7,836 resources related to Web pages
- Topics related to Web pages
- IEEE Organizations related to Web pages
- Conferences related to Web pages
- Periodicals related to Web pages
- Most published Xplore authors for Web pages
Promote the exchange of ideas between academia and industry in the field of computer and networks dependability
2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize stateof-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.
2019 IEEE International Professional Communication Conference (ProComm)
The scope of the conference includes the study, development, improvement, and promotion ofeffective techniques for preparing, organizing, processing, editing, collecting, conserving,teaching, and disseminating any form of technical information by and to individuals and groupsby any method of communication. It also includes technical, scientific, industrial, and otheractivities that contribute to the techniques and products used in this field.
The 2019 IEEE International Conference on Communications (ICC) will be held from 20-24 May 2019 at Shanghai International Convention Center, China,conveniently located in the East Coast of China, the region home to many of the world’s largest ICT industries and research labs. Themed“Smart Communications”, this flagship conference of IEEE Communications Society will feature a comprehensive Technical Program including16 Symposia and a number of Tutorials and Workshops. IEEE ICC 2019 will also include an attractive Industry Forum & Exhibition Program featuringkeynote speakers, business and industry pan
Circuits and Systems, Computers, Information Technology, Communication Systems, Control and Instrumentation, Electrical Power Systems, Power Electronics, Signal Processing
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...
Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...
IEEE Industrial Electronics Magazine, 2009
Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007
This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...
2010 International Conference on E-Business and E-Government, 2010
Compared with traditional business electronic business (e-business) has the advantages of globalization of markets, convenience, low cost and high efficiency. It has changed the business philosophy and modes of operation in traditional business, and the changes have a deeply significant effect on transnational business of small and medium enterprises (SMEs). Compared with large enterprises SMEs are at a disadvantage in ...
2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), 2007
Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique ...
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009
Digital watermarking is an effective means for copyright protection or covert communication in the research field of information security. By using watermarking, the watermark bits are hidden into the multimedia content with the designed algorithm. And the watermarked contents, or the watermarked image in this paper, look almost identical to its original counterpart, while it still retains the capability to ...
Browsing the World's Oldest Phonebook
Valerie Cross - Similarity from Fuzzy Sets to Semantic Similarity and Their Role on the Semantic Web
Dean Kamen's Artificial Arm
Computer-Assisted Audiovisual Language Learning
Computing Conversations: Rasmus Lerdorf Interview on Creating PHP
2011 IEEE Awards James H. Mulligan, Jr. Education Medal - Raj Mittra
IEEE Xplore Digital Library - Prakash Bellur - Ignite: Sections Congress 2017
IEEE Top Trends for 2012 at CES: Tipping Point for Video Entertainment on the Web
Surgeons Got Game
Data and Algorithmic Bias in the Web - Ricardo Baeza-Yates - WCCI 2016
A Manhattan Project for the Prosthetic Arms Race
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Tapping the Computing Power of the Unconscious Brain
Feeding the Machine: The World's Most Sophisticated Artificial Stomach
The Rocket-Powered Prosthetic Arm
Playing Guitar Hero Without Hands
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Mark Guzdial: 2012 IEEE Computer Society Undergraduate Teaching Award Winner
William J. Miller on Sensei-IoT: 2016 End to End Trust and Security Workshop for the Internet of Things
This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and using the calculated fuzzy memberships as class weights when calculating the fuzzy averaged Q values that map hyperlinks to future discounted rewards. The candidate hyperlinks are ranked according to their corresponding fuzzy averaged Q values, and the hyperlink with the optimal Q value is the best one to be crawled in the next step. Experiments of topic crawling tasks have shown FOA collects high harvest rate.
Compared with traditional business electronic business (e-business) has the advantages of globalization of markets, convenience, low cost and high efficiency. It has changed the business philosophy and modes of operation in traditional business, and the changes have a deeply significant effect on transnational business of small and medium enterprises (SMEs). Compared with large enterprises SMEs are at a disadvantage in strength in transnational operations, but the application of e-business brings new opportunities for SMEs. Therefore, SMEs should take full advantage of the opportunities e-business has brought and e-business's functions of advertising, information and business in order to improve their own international competitiveness and operate internationally.
Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique to deal with the time of a file on local machine, even its data block of a file had been re-written many times or deleted long ago, and adopt the time offset mechanism to deal with the deviation time of the file at time t. Use a logging mechanism to record the time of modifications to each disk block and its deviation time at time t to calculate the real time of a file for reasoning the order of the events and obtaining a timeline of activities on a file.
Digital watermarking is an effective means for copyright protection or covert communication in the research field of information security. By using watermarking, the watermark bits are hidden into the multimedia content with the designed algorithm. And the watermarked contents, or the watermarked image in this paper, look almost identical to its original counterpart, while it still retains the capability to counteract intentional signal processing by others and keeps the existence of the hidden watermark. We employ the concept of sub-sampling and make use of the frequency coefficient similarities between the sub-images for effectively embedding the watermark. In addition, there must be requirements to keep both the embedded watermark alive and the watermarked contents acceptable. Here we make use of an optimization technique, called bacterial foraging, for obtaining an optimized watermarking algorithm with a properly designed fitness function comprising the possible requirements including the watermarked image quality and the capability for the existence of extracted watermark. Simulation results demonstrate the advantages and effectiveness of the proposed algorithm with the combination of sub-sampling and bacterial foraging.
Given the popularity of mobile and wearable devices, it is important to focus on the clarity of the displayed content for the end users. Currently, there is no link between the layout or size of displayed image and the information content in those images. In this paper, we present a method for optimally arranging and displaying a group of images, where the images are resized such that the relative size of the images is proportional to the number of objects in the images, or the number of faces. This ensures that the user gets to view faces or objects in images equally well regardless of the original size of the images. The method can be used for a number of applications in a mobile device, such as the gallery, web browser and video applications. We present implementation details to resize and layout a group of images displayed on a web page in a web browser. We also present results of a user study to see if such an approach might be desirable.
Web testing is a promising technique to ensure the high quality of Web applications. This work regards a Web application as the composition of different interacting components. A composite component consists of several other components. A Component Interaction Diagram (CID) is constructed from the specification of the Web application under test. The CID is described in XML fashion. For each component, a component automaton is established. According to the CID, the Component Test Sequences (CTSs) are generated. The CTSs are in fact the interacting sequences of the components. The test cases, which are individual XML documents, are the CTSs with input data and then the Web testing becomes the testing of component interaction automata. Finally, the evaluation of Component Test Sequence Coverage (CTSC) is performed and a method to increase the CTSC is presented.
With the pervasive use of camera phones, the embedded camera has been considered as a promising HCI manner for mobiles. With necessary technologies, it is possible to become a powerful tool to acquire the information in daily life. We have designed and implemented a system named Photo-to-Search to carry out queries from camera phones simply by taking some photos of interested objects. The captured pictures are compared with a large amount of Web images to select the ones which contain the same prominent object. Consequently, the related information is extracted from the Web pages where the matched images locate. In our demo, data of large buildings, storefronts and products are collected and these kinds of queries are specifically demonstrated to show the efficiency and the effectiveness of our system.
Generally different Web sites have different Web page structures, which would heavily affect the extraction quality when the Web content is automatically collected. On the basis of a statistical analysis on content features and structure characteristics of News domain Web pages, this paper proposes a maximum continuous sum of text density (MCSTD) method to efficiently and effectively extract Web content from different Web pages. Firstly, Web pages are preprocessed, and then the text density of texts are calculated. Finally, the Web content is extracted using the proposed MCSTD method. Experimental results show that the extraction precision is over 95%, and the proposed approach is more efficient and easier to be implemented compared to traditional models. Additionally, our method has also been applied to the scenario of comparable corpora construction using extracted Web resource.
By moving towards the semantic Web ontologies as a way to describe a domain of interest will gain importance. Already in today's Web with its overwhelming amount of HTML Web pages ontologies can assist users in their whole information retrieval process. In this article, the author first explains how to support users in describing their information needs by using ontologies. Second, it is shown how to retrieve high quality data sources in a particular subject domain. For demonstration purposes, the examples in the article are based on a user searching for hotels. Third, the author also describes how search agents are able to query and analyze the content of the retrieved pages with the aid of ontologies. In contrast to the "wrapper" technique which is commonly used by most of the available applications to extract data of a known Web site, ontologies offer more flexibility, adaptability and robustness. Fourth, it is shown how the results of different sources are merged and presented as valuable data to the user. Users' benefits are more accurate query definitions in a given domain, delegation of time-consuming search tasks to search agents and comparable search results of higher quality
Define recommended practices for World Wide Web page engineering for Intranet and Extranet environments, based on World Wide Web Consortium (W3C) and related industry guidelines. (Expanded from previous PAR which specifically mentioned HTML and XML)
WebKit Architecture Engineer – Performance
Senior Front-End Engineer
Silicon Engineering Program Specialist
Front-End Engineer - iCloud Analytics
IS iCloud Site Support Engineer
Electrical Engineer, Associate (Distribution Engineering –Systems Design)
Seattle City Light
Electrical Engineer, Assistant 1
Seattle City Light
Instructor - Department of Information Technology
Georgia Southern University