Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An E-Negotiation Agent Using Rule Based and Case Based Approaches: A Comparative Study with Bilateral E-Negotiation with Prediction
(Articles)
Sheetal R. Vij
,
Amruta More
,
Debajyoti Mukhopadhyay
,
Avinash J. Agrawal
Journal of Software Engineering and Applications
Vol.8 No.10
,October 12, 2015
DOI:
10.4236/jsea.2015.810049
4,979
Downloads
5,751
Views
Citations
Apply AHP for Resource Allocation Problem in Cloud
(Articles)
Avtar Singh
,
Kamlesh Dutta
Journal of Computer and Communications
Vol.3 No.10
,October 23, 2015
DOI:
10.4236/jcc.2015.310002
3,609
Downloads
4,499
Views
Citations
The Reform of Higher Education through Alternative University Teaching Models
(Articles)
Stoyan Denchev
,
Ivanka Pavlova
,
Miriyana Pavlova
Creative Education
Vol.7 No.2
,February 26, 2016
DOI:
10.4236/ce.2016.72029
2,548
Downloads
3,514
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,456
Downloads
4,953
Views
Citations
Cloud Computing Perceived Importance in the Middle Eastern Firms: The Cases of Jordan, Saudi Arabia and United Arab Emirates from the Operational Level
(Articles)
Ra’ed Mas’adeh
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83011
1,733
Downloads
3,356
Views
Citations
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
(Articles)
P. Premkumar
,
D. Shanthi
Circuits and Systems
Vol.7 No.11
,September 13, 2016
DOI:
10.4236/cs.2016.711307
1,831
Downloads
3,104
Views
Citations
Scalability of the DVFS Power Management Technique as Applied to 3-Tier Data Center Architecture in Cloud Computing
(Articles)
Sulieman Bani-Ahmad
,
Saleh Sa’adeh
Journal of Computer and Communications
Vol.5 No.1
,January 20, 2017
DOI:
10.4236/jcc.2017.51007
1,970
Downloads
3,441
Views
Citations
Survey on Public Key Cryptography Scheme for Securing Data in Cloud Computing
(Articles)
J. Athena
,
V. Sumathy
Circuits and Systems
Vol.8 No.3
,March 31, 2017
DOI:
10.4236/cs.2017.83005
2,058
Downloads
4,508
Views
Citations
Design and Implementation of a Real Time Wireless Monitor System for Urinary Incontinence
(Articles)
Xuhui Nie
,
Zongyu Song
,
Jinsong Yang
,
Ziwei Dengyun
,
Mingxi Yin
,
Xiaohui Duan
,
Bingli Jiao
Int'l J. of Communications, Network and System Sciences
Vol.10 No.5B
,May 26, 2017
DOI:
10.4236/ijcns.2017.105B025
1,263
Downloads
2,167
Views
Citations
Subject Oriented Autonomic Cloud Data Center Networks Model
(Articles)
Hang Qin
,
Li Zhu
Journal of Data Analysis and Information Processing
Vol.5 No.3
,July 25, 2017
DOI:
10.4236/jdaip.2017.53007
1,042
Downloads
1,875
Views
Citations
Cloud Enabled Text Reader for Individuals with Vision Impairment
(Articles)
Abul K. M. Azad
,
Mohammed Misbahuddin
Advances in Internet of Things
Vol.7 No.4
,September 5, 2017
DOI:
10.4236/ait.2017.74007
1,344
Downloads
2,687
Views
Citations
Implementing an Information System Strategy: A Cost, Benefit, and Risk Analysis Framework for Evaluating Viable IT Alternatives in the US Federal Government
(Articles)
Sofia E. Espinoza
,
Joan S. Brooks
,
John Araujo
Int'l J. of Communications, Network and System Sciences
Vol.11 No.6
,June 28, 2018
DOI:
10.4236/ijcns.2018.116007
1,218
Downloads
3,424
Views
Citations
This article belongs to the Special Issue on
Management Information System
Enterprise Cloud Computing Project for Connecting Higher Education Institutions: A Case Study of the UAE
(Articles)
Mounir M. El Khatib
,
Gouher Ahmed
,
Ahmed Al-Nakeeb
Modern Economy
Vol.10 No.1
,January 14, 2019
DOI:
10.4236/me.2019.101010
936
Downloads
2,443
Views
Citations
Current Status of the Use of Cloud Computing in SMEs in the City of Latacunga, Ecuador
(Articles)
Gabriela Cajamarca-Palomo
,
Mauricio Quisimalin-Santamaría
,
Patricio Medina-Chicaiza
Open Journal of Business and Management
Vol.7 No.2
,April 4, 2019
DOI:
10.4236/ojbm.2019.72043
1,086
Downloads
2,441
Views
Citations
Towards Attaining Reliable and Efficient Green Cloud Computing Using Micro-Smart Grids to Power Internet Data Center
(Articles)
Mohammed Mansur Ibrahim
,
Anas Ahmad Danbala
,
Mustapha Ismail
Journal of Computer and Communications
Vol.7 No.7
,July 18, 2019
DOI:
10.4236/jcc.2019.77016
1,003
Downloads
2,184
Views
Citations
An Overview of “Optimal Input-Output Planning Model and Cross-Boundary Economic Management Information System”
—Organic Combinations and Connections between the Optimal Input-Output Planning Model and Big Data, New Cloud Computing Technology, Internet of Things or New Internet Industry
(Articles)
Ning Kang
American Journal of Industrial and Business Management
Vol.9 No.9
,September 16, 2019
DOI:
10.4236/ajibm.2019.99118
631
Downloads
1,954
Views
Citations
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing
(Articles)
Mohammad Anwar Hossain
,
Ahsan Ullah
,
Newaz Ibrahim Khan
,
Md Feroz Alam
Journal of Information Security
Vol.10 No.4
,October 14, 2019
DOI:
10.4236/jis.2019.104012
1,232
Downloads
5,088
Views
Citations
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
(Articles)
Abou_el_ela Abdou Hussien
Journal of Information Security
Vol.12 No.1
,January 15, 2021
DOI:
10.4236/jis.2021.121003
966
Downloads
3,624
Views
Citations
Fractional Rider Deep Long Short Term Memory Network for Workload Prediction-Based Distributed Resource Allocation Using Spark in Cloud Gaming
(Articles)
Koné Kigninman Désiré
,
Kouassi Adlès Francis
,
Konan Hyacinthe Kouassi
,
Eya Dhib
,
Nabil Tabbane
,
Olivier Asseu
Engineering
Vol.13 No.3
,March 18, 2021
DOI:
10.4236/eng.2021.133011
507
Downloads
1,213
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
522
Downloads
2,552
Views
Citations
<
...
6
7
8
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top