共 14 条
- [1] [Anonymous], 2014, 2014 INT C IT CONV S
- [2] [Anonymous], 2009, P 4 INT C COMMUNITIE, DOI DOI 10.1145/1556460.1556497
- [3] Bonsignore Elizabeth M., 2009, 2009 International Conference on Computational Science and Engineering (CSE), P332, DOI 10.1109/CSE.2009.120
- [4] Dunne Cody, 2012, 13 ANN INT C DIG GOV, P300
- [5] Hansen D., 2011, 2011 44th Hawaii International Conference on System Sciences (HICSS), P1, DOI [DOI 10.1109/HICSS.2011.196, 10.1109/HICSS.2011.196]
- [6] Khurana U., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P549, DOI 10.1109/PASSAT/SocialCom.2011.212
- [7] Kim J., 2013, P RES ADAPTIVE CONVE, P107
- [8] Koochakzadeh N., 2011, 2011 IEEE International Conference on Data Mining Workshops, P1235, DOI 10.1109/ICDMW.2011.128
- [9] Malviya V, 2015, 2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), P654, DOI 10.1109/NGCT.2015.7375202
- [10] Nirmala CR, 2015, PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), P420, DOI 10.1109/ICATCCT.2015.7456920