Conferences related to Web pages

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)

Circuits and Systems, Computers, Information Technology, Communication Systems, Control and Instrumentation, Electrical Power Systems, Power Electronics, Signal Processing


2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)

WiOpt 2018 welcomes original papers related to modeling, performance evaluation, and optimization of wireless networks. The scope covers all types of wireless networks: cellular, ad hoc, content-driven, delay-tolerant, mesh, metropolitan, sensor, cognitive, vehicular, robotic, Internet of Things, virtualized, etc. The focus is on issues at and above the MAC layer, although cross-layer techniques encompassing the physical layer are equally welcome. We encourage both theoretical contributions and submissions relating to real world empirical measurements, experimental studies.


2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field


2018 41st International Convention on Information and Communication Technology, Electronicsand Microelectronics (MIPRO)

Computer in Technical Systems, Intelligent Systems, Distributed Computing and VisualizationSystems, Communication Systems, Information Systems Security, Digital Economy, Computersin Education, Microelectronics, Electronic Technology, Education


More Conferences

Periodicals related to Web pages

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


More Periodicals

Most published Xplore authors for Web pages

Back to Top

No authors for "Web pages"


Xplore Articles related to Web pages

Back to Top

Correction

[] IEEE Industrial Electronics Magazine, 2009

None


Introduction

[{u'author_order': 1, u'affiliation': u'Aarhus University', u'full_name': u'Christian Ulrik Andersen'}, {u'author_order': 2, u'affiliation': u'Aarhus Universitet', u'full_name': u'S\xf8ren Bro Pold'}] The Metainterface: The Art of Platforms, Cities, and Clouds, None

To many people, computer interfaces relate to graphical user interfaces, and an implicit understanding of user friendliness and easy access to functionality. It is less known that since the early 1960s, there has been a tradition of artistic experimentation with computers, and this continuously informs a cultural and aesthetic critique—from the underbelly of digital culture, so to speak. These curatorial ...


9 Popular Doesn't Mean Good

[{u'author_order': 1, u'affiliation': u'New York University', u'full_name': u'Meredith Broussard'}] Artificial Unintelligence: How Computers Misunderstand the World, None

How can you take a “good” selfie? In 2015, several prominent American media outlets covered the results of an experiment that purported to answer this question using data science. The results were predictable to anyone familiar with photography basics: make sure your picture is in focus, don't cut off the subject's forehead, and so forth. The experiment used the same ...


A Fuzzy Approach to Ranking Hyperlinks

[{u'author_order': 1, u'affiliation': u'Shandong Normal Univ. Jinan', u'full_name': u'Huaxiang Zhang'}, {u'author_order': 2, u'affiliation': u'Shandong Univ. of Finance, Jinan', u'full_name': u'Jing Lu'}] Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007

This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...


The Application of Electronic Business in Transnational Operations of Small and Medium Enterprises

[{u'author_order': 1, u'full_name': u'Wu Bo'}, {u'author_order': 2, u'full_name': u'Wang Yufen'}, {u'author_order': 3, u'full_name': u'He Lishi'}] 2010 International Conference on E-Business and E-Government, 2010

Compared with traditional business electronic business (e-business) has the advantages of globalization of markets, convenience, low cost and high efficiency. It has changed the business philosophy and modes of operation in traditional business, and the changes have a deeply significant effect on transnational business of small and medium enterprises (SMEs). Compared with large enterprises SMEs are at a disadvantage in ...


More Xplore Articles

Educational Resources on Web pages

Back to Top

eLearning

No eLearning Articles are currently tagged "Web pages"

IEEE-USA E-Books

  • Introduction

    To many people, computer interfaces relate to graphical user interfaces, and an implicit understanding of user friendliness and easy access to functionality. It is less known that since the early 1960s, there has been a tradition of artistic experimentation with computers, and this continuously informs a cultural and aesthetic critique—from the underbelly of digital culture, so to speak. These curatorial and artistic practices were first presented as part of an art scene that attempted to mix software with conceptual art. Exhibitions such as Cybernetic Serendipity at the Institute of Contemporary Arts in London in 1968, Software at the Jewish Museum in New York in 1970, and Computers and Visual Research in Zagreb in 1968 are all well- known examples of this. Within computer music, literature, games, and visuals, there are numerous illustrations of even earlier experimentation crossing computation with various forms of representation and performance, and today festivals such as transmediale in Berlin, Ars Electronica in Linz, and numerous other events attract tens of thousands of spectators and practitioners.

  • 9 Popular Doesn't Mean Good

    How can you take a “good” selfie? In 2015, several prominent American media outlets covered the results of an experiment that purported to answer this question using data science. The results were predictable to anyone familiar with photography basics: make sure your picture is in focus, don't cut off the subject's forehead, and so forth. The experiment used the same type of procedures we used to analyze the Titanic data in chapter 7.

  • Writing a List of References or a Bibliography

    One of the purposes of a reference is to give the report credibility. Each entry in the list of references must supply certain primary information so that the reader can clearly identify the document and be able to refer to it or order it. Every detail must be copied exactly as it appears on the original document. A bibliography may be a comprehensive list of all documents pertaining to the topic being discussed, or it may be limited to the sources that were used to research and conduct the project or study. In a bibliography entry many rules apply such as: the first-named author's names are reversed, with the surname or family name shown first and the personal name(s) shown second; and within each entry the information is divided into three compartments that are separated by periods: author identification, document or article title, and publisher identification.

  • Web Information Retrieval

    This chapter contains sections titled:IntroductionDistinctive Characteristics of the WebThree Ranking ProblemsOther Web IR IssuesEvaluation of Web Search EffectivenessSummaryExercisesReferences

  • Regulation and Governance of the Internet

    This chapter contains sections titled:IntroductionContent RegulationEffective RegulationRegulation: Technical IssuesThe Current SituationAcross BordersInternet Regulation: Normative IssuesCensorshipRegulation of the Internet: Moral ArgumentsOther ArgumentsRegulation and EfficiencyRegulation Across Legal JurisdictionsConclusionAcknowledgmentsReferences

  • The Semantic Web – From Vision to Reality

    This chapter contains sections titled:Setting Out the VisionDescribing SemanticsEarly ApplicationsSemantic Web ServicesSemantic Web Technology in the EnterpriseThe Next Steps for the Semantic WebConclusionsReferences

  • Development Using Templates and Workflows

    Templates and workflows are the quintessential components for content design. Templates provide a reusable and consistent framework for managing content. Authoring templates enable authors to create content with defined structure. Presentation templates add presentation logic to content. Content workflows play a vital role in the content management lifecycle. Processes such as content publishing, content translation, and content versioning are modeled by content workflows. This chapter looks at various aspects of content templates and workflows, along with best practices and optimization methodologies. It discusses the basic concepts of templates, template types, and details of authoring templates and presentation templates. The chapter then looks at template‐user interfaces and mapping templates to Web pages. It focuses on case studies for designing a template for a Web support site and describes workflow design and workflow optimization along with a case study.

  • Interfaces for Crowdsourcing Platforms

    This chapter on interfaces for crowdsourcing platforms and applications is divided into three sections. The first section gives a brief outline of the current web technology and terminology. It introduces network architectures, communication protocols, markup languages, programming paradigms, and technology for media playback. The second section presents three commercial crowdsourcing platforms (CrowdFlower, Amazon Mechanical Turk (MTurk), and Clickworker) as typical examples of such platforms. This section also covers WikiSpeech, a system for speech recording, annotation and online perception experiments that offer many features typical of crowdsourcing platforms. Finally, the third section describes in detail how tasks are implemented using the interfaces of crowdsourcing platforms. Three main options are available: implementing tasks manually using a graphical user interface, using command‐line tools that generate tasks from configuration files, or writing application programs that interact directly with the crowdsourcing platform programming interfaces.

  • Cache Poisoning Defenses

    The primary attack vector for poisoning domain name system (DNS) cache consists of an attacker manipulating DNS responses by sending numerous answers to a given query with varying IP and DNS header parameters. A high volume of incoming DNS answers disproportionate to outgoing queries could indicate a cache poisoning attack. Upon detection of an attack, user should attempt to identify the source of the attack and if possible, block the sender. Antivirus and anti‐malware defenses for end user devices can help reduce the incidence of known viruses and malware from instigating a cache poisoning attack against the recursive servers. The definitive solution to cache poisoning attacks requires the authentication of each DNS query answer as having been published by the authoritative domain owner. DNS security extensions (DNSSEC) specifications provide for query answer authentication as well as data integrity validation to assure no manipulation of query answers en route to the validating resolver.



Standards related to Web pages

Back to Top

Recommended Practice for the Internet - Web Site Engineering, Web Site Management and Web Site Life Cycle

Define recommended practices for World Wide Web page engineering for Intranet and Extranet environments, based on World Wide Web Consortium (W3C) and related industry guidelines. (Expanded from previous PAR which specifically mentioned HTML and XML)