Conferences related to Web pages

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)

Circuits and Systems, Computers, Information Technology, Communication Systems, Control and Instrumentation, Electrical Power Systems, Power Electronics, Signal Processing


2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)

WiOpt 2018 welcomes original papers related to modeling, performance evaluation, and optimization of wireless networks. The scope covers all types of wireless networks: cellular, ad hoc, content-driven, delay-tolerant, mesh, metropolitan, sensor, cognitive, vehicular, robotic, Internet of Things, virtualized, etc. The focus is on issues at and above the MAC layer, although cross-layer techniques encompassing the physical layer are equally welcome. We encourage both theoretical contributions and submissions relating to real world empirical measurements, experimental studies.


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 41st International Convention on Information and Communication Technology, Electronicsand Microelectronics (MIPRO)

Computer in Technical Systems, Intelligent Systems, Distributed Computing and VisualizationSystems, Communication Systems, Information Systems Security, Digital Economy, Computersin Education, Microelectronics, Electronic Technology, Education


More Conferences

Periodicals related to Web pages

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


More Periodicals

Most published Xplore authors for Web pages

Back to Top

Xplore Articles related to Web pages

Back to Top

Intelligent crawling based on rough set for web resource discovery

[{u'author_order': 1, u'affiliation': u'Information Engineering, Zhong Shan Torch Polytechnic College, Zhong Shan, China', u'full_name': u'LingXia Hu'}] 2010 2nd IEEE International Conference on Information Management and Engineering, None

The rapid development of the Internet brings a new problem, which is how to rapidly and effectively retrieve needed web resource from vast number of web pages. The progress of machine learning techniques shows a new direction of solving this problem. In this paper, intelligent crawling algorithm based on rough set is proposed. The algorithm use the hypertext features behavior ...


Query expansion using conceptual fuzzy sets for search engine

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci., Meiji Univ., Kanagawa, Japan', u'full_name': u'T. Takagi'}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. Sci., Meiji Univ., Kanagawa, Japan', u'full_name': u'M. Tajima'}] 10th IEEE International Conference on Fuzzy Systems. (Cat. No.01CH37297), None

We propose a search engine which conceptually matches input keywords and web pages. The conceptual matching is realized by context-dependent keyword expansion using conceptual fuzzy sets. First, we show the necessity and the problems of applying fuzzy sets to information retrieval. Next, we introduce the usefulness of conceptual fuzzy sets in overcoming those problems, and propose the realization of conceptual ...


Web agents with a three-stage information filtering approach

[{u'author_order': 1, u'affiliation': u'Dept. of Inf. Eng., Chinese Univ. of Hong Kong, China', u'full_name': u'Kwang Mong Sim'}] Proceedings. 2003 International Conference on Cyberworlds, None

With ever-increasing number of Web sites, users face the challenge of locating, as well as filtering, browsing, and monitoring information of astronomical magnitude. While there are many extant search engines that assist users in locating URLs, they often return an overwhelmingly large number of information sources for a query, and the (time-consuming but perhaps interesting) task of browsing Web sites ...


Content extraction issues in online web education

[{u'author_order': 1, u'affiliation': u'Faculty of Computer Science Engineering, Chirala Engineering College, India', u'full_name': u'Kolla Bhanu Prakash'}, {u'author_order': 2, u'affiliation': u'Faculty of Computer Science Engineering, Chirala Engineering College, India', u'full_name': u'K Sravan Kumar'}, {u'author_order': 3, u'affiliation': u'Faculty of Computer Science Engineering, Chirala Engineering College, India', u'full_name': u'S Uma Maheswara Rao'}] 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), None

Internet and search engines are increasing its prominence in modern day life. Search engines like Google, Bing and Yahoo are perhaps the largest source of information that anyone can access at anytime in the present day life. People have different interests while using the Internet. Advanced users could be interested in automatically extracting information from pages for later processing and ...


MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker

[{u'author_order': 1, u'affiliation': u'Grad. Univ. of Chinese Acad. of Sci., Beijing, China', u'full_name': u'Pingjian Wang'}, {u'author_order': 2, u'affiliation': u'State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China', u'full_name': u'Lei Wang'}, {u'author_order': 3, u'affiliation': u'State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China', u'full_name': u'Ji Xiang'}, {u'author_order': 4, u'affiliation': u'Coll. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA', u'full_name': u'Peng Liu'}, {u'author_order': 5, u'affiliation': u'State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China', u'full_name': u'Neng Gao'}, {u'author_order': 6, u'affiliation': u'State Key Lab. of Inf. Security, Inst. of Inf. Eng., Beijing, China', u'full_name': u'Jiwu Jing'}] 2013 IEEE 7th International Conference on Software Security and Reliability, None

We propose MJBlocker, a lightweight and run-time malicious JavaScript Extensions (JSEs) blocker for preventing them from hurting user security. MJBlocker can identify and block malicious JSEs whenever they are executed. It is motivated by the observation that most attack goals of malicious JSEs are accomplished via invoking Cross-Platform Component Object Model (XPCOM) calls, and the XPCOM call sequences acquired from ...


More Xplore Articles

Educational Resources on Web pages

Back to Top

eLearning

No eLearning Articles are currently tagged "Web pages"

IEEE-USA E-Books

  • Web Information Retrieval

    This chapter contains sections titled: Introduction Distinctive Characteristics of the Web Three Ranking Problems Other Web IR Issues Evaluation of Web Search Effectiveness Summary Exercises References

  • Regulation and Governance of the Internet

    This chapter contains sections titled: Introduction Content Regulation Effective Regulation Regulation: Technical Issues The Current Situation Across Borders Internet Regulation: Normative Issues Censorship Regulation of the Internet: Moral Arguments Other Arguments Regulation and Efficiency Regulation Across Legal Jurisdictions Conclusion Acknowledgments References

  • Interfaces for Crowdsourcing Platforms

    This chapter on interfaces for crowdsourcing platforms and applications is divided into three sections. The first section gives a brief outline of the current web technology and terminology. It introduces network architectures, communication protocols, markup languages, programming paradigms, and technology for media playback. The second section presents three commercial crowdsourcing platforms (CrowdFlower, Amazon Mechanical Turk (MTurk), and Clickworker) as typical examples of such platforms. This section also covers WikiSpeech, a system for speech recording, annotation and online perception experiments that offer many features typical of crowdsourcing platforms. Finally, the third section describes in detail how tasks are implemented using the interfaces of crowdsourcing platforms. Three main options are available: implementing tasks manually using a graphical user interface, using command‐line tools that generate tasks from configuration files, or writing application programs that interact directly with the crowdsourcing platform programming interfaces.

  • Development Using Templates and Workflows

    Templates and workflows are the quintessential components for content design. Templates provide a reusable and consistent framework for managing content. Authoring templates enable authors to create content with defined structure. Presentation templates add presentation logic to content. Content workflows play a vital role in the content management lifecycle. Processes such as content publishing, content translation, and content versioning are modeled by content workflows. This chapter looks at various aspects of content templates and workflows, along with best practices and optimization methodologies. It discusses the basic concepts of templates, template types, and details of authoring templates and presentation templates. The chapter then looks at template¿¿¿user interfaces and mapping templates to Web pages. It focuses on case studies for designing a template for a Web support site and describes workflow design and workflow optimization along with a case study.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti¿¿?malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.

  • The Semantic Web – From Vision to Reality

    This chapter contains sections titled: Setting Out the Vision Describing Semantics Early Applications Semantic Web Services Semantic Web Technology in the Enterprise The Next Steps for the Semantic Web Conclusions References



Standards related to Web pages

Back to Top

Recommended Practice for the Internet - Web Site Engineering, Web Site Management and Web Site Life Cycle

Define recommended practices for World Wide Web page engineering for Intranet and Extranet environments, based on World Wide Web Consortium (W3C) and related industry guidelines. (Expanded from previous PAR which specifically mentioned HTML and XML)