective and comprehensive information for decision makers to select appropriate web services for composition.

glucagon 发表于 2025-3-30 01:48:41

,The Foundation — Graph Grammars,l large dataset classification problem into many small dataset classification problems. Experiment results on UCI datasets demonstrate that the proposed method has advantages in accuracy in comparison to other classification approaches.

Engaging 发表于 2025-3-30 07:49:49

Conclusions and Future Perspective,est inputs; generating executable security test case. Also, we proposed an algorithm for generating security testing sequences and conducted an empirical study to show the feasibility and effectiveness of our approach.
页: 1 2 3 4 [5] 6 7 8
查看完整版本: Titlebook: Contemporary Research on E-business Technology and Strategy; International Confer Vasil Khachidze,Tim Wang,Alicia Lim Conference proceeding