Conferences related to Web pages

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)

2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize state­of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.


2019 IEEE International Professional Communication Conference (ProComm)

The scope of the conference includes the study, development, improvement, and promotion ofeffective techniques for preparing, organizing, processing, editing, collecting, conserving,teaching, and disseminating any form of technical information by and to individuals and groupsby any method of communication. It also includes technical, scientific, industrial, and otheractivities that contribute to the techniques and products used in this field.


ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

The 2019 IEEE International Conference on Communications (ICC) will be held from 20-24 May 2019 at Shanghai International Convention Center, China,conveniently located in the East Coast of China, the region home to many of the world’s largest ICT industries and research labs. Themed“Smart Communications”, this flagship conference of IEEE Communications Society will feature a comprehensive Technical Program including16 Symposia and a number of Tutorials and Workshops. IEEE ICC 2019 will also include an attractive Industry Forum & Exhibition Program featuringkeynote speakers, business and industry pan


2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)

Circuits and Systems, Computers, Information Technology, Communication Systems, Control and Instrumentation, Electrical Power Systems, Power Electronics, Signal Processing


More Conferences

Periodicals related to Web pages

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


More Periodicals

Most published Xplore authors for Web pages

Back to Top

No authors for "Web pages"


Xplore Articles related to Web pages

Back to Top

Correction

[] IEEE Industrial Electronics Magazine, 2009

None


A Fuzzy Approach to Ranking Hyperlinks

[{u'author_order': 1, u'affiliation': u'Shandong Normal Univ. Jinan', u'authorUrl': u'https://ieeexplore.ieee.org/author/37600268800', u'full_name': u'Huaxiang Zhang', u'id': 37600268800}, {u'author_order': 2, u'affiliation': u'Shandong Univ. of Finance, Jinan', u'authorUrl': u'https://ieeexplore.ieee.org/author/37833866600', u'full_name': u'Jing Lu', u'id': 37833866600}] Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007

This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...


The Application of Electronic Business in Transnational Operations of Small and Medium Enterprises

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/37539466100', u'full_name': u'Wu Bo', u'id': 37539466100}, {u'author_order': 2, u'authorUrl': u'https://ieeexplore.ieee.org/author/37681303500', u'full_name': u'Wang Yufen', u'id': 37681303500}, {u'author_order': 3, u'full_name': u'He Lishi'}] 2010 International Conference on E-Business and E-Government, 2010

Compared with traditional business electronic business (e-business) has the advantages of globalization of markets, convenience, low cost and high efficiency. It has changed the business philosophy and modes of operation in traditional business, and the changes have a deeply significant effect on transnational business of small and medium enterprises (SMEs). Compared with large enterprises SMEs are at a disadvantage in ...


Time Bounding Event Reasoning in Computer Forensic

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/37829167500', u'full_name': u'Liu Zhi jun', u'id': 37829167500}, {u'author_order': 2, u'authorUrl': u'https://ieeexplore.ieee.org/author/37827089500', u'full_name': u'Zhang Huan guo', u'id': 37827089500}] 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), 2007

Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique ...


Similarity-Based Watermarking for Sub-Sampling Images with Bacterial Foraging Techniques

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/37275101100', u'full_name': u'Hsiang-Cheh Huang', u'id': 37275101100}, {u'author_order': 2, u'authorUrl': u'https://ieeexplore.ieee.org/author/37415447100', u'full_name': u'Feng-Cheng Chang', u'id': 37415447100}] 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009

Digital watermarking is an effective means for copyright protection or covert communication in the research field of information security. By using watermarking, the watermark bits are hidden into the multimedia content with the designed algorithm. And the watermarked contents, or the watermarked image in this paper, look almost identical to its original counterpart, while it still retains the capability to ...


More Xplore Articles

Educational Resources on Web pages

Back to Top

eLearning

No eLearning Articles are currently tagged "Web pages"

IEEE-USA E-Books

  • Writing a List of References or a Bibliography

    One of the purposes of a reference is to give the report credibility. Each entry in the list of references must supply certain primary information so that the reader can clearly identify the document and be able to refer to it or order it. Every detail must be copied exactly as it appears on the original document. A bibliography may be a comprehensive list of all documents pertaining to the topic being discussed, or it may be limited to the sources that were used to research and conduct the project or study. In a bibliography entry many rules apply such as: the first-named author's names are reversed, with the surname or family name shown first and the personal name(s) shown second; and within each entry the information is divided into three compartments that are separated by periods: author identification, document or article title, and publisher identification.

  • Web Information Retrieval

    This chapter contains sections titled:IntroductionDistinctive Characteristics of the WebThree Ranking ProblemsOther Web IR IssuesEvaluation of Web Search EffectivenessSummaryExercisesReferences

  • Regulation and Governance of the Internet

    This chapter contains sections titled:IntroductionContent RegulationEffective RegulationRegulation: Technical IssuesThe Current SituationAcross BordersInternet Regulation: Normative IssuesCensorshipRegulation of the Internet: Moral ArgumentsOther ArgumentsRegulation and EfficiencyRegulation Across Legal JurisdictionsConclusionAcknowledgmentsReferences

  • Introduction

    To many people, computer interfaces relate to graphical user interfaces, and an implicit understanding of user friendliness and easy access to functionality. It is less known that since the early 1960s, there has been a tradition of artistic experimentation with computers, and this continuously informs a cultural and aesthetic critique—from the underbelly of digital culture, so to speak. These curatorial and artistic practices were first presented as part of an art scene that attempted to mix software with conceptual art. Exhibitions such as Cybernetic Serendipity at the Institute of Contemporary Arts in London in 1968, Software at the Jewish Museum in New York in 1970, and Computers and Visual Research in Zagreb in 1968 are all well- known examples of this. Within computer music, literature, games, and visuals, there are numerous illustrations of even earlier experimentation crossing computation with various forms of representation and performance, and today festivals such as transmediale in Berlin, Ars Electronica in Linz, and numerous other events attract tens of thousands of spectators and practitioners.

  • The Semantic Web – From Vision to Reality

    This chapter contains sections titled:Setting Out the VisionDescribing SemanticsEarly ApplicationsSemantic Web ServicesSemantic Web Technology in the EnterpriseThe Next Steps for the Semantic WebConclusionsReferences

  • Development Using Templates and Workflows

    Templates and workflows are the quintessential components for content design. Templates provide a reusable and consistent framework for managing content. Authoring templates enable authors to create content with defined structure. Presentation templates add presentation logic to content. Content workflows play a vital role in the content management lifecycle. Processes such as content publishing, content translation, and content versioning are modeled by content workflows. This chapter looks at various aspects of content templates and workflows, along with best practices and optimization methodologies. It discusses the basic concepts of templates, template types, and details of authoring templates and presentation templates. The chapter then looks at template‐user interfaces and mapping templates to Web pages. It focuses on case studies for designing a template for a Web support site and describes workflow design and workflow optimization along with a case study.

  • 9 Popular Doesn't Mean Good

    How can you take a “good” selfie? In 2015, several prominent American media outlets covered the results of an experiment that purported to answer this question using data science. The results were predictable to anyone familiar with photography basics: make sure your picture is in focus, don't cut off the subject's forehead, and so forth. The experiment used the same type of procedures we used to analyze the Titanic data in chapter 7.

  • Interfaces for Crowdsourcing Platforms

    This chapter on interfaces for crowdsourcing platforms and applications is divided into three sections. The first section gives a brief outline of the current web technology and terminology. It introduces network architectures, communication protocols, markup languages, programming paradigms, and technology for media playback. The second section presents three commercial crowdsourcing platforms (CrowdFlower, Amazon Mechanical Turk (MTurk), and Clickworker) as typical examples of such platforms. This section also covers WikiSpeech, a system for speech recording, annotation and online perception experiments that offer many features typical of crowdsourcing platforms. Finally, the third section describes in detail how tasks are implemented using the interfaces of crowdsourcing platforms. Three main options are available: implementing tasks manually using a graphical user interface, using command‐line tools that generate tasks from configuration files, or writing application programs that interact directly with the crowdsourcing platform programming interfaces.

  • The Ecosystem of the Internet of Things

    This chapter presents the historical and technological context of the evolution from the traditional web to the social and semantic web and to connected objects (COs). Over time, the web has gone through several iterations. Thus, if yesterday's web was the traditional web (web 1.0), a web of documents and firmly static, today's web (web 2.0) is a social and dynamic web. The web of tomorrow (web 3.0) will be a semantic and collective web linked to the Internet of Things (IoT). The chapter clarifies the definitions and concepts of the IoT by drawing on examples of its presence in people's daily lives. The emergence of the IoT fits into the logical progression of elements that have contributed to the construction of computing and of communication networks as they are known today: the birth of the World Wide Web, the democratization of the web, the passage from analog to digital and technology convergence.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti‐malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.



Standards related to Web pages

Back to Top

Recommended Practice for the Internet - Web Site Engineering, Web Site Management and Web Site Life Cycle

Define recommended practices for World Wide Web page engineering for Intranet and Extranet environments, based on World Wide Web Consortium (W3C) and related industry guidelines. (Expanded from previous PAR which specifically mentioned HTML and XML)



Jobs related to Web pages

Back to Top