UM

Browse/Search Results:  1-10 of 14 Help

Selected(0)Clear Items/Page:    Sort:
Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity Journal article
Wang, Qian, Peng, Chih Hung, Jin, Yong, Jiang, Shenyang. Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity[J]. Production and Operations Management, 2024.
Authors:  Wang, Qian;  Peng, Chih Hung;  Jin, Yong;  Jiang, Shenyang
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:4.8/6.0 | Submit date:2024/11/05
Data Breach  Information Technology Investment  It Innovation  Failure Learning Theory  Threat Rigidity Theory  
Editorial: Information theory meets deep neural networks: theory and applications Other
2024-07-15
Authors:  Zhang, Anguo;  Zhang, Qichun;  Zhao, Kai
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2024/08/05
Artificial Neural Networks  Deep Learning—artificial Intelligence  Deep Neural Networks (Dnns)  Information Bottleneck  Information Theory  
How to utilize the information gap for blind box marketing better: evidence from plane tickets Journal article
Qiu, Ziyi, Chen, Sirong, Law, Rob, Zhang, Mu. How to utilize the information gap for blind box marketing better: evidence from plane tickets[J]. Asia Pacific Journal of Tourism Research, 2024, 29(8), 961-978.
Authors:  Qiu, Ziyi;  Chen, Sirong;  Law, Rob;  Zhang, Mu
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:4.3/4.4 | Submit date:2024/08/05
Anxiety Perception  Blind Box  Curiosity  Impulsive Purchase Intention  Information Gap Theory  Paradoxical Role  
Probabilistic Nuclear-Norm Matrix Regression Regularized by Random Graph Theory Journal article
Zhou, Jianhang, Li, Shuyi, Zeng, Shaoning, Zhang, Bob. Probabilistic Nuclear-Norm Matrix Regression Regularized by Random Graph Theory[J]. IEEE Transactions on Emerging Topics in Computational Intelligence, 2024.
Authors:  Zhou, Jianhang;  Li, Shuyi;  Zeng, Shaoning;  Zhang, Bob
Favorite | TC[WOS]:1 TC[Scopus]:0  IF:5.3/5.7 | Submit date:2024/05/16
Adaptation Models  Bayes Methods  Computational Intelligence  Computational Intelligence  Graph Theory  Nuclear Magnetic Resonance  Nuclear-norm Matrix Regression  Probabilistic Logic  Probability Theory  Random Graph  Structural Information  Training  
34.6 A 28nm 72.12TFLOPS/W Hybrid-Domain Outer-Product Based Floating-Point SRAM Computing-in-Memory Macro with Logarithm Bit-Width Residual ADC Conference paper
Yuan, Yiyang, Yang, Yiming, Wang, Xinghua, Li, Xiaoran, Ma, Cailian, Chen, Qirui, Tang, Meini, Wei, Xi, Hou, Zhixian, Zhu, Jialiang, Wu, Hao, Ren, Qirui, Xing, Guozhong, Mak, Pui In, Zhang, Feng. 34.6 A 28nm 72.12TFLOPS/W Hybrid-Domain Outer-Product Based Floating-Point SRAM Computing-in-Memory Macro with Logarithm Bit-Width Residual ADC[C]:Institute of Electrical and Electronics Engineers Inc., 2024, 576-578.
Authors:  Yuan, Yiyang;  Yang, Yiming;  Wang, Xinghua;  Li, Xiaoran;  Ma, Cailian; et al.
Favorite | TC[Scopus]:2 | Submit date:2024/05/16
Training  Random Access Memory  Throughput  Common Information Model (Computing)  System-on-chip  Solid State Circuits  Complexity Theory  
Optimal Sizing of Isolated Renewable Power Systems with Ammonia Synthesis: Model and Solution Approach Journal article
Yu, Zhipeng, Lin, Jin, Liu, Feng, Li, Jiarong, Zhao, Yuxuan, Song, Yonghua. Optimal Sizing of Isolated Renewable Power Systems with Ammonia Synthesis: Model and Solution Approach[J]. IEEE Transactions on Power Systems, 2024, 39(5), 1-14.
Authors:  Yu, Zhipeng;  Lin, Jin;  Liu, Feng;  Li, Jiarong;  Zhao, Yuxuan; et al.
Favorite | TC[WOS]:2 TC[Scopus]:4  IF:6.5/7.4 | Submit date:2024/05/16
Ammonia  Combined c&c And b&b Algorithm  Costs  Hydrogen  Information Gap Decision Theory(Igdt)  Investment  Isolated Renewable Power To Ammonia (Irepta)  Mixed-integer Linear Fractional Programming (Milfp)  Planning  Renewable Energy Sources  Uncertainty  
3C Resource Sharing for Personalized Content Delivery in B5G Networks: A Contract Approach Journal article
Qian Bo, Ma Ting, Yu Kai, Xu Yunting, Wu Yuan, Zhou Haibo. 3C Resource Sharing for Personalized Content Delivery in B5G Networks: A Contract Approach[J]. IEEE Internet of Things Journal, 2023, 10(15), 13442-13457.
Authors:  Qian Bo;  Ma Ting;  Yu Kai;  Xu Yunting;  Wu Yuan; et al.
Favorite | TC[WOS]:0 TC[Scopus]:2  IF:8.2/9.0 | Submit date:2023/08/03
Beyond 5g (B5g) Networks  Communication  Caching  Computing (3c) Resource Sharing  Incentive Mechanism  Information Asymmetry  Multidimensional Contract Theory  Personalized Content Delivery  
A comprehensive analysis of package tour quality: A stochastic evolutionary game Journal article
Lv, Wan-Qing, Wang, Yi-Jie, Su, Ching-Hui (Joan), Chen, Ming-Hsiang, Kot, Hung Wan. A comprehensive analysis of package tour quality: A stochastic evolutionary game[J]. Tourism Management, 2022, 91(8), 104478.
Authors:  Lv, Wan-Qing;  Wang, Yi-Jie;  Su, Ching-Hui (Joan);  Chen, Ming-Hsiang;  Kot, Hung Wan
Favorite | TC[WOS]:6 TC[Scopus]:5  IF:10.9/11.5 | Submit date:2022/05/13
Asymmetric Information  Compound Relief Mechanism  Lemon Market Theory  Package Tour Quality  Stochastic Evolutionary Game  Wright-fisher Process  
Introduction: A Brief Account of Tianzhen Xie’s Journey with Medio-translatology Book chapter
出自: New Frontiers in Translation Studies:Springer Science and Business Media Deutschland GmbH, 2022, 页码:1-9
Authors:  Feng Cui;  Defeng Li
Favorite | TC[Scopus]:0 | Submit date:2022/05/13
Tianzhen Xie  Medio-translatology  Background Information  Translation Theory  
A novel method of variable selection in data envelopment analysis with entropy measures Journal article
Deng, Qiang, Lian, Zhaotong, Fu, Qi. A novel method of variable selection in data envelopment analysis with entropy measures[J]. International Journal of Operational Research, 2021, 41(4), 514-534.
Authors:  Deng, Qiang;  Lian, Zhaotong;  Fu, Qi
Favorite | TC[Scopus]:2 | Submit date:2022/05/13
Aic  Akaike Information Criteria  Data Envelopment Analysis  Entropy Theory  Variable Selection