| Issue | Title | |
| Vol 21, No 3 (2020) | An Application of Differential Evolution Algorithm-based Restricted Boltzmann Machine to Recommendation Systems | Abstract PDF |
| R. J. Kuo, J. T. Chen | ||
| Vol 24, No 1 (2023) | An Application of Keystream Using Cellular Automata for Image Encryption in IoT | Abstract PDF |
| Shyi-Tsong Wu | ||
| Vol 17, No 3 (2016) | An Approach for Robust In-Network Caching in Information-Centric Networks | Abstract |
| Yujing Zeng, Mingshuang Jin, Jiawei Li | ||
| Vol 24, No 2 (2023) | An Approach to Critical Success Factors in Designing Cloud-based Application Solutions | Abstract PDF |
| Shin-Jer Yang, Zi-Ling Lai, Ming-Chin Hung | ||
| Vol 19, No 1 (2018) | An Approach to Improve Efficiency of Traditional Automated Trust Negotiation Strategies | Abstract PDF |
| Bailing Liu, Chao Lei, Yanhui Li, Liting Liang | ||
| Vol 19, No 7 (2018) | An Approach to Instant Discovering Companion Vehicles from Live Streaming ANPR Data | Abstract PDF |
| Meiling Zhu, Chen Liu, Jianwu Wang, Yanbo Han | ||
| Vol 17, No 4 (2016) | An Approach to Reduce Soft Error Rate of SRAM-Based FPGA with SEU Effects by Partial Mitigation and PSO | Abstract |
| Yunyi Yan, Jinfu Wu, Baolong Guo | ||
| Vol 13, No 5 (2012) | An Approach to Representing Access Control Policies for Improving DFANS | Abstract |
| Bai-Ling Liu, Wei-Jun Wang | ||
| Vol 19, No 2 (2018) | An Approach To Webpage Prediction Method Using Variable Order Markov Model In Recommendation Systems | Abstract PDF |
| T. Gopalakrishnan, P. Sengottuvelan, A. Bharathi, R. Lokeshkumar | ||
| Vol 24, No 2 (2023) | An Architecture for Electronic Exchange of Official Document Based on Email and Blockchain | Abstract PDF |
| Chu-Mei Chiu, Fang-Ming Hsu, Meng-Hsiang Shen, Chun-Min Lin | ||
| Vol 20, No 4 (2019) | An Architecture-Centric Development Approach for Service-Oriented Product Lines | Abstract PDF |
| Xingjian Lu, Jianwei Yin, Gaoqi He, Huiqun Yu, Neal N. Xiong | ||
| Vol 26, No 2 (2025) | An Artificial Intelligence Method to Predict Malicious Behavior | Abstract |
| Der-Chen Huang, Chun-Fang Hsiao, Bo-Kai Liu, Yu-Yi Chen | ||
| Vol 13, No 3 (2012) | An Asynchronous Duty Cycle Adjustment MAC Protocol for Wireless Sensor Networks | Abstract |
| Yu-Chia Chang, Jehn-Ruey Jiang, Jang-Ping Sheu | ||
| Vol 22, No 7 (2021) | An Augmented Load-Balancing Algorithm for Task Scheduling in Cloud-Based Systems | Abstract PDF |
| Franck Seigneur Nininahazwe, Jian Shen, Micheal Ernest Taylor | ||
| Vol 22, No 4 (2021) | An Authenticated Trust Based Security Mechanism for Video Transmission in Wireless Mesh Networks | Abstract PDF |
| J. B. Shajilin Loret, T. Ganesh Kumar | ||
| Vol 21, No 5 (2020) | An Automated Learning Content Classification Model for Open Education Repositories: Case of MERLOT II | Abstract PDF |
| W. K. T. M. Gunarathne, Timothy K. Shih, Chalothon Chootong, Worapot Sommool, Ankhtuya Ochirbat | ||
| Vol 15, No 3 (2014) | An Automatic Extraction Approach of Worm Signatures Based on Behavioral Footprint Analysis | Abstract |
| Hanxun Zhou, Wei Guo, Yong Feng | ||
| Vol 12, No 5 (2011) | An Automatic Teaching Materials Construction System Based on Mashup | Abstract |
| Yi-Hsing Chang, Bo-Kai Chen | ||
| Vol 18, No 2 (2017) | An AUV-Aided Routing Protocol Based on Dynamic Gateway Nodes for Underwater Wireless Sensor Networks | Abstract |
| Zhuo Wang, Xiaoning Feng, Hongde Qin, Hongmei Guo, Guangjie Han | ||
| Vol 20, No 7 (2019) | An e-cash Scheme with Multiple Denominations and Transferability | Abstract PDF |
| Jia-Ning Luo, Ming-Hour Yang | ||
| Vol 21, No 1 (2020) | An ECC Based Remote User Authentication Protocol | Abstract PDF |
| Akasha Shafiq, Izwa Altaf, Khalid Mahmood, Saru Kumari, Chien-Ming Chen | ||
| Vol 22, No 7 (2021) | An Economic Vision of Caching Issues in Content Delivery Networks: Opportunities and Challenges | Abstract PDF |
| Yuming Zhang, Bohao Feng, Wei Quan, Hongke Zhang | ||
| Vol 22, No 4 (2021) | An Edge Intelligence-based Generative Data Augmentation System for IoT Image Recognition Tasks | Abstract PDF |
| Wei-Jian Hu, Tang-Ying Xie, Bao-Shan Li, Yong-Xing Du, Neal N. Xiong | ||
| Vol 10, No 5 (2009) | An Effective Anomaly Traffic Detection System via Quadruple Attributes for NTU Campus Network | Abstract |
| Mei-Wen Li, Wei-Yen Day, Phone Lin, Hsin-Hsi Chen | ||
| Vol 19, No 5 (2018) | An Effective Experimental Platform for Multipath Transmission Protocol Algorithms and Performance Analysis | Abstract PDF |
| Xuedong Sun, Jianxin Wang, Neal Xiong, Pingping Dong | ||
| 551 - 575 of 2720 Items | << < 18 19 20 21 22 23 24 25 26 27 > >> | |
