|
Issue |
Title |
|
Vol 13, No 5 (2012) |
WiMAX DBA Algorithm Prioritizes Bandwidth Provision by Using a Reserved 2-Tier Max-Min Fair Sharing Policy |
Abstract
|
Pei-Chen Tseng, Jai-Yan Tsai, Wen-Shyang Hwang |
|
Vol 21, No 4 (2020) |
Wireless Backhaul Optimization Algorithm Considering Time Delay in 5G Dynamic Heterogeneous Scenarios |
Abstract
PDF
|
Hui Zhang, Fengle Li |
|
Vol 13, No 2 (2012) |
Wireless Charging Scheduling Algorithms in Wireless Sensor Networks |
Abstract
|
Wen Ouyang, Chang Wu Yu, Ching-cheng Tien, Chih-Wei Hao, Tung-Hsien Peng |
|
Vol 19, No 3 (2018) |
Wireless Network Localization Algorithm Based on Tikhonov Regularization for Anisotropic Networks |
Abstract
PDF
|
Jiandong Yao, Xiaoyong Yan, Chengshan Qian, Huijun Li |
|
Vol 18, No 4 (2017) |
Wireless Networks Using Matroid along with Network Coding |
Abstract
|
Purnendu Shekhar Pandey, Neetesh Purohit, Shekhar Verma |
|
Vol 19, No 4 (2018) |
WSN Integrated Authentication Schemes Based on Internet of Things |
Abstract
PDF
|
Tsung-Hung Lin, Cheng-Chi Lee, Chia-Hao Chang |
|
Vol 18, No 2 (2017) |
XQUICK: An Efficient Path-Based XML Storage Scheme for Fast Query Processing and Update |
Abstract
|
Ponsy R. K. Sathia Bhama, Radha Senthilkumar, Priya Varshinee |
|
Vol 12, No 3 (2011) |
XRVAT: A Visual Topic Maps-Based Environment for Ontology Construction |
Abstract
|
Cheng-Zen Yang, Ing-Xiang Chen, Chun-Hua Chou |
|
Vol 19, No 7 (2018) |
YANG-based Data Modeling Techniques for the Content Layer of NETCONF to Improve Query Throughput |
Abstract
PDF
|
YangMin Lee, JaeKee Lee |
|
Vol 24, No 3 (2023) |
Yarn Unevenness Prediction Using Generalized Regression Neural Network |
Abstract
PDF
|
Bao-Wei Zhang, Lin Xu, Yong-Hua Wang |
|
Vol 17, No 1 (2016) |
Zero-Watermarking for Face Image Protection in Database |
Abstract
|
Hai-Duong Le, Xiaoyan Xu, Qiang Wang, Li Li, Chin-Chen Chang |
|
Vol 18, No 3 (2017) |
Zombie Fans Detection in Sina Microblog a Machine Learning Approach |
Abstract
|
Binlin Cheng, Jianming Fu |
|
Vol 23, No 2 (2022) |
ZT-BDS: A Secure Blockchain-based Zero-trust Data Storage Scheme in 6G Edge IoT |
Abstract
PDF
|
Chenchen Han, Gwang-Jun Kim, Osama Alfarraj, Amr Tolba, Yongjun Ren |
|
Vol 24, No 1 (2023) |
[RETRACTED] Applying Fuzzy Cognitive Map Based on Structural Equation Modeling for Perceiving the Service Quality and Attributes in Service Industry |
Abstract
|
Kuan-Yu Chen, Yu-Lun Hsu, Yu-San Ting, Pi-Tzong Jan |
|
Vol 24, No 3 (2023) |
[RETRACTED] Research on Industrial IoT Security Based on Deep Learning |
Abstract
|
Xian Guo, Keyu Chen, An Yang, Zhanhui Gang |
|
Vol 10, No 4 (2009) |
具變形躲避偵測機制之隨機金鑰穿透測試載具 |
Abstract
|
楊明豪(Ming-Hour Yang), 羅嘉寧(Jia-Ning Luo) |
|
Vol 3, No 1 (2002) |
具多階安全機制之擴充式微付款系統 |
Abstract
|
王榮中 , 黃士殷 |
|
Vol 11, No 7 (2010) |
具有低失真性之黑白影像藏密學技術 |
Abstract
|
謝文仲(Wen-Chung Hsieh), 吳男益(Nan-I Wu), 王宗銘(Chung-Ming Wang) |
|
Vol 8, No 2 (2007) |
利用物件導向技術以設計Web-based系統量化品質評量工具之研究 |
Abstract
|
楊欣哲(Shin-Jer Yang) |
|
Vol 4, No 2 (2003) |
利用網頁資訊建構多階層指導教授與研究生之網絡關係 |
Abstract
|
徐慧成(Huei-chen Shi), 謝盛文(Sheng-Wen Hsieh), 陳年興(Nian-Shing Chen) |
|
Vol 5, No 1 (2004) |
利用群體盲目簽章實現一複合式銀行架構之電子現金付費機制 |
Abstract
|
吳奕慰(Ea-Way Lu.), 伍麗樵(Lih-Chyau Wuu) |
|
Vol 4, No 1 (2003) |
動態權值循環:一個在網際網路上的分封排序機制 |
Abstract
|
朱元三(Yuan-Sun Chu), 陳景章(Kim-Joan Chen), 楊瑞賓(Jui-pin Yang), 張桂逢(Kuei-Feng Chang) |
|
Vol 10, No 4 (2009) |
可回復式高動態範圍影像資訊隱藏演算法 |
Abstract
|
王宗銘(Chung-Ming Wang), 黃姵甄(Pei-Chen Huang), 王皓正(Hao-Cheng Wang) |
|
Vol 9, No 5 (2008) |
可信網路接入認證在移動終端上的實現 |
Abstract
|
吳昊(Hao Wu), 鐘章隊(Zhang-Dui Zhong) |
|
Vol 3, No 1 (2002) |
台灣網路學習市場之潛在消費者初探 |
Abstract
|
謝耀龍(Yaolung J. Hsieh), 尤俊傑(Andy Yu) |
|
2551 - 2575 of 2657 Items |
<< < 98 99 100 101 102 103 104 105 106 107 > >> |