×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Busin... [5]
THE STATE KEY LA... [3]
Faculty of Scien... [3]
Faculty of Arts ... [1]
INSTITUTE OF MIC... [1]
ASIA-PACIFIC ACA... [1]
More...
Authors
FU QI [2]
SONG YONGHUA [1]
MAK PUI IN [1]
DU JIANXIA [1]
LIAN ZHAOTONG [1]
LI DEFENG [1]
More...
Document Type
Journal article [11]
Book chapter [1]
Conference paper [1]
Other [1]
Date Issued
2024 [6]
2023 [1]
2022 [2]
2021 [1]
2019 [2]
2018 [1]
More...
Language
英語English [14]
Source Publication
Asia Pacific Jou... [1]
Asia-Pacific Edu... [1]
Behavioral Scien... [1]
Digest of Techni... [1]
Frontiers in Neu... [1]
IEEE Internet of... [1]
More...
Indexed By
SCIE [6]
SSCI [5]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 14
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity
Journal article
Wang, Qian, Peng, Chih Hung, Jin, Yong, Jiang, Shenyang. Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity[J]. Production and Operations Management, 2024.
Authors:
Wang, Qian
;
Peng, Chih Hung
;
Jin, Yong
;
Jiang, Shenyang
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
4.8
/
6.0
|
Submit date:2024/11/05
Data Breach
Information Technology Investment
It Innovation
Failure Learning Theory
Threat Rigidity Theory
Editorial: Information theory meets deep neural networks: theory and applications
Other
2024-07-15
Authors:
Zhang, Anguo
;
Zhang, Qichun
;
Zhao, Kai
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2024/08/05
Artificial Neural Networks
Deep Learning—artificial Intelligence
Deep Neural Networks (Dnns)
Information Bottleneck
Information Theory
How to utilize the information gap for blind box marketing better: evidence from plane tickets
Journal article
Qiu, Ziyi, Chen, Sirong, Law, Rob, Zhang, Mu. How to utilize the information gap for blind box marketing better: evidence from plane tickets[J]. Asia Pacific Journal of Tourism Research, 2024, 29(8), 961-978.
Authors:
Qiu, Ziyi
;
Chen, Sirong
;
Law, Rob
;
Zhang, Mu
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
4.3
/
4.4
|
Submit date:2024/08/05
Anxiety Perception
Blind Box
Curiosity
Impulsive Purchase Intention
Information Gap Theory
Paradoxical Role
Probabilistic Nuclear-Norm Matrix Regression Regularized by Random Graph Theory
Journal article
Zhou, Jianhang, Li, Shuyi, Zeng, Shaoning, Zhang, Bob. Probabilistic Nuclear-Norm Matrix Regression Regularized by Random Graph Theory[J]. IEEE Transactions on Emerging Topics in Computational Intelligence, 2024.
Authors:
Zhou, Jianhang
;
Li, Shuyi
;
Zeng, Shaoning
;
Zhang, Bob
Favorite
|
TC[WOS]:
1
TC[Scopus]:
0
IF:
5.3
/
5.7
|
Submit date:2024/05/16
Adaptation Models
Bayes Methods
Computational Intelligence
Computational Intelligence
Graph Theory
Nuclear Magnetic Resonance
Nuclear-norm Matrix Regression
Probabilistic Logic
Probability Theory
Random Graph
Structural Information
Training
34.6 A 28nm 72.12TFLOPS/W Hybrid-Domain Outer-Product Based Floating-Point SRAM Computing-in-Memory Macro with Logarithm Bit-Width Residual ADC
Conference paper
Yuan, Yiyang, Yang, Yiming, Wang, Xinghua, Li, Xiaoran, Ma, Cailian, Chen, Qirui, Tang, Meini, Wei, Xi, Hou, Zhixian, Zhu, Jialiang, Wu, Hao, Ren, Qirui, Xing, Guozhong, Mak, Pui In, Zhang, Feng. 34.6 A 28nm 72.12TFLOPS/W Hybrid-Domain Outer-Product Based Floating-Point SRAM Computing-in-Memory Macro with Logarithm Bit-Width Residual ADC[C]:Institute of Electrical and Electronics Engineers Inc., 2024, 576-578.
Authors:
Yuan, Yiyang
;
Yang, Yiming
;
Wang, Xinghua
;
Li, Xiaoran
;
Ma, Cailian
; et al.
Favorite
|
TC[Scopus]:
2
|
Submit date:2024/05/16
Training
Random Access Memory
Throughput
Common Information Model (Computing)
System-on-chip
Solid State Circuits
Complexity Theory
Optimal Sizing of Isolated Renewable Power Systems with Ammonia Synthesis: Model and Solution Approach
Journal article
Yu, Zhipeng, Lin, Jin, Liu, Feng, Li, Jiarong, Zhao, Yuxuan, Song, Yonghua. Optimal Sizing of Isolated Renewable Power Systems with Ammonia Synthesis: Model and Solution Approach[J]. IEEE Transactions on Power Systems, 2024, 39(5), 1-14.
Authors:
Yu, Zhipeng
;
Lin, Jin
;
Liu, Feng
;
Li, Jiarong
;
Zhao, Yuxuan
; et al.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
4
IF:
6.5
/
7.4
|
Submit date:2024/05/16
Ammonia
Combined c&c And b&b Algorithm
Costs
Hydrogen
Information Gap Decision Theory(Igdt)
Investment
Isolated Renewable Power To Ammonia (Irepta)
Mixed-integer Linear Fractional Programming (Milfp)
Planning
Renewable Energy Sources
Uncertainty
3C Resource Sharing for Personalized Content Delivery in B5G Networks: A Contract Approach
Journal article
Qian Bo, Ma Ting, Yu Kai, Xu Yunting, Wu Yuan, Zhou Haibo. 3C Resource Sharing for Personalized Content Delivery in B5G Networks: A Contract Approach[J]. IEEE Internet of Things Journal, 2023, 10(15), 13442-13457.
Authors:
Qian Bo
;
Ma Ting
;
Yu Kai
;
Xu Yunting
;
Wu Yuan
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
2
IF:
8.2
/
9.0
|
Submit date:2023/08/03
Beyond 5g (B5g) Networks
Communication
Caching
Computing (3c) Resource Sharing
Incentive Mechanism
Information Asymmetry
Multidimensional Contract Theory
Personalized Content Delivery
A comprehensive analysis of package tour quality: A stochastic evolutionary game
Journal article
Lv, Wan-Qing, Wang, Yi-Jie, Su, Ching-Hui (Joan), Chen, Ming-Hsiang, Kot, Hung Wan. A comprehensive analysis of package tour quality: A stochastic evolutionary game[J]. Tourism Management, 2022, 91(8), 104478.
Authors:
Lv, Wan-Qing
;
Wang, Yi-Jie
;
Su, Ching-Hui (Joan)
;
Chen, Ming-Hsiang
;
Kot, Hung Wan
Favorite
|
TC[WOS]:
6
TC[Scopus]:
5
IF:
10.9
/
11.5
|
Submit date:2022/05/13
Asymmetric Information
Compound Relief Mechanism
Lemon Market Theory
Package Tour Quality
Stochastic Evolutionary Game
Wright-fisher Process
Introduction: A Brief Account of Tianzhen Xie’s Journey with Medio-translatology
Book chapter
出自: New Frontiers in Translation Studies:Springer Science and Business Media Deutschland GmbH, 2022, 页码:1-9
Authors:
Feng Cui
;
Defeng Li
Favorite
|
TC[Scopus]:
0
|
Submit date:2022/05/13
Tianzhen Xie
Medio-translatology
Background Information
Translation Theory
A novel method of variable selection in data envelopment analysis with entropy measures
Journal article
Deng, Qiang, Lian, Zhaotong, Fu, Qi. A novel method of variable selection in data envelopment analysis with entropy measures[J]. International Journal of Operational Research, 2021, 41(4), 514-534.
Authors:
Deng, Qiang
;
Lian, Zhaotong
;
Fu, Qi
Favorite
|
TC[Scopus]:
2
|
Submit date:2022/05/13
Aic
Akaike Information Criteria
Data Envelopment Analysis
Entropy Theory
Variable Selection