|
1 |
OPTIMIZING RECOMMENDATIONS WITH AN RFID-BASED APPROACH FOR THE TAIWAN TRAINQUALI DOCUMENT MANAGEMENT SYSTEM
|
Chao-Tsong Fangtsou、Rui-Yang Chen、Ming-Hung Yang
|
RFID-Based
、
Collaborative Filtering
、
TTQS Document Management
、
IoT
、
Optimizing Recommendation
|
| |
|
2 |
WHY EXPECT LOWER PRICES ONLINE? EMPIRICAL EXAMINATION IN ONLINE AND STORE-BASED RETAILERS
|
Shao-Kang Lo、Ai-Yun Hsieh、Yu-Ping Chiu
|
Overhead Cost
、
Price Perception
、
Internal Reference Price
、
Online Retailers
、
Store-Based Retailers
|
| |
|
3 |
TECHNOLOGY OF FEDERATED IDENTITY AND SECURE LOGGINGS IN CLOUD COMPUTING
|
Takashi Shitamichi、Ryoichi Sasaki
|
Federation
、
Identity
、
Authentication
、
SAML
、
ID-WSF
、
Cloud Computing
、
Log
|
| |
|
4 |
THE VALUE OF IT HABIT IN MICROBLOGS ON BRAND LOYALTY
|
Hong Zhang、Kem Z.K. Zhang、Matthew K.O. Lee、Feng Feng
|
Microblogs
、
Virtual Community
、
Brand Loyalty
、
IT habit
、
Satisfaction
|
| |
|
5 |
AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES
|
Daniel J. Buehrer、Tzu-Yang Wang
|
Sessional Authentication
、
Sharing Network
、
Sign-Up
|
| |
|
6 |
USING TEXT MINING TECHNIQUES TO ANALYZE HOW MOVIE FORUMS AFFECT THE BOX OFFICE
|
I-ping Chiang、Yean-Fu Wen、Yu-Chun Luo、Ming-Chien Li、Chiao-Ying Hsu
|
Box Office
、
Film Industry
、
Forecast
、
Text Mining
、
WOM
|
| |
|
7 |
UNDERSTANDING THE EFFECTS OF EWOM ON COSMETIC CONSUMER BEHAVIORAL INTENTION
|
Chien-Wen Chen、Wei-Cyuan Chen、Wen-Kuo Chen
|
IS Continuance Model
、
Information Adoption Theory
、
Electronic word of mouth
|
| |
|
8 |
NIHON-SEI : COMPUTER-AIDED INSTRUCTION THAT TEACHES BASIC JAPANESE
|
Daryl L. Montalbo、Rhea R. Regis、Crystal Gail S. Quijano、Melie Jim F. Sarmiento
|
Animation
、
Computer-Aided Instruction
、
Graphics
、
Nihongo
、
Sounds
、
Text
、
Multimedia
|
| |
|
9 |
INTEGRATING FACEBOOK AND ALUMNI INTO THE SOCIAL NETWORK MOBILE PLATFORM
|
Tzuo-Ming Chen、Chi-Tsai Yeh
|
Smart Mobile Devices
、
Social Network Sites
、
Google Sync
|
| |
|
10 |
FAULT TOLERANCE IN MOBILE GRID COMPUTING
|
Aghila Rajagopal、M.A. Maluk Mohamed
|
Object Based Mobile Grid
、
Surrogate Object
、
Fault Recovery
|
| |