Table of contents
Security-as-a-service: a literature review
Wenyuan Wang, Sira YongchareonThis study aims to identify the level of security from existing work, analyze categories of security as a service (SECaaS) and classify them into a meaningful set of groups…
Sentiment urgency emotion conversion over time for business intelligence
Tariq Soussan, Marcello TrovatiSocial media has become a vital part of any institute’s marketing plan. Social networks benefit businesses by allowing them to interact with their clients, grow brand exposure…
Optimal path strategy for the web computing under deep reinforcement learning
Mu Shengdong, Wang Fengyu, Xiong Zhengxian, Zhuang Xiao, Zhang LunfengWith the advent of the web computing era, the transmission mode of the Internet of Everything has caused an explosion in data volume, which has brought severe challenges to…
Caching strategy for Web application – a systematic literature review
Mulki Indana Zulfa, Rudy Hartanto, Adhistya Erna PermanasariInternet users and Web-based applications continue to grow every day. The response time on a Web application really determines the convenience of its users. Caching Web content is…
Cross-blockchain protocol for public registries
Oleksii KonashevychThe purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain…
Dialogbook: a proposal for simple e-portfolio system for international communication learning
Jun Iio, Shigenori WakabayashiMany learning management systems and e-portfolio services that are useful for recording learners’ activities and facilitating communication among students and teachers have been…
ISSN:
1744-0084e-ISSN:
1744-0092ISSN-L:
1744-0084Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Prof. Honghao Gao
- Prof. Li Kuang