1.Identifying the influential spreaders in multilayer interactions of online social networks
Source:JOURNAL OF INTELLIGENT & FUZZY SYSTEMS,2016,Vol.31
2.An Empirical Research on the Investment Strategy of Stock Market based on Deep Reinforcement Learning model
Source:COMPLEXIS 2019 - Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk,2019,Vol.
3.BEYOND CODES AND PIXELS
Source:PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED ARCHITECTURAL DESIGN RESEARCH IN ASIA (CAADRIA 2012): BEYOND CODES AND PIXELS,2012,Vol.
4.Key management and key distribution for secure group communication in mobile and cloud network
Source:FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,2018,Vol.84
5.Institutional perspective on emerging industry development: Foreign experiences and policy implications for China
Source:Journal of Science and Technology Policy in China,2011,Vol.2
6.HOW THE 1978 FOREIGN DOMESTIC WORKERS LAW INCREASED THE LABOR SUPPLY OF SINGAPOREAN WOMEN
Source:SINGAPORE ECONOMIC REVIEW,2016,Vol.61
7.A novel cluster HAR-type model for forecasting realized volatility
Source:INTERNATIONAL JOURNAL OF FORECASTING,2019,Vol.35
8.Big data analytics for sustainability
Source:FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,2018,Vol.86
9.2nd International Workshop on Multimedia Privacy and Security
Source:PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),2018,Vol.
10.A Q-Learning-Based Approach for Deploying Dynamic Service Function Chains
Source:SYMMETRY-BASEL,2018,Vol.10
11.Multimedia augmented m-learning Issues, trends and open challenges
Source:International Journal of Information Management,2016,Vol.36
12.Dynamic capabilities and organizational performance: The mediating role of innovation
Source:JOURNAL OF MANAGEMENT & ORGANIZATION,2019,Vol.25
13.Data analytics and visualization for inspecting cancers and genes
Source:MULTIMEDIA TOOLS AND APPLICATIONS,2018,Vol.77
14.“第二故乡”:“一带一路”格局下的企业战略
Source:Business Review,2017,Vol.
15.Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
Source:JOURNAL OF NETWORK AND COMPUTER APPLICATIONS,2017,Vol.93
16.The role of big data in smart city
Source:INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT,2016,Vol.36
17.SmallClient for big data: an indexing framework towards fast data retrieval
Source:CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS,2017,Vol.20
18.Strategically Managing Facility Management Knowledge Sharing via Web 2.0
Source:COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS,2012,Vol.350
19.Editorial: Designing Technologies for Youth Mental Health
Source:FRONTIERS IN PUBLIC HEALTH,2020,Vol.8
20.Towards combining reactive and proactive cloud elasticity on running HPC applications
Source:IoTBDS 2018 - Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security,2018,Vol.2018-March