|
Issue |
Title |
|
Vol 20, No 2 (2019) |
An Advanced Networking Protocol for VHF Data Exchange System |
Abstract
PDF
|
Liang Chen, Qinyou Hu, Qifei Zou |
|
Vol 11, No 7 (2010) |
An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks |
Abstract
|
Jung-Wen Lo, Ji-Zhe Lee, Min-Shiang Hwang, Yen-Ping Chu |
|
Vol 26, No 2 (2025) |
An Affordable Intelligent Navigation Backpack for the Visually Impaired: Deep Learning-Based Obstacle Detection and Real-Time Navigation with RGB-D Integration |
Abstract
|
Cheng-Li Luo, Hai Xu, Min Liu, Shu-Chuan Chu |
|
Vol 3, No 2 (2002) |
An Agent-Based Approach to the Wireless Internet |
Abstract
|
Qusay H. Mahmoud |
|
Vol 16, No 2 (2015) |
An Agent-Based Diagnosis System for Child's Developmental Delay Screening in Taiwan |
Abstract
|
Yao-Jung Yang, Hsiang-Yang Chen |
|
Vol 23, No 4 (2022) |
An Algorithm Combining Random Forest Classification and Fuzzy Comprehensive Evaluation |
Abstract
PDF
|
Jing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang |
|
Vol 20, No 5 (2019) |
An Algorithm of Street-level Landmark Obtaining Based on Yellow Pages |
Abstract
PDF
|
Te Ma, Fenlin Liu, Xiangyang Luo, Meijuan Yin, Ruixiang Li |
|
Vol 20, No 4 (2019) |
An Algorithmic Approach for Core Election in Mobile Ad-hoc Network |
Abstract
PDF
|
Faheem Khan, Abdul Wahid Khan, Khalid Shah, Iqbal Qasim, Asad Habib |
|
Vol 17, No 7 (2016) |
An Alignment-Oriented Segmenting Approach for Optimizing Large Scale Ontology Alignments |
Abstract
|
Xingsi Xue, Shu-Chuan Chu |
|
Vol 13, No 2 (2012) |
An Android Alarm Clock Application Combining with Function of SMS and GPS |
Abstract
|
Rung-Shiang Cheng, Po-Hsian Huang, Der-Jiunn Deng |
|
Vol 15, No 7 (2014) |
An Android Launcher with Hand Tremor Filter Capabilities for the Elderly |
Abstract
|
Chih-Pin Freg, Tien-Yan Ma, Kuo-Yang Tseng, Wei-Tsong Lee, Ting-Wei Hou |
|
Vol 19, No 4 (2018) |
An Anti-shoulder-surfing Authentication Scheme of Mobile Device |
Abstract
PDF
|
Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai |
|
Vol 18, No 5 (2017) |
An AP-Based Shilling Attack Detector for Collaborative Filtering Recommendation Systems |
Abstract
|
Qingxian Wang, Meng Wan, Mingsheng Shang, Shimin Cai |
|
Vol 21, No 3 (2020) |
An Application of Differential Evolution Algorithm-based Restricted Boltzmann Machine to Recommendation Systems |
Abstract
PDF
|
R. J. Kuo, J. T. Chen |
|
Vol 24, No 1 (2023) |
An Application of Keystream Using Cellular Automata for Image Encryption in IoT |
Abstract
PDF
|
Shyi-Tsong Wu |
|
Vol 17, No 3 (2016) |
An Approach for Robust In-Network Caching in Information-Centric Networks |
Abstract
|
Yujing Zeng, Mingshuang Jin, Jiawei Li |
|
Vol 24, No 2 (2023) |
An Approach to Critical Success Factors in Designing Cloud-based Application Solutions |
Abstract
PDF
|
Shin-Jer Yang, Zi-Ling Lai, Ming-Chin Hung |
|
Vol 19, No 1 (2018) |
An Approach to Improve Efficiency of Traditional Automated Trust Negotiation Strategies |
Abstract
PDF
|
Bailing Liu, Chao Lei, Yanhui Li, Liting Liang |
|
Vol 19, No 7 (2018) |
An Approach to Instant Discovering Companion Vehicles from Live Streaming ANPR Data |
Abstract
PDF
|
Meiling Zhu, Chen Liu, Jianwu Wang, Yanbo Han |
|
Vol 17, No 4 (2016) |
An Approach to Reduce Soft Error Rate of SRAM-Based FPGA with SEU Effects by Partial Mitigation and PSO |
Abstract
|
Yunyi Yan, Jinfu Wu, Baolong Guo |
|
Vol 13, No 5 (2012) |
An Approach to Representing Access Control Policies for Improving DFANS |
Abstract
|
Bai-Ling Liu, Wei-Jun Wang |
|
Vol 19, No 2 (2018) |
An Approach To Webpage Prediction Method Using Variable Order Markov Model In Recommendation Systems |
Abstract
PDF
|
T. Gopalakrishnan, P. Sengottuvelan, A. Bharathi, R. Lokeshkumar |
|
Vol 24, No 2 (2023) |
An Architecture for Electronic Exchange of Official Document Based on Email and Blockchain |
Abstract
PDF
|
Chu-Mei Chiu, Fang-Ming Hsu, Meng-Hsiang Shen, Chun-Min Lin |
|
Vol 20, No 4 (2019) |
An Architecture-Centric Development Approach for Service-Oriented Product Lines |
Abstract
PDF
|
Xingjian Lu, Jianwei Yin, Gaoqi He, Huiqun Yu, Neal N. Xiong |
|
Vol 26, No 2 (2025) |
An Artificial Intelligence Method to Predict Malicious Behavior |
Abstract
|
Der-Chen Huang, Chun-Fang Hsiao, Bo-Kai Liu, Yu-Yi Chen |
|
526 - 550 of 2669 Items |
<< < 17 18 19 20 21 22 23 24 25 26 > >> |