


default search action
Journal of Database Management, Volume 29
Volume 29, Number 1, 2018
- Roman Lukyanenko, Jeffrey Parsons

:
Beyond Micro-Tasks: Research Opportunities in Observational Crowdsourcing. 1-22 - Michaël Verdonck

, Frederik Gailly:
An Ontological Analysis Framework for Domain-Specific Modeling Languages. 23-42 - Xindong You, Yeli Li, Zhenyang Zhu, Lifeng Yu, Dawei Sun:

QGLG Automatic Energy Gear-Shifting Mechanism with Flexible QoS Constraint in Cyber-Physical Systems: Designing, Analysis, and Evaluation. 43-65
Volume 29, Number 2, 2018
- Congfeng Jiang, Junming Liu, Dongyang Ou, Yumei Wang, Lifeng Yu:

Implicit Semantics Based Metadata Extraction and Matching of Scholarly Documents. 1-22 - Bijoy Bordoloi, Bhushan Kapoor, Tim Jacks:

An Efficient Stochastic Update Propagation Method in Data Warehousing. 23-41 - Nan Wang:

To Evaluate or Not to Evaluate?: A Two-Process Model of Innovation Adoption Decision Making. 42-61 - Tianyang Dong, Qiang Cheng, Bin Cao, Jianwei Shi:

A Novel Approach to Distributed Rule Matching and Multiple Firing Based on MapReduce. 62-84
Volume 29, Number 3, 2018
- Weipeng Jing, Dongxue Tian, Guangsheng Chen, Yiyuan Li:

Research on Improved Method of Storage and Query of Large-Scale Remote Sensing Images. 1-16 - Libin Jiao, Hao Wu, Rongfang Bie, Anton Umek, Anton Kos:

Towards Real-Time Multi-Sensor Golf Swing Classification Using Deep CNNs. 17-42 - Elizabeth D. Matemba, Guoxin Li, Baraka Jacob Maiseli

:
Consumers' Stickiness to Mobile Payment Applications: An Empirical Study of WeChat Wallet. 43-66 - Wen Zeng, Hongjiao Xu, Hui Li, Xiang Li:

Research on Methodology of Correlation Analysis of Sci-Tech Literature Based on Deep Learning Technology in the Big Data. 67-88 - Qingqing Zhou

, Chengzhi Zhang:
Detecting Users' Dietary Preferences and Their Evolutions via Chinese Social Media. 89-110
Volume 29, Number 4, 2018
- Zongmin Ma

, Xiaoqing Lin, Li Yan, Zhen Zhao:
RDF Keyword Search by Query Computation. 1-27 - Harmeet Kaur Khanuja, Dattatraya S. Adane:

Monitor and Detect Suspicious Transactions With Database Forensic Analysis. 28-50 - Woojin Jung, Sang-Yong Tom Lee

:
ICT R&D and Technology Knowledge Flows in Korea. 51-69

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














