Skip to main content

and
Your search also matched 98 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A Method for Evaluating the Suitability of CO2 Injection in Oil Reservoirs Based on Multi-model Coupled Machine Learning Algorithm

Include preview-only content
  1. Chapter and Conference Paper

    Blind Image Quality Assessment via Deep Recursive Convolutional Network with Skip Connection

    The performance of traditional image quality assessment (IQA) methods are not robust, due to those methods exploit shallow hand-designed features. It has been demonstrated that deep neural network can learn mo...

    Qingsen Yan, **qiu Sun, Shaolin Su, Yu Zhu in Pattern Recognition and Computer Vision (2018)

  2. Chapter and Conference Paper

    CAS(ME)2: A Database of Spontaneous Macro-expressions and Micro-expressions

    Micro-expressions are facial expressions that are characterized by short durations, involuntary generation and low intensity, and they are regarded as unique cues revealing one’s hidden emotions. Although meth...

    Fangbing Qu, Su-**g Wang, Wen-**g Yan in Human-Computer Interaction. Novel User Exp… (2016)

  3. Chapter and Conference Paper

    A Genetic Algorithm Based Model for Chinese Phishing E-commerce Websites Detection

    We propose a new Chinese phishing e-commerce websites detection model which integrates the URL features and web features of websites. Some unique features of Chinese e-Commerce websites are included and Sequen...

    Zhijun Yan, Su Liu, Tianmei Wang, Baowen Sun in HCI in Business, Government, and Organizat… (2016)

  4. Chapter and Conference Paper

    Quantifying Micro-expressions with Constraint Local Model and Local Binary Pattern

    Micro-expression may reveal genuine emotions that people try to conceal. However, it’s difficult to measure it. We selected two feature extraction methods to analyze micro-expressions by assessing the dynamic ...

    Wen-**g Yan, Su-**g Wang, Yu-Hsin Chen in Computer Vision - ECCV 2014 Workshops (2015)

  5. Chapter and Conference Paper

    Launching Generic Attacks on iOS with Approved Third-Party Applications

    iOS is Apple’s mobile operating system, which is used on iPhone, iPad and iPod touch. Any third-party applications developed for iOS devices are required to go through Apple’s application vetting process and a...

    ** Han, Su Mon Kywe, Qiang Yan, Feng Bao in Applied Cryptography and Network Security (2013)

  6. Chapter and Conference Paper

    Automated Realization of Business Workflow Specification

    Business workflow assembles together a collection of tasks or activities in order to accomplish a business objective. Management of business workflows is facing many significant challenges, including in partic...

    Guohua Liu, ** Liu, Haihuan Qin, Jianwen Su in Service-Oriented Computing. ICSOC/ServiceW… (2010)

  7. Chapter and Conference Paper

    Does Health Related Quality of Life Differ between People with Chronic Mental Illness Who Use Computers and Those Who Do Not?

    Occupational therapists are increasingly interested in promoting quality of life and digital divides in people with chronic mental illness. This study aims to compare quality of life between people with chroni...

    Yan-hua Huang, I-Ju Su in Universal Access in Human-Computer Interac… (2009)

  8. Chapter and Conference Paper

    A Design of Air-Condition Remote Control for Visually Impaired People

    Air condition is operated by a remote control presented mainly with visual cues. Individuals with visual impairment have difficult to use it. This research aims to design an air condition remote control for th...

    Cherng-Yee Leung, Yan-Ting Yao in Universal Access in Human-Computer Interac… (2009)

  9. Chapter and Conference Paper

    Frontal Face Synthesis Based on Multiple Pose-Variant Images for Face Recognition

    Pose variance remains a challenging problem for face recognition. In this paper, a stereoscopic synthesis method for generating a frontal face image is proposed to improve the performance of automatic face rec...

    Congcong Li, Guangda Su, Yan Shang, Yingchun Li in Advances in Biometrics (2007)

  10. Chapter and Conference Paper

    A Loop-Based Key Management Scheme for Wireless Sensor Networks

    Wireless sensor networks are emerging as a promising solution for various types of futuristic applications for both military and the public. The design of key management schemes is one of the most important as...

    YingZhi Zeng, BaoKang Zhao, **Shu Su in Emerging Directions in Embedded and Ubiqui… (2007)