Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Ecosystem (ECO) Approach on Wisdom Societies and Sociotechnical Systems
(Articles)
Antonio José Balloni
,
Adalberto Mantovani Martiniano de Azevedo
,
Marco Antonio Silveira
Open Journal of Political Science
Vol.2 No.3
,November 1, 2012
DOI:
10.4236/ojps.2012.23004
5,116
Downloads
10,088
Views
Citations
Certainty of patient survival with reference to game information dynamic model
(Articles)
Hiroyuki Iida
,
Takeo Nakagawa
,
Nathan Nossal
Open Journal of Preventive Medicine
Vol.2 No.4
,November 29, 2012
DOI:
10.4236/ojpm.2012.24068
3,556
Downloads
6,061
Views
Citations
Reasoning about Context Information in Cloud Computing Environments
(Articles)
Norihiro Kamide
,
Yishui Zhu
Journal of Software Engineering and Applications
Vol.5 No.11A
,November 30, 2012
DOI:
10.4236/jsea.2012.531109
3,514
Downloads
6,047
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
QoS Based Framework for Effective Web Services in Cloud Computing
(Articles)
Debajyoti Mukhopadhyay
,
Falguni J. Chathly
,
Nagesh N. Jadhav
Journal of Software Engineering and Applications
Vol.5 No.11A
,November 30, 2012
DOI:
10.4236/jsea.2012.531110
5,242
Downloads
9,123
Views
Citations
This article belongs to the Special Issue on
Cloud Computing
Supply Chain Integration, a Chain of Efficient Utilization of Information Technology: Its Benefits & Challenges
(Articles)
Regine Adele Ngono Fouda
Open Journal of Applied Sciences
Vol.2 No.4
,December 26, 2012
DOI:
10.4236/ojapps.2012.24044
4,888
Downloads
10,081
Views
Citations
Proposal for the Introduction of the Spatial Perspective in the Application of Global Sensitivity Analysis
(Articles)
Wenseslao Plata-Rocha
,
Montserrat Gómez-Delgado
,
Joaquín Bosque-Sendra
Journal of Geographic Information System
Vol.4 No.6
,December 31, 2012
DOI:
10.4236/jgis.2012.46055
4,641
Downloads
7,238
Views
Citations
On Efficient Monitoring of Process Dispersion using Interquartile Range
(Articles)
Shabbir Ahmad
,
Zhengyan Lin
,
Saddam Akber Abbasi
,
Muhammad Riaz
Open Journal of Applied Sciences
Vol.2 No.4B
,January 10, 2013
DOI:
10.4236/ojapps.2012.24B010
4,907
Downloads
7,240
Views
Citations
Formation of Professional Competence of Students in Engineering Education
(Articles)
Elena Lisichko
,
Ekaterina Postnikova
,
Sergei I. Tverdokhlebov
Creative Education
Vol.3 No.7B
,January 15, 2013
DOI:
10.4236/ce.2012.37B027
4,821
Downloads
6,781
Views
Citations
Information Fusion for Process Acquisition in the Operating Room
(Articles)
Thomas Neumuth
,
Christian Meißner
Open Journal of Applied Sciences
Vol.2 No.4B
,January 16, 2013
DOI:
10.4236/ojapps.2012.24B044
3,559
Downloads
5,150
Views
Citations
Reliable Multi-path Routing in Selfish Networks with Hidden Information and Actions
(Articles)
Gang Peng
,
Mingrui Zou
,
Sammy Chan
Journal of Software Engineering and Applications
Vol.5 No.12B
,January 18, 2013
DOI:
10.4236/jsea.2012.512B007
4,162
Downloads
5,742
Views
Citations
Inference for Interest Rate Models Using Milstein’s Approximation
(Articles)
Theodoro Koulis
,
Aera Thavaneswaran
Journal of Mathematical Finance
Vol.3 No.1
,February 28, 2013
DOI:
10.4236/jmf.2013.31010
3,693
Downloads
7,359
Views
Citations
On the Security of Quantum Key Distribution Ping-Pong Protocol
(Articles)
Masakazu Yoshida
,
Takayuki Miyadera
,
Hideki Imai
Journal of Quantum Information Science
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/jqis.2013.31004
4,379
Downloads
7,481
Views
Citations
A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network
(Articles)
Latha Venkatesan
,
S. Shanmugavel
,
Chandrasekaran Subramaniam
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53006
7,386
Downloads
14,043
Views
Citations
Sensitivity of the Investments of Sub-Saharan Firms to Financial Constraints
(Articles)
Elie Ngongang
Journal of Mathematical Finance
Vol.3 No.1A
,March 29, 2013
DOI:
10.4236/jmf.2013.31A020
3,747
Downloads
6,714
Views
Citations
This article belongs to the Special Issue on
Forecasting and Portfolio Construction
Visualizing Association Rules Using Linked Matrix,Graph, and Detail Views
(Articles)
Yoones A. Sekhavat
,
Orland Hoeber
International Journal of Intelligence Science
Vol.3 No.1A
,March 29, 2013
DOI:
10.4236/ijis.2013.31A005
7,912
Downloads
14,316
Views
Citations
This article belongs to the Special Issue on
Knowledge Discovery
A Critical Analysis of Selected Policy Making Decisions in the US and the UK with Regard to the Implementation of Information and Communication Technology (ICT) in National State Primary and Secondary School Education Systems
(Articles)
Mark Brooke
Open Journal of Modern Linguistics
Vol.3 No.1
,March 29, 2013
DOI:
10.4236/ojml.2013.31012
9,142
Downloads
18,093
Views
Citations
Spatiotemporal Urban Land Use Changes in the Changzhutan Region of Hunan Province in China
(Articles)
Bin Quan
,
Zhikun Xiao
,
M. J. M. Römkens
,
Yijun Bai
,
Shi Lei
Journal of Geographic Information System
Vol.5 No.2
,April 16, 2013
DOI:
10.4236/jgis.2013.52014
5,114
Downloads
8,991
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,266
Downloads
8,668
Views
Citations
A Neural Network and Expert Systems Based Model for Measuring Business Effectiveness of Information Technology Investment
(Articles)
Mahmud Mavaahebi
,
Ken Nagasaka
American Journal of Industrial and Business Management
Vol.3 No.2
,April 25, 2013
DOI:
10.4236/ajibm.2013.32030
5,735
Downloads
9,264
Views
Citations
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images
(Articles)
Yanping Zhang
,
Juan Jiang
,
Yongliang Zha
,
Heng Zhang
,
Shu Zhao
International Journal of Intelligence Science
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ijis.2013.32009
8,573
Downloads
14,216
Views
Citations
<
...
48
49
50
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top