Skip to main content

previous disabled Page of 7
and
Your search also matched 704 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Effects of a self-regulated-based gamified interactive e-books on primary students' learning performance and affection in a flipped mathematics classroom

Include preview-only content
  1. Article

    Open Access

    Cross-chain asset trading scheme for notaries based on edge cloud storage

    Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain ...

    Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou in Journal of Cloud Computing (2024)

  2. Article

    Open Access

    Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics

    Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...

    **n Wang, Dongsheng Yang, D Raveena Judie Dolly, Shuang Chen in Journal of Cloud Computing (2024)

  3. Article

    Open Access

    Smart and efficient EV charging navigation scheme in vehicular edge computing networks

    With the increasing number of electric fast charging stations (FCSs) deployed along roadsides of both urban roads and highways, the long-distance travel of electric vehicles (EVs) becomes possible. The EV char...

    Haoyu Li, Jihuang Chen, Chao Yang, **n Chen, Le Chang in Journal of Cloud Computing (2023)

  4. Article

    Open Access

    Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation

    The field of medical image segmentation, particularly in the context of brain tumor delineation, plays an instrumental role in aiding healthcare professionals with diagnosis and accurate lesion quantification....

    Abdul Haseeb Nizamani, Zhigang Chen, Ahsan Ahmed Nizamani in Journal of Cloud Computing (2023)

  5. Article

    Exploring the interaction of cognition and emotion in small group collaborative discourse by Heuristic Mining Algorithm (HMA) and Inductive Miner Algorithm (IMA)

    This study explored the interaction between cognition and emotion in blended collaborative learning. The participants (n = 30) of this study were undergraduate students enrolled in a 16-week course on information...

    Wei Xu, Ye-Feng Lou, Hang Chen, Zhi-Yi Shen in Education and Information Technologies (2023)

  6. Article

    Open Access

    Container cascade fault detection based on spatial–temporal correlation in cloud environment

    Containers are light, numerous, and interdependent, which are prone to cascading fault, increasing the probability of fault and the difficulty of detection. Existing detection methods are usually based on a ca...

    Ningjiang Chen, Qingwei Zhong, Yifei Liu, Weitao Liu, Lin Bai in Journal of Cloud Computing (2023)

  7. Article

    Open Access

    Lightweight similarity checking for English literatures in mobile edge computing

    With the advent of information age, mobile devices have become one of the major convenient equipment that aids people’s daily office activities such as academic research, one of whose major tasks is to check t...

    **aomei Liu, Ailing Gao, Chengxiang Chen in Journal of Cloud Computing (2023)

  8. Article

    Preface

    **an-He Sun, Dong Li, Wen-Guang Chen, Tao Li in Journal of Computer Science and Technology (2021)

  9. Article

    Open Access

    An efficient attribute-based hierarchical data access control scheme in cloud computing

    Security issues in cloud computing have become a hot topic in academia and industry, and CP-ABE is an effective solution for managing and protecting data. When data is shared in cloud computing, they usually h...

    Heng He, Liang-han Zheng, Peng Li, Li Deng in Human-centric Computing and Information Sc… (2020)

  10. Article

    Open Access

    A spatio-temporal specification language and its completeness & decidability

    In the past few years, significant progress has been made on spatio-temporal cyber-physical systems in achieving spatio-temporal properties on several long-standing tasks. With the broader specification of spa...

    Tengfei Li, **g Liu, Haiying Sun, **ang Chen, Lipeng Zhang in Journal of Cloud Computing (2020)

  11. Chapter and Conference Paper

    Visual Compiler: Towards Translating Digital UI Design Draft to Front-End Code Automatically

    One assignment of a front-end engineer is to transform the User Interface (UI) design drafts to arrangements with program compatibilities. To furnish the customer requirement, engineers usually need to consid...

    Jiemao Pan, **ang Chen, Ting Chen, Bin Tang in Human Interface and the Management of Info… (2020)

  12. Chapter and Conference Paper

    Comprehensive Evaluation of an Educational Information Management Solution for Parents: MyStudentScope

    Existing electronic student information systems used by schools were designed from the perspective of the educators or students, not the parents. Parents and caregivers have challenges optimizing their use of ...

    Theresa Matthews, **juan Heidi Feng in Human Interface and the Management of Info… (2020)

  13. Chapter and Conference Paper

    Based on GAN Generating Chaotic Sequence

    In this paper, an adversarial encryption algorithm based on generating chaotic sequence by GAN is proposed. Starting from the poor leakage resistance of the basic adversarial encryption communication model bas...

    Xuguang Chen, Hongbin Ma, Pujun Ji, Haiting Liu, Yan Liu in Cyber Security (2020)

  14. Chapter and Conference Paper

    VLC-Enabled Human-Aware Building Management System

    “Smart” buildings that can sense and detect people’s presence have been in use for the past few decades, mostly using technologies that trigger reactive responses such as turning on/off heating/ventilating, li...

    Yehuda E. Kalay, Haripriya Sathyanarayanan in Distributed, Ambient and Pervasive Interac… (2020)

  15. Chapter and Conference Paper

    Design Criteria for Kansei-Oriented Elderly Products

    The purposes of this study included: (1) identifying the specific design components of functional shoes that affect the psychological feeling of the elderly, and establishing their weights; (2) exploring the ...

    Kuo-Hsiang Chen, Ching-Chien Liang in Human-Computer Interaction. Perspectives o… (2019)

  16. Chapter and Conference Paper

    Research on Agricultural Scientific and Technological Information Dissemination System Based on Complex Network Technology

    In view of the complexity of information dissemination in agriculture and the uncertainty of farmers’ demand for scientific and technological information, this paper makes a comprehensive and accurate analysis...

    Hang Chen, Guifen Chen, Ying Zhang in Computer and Computing Technologies in Agr… (2019)

  17. Chapter and Conference Paper

    Study on Spatiotemporal Characteristics of Gaze Gesture Input

    The gaze gesture input has the advantages of high bandwidth, high efficiency, no misoperation and high customization, but it also has the disadvantages of high cognitive load and high fatigue degree. At prese...

    Wen-jun Hou, Si-qi Wu, **ao-lin Chen in Human-Computer Interaction. Recognition an… (2019)

  18. Chapter and Conference Paper

    Optimizing Data Placement on Hierarchical Storage Architecture via Machine Learning

    As storage hierarchies are getting deeper on modern high-performance computing systems, intelligent data placement strategies that can choose the optimal storage tier dynamically is the key to realize the pote...

    Peng Cheng, Yutong Lu, Yunfei Du, Zhiguang Chen, Yang Liu in Network and Parallel Computing (2019)

  19. Chapter and Conference Paper

    Gamification in Local Intangible Cultural Heritage Museums for Children: A Case Design

    Nowadays, local intangible cultural heritage is in danger of disappearing. The museum is a good way to protect it but the current problem is that visitors are less willing to visit boring museums. Gamification...

    Yuchen Weng, Tao Shen, Sihuang Chen in Design, User Experience, and Usability. Ap… (2019)

  20. Chapter and Conference Paper

    Mouse Behavior as an Index of Phishing Awareness

    Phishing attacks are one of the most common security challenges faced by individuals and organizations today. Although many techniques exist to filter out phishing emails, they are not always effective leaving...

    Kun Yu, Ronnie Taib, Marcus A. Butavicius in Human-Computer Interaction – INTERACT 2019 (2019)

previous disabled Page of 7