Search Results - "Fong, W.L."
-
1
An investigation of mobile payment (m-payment) services in Thailand
Published in Asia-Pacific journal of business administration (04-04-2016)“…Purpose – Despite the significant efforts by the Thai Government to promote the use of mobile payment (m-payment) services, this new mode of financial payment…”
Get full text
Journal Article -
2
Board characteristics of medium and large Chinese companies
Published in Corporate governance (Bradford) (01-01-2010)“…Purpose - This paper aims to contribute to research studies on boards of directors in the Chinese transition economy that are by far, few and limited.Design…”
Get full text
Journal Article -
3
Optical studies on Tb3+: Dy3+ singly and doubly doped Borosilicate glasses for white light and solid state lighting applications
Published in Journal of non-crystalline solids (15-04-2020)“…•Singly and Tb3+/Dy3+ co-doped borosilicate glasses are investigated for SSL and white light emitting applications.•The X-ray diffraction profile confirmed the…”
Get full text
Journal Article -
4
Thermal, structural and optical properties of Bi2O3-Na2O-TiO2-ZnO-TeO2 glass system
Published in Journal of non-crystalline solids (01-03-2021)“…Tellurite glasses have found wide applications in laser, nonlinear optics and optical communication. This paper describes the role of Bi2O3 on the physical and…”
Get full text
Journal Article -
5
Influence of Bi2O3 content on structural, optical and radiation shielding properties of transparent Bi2O3-Na2O-TiO2-ZnO-TeO2 glass ceramics
Published in Radiation physics and chemistry (Oxford, England : 1993) (01-11-2022)“…This study aimed to evaluate the thermal, structural, optical and radiation shielding properties of the xBi2O3–5Na2O–5TiO2–10ZnO-(80-x)TeO2 glass ceramics,…”
Get full text
Journal Article -
6
Stretchable Microwave Transmission Lines Using Liquid‐Metal Embedded Elastomers
Published in Advanced engineering materials (01-09-2022)“…The characterization of an RF transmitter composed of insulating and conducting regions of liquid‐metal embedded elastomer (LMEE) is presented along with in…”
Get full text
Journal Article -
7
A Comparative Study of Current and Potential Users of Mobile Payment Services
Published in SAGE open (01-11-2016)“…Previous studies of mobile payment (m-payment) services have primarily focused on a single group of adopters. This study identifies the factors that influence…”
Get full text
Journal Article -
8
Anisotropic deformation of Zr–2.5Nb pressure tube material at high temperatures
Published in Journal of nuclear materials (01-09-2013)“…Zr–2.5Nb alloy is used for the pressure tubes in CANDU® reactor fuel channels. In reactor, the pressure tube normally operates at 300°C and experiences a…”
Get full text
Journal Article Conference Proceeding -
9
Digital Divide Between Urban and Rural Regions in China
Published in The Electronic journal of information systems in developing countries (01-01-2009)“…This research paper evaluates the development relationship between the adoption rate of Information and Communications Technologies (the Internet, mobile…”
Get full text
Journal Article -
10
Papilio: Visualizing Android Application Permissions
Published in Computer graphics forum (01-06-2014)“…We introduce Papilio, a new visualization technique for visualizing permissions of real‐world Android applications. We explore the development of layouts that…”
Get full text
Journal Article -
11
Using Visualization to Explore Original and Anonymized LBSN Data
Published in Computer graphics forum (01-06-2016)“…We present GSUVis, a visualization tool designed to provide better understanding of location‐based social network (LBSN) data. LBSN data is one of the most…”
Get full text
Journal Article -
12
Anisotropy factors from texture and mechanical strain in Zircaloy-4 fuel sheaths
Published in Journal of nuclear materials (01-09-2013)“…The crystallographic textures in Zircaloy-4 fuel sheathing in the as-manufactured condition and with simulated braze zones microstructures have been…”
Get full text
Journal Article -
13
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems
Published in Computers & security (01-07-2014)“…Popularity of Social Network Systems (SNSs) has significantly increased in recent years, raising serious concerns for the privacy of users. Such concerns arise…”
Get full text
Journal Article -
14
Crystallographic Texture and Volume Fraction of α and β Phases in Zr-2.5Nb Pressure Tube Material During Heating and Cooling
Published in Metallurgical and materials transactions. A, Physical metallurgy and materials science (01-03-2012)“…The phase transformations in an as-received Zr-2.5Nb pressure tube material were characterized in detail by neutron diffraction. The texture and volume…”
Get full text
Journal Article -
15
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems
Published in 2011 IEEE Symposium on Security and Privacy (01-05-2011)“…In Face book-style Social Network Systems (FSNSs), which are a generalization of the access control model of Face book, an access control policy specifies a…”
Get full text
Conference Proceeding -
16
Using Technology to Support Discussions on Sensitive Topics in the Study of Business Ethics
Published in Journal of information technology education (2015)“…There is a dearth of research into teaching strategies and learning approaches for units involving sensitive topics that can provoke an emotional response in…”
Get more information
Journal Article -
17
Reasoning about safety properties in a JVM-like environment
Published in Science of computer programming (01-07-2007)“…Type-based protection mechanisms in a JVM-like environment must be administrated by the code consumer at the bytecode level. Unfortunately, formulating a sound…”
Get full text
Journal Article -
18
Access control by tracking shallow execution history
Published in IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 (2004)“…Software execution environments like operating systems, mobile code platforms and scriptable applications must protect themselves against potential damages…”
Get full text
Conference Proceeding -
19
Isolating untrusted software extensions by custom scoping rules
Published in Computer languages, systems & structures (01-10-2010)“…In a modern programming language, scoping rules determine the visibility of names in various regions of a program. In this work, we examine the idea of…”
Get full text
Journal Article -
20
Discretionary capability confinement
Published in International journal of information security (01-04-2008)“…Motivated by the need of application-level access control in dynamically extensible systems, this work proposes a static annotation system for modeling…”
Get full text
Journal Article