Conferences related to Crawlers

Back to Top

2020 IEEE International Conference on Industrial Technology (ICIT)

ICIT focuses on industrial and manufacturing applications of electronics, controls, communications, instrumentation, and computational intelligence.


2020 IEEE International Conference on Robotics and Automation (ICRA)

The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.


More Conferences

Periodicals related to Crawlers

Back to Top

Automation Science and Engineering, IEEE Transactions on

The IEEE Transactions on Automation Sciences and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. We welcome results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Industrial Electronics, IEEE Transactions on

Theory and applications of industrial electronics and control instrumentation science and engineering, including microprocessor control systems, high-power controls, process control, programmable controllers, numerical and program control systems, flow meters, and identification systems.


More Periodicals

Most published Xplore authors for Crawlers

Back to Top

Xplore Articles related to Crawlers

Back to Top

A Fuzzy Approach to Ranking Hyperlinks

Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007

This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...


A Method to Automatically Discover and Classify Deep Web Data Source Using Multi-Classifier

2009 WRI World Congress on Computer Science and Information Engineering, 2009

Recently, the discovery of deep Web data source and domain-relevant issue attract more and more attentions. This paper proposed a method using multi- classifier to discover and classify the data source of deep Web. Firstly, It used naive Bayes classifier to class the page into domain relevance or not. Secondly, improved C4.5 decision tree algorithm was used to identify the ...


Research on controls of sub crawlers for climbing up stairs with LRF for rescue robots

2016 14th International Conference on Control, Automation, Robotics and Vision (ICARCV), 2016

This paper presents an autonomous control method for rescue robots climbing up stairs using LRF. In disaster areas caused by earthquakes, rescue robots are needed to find injured people from under broken buildings instead of rescue workers. Then, the robots require high skills to be controlled, because the robots are operated by remote controls with wireless cameras. Especially, in case ...


Notice of Violation of IEEE Publication Principles<br>Architecture and Implementation of Object-Level Vertical Search

2009 International Conference on New Trends in Information and Service Science, 2009

Current mobile Web search engines essentially conduct document-level ranking and retrieval. However, structured information about real-world objects embedded in static Web pages and online databases exists in huge amounts. We explore a new paradigm to enable Web search at the object level in this paper, extracting and integrating Web information for objects relevant to a specific application domain. We then ...


Personal ontologies

IEEE Internet Computing, 1999

Corporations can suffer from too much information, and it is often inaccessible, inconsistent, and incomprehensible. The corporate solution entails knowledge management techniques and data warehouses. The paper discusses the use of the personal ontology. The promising approach is an organization scheme based on a model of an office and its information, an ontology, coupled with the proper tools for using ...


More Xplore Articles

Educational Resources on Crawlers

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Crawlers"

IEEE-USA E-Books

  • A Fuzzy Approach to Ranking Hyperlinks

    This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and using the calculated fuzzy memberships as class weights when calculating the fuzzy averaged Q values that map hyperlinks to future discounted rewards. The candidate hyperlinks are ranked according to their corresponding fuzzy averaged Q values, and the hyperlink with the optimal Q value is the best one to be crawled in the next step. Experiments of topic crawling tasks have shown FOA collects high harvest rate.

  • A Method to Automatically Discover and Classify Deep Web Data Source Using Multi-Classifier

    Recently, the discovery of deep Web data source and domain-relevant issue attract more and more attentions. This paper proposed a method using multi- classifier to discover and classify the data source of deep Web. Firstly, It used naive Bayes classifier to class the page into domain relevance or not. Secondly, improved C4.5 decision tree algorithm was used to identify the query interface. The result of the experiment competed with single decision tree classifier proved this method is effective.

  • Research on controls of sub crawlers for climbing up stairs with LRF for rescue robots

    This paper presents an autonomous control method for rescue robots climbing up stairs using LRF. In disaster areas caused by earthquakes, rescue robots are needed to find injured people from under broken buildings instead of rescue workers. Then, the robots require high skills to be controlled, because the robots are operated by remote controls with wireless cameras. Especially, in case of climbing up stairs to find victims, it is hard to recognize a depth between robots and steps for operators with wireless cameras. Then we have proposed the method to estimate slope angles of stairs using LRF and an angle control method for sub crawlers of rescue robots. Here, we try to develop the estimation system with small and low-cost sensors instead of commercial ranging sensors that are too large to be attached on rescue robots. In this paper, we present the validity of the proposed method for actual stairs in a building. First, we present a method for estimating a slope angle of stairs using LRF. Second, a selection method of measured points for an accurate estimation for the slope angle is considered. Third, it is shown that our constructed rescue robot estimates the angle of the slope and climbs up the actual stairs with controlling postures of the robot with sub crawlers.

  • Notice of Violation of IEEE Publication Principles<br>Architecture and Implementation of Object-Level Vertical Search

    Current mobile Web search engines essentially conduct document-level ranking and retrieval. However, structured information about real-world objects embedded in static Web pages and online databases exists in huge amounts. We explore a new paradigm to enable Web search at the object level in this paper, extracting and integrating Web information for objects relevant to a specific application domain. We then rank these objects in terms of their relevance and popularity in answering user queries. We introduce the overview and core technologies of object-level vertical search engines that have been implemented in one working systems: Windows Live Product Search on mobile (http://m.live.com).

  • Personal ontologies

    Corporations can suffer from too much information, and it is often inaccessible, inconsistent, and incomprehensible. The corporate solution entails knowledge management techniques and data warehouses. The paper discusses the use of the personal ontology. The promising approach is an organization scheme based on a model of an office and its information, an ontology, coupled with the proper tools for using it.

  • INTELLIGENT MOBILITY - New approach of robot mobility systems for rescue scenarios

    This paper presents a novel mobile robot for urban search and rescue based to achieve highly locomotion capabilities. The preliminary aim is to build rescue robots which could be able to drive in an unstructured environment and search for victims. It is critical in many mobile robotics applications to characterise the presence and position of objects around the robot. This is the case whether the mobile robot is under autonomous or teleoperative control. To autonomously navigate on rough terrain is a challenging problem for mobile robots, requiring the ability to decide which parts of the environment can be traversed or have to be bypassed. A new mechanism is developed to drive sideways which could be helpful especially in stairs or uneven terrain.

  • A personalized Web search engine using fuzzy concept network with link structure

    There has been much research on link-based search engines such as google and clever. They use link structure to find precision result. Usually, a link- based search engine produces higher-quality results than a text-based search engine. However, they have difficulty in producing the result fit to a specific user's preference. Personalization is required to support a more appropriate result. Among many techniques, the fuzzy concept network based on a user profile can represent a user's subjective interest properly. The paper presents another search engine that uses the fuzzy concept network to personalize the results from a link-based search method. The fuzzy concept network based on a user profile reorders five results of the link-based search engine, and the system provides a personalized high-quality result. Experimental results with three subjects indicate that the system developed searches not only relevant but also personalized Web pages on a user's preference.

  • Research on Tibetan Web Standard Text Data Model

    Through analyzing the characteristics of Tibetan network data information and Tibetan network data information, this paper designs the Tibetan network URL, Tibetan network Berkeley, DB, Tibetan network preprocessing, Tibetan network coding conversion algorithm, and finally establishes the Tibetan network standard text information database. This model provides users with internet Tibetan text object resources obtained by multiple channels, and then realize the Tibetan automatic judgement and identification and extraction. Eventually, it converts object resources from different format sources into plain Tibetan text files for analysis and processing.

  • Web-Based Refining of Machine Translations

    In this article we describe the architecture of our Web-based platform for refining machine translations. The main idea is to use the Web as a database of phrases, and use this information in order to improve the quality of translations. The platform considers three modules, namely: crawling, indexing, and refining. This is an ongoing work, and currently we are capable to take an English phrase and produce its refined Spanish translation.

  • Reconstructed real-time 3D image of chimneys using underwater acoustic video camera in the experimental field

    Ocean resources exploration and underwater works using Remotely Operated Vehicle and Autonomous Underwater Vehicle increase interest, and a techniques of underwater image with acoustic has become a significant concern. Therefore, a development of new underwater acoustic device adapted to ocean resources exploration and underwater works. In this study, we reconstructed real-time 3D image of chimneys using underwater acoustic video camera in the experimental field. The experiment was performed by means of an acoustic video camera, underwater crawler, and chimneys. High spatial imaging and software were developed for this experiment and they were used to generate 3D views, to display an operation views and measurement distance of targets. Our results will be necessary for the ocean resources exploration and underwater works.



Standards related to Crawlers

Back to Top

No standards are currently tagged "Crawlers"


Jobs related to Crawlers

Back to Top