2014 11th International Conference on e-Business (ICE-B)

28-30 Aug. 2014

Filter Results

Displaying Results 1 - 25 of 89
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for reuse | PDF file iconPDF (1667 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s):I - II
    Request permission for reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Brief contents

    Publication Year: 2014, Page(s): III
    Request permission for reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2014, Page(s): IV
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (30 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing and steering committees

    Publication Year: 2014, Page(s):V - VI
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2014, Page(s):VII - VIII
    Request permission for reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2014, Page(s):IX - X
    Request permission for reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contents

    Publication Year: 2014, Page(s):XI - XIII
    Request permission for reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Invited speakers

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (9 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (10 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • A need-based assessment for building a national cyber security workforce

    Publication Year: 2014, Page(s):IS-5 - IS-6
    Request permission for reuse | PDF file iconPDF (143 KB) | HTML iconHTML
    Freely Available from IEEE
  • Democratization in science and technology through Cloud Computing

    Publication Year: 2014, Page(s):IS-7 - IS-8
    Request permission for reuse | PDF file iconPDF (156 KB) | HTML iconHTML
    Freely Available from IEEE
  • Model-driven development of multi-view modelling tools: The MuVieMOT approach

    Publication Year: 2014, Page(s): IS-9
    Request permission for reuse | PDF file iconPDF (147 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): IS-10
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Social business intelligence: OLAP applied to user generated contents

    Publication Year: 2014, Page(s):IS-11 - IS-19
    Request permission for reuse | PDF file iconPDF (764 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): IS-20
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Advanced persistent threats & Social Engineering

    Publication Year: 2014, Page(s): IS-21
    Request permission for reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Applications

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • Full papers

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2014, Page(s): 1
    Request permission for reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE