7,837 resources related to Web pages
- Topics related to Web pages
- IEEE Organizations related to Web pages
- Conferences related to Web pages
- Periodicals related to Web pages
- Most published Xplore authors for Web pages
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
Promote the exchange of ideas between academia and industry in the field of computer and networks dependability
2019 IEEE International Professional Communication Conference (ProComm)
The scope of the conference includes the study, development, improvement, and promotion ofeffective techniques for preparing, organizing, processing, editing, collecting, conserving,teaching, and disseminating any form of technical information by and to individuals and groupsby any method of communication. It also includes technical, scientific, industrial, and otheractivities that contribute to the techniques and products used in this field.
Wireless and Optical communications Networks WOCN2018 invites high-quality recent research results in the areas of Home and Health networking, Electronic commerce, Mobility and Mobile Payment, Broadband access, satellite services, 5G in rural communications, cloud computing, Smart grids, Big data analysis, Cyber security, Internet-of-Things IOT, Mobile and Wireless Communications, optical communications and networking, architectures, protocols, planning and design, management and operation, simulation and performance modeling. WOCN2018 conference is the application of the next generation of information and communications. WOCN2018 seeks to address and capture highly innovative and state of the art research and work in the area of information and communications technologies including wireless and Optical communications networks.
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...
Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...
IEEE Industrial Electronics Magazine, 2009
Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007), 2007
This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and ...
2010 International Conference on E-Business and E-Government, 2010
Compared with traditional business electronic business (e-business) has the advantages of globalization of markets, convenience, low cost and high efficiency. It has changed the business philosophy and modes of operation in traditional business, and the changes have a deeply significant effect on transnational business of small and medium enterprises (SMEs). Compared with large enterprises SMEs are at a disadvantage in ...
2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), 2007
Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique ...
2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009
Digital watermarking is an effective means for copyright protection or covert communication in the research field of information security. By using watermarking, the watermark bits are hidden into the multimedia content with the designed algorithm. And the watermarked contents, or the watermarked image in this paper, look almost identical to its original counterpart, while it still retains the capability to ...
This paper presents a fuzzy approach to efficiently crawling topic related web pages using reinforcement learning and fuzzy clustering theory. The approach, FOA, takes the delayed reward into account and subsequently labels newly crawled web pages online. To minimize the bad effect of the naive Bayes classifiers, we adopt the fuzzy center-averaged clustering method to label crawled web pages, and using the calculated fuzzy memberships as class weights when calculating the fuzzy averaged Q values that map hyperlinks to future discounted rewards. The candidate hyperlinks are ranked according to their corresponding fuzzy averaged Q values, and the hyperlink with the optimal Q value is the best one to be crawled in the next step. Experiments of topic crawling tasks have shown FOA collects high harvest rate.
Compared with traditional business electronic business (e-business) has the advantages of globalization of markets, convenience, low cost and high efficiency. It has changed the business philosophy and modes of operation in traditional business, and the changes have a deeply significant effect on transnational business of small and medium enterprises (SMEs). Compared with large enterprises SMEs are at a disadvantage in strength in transnational operations, but the application of e-business brings new opportunities for SMEs. Therefore, SMEs should take full advantage of the opportunities e-business has brought and e-business's functions of advertising, information and business in order to improve their own international competitiveness and operate internationally.
Timestamps are widely used in computing and offer an easy way to determine the time of events in digital investigations. Unfortunately, the ability of users to change clock settings, the difficult to recover the multi-level overwriting data in a disk, etc. can not provide the efficient timestamp for event reasoning. In this paper, we present techniques to use lay technique to deal with the time of a file on local machine, even its data block of a file had been re-written many times or deleted long ago, and adopt the time offset mechanism to deal with the deviation time of the file at time t. Use a logging mechanism to record the time of modifications to each disk block and its deviation time at time t to calculate the real time of a file for reasoning the order of the events and obtaining a timeline of activities on a file.
Digital watermarking is an effective means for copyright protection or covert communication in the research field of information security. By using watermarking, the watermark bits are hidden into the multimedia content with the designed algorithm. And the watermarked contents, or the watermarked image in this paper, look almost identical to its original counterpart, while it still retains the capability to counteract intentional signal processing by others and keeps the existence of the hidden watermark. We employ the concept of sub-sampling and make use of the frequency coefficient similarities between the sub-images for effectively embedding the watermark. In addition, there must be requirements to keep both the embedded watermark alive and the watermarked contents acceptable. Here we make use of an optimization technique, called bacterial foraging, for obtaining an optimized watermarking algorithm with a properly designed fitness function comprising the possible requirements including the watermarked image quality and the capability for the existence of extracted watermark. Simulation results demonstrate the advantages and effectiveness of the proposed algorithm with the combination of sub-sampling and bacterial foraging.
Given the popularity of mobile and wearable devices, it is important to focus on the clarity of the displayed content for the end users. Currently, there is no link between the layout or size of displayed image and the information content in those images. In this paper, we present a method for optimally arranging and displaying a group of images, where the images are resized such that the relative size of the images is proportional to the number of objects in the images, or the number of faces. This ensures that the user gets to view faces or objects in images equally well regardless of the original size of the images. The method can be used for a number of applications in a mobile device, such as the gallery, web browser and video applications. We present implementation details to resize and layout a group of images displayed on a web page in a web browser. We also present results of a user study to see if such an approach might be desirable.
Web testing is a promising technique to ensure the high quality of Web applications. This work regards a Web application as the composition of different interacting components. A composite component consists of several other components. A Component Interaction Diagram (CID) is constructed from the specification of the Web application under test. The CID is described in XML fashion. For each component, a component automaton is established. According to the CID, the Component Test Sequences (CTSs) are generated. The CTSs are in fact the interacting sequences of the components. The test cases, which are individual XML documents, are the CTSs with input data and then the Web testing becomes the testing of component interaction automata. Finally, the evaluation of Component Test Sequence Coverage (CTSC) is performed and a method to increase the CTSC is presented.
With the pervasive use of camera phones, the embedded camera has been considered as a promising HCI manner for mobiles. With necessary technologies, it is possible to become a powerful tool to acquire the information in daily life. We have designed and implemented a system named Photo-to-Search to carry out queries from camera phones simply by taking some photos of interested objects. The captured pictures are compared with a large amount of Web images to select the ones which contain the same prominent object. Consequently, the related information is extracted from the Web pages where the matched images locate. In our demo, data of large buildings, storefronts and products are collected and these kinds of queries are specifically demonstrated to show the efficiency and the effectiveness of our system.
Generally different Web sites have different Web page structures, which would heavily affect the extraction quality when the Web content is automatically collected. On the basis of a statistical analysis on content features and structure characteristics of News domain Web pages, this paper proposes a maximum continuous sum of text density (MCSTD) method to efficiently and effectively extract Web content from different Web pages. Firstly, Web pages are preprocessed, and then the text density of texts are calculated. Finally, the Web content is extracted using the proposed MCSTD method. Experimental results show that the extraction precision is over 95%, and the proposed approach is more efficient and easier to be implemented compared to traditional models. Additionally, our method has also been applied to the scenario of comparable corpora construction using extracted Web resource.
By moving towards the semantic Web ontologies as a way to describe a domain of interest will gain importance. Already in today's Web with its overwhelming amount of HTML Web pages ontologies can assist users in their whole information retrieval process. In this article, the author first explains how to support users in describing their information needs by using ontologies. Second, it is shown how to retrieve high quality data sources in a particular subject domain. For demonstration purposes, the examples in the article are based on a user searching for hotels. Third, the author also describes how search agents are able to query and analyze the content of the retrieved pages with the aid of ontologies. In contrast to the "wrapper" technique which is commonly used by most of the available applications to extract data of a known Web site, ontologies offer more flexibility, adaptability and robustness. Fourth, it is shown how the results of different sources are merged and presented as valuable data to the user. Users' benefits are more accurate query definitions in a given domain, delegation of time-consuming search tasks to search agents and comparable search results of higher quality
Define recommended practices for World Wide Web page engineering for Intranet and Extranet environments, based on World Wide Web Consortium (W3C) and related industry guidelines. (Expanded from previous PAR which specifically mentioned HTML and XML)