Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2016
- T. S. Amer, Todd L. Johnson:
Information Technology Progress Indicators: Temporal Expectancy, User Preference, and the Perception of Process Duration. Int. J. Technol. Hum. Interact. 12(4): 1-14 (2016) - Pratyush Banerjee:
Attracting Job-Seekers Through Online Job Advertisements: Application of RJPs, Blogs and Video Podcasts. Int. J. Technol. Hum. Interact. 12(3): 1-17 (2016) - Ardion Beldad:
Sealing One's Online Wall Off From Outsiders: Determinants of the Use of Facebook's Privacy Settings among Young Dutch Users. Int. J. Technol. Hum. Interact. 12(1): 21-34 (2016) - Olfa Bouzaabia, Rym Bouzaabia, Alexandru Capatina:
Determinants of Internet Use by Senior Generation: A Cross Cultural Study. Int. J. Technol. Hum. Interact. 12(1): 63-82 (2016) - Sylvaine Castellano, Insaf Khelladi:
Reputation, Image, and Social Media as Determinants of e-Reputation: The Case of Digital Natives and Luxury Brands. Int. J. Technol. Hum. Interact. 12(4): 48-64 (2016) - Peerayuth Charoensukmongkol:
Contribution of Mindfulness to Individuals' Tendency to Believe and Share Social Media Content. Int. J. Technol. Hum. Interact. 12(3): 47-63 (2016) - Ruth Chatelain-Jardón, Jesus Carmona, Ned Kock:
An Extension to Simulated Web-Based Threats and Their Impact on Knowledge Communication Effectiveness. Int. J. Technol. Hum. Interact. 12(3): 64-77 (2016) - Yi-Fen Chen, Chia-Jung Wu:
Influence of Website Design on Consumer Emotion and Purchase Intention in Travel Websites. Int. J. Technol. Hum. Interact. 12(4): 15-29 (2016) - Liliana Vale Costa, Ana Isabel Veloso:
Factors Influencing the Adoption of Video Games in Late Adulthood: A Survey of Older Adult Gamers. Int. J. Technol. Hum. Interact. 12(1): 35-50 (2016) - Vincent Dutot:
Impact of Cross-Channel Strategy on Brand's Commitment: A Case Study in an Affordable Luxury Industry. Int. J. Technol. Hum. Interact. 12(4): 65-81 (2016) - Hong-Mei Huang, Lu-Ping Xu:
Design and Analysis of the Secure Scheme for Quantum Positioning based on Entangled Photon Pair. Int. J. Technol. Hum. Interact. 12(2): 22-35 (2016) - Min-Ling Hung:
Online Learning Readiness: Its Relations to College Students' Changes over Time, and Willingness to Enroll in Future Courses. Int. J. Technol. Hum. Interact. 12(1): 51-62 (2016) - A. Y. M. Atiquil Islam:
Development and Validation of the Technology Adoption and Gratification (TAG) Model in Higher Education: A Cross-Cultural Study Between Malaysia and China. Int. J. Technol. Hum. Interact. 12(3): 78-105 (2016) - Chia-Ying Li:
Understanding University Students' System Acceptance Behavior: The Roles of Personality Trait and Subjective Norms. Int. J. Technol. Hum. Interact. 12(3): 106-125 (2016) - Xiuguang Li, Yuanyuan He, Ben Niu, Kai Yang, Hui Li:
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks. Int. J. Technol. Hum. Interact. 12(2): 36-47 (2016) - Jessica Lichy, Maher Kachour:
Understanding How Students Interact With Technology For Knowledge-Sharing: The Emergence of a New 'Social' Divide in France. Int. J. Technol. Hum. Interact. 12(1): 83-104 (2016) - Yiqun Liu, Xiaorui Wang, Jianqi Zhang, Minqing Zhang, Peng Luo, Xu An Wang:
An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem. Int. J. Technol. Hum. Interact. 12(2): 1-21 (2016) - Jialin Ma, Yongjun Zhang, Zhijian Wang, Kun Yu:
A Message Topic Model for Multi-Grain SMS Spam Filtering. Int. J. Technol. Hum. Interact. 12(2): 83-95 (2016) - Karim Mezghani, Faouzi Ayadi:
Factors Explaining IS Managers Attitudes toward Cloud Computing Adoption. Int. J. Technol. Hum. Interact. 12(1): 1-20 (2016) - Judith Partouche-Sebban:
Online Interactions as a Terror Management Mechanism: How Death Anxiety Affects Facebook Use. Int. J. Technol. Hum. Interact. 12(4): 30-47 (2016) - Li-Jen Wang, Ying-Tien Wu, Chiu-Ming Hu:
English Teachers' Practice and Perspectives on Using Educational Computer Games in EIL Context. Int. J. Technol. Hum. Interact. 12(3): 33-46 (2016) - Wei Zhang:
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings. Int. J. Technol. Hum. Interact. 12(2): 72-82 (2016) - Yuechuan Wei, Yisheng Rong, Xu An Wang:
Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack. Int. J. Technol. Hum. Interact. 12(2): 60-71 (2016) - Zhiming Wu, Tao Lin, Ningjiu Tang:
Explore the Use of Handwriting Information and Machine Learning Techniques in Evaluating Mental Workload. Int. J. Technol. Hum. Interact. 12(3): 18-32 (2016) - Kai Yang, Shuguang Liu, Xiuguang Li, Xu An Wang:
D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks. Int. J. Technol. Hum. Interact. 12(2): 48-59 (2016)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-04 02:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint