Author of the publication

An Investigation of How Businesses Are Highly Influenced by Social Media Security.

, , , , , and . MISNC, volume 473 of Communications in Computer and Information Science, page 311-324. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TensorMD: Scalable Tensor-Diagram based Machine Learning Interatomic Potential on Heterogeneous Many-Core Processors., , , , , , , , , and 1 other author(s). CoRR, (2023)Implementing Global Information Technology Product in a Localized Context: An Exploratory Study of ERP System Implementation in China., , , and . Information Systems Perspectives and Challenges in the Context of Globalization, volume 254 of IFIP Conference Proceedings, page 185-198. Kluwer, (2003)The similarity metric, , , , and . (Aug 5, 2004)Research on Strategies Applied in the EL-Based Autonomous Learning Based on Web Sources., , , and . CSEE (4), volume 217 of Communications in Computer and Information Science, page 11-16. Springer, (2011)A topological optimization approach for structural design of a high-speed low-load mechanism using the equivalent static loads method, , and . International Journal for Numerical Methods in Engineering, 89 (5): 584–598 (2012)Improving Concept Hierarchy Development for Web Returned Documents Using Automatic Classification., , , and . International Conference on Internet Computing, page 99-105. CSREA Press, (2005)Assessing Student Learning Through Keyword Density Analysis of Online Class Messages., and . AMCIS, page 362. Association for Information Systems, (2004)Research and Design of Online Declaration and Approval System Based on Mvc., , , , , , and . CCTA, volume 259 of IFIP Advances in Information and Communication Technology, page 867-873. Springer, (2007)Library strategic environment in the public cultural service system in China, , , and . http://dx.doi.org/10.1108/LM0220160013, 37 (4/5): 195209 (2016)Investigating Route Cache in Named Data Networking., , and . IEEE Communications Letters, 22 (2): 296-299 (2018)