| Home | Editorial Board | Aims & Scope | Information for Authors | Subscription | ICIC-ELB | IJICIC |
| The Worm Diffusion Mechanism of the Chinese Farmer's Adoption Behavior of Mobile E-Commerce under Social Network Perspective | 1-6 |
|
| Huipo Wang and Yunfu Huo | ||
| Factors Affecting Users' Acceptance of SMS Advertising: An Empirical Study | 7-13 |
|
| Wenli Li and Gongmei Li | ||
| Mining Top-Rank-K Erasable Itemsets | 15-20 |
|
| Zhihong Deng and Xiaoran Xu | ||
| Reducing Medication Errors Based on Auto-ID Technologies in Hospitals | 21-26 |
|
| Jong Soo Cho, Jaegon Jung and Dongsoo Kim | ||
| Research on the Construction and Assessment of the Technical Control Models in Network Information Communication | 27-33 |
|
| Yao Liu | ||
| Outlier Detection of Celestial Spectra Based on Modified GA | 35-40 |
|
| Jingchang Pan, Peng Wei, Caiming Zhang and Ali Luo | ||
| Data Gathering Scheme with Transmission Power Control for Multiple-Sink and Large-Scale Wireless Sensor Networks | 41-48 |
|
| Masahito Maki, Akihide Utani and Hisao Yamamoto | ||
| Density-Based Subspace Clustering over Decayed Windows on Data Streams | 49-54 |
|
| Jiadong Ren, Shiyuan Cao and Changzhen Hu | ||
| A Study on Premium Marketing: The Case of Lexus in Japan | 55-58 |
|
| Takanori Osaki | ||
| A Deep Web Query Interface Automatic Identification Approach Based on SVM | 59-64 |
|
| Fuzhi Zhang, Junfeng Chang and Xianshuang Zhang | ||
| Fuzzy Sentiment Inference (FSI) of Online Reviews for Consumer Recommendation | 65-70 |
|
| Narisa Zhao, Yuan Li, Deli Yang and Ying Liu | ||
| Semantic Similarity between Complex Named Entities: An Approach Using Multiple Web Resources | 71-76 |
|
| Hui Liu and Yuquan Chen | ||
| Using Genetic Algorithm to Manage and Schedule Temperature Sensor Calibration | 77-82 |
|
| Teerawat Thepmanee and Ruedee Masuchun | ||
| Context Tree Model for Knowledge Reuse | 83-88 |
|
| Jianjun Wang, Lujun Miao and Ping He | ||
| Feature Selection Method and Impact Power Factor for Watermelon Maturity Detection | 89-94 |
|
| Guan-Dong Gao, Gui-Fa Teng, Ke Xiao and Xiao-Ru Zhang | ||
| Categories and New Developments of Three-Dimensional Reconstruction Using Triangulation Mesh | 95-99 |
|
| Yongde Zhang, Yanju Liu and Xuefeng Dai | ||
| Japanese Dependency Analysis by Combining Graph-Based Model with Transition-Based Model | 101-106 |
|
| Huiwei Zhou, Degen Huang and Jie Gao | ||
| Employee Performance Assessment of State-Owned Enterprise Based on Super-Efficient DEA Model | 107-112 |
|
| Chengcheng Bai, Junhai Ma and Chengyi Xia | ||
| An Algorithm Based on Attributed Relational Graph for Name Disambiguation | 113-118 |
|
| Jingfeng Guo, Dandan Hao and Chao Zheng | ||
| Robust Passive Control for Uncertain Nonlinear Neutral Markovian Jump Systems with Mode-Dependent Time-Delays | 119-126 |
|
| Jiqing Qiu, Kunfeng Lu, Magdi S. Mahmoud, Na Yao and Xiaoming Du | ||
| An Integrated Representation of Context-Based Demand and Supply Knowledge for Supporting Foreign Students' Chinese Mobile Language Learning | 127-134 |
|
| Khalil Al-mekhlafi, Xiangpei Hu, Lijun Sun and Ziguang Zheng | ||
| A Resistance Capability Enhanced Trustworthiness Evaluation Approach for Web Services | 135-140 |
|
| Fuzhi Zhang, Panpan Jia and Jinbo Chao | ||
| Equipment-Level Planned Capacity Modeling Based on Time States Analysis and Sensitivity Analysis in Semiconductor Manufacturing | 141-146 |
|
| Bo Li and Wenrong Li | ||
| A Selected-Relay Scheme in Wireless Sensor Network | 147-153 |
|
| Xuefen Zhang, Changchuan Yin, Fangzhen Li and Jie Ding | ||
| Cluster Number Estimation Based on Multiway Normalized Cut Criterion in Spectral Clustering | 155-161 |
|
| Sumuya, Chonghui Guo and Yunhui Zang | ||
| A Novel Structure of FPGA-Based Viterbi Decoder | 163-168 |
|
| Honglie Zhang, Guoyin Zhang, Aihong Yao and Ling Li | ||
| Analysis of Business Process Efficiency Based on Task Assignments | 169-173 |
|
| Zhenguo Wang, Jaehyun Kong, Hyerim Bae and Dong-Soo Kim | ||
| Detection of Abnormal Behavior for Elderly Based on Human Motion Trajectory | 175-181 |
|
| Haitao Li and Lingfu Kong | ||
| Multi-Objective Product Portfolio Selection Based on Association Mining for Cross-Selling Consideration | 183-188 |
|
| Zhihong Zhang, Jisong Kou, Fuzan Chen and Minqiang Li | ||
| A Fair Payment Protocol Based on Mobile Agent without TTP | 189-194 |
|
| Baowen Wang, Xiuxian Zheng, Jie Zhang and Wenyuan Liu | ||
| A Generalized Signcryption Scheme with Forward Security of Multiple Private Key Generators | 195-200 |
|
| Wenyuan Liu, Zecui Xie, Jie Zhang, Baowen Wang and Yali Si | ||
| Content- and Semantic-Based Progressive Multimodal Image Retrieval | 201-206 |
|
| Haiyu Song, Xiongfei Li, Pengjie Wang and Xiaoli Zhang | ||
| The Case Study of RFID Innovative Application Services in National Palace Museum | 207-212 |
|
| Tsong-Yi Chen, Vaci?Istanda and Chen-Wo Kuo | ||
| An Image Retrieval Method Based on Multiple Hyperspheres OC-SVM Hashing | 213-218 |
|
| Haiyan Fu, Xiangwei Kong, Nan Yang and Jianhui Zhou | ||
| Synchronization for a Class of Dynamical Complex Networks with Coupling-Delay | 219-224 |
|
| Xinbin Li, Lamei Wang and Xian Liu | ||
| Event-Based Real-Time Process Monitoring Using State Transition Lattice | 225-230 |
|
| Bokyoung Kang, Nam Wook Cho, Jae-Yoon Jung and Suk-Ho Kang | ||
| Applying a System of Computer Speech Synthesis to Special Educational Student of Vocational School for Administering Motorcycle Driver's License | 231-235 |
|
| L. T. Morris, Hong-Min Lin, Shu-Fen Nien and Wan-Ju Chen | ||
| Enterprise Application Integration through a Clustered Framework with Intelligent Agents | 237-242 |
|
| Dengjye Chen, Su-Hua Wang and Samadhiya Durgesh | ||
| Fingerprint Matching Using Multiple Sets of Invariant Moments | 243-248 |
|
| Jucheng Yang | ||
| An LMI Approach to Reliable H-infinity Guaranteed Cost Control for Uncertain Non-Linear Stochastic Markovian Jump Systems with Mode-Dependent and Distributed Delays | 249-254 |
|
| Lianqing Su, Xiaodan Zhu, Changjie Zhou and Jiqing Qiu | ||
| Utility Increasing Policy Based Reactively Dynamic Selection of Composite Service | 255-260 |
|
| Yu Dai, Lei Yang, Zhiliang Zhu and Bin Zhang | ||
| On the Image Encryption via Compressed Sensing | 261-266 |
|
| Gesen Zhang, Shuhong Jiao and Xiaoli Xu | ||
| Exploration of Rotation Strategy for Value Premium of Stock Market | 267-272 |
|
| Deng-Yiv Chiu, Hsiao-Ching Lee and Cheng-Yi Shiu | ||
| Dictionary-Based Voting Text Classification for Multilingual Domain-Specific Web Pages | 273-278 |
|
| Chunyan Liang, Minfang Huang and Huiying Tian |