UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Standing out from the crowd – An investigation of the signal attributes of Airbnb listings Journal article
International Journal of Contemporary Hospitality Management, 2019,Volume: 32
Authors:  Bin Yao;  Richard T.R. Qiu;  Daisy X.F. Fan;  Anyu Liu;  Dimitrios Buhalis
View | Adobe PDF | Favorite | View/Download:248/13 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/09/10
Signaling Theory  Big Data  Airbnb  Binomial Logistic Model  Booking Probability  Sequential Bayesian Updating  Sharing Economy  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite | View/Download:27/0 | TC[WOS]:3 TC[Scopus]:0 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Adaptive local feature based multi-scale image hashing for robust tampering detection Conference paper
IEEE Region 10 Annual International Conference, Proceedings/TENCON, Macao, China, 1-4 Nov. 2015
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite | View/Download:9/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/14
Adaptive Local Feature Extraction  Location-context Information  Multi-scale Image Hashing  Tampering Detection  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite | View/Download:6/0 | TC[WOS]:28 TC[Scopus]:0 | Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection  
A context-aware scheme for privacy-preserving location-based services Journal article
Computer Networks, 2012,Volume: 56,Issue: 11,Page: 2551
Authors:  Pingley A.;  Yu W.;  Zhang N.;  Fu X.;  Zhao W.
Favorite | View/Download:7/0 | TC[WOS]:15 TC[Scopus]:0 | Submit date:2018/10/30
Locality-preserving  Location-based service  VHC-mapping  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View | Adobe PDF | Favorite | View/Download:1279/304 | TC[WOS]:233 TC[Scopus]:0 | Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
Integrating RFID technology in Internet applications Conference paper
Communications in Computer and Information Science, Ankara, TURKEY, JUN 26-28, 2011
Authors:  Simon Fong
Favorite | View/Download:7/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Internet Applications  Rfid  Wireless Communication  
Optimization of sensor locations and sensitivity analysis for engine health monitoring using minimum interference algorithms Conference paper
2007 IEEE International Conference on System of Systems Engineering, SOSE
Authors:  Cotae P.;  Yalamanchili S.;  Chen C.L.P.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Fisher information matrix  Gram matrix  Interference algorithms  Optimum placement