Skip to main content

previous disabled Page of 10
and
  1. No Access

    Chapter and Conference Paper

    Voice-Assisted Food Recall Using Voice Assistants

    In this paper, we design a voice-assisted food recall tool that can be implemented on voice assistants of smart speakers and smartphones, enabling frequent, quick, and real-time self-administered food recall. ...

    **aohui Liang, John A. Batsis, **g Yuan in HCI International 2022 – Late Breaking Pap… (2022)

  2. No Access

    Chapter and Conference Paper

    The Use of Structuration Theory in Empirical Information Systems Research: A Systematic Literature Review

    Structuration Theory (ST) is increasingly used in the field of Information Systems (IS) and has been widely cited by IS researchers

    Khando Khando, M. Sirajul Islam, Shang Gao in The Role of Digital Technologies in Shapin… (2022)

  3. No Access

    Book and Conference Proceedings

    Design, User Experience, and Usability: UX Research and Design

    10th International Conference, DUXU 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part I

    Marcelo M. Soares in Lecture Notes in Computer Science (2021)

  4. No Access

    Book and Conference Proceedings

    Design, User Experience, and Usability: Design for Contemporary Technological Environments

    10th International Conference, DUXU 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings, Part III

    Marcelo M. Soares in Lecture Notes in Computer Science (2021)

  5. No Access

    Chapter and Conference Paper

    Usability Assessment of the **aoAi Touch Screen Speaker

    With the development of modern economy and technology, people's living standards are constantly improving, and more intelligent products have come into people's vision. People's requirements for product availa...

    Naixin Liu, Shuyue Li, Wang **ang, Yue Xu in Design, User Experience, and Usability: D… (2021)

  6. No Access

    Chapter and Conference Paper

    Bot Log Mining: Using Logs from Robotic Process Automation for Process Mining

    Robotic Process Automation (RPA) is an emerging technology for automating tasks using bots that can mimic human actions on computer systems. Most existing research focuses on the earlier phases of RPA implemen...

    Andreas Egger, Arthur H. M. ter Hofstede, Wolfgang Kratsch in Conceptual Modeling (2020)

  7. No Access

    Chapter and Conference Paper

    Position: GDPR Compliance by Construction

    New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...

    Malte Schwarzkopf, Eddie Kohler in Heterogeneous Data Management, Polystores,… (2019)

  8. No Access

    Chapter and Conference Paper

    Data Sharing and Privacy for Patient IoT Devices Using Blockchain

    Once a fitness fad, wearable and other related Internet of Things (IoT) devices are fast becoming common place in many different smart city applications such as healthcare. However, IoT devices, particularly i...

    Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha in Smart City and Informatization (2019)

  9. Chapter and Conference Paper

    Research on the Key Techniques of Semantic Mining of Information Digest in the Field of Agricultural Major Crops Based on Deep Learning

    Nowadays application scopes of deep learning research in the machine learning subfield have been gradually expanded, mainly in the field of computer vision and natural language processing. However, in the latt...

    Hao G. J. M. Gong, Yunpeng Cui, ** Qian in Computer and Computing Technologies in Agr… (2019)

  10. No Access

    Book and Conference Proceedings

    Advances in Production Management Systems. Smart Manufacturing for Industry 4.0

    IFIP WG 5.7 International Conference, APMS 2018, Seoul, Korea, August 26-30, 2018, Proceedings, Part II

    Prof. Ilkyeong Moon, Gyu M. Lee in IFIP Advances in Information and Communication Technology (2018)

  11. No Access

    Chapter and Conference Paper

    A Revocable Outsourcing Attribute-Based Encryption Scheme

    Attribute-Based Encryption (ABE) is a generalized cryptographic primitive from normal public key encryption. It provides an access control mechanism over encrypted message using access policies and ascribed at...

    Zoe L. Jiang, Ruoqing Zhang, Zechao Liu in Cloud Computing, Security, Privacy in New … (2018)

  12. No Access

    Chapter and Conference Paper

    Position Paper on Blockchain Technology: Smart Contract and Applications

    Blockchain technology enables a transaction to be handled in a decentralized fashion. In this position paper, we aim to introduce the background of blockchain technology, discuss one of its important component...

    Weizhi Meng, Jianfeng Wang, **anmin Wang, Joseph Liu in Network and System Security (2018)

  13. No Access

    Chapter and Conference Paper

    Climbing Ranking Position via Long-Distance Backlinks

    The best attachment consists in finding a good strategy that allows a node inside a network to achieve a high rank. This is an open issue due to its intrinsic computational complexity and to the giant dimension o...

    V. Carchiolo, M. Grassia, A. Longheu in Internet and Distributed Computing Systems (2018)

  14. No Access

    Chapter and Conference Paper

    Exploiting Long Distance Connections to Strengthen Network Robustness

    Network fault tolerance (also known as resilience or robustness) is becoming a highly relevant topic, expecially in real networks, where it is essential to know to what extent it is still working notwithstandi...

    V. Carchiolo, M. Grassia, A. Longheu in Internet and Distributed Computing Systems (2018)

  15. No Access

    Chapter and Conference Paper

    Design and Performance Analysis of Load Balancing Strategies for Cloud-Based Business Process Management Systems

    Business Process Management Systems (BPMS) provide automated support for the execution of business processes in modern organisations. With the advent of cloud computing, the deployment of BPMS is shifting from...

    Michael Adams, Chun Ouyang in On the Move to Meaningful Internet Systems… (2018)

  16. No Access

    Chapter and Conference Paper

    Mixed Membership Sparse Gaussian Conditional Random Fields

    Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...

    Jie Yang, Henry C. M. Leung, S. M. Yiu in Advanced Data Mining and Applications (2017)

  17. No Access

    Chapter and Conference Paper

    Mining Textual Reviews with Hierarchical Latent Tree Analysis

    Collecting feedback from customers is an important task of any business if they hope to retain customers and improve their quality of service. Nowadays, customers can enter reviews on many websites. The vast n...

    Leonard K. M. Poon, Chun Fai Leung, Nevin L. Zhang in Data Mining and Big Data (2017)

  18. No Access

    Chapter and Conference Paper

    Cuttle: Enabling Cross-Column Compression in Distributed Column Stores

    We observe that, in real-world distributed data warehouse systems, data columns from different sources often exhibit redundancy. Even though these systems can employ both general and column-oriented compressio...

    Hao Liu, Jiang **ao, **anjun Guo, Haoyu Tan, Qiong Luo, Lionel M. Ni in Web and Big Data (2017)

  19. No Access

    Chapter and Conference Paper

    An Investigation into the Use of Document Scores for Optimisation over Rank-Biased Precision

    When a Document Retrieval system receives a query, a Relevance model is used to provide a score to each document based on its relevance to the query. Relevance models have parameters that should be tuned to op...

    Sunil Randeni, Kenan M. Matawie, Laurence A. F. Park in Information Retrieval Technology (2017)

  20. No Access

    Chapter and Conference Paper

    Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems

    Privacy preservation is an essential requirement for information systems and also it is regulated by law. However, existing solutions for privacy protection during data analysis have some limitations when appl...

    Thien-An Nguyen, Nhien-An Le-Khac, M-Tahar Kechadi in Future Data and Security Engineering (2017)

previous disabled Page of 10