|
Issue |
Title |
|
Vol 15, No 7 (2014) |
An Efficient Packet Forwarding Mechanism Based on Bandwidth Prediction with Consideration of V2I and V2V Communications |
Abstract
|
Wei-Kuang Lai, Mei-Tso Lin, Yuh-Chung Lin, Ya-Lin Jhuang |
|
Vol 11, No 1 (2010) |
An Efficient Peer Collaboration Strategy for Optimizing P2P Services in BitTorrent-Like File Sharing Networks |
Abstract
|
Ching-Hsien Hsu, Yun-Chiu Ching, Laurence T. Yang, Frode Eika Sandnes |
|
Vol 17, No 1 (2016) |
An Efficient Power-Saving Scheduling Algorithm |
Abstract
|
Keng-Mao Cho, Chun-Wei Tsai, Chu-Sing Yang |
|
Vol 17, No 5 (2016) |
An Efficient Resource Management Algorithm for Information Centric Networks |
Abstract
|
Xiao-Cui Sun, Zhi-Jun Wang, Hang Chu, Qi-Rui Zhang |
|
Vol 17, No 3 (2016) |
An Efficient RFID Authentication Protocol Providing Strong Privacy and Security |
Abstract
|
Jian Shen, Haowen Tan, Sangman Moh, Ilyong Chung, Jin Wang |
|
Vol 7, No 4 (2006) |
An Efficient Routing Algorithm for Overlay Multicast in Diffserv Domains |
Abstract
|
Xiao Chen, Huagang Shao, Weinong Wang |
|
Vol 6, No 3 (2005) |
An Efficient Similarity Metric for Pattern-Based Very Low Bit-Rate Video Coding |
Abstract
|
Manoranjan Paul, Manzur Murshed |
|
Vol 23, No 3 (2022) |
An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing |
Abstract
PDF
|
Sai Ji, Yang Yuan, Jian Shen, Chin-Feng Lai, Bofan Chen |
|
Vol 12, No 6 (2011) |
An Efficient Ultralightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol |
Abstract
|
Kuo-Hui Yeh, N. W. Lo, Enrico Winata |
|
Vol 12, No 3 (2011) |
An Efficient Unstructured P2P Overlay for File Sharing over MANETs Using Underlying Reactive Routing |
Abstract
|
Nadir Shah, De-Pei Qian, Rui Wang |
|
Vol 14, No 6 (2013) |
An Efficient Verifiably Encrypted Signature from Weil Pairing |
Abstract
|
Jian Shen, Wen-Ying Zheng, Jin Wang, Yu-Hui Zheng, Xing-Ming Sun, Sung-Young Lee |
|
Vol 18, No 4 (2017) |
An Efficient VLSI Architecture of Embedded Sub-Band Coding with Optimal Truncation for Scalable Video Coding |
Abstract
|
Jen-Shiun Chiang, Chih-Hsien Hsia, Ting-Hao Hwang |
|
Vol 18, No 5 (2017) |
An Elastic Reconstruction of 5G Network Oriented Cloud-ICT Convergence Service |
Abstract
|
Long-Jiang Tan, Qiang Wu, Chun-Ming Wu |
|
Vol 20, No 3 (2019) |
An Electronic Voting System Immune to Coercion and Bribery from Cross Layers in Large Scale Election |
Abstract
PDF
|
Zhen-Yu Wu, Tzer-Shyong Chen, Yu-Fang Chung, Kuo-Kuang Huang |
|
Vol 21, No 3 (2020) |
An E-lottery System with a Fair Purchasing Environment and an Arbitration Mechanism |
Abstract
PDF
|
Chin-Ling Chen, Yuan-Hao Liao, Fang-Yie Leu, Ilsun You, Kim-Kwang Raymond Choo, Chia-Yin Ko |
|
Vol 20, No 2 (2019) |
An Empirical Evaluation of Online Cooperative Programming Platforms Based on the PACT Framework and Technology Readiness |
Abstract
PDF
|
Yi-Wen Liao, Yueh-Min Huang, Yong-Ming Huang, Zhi-Yuan Su, Chun-Wang Wei |
|
Vol 23, No 3 (2022) |
An Empirical Study of Gradient-based Explainability Techniques for Self-admitted Technical Debt Detection |
Abstract
PDF
|
Guoqiang Zhuang, Yubin Qu, Long Li, Xianzhen Dou, Mengao Li |
|
Vol 20, No 2 (2019) |
An Empirical Study on Tacit Knowledge Sharing Based on Social Network Analysis |
Abstract
PDF
|
Peng Jiang, Zhongjian Le, Juling Ding, Yong Guo, Changhoon Lee |
|
Vol 25, No 6 (2024) |
An Empirical Study on User Role Discovery Based on Clustering Algorithms and Optimizations in Location-Based Social Network |
Abstract
|
Ning Wang, Wenqing Zhu, Huiying Fang, Weimin Zhao |
|
Vol 20, No 1 (2019) |
An Empirical Throughput Analysis of Multimedia Applications with OpenFlow-based Dynamic Load Balancing Approach in WLAN |
Abstract
PDF
|
Syed Mushhad Mustuzhar Gilani, Tang Hong, Guofeng Zhao, Chuan Xu, Muhammad Azeem Abbas |
|
Vol 19, No 1 (2018) |
An Energy Conserving Reversible and Irreversible Digital Watermarking Hybrid Scheme for Cluster-based Wireless Sensor Networks |
Abstract
PDF
|
Chu-Fu Wang, An-Ting Wu, Shu-Chien Huang |
|
Vol 24, No 3 (2023) |
An Energy Efficiency Based Secure Data Transmission in WBSN Using Novel Id-Based Group Signature Model and SECC Technique |
Abstract
PDF
|
C. Ramesh Kumar, T. Ganesh Kumar, A. Hemlathadhevi, D. R. Thirupurasundari |
|
Vol 19, No 6 (2018) |
An Energy-aware Method for Multi-domain Service Function Chaining |
Abstract
PDF
|
Qi Xu, Deyun Gao, Huachun Zhou, Wei Quan, Wenfeng Shi |
|
Vol 19, No 1 (2018) |
An Energy-balanced Cluster Head Selection Method for Clustering Routing in WSN |
Abstract
PDF
|
Libing Wu, Lei Nie, Bingyi Liu, Jianqun Cui, Naixue Xiong |
|
Vol 19, No 1 (2018) |
An Energy-efficient Secure AODV Protocol in Industrial Sensor Network |
Abstract
PDF
|
Weidong Fang, Chuanlei Zhang, Wei Chen, Ming Li, Fengying Ma |
|
601 - 625 of 2669 Items |
<< < 20 21 22 23 24 25 26 27 28 29 > >> |