|
Issue |
Title |
|
Vol 25, No 6 (2024) |
An Empirical Study on User Role Discovery Based on Clustering Algorithms and Optimizations in Location-Based Social Network |
Abstract
|
Ning Wang, Wenqing Zhu, Huiying Fang, Weimin Zhao |
|
Vol 20, No 1 (2019) |
An Empirical Throughput Analysis of Multimedia Applications with OpenFlow-based Dynamic Load Balancing Approach in WLAN |
Abstract
PDF
|
Syed Mushhad Mustuzhar Gilani, Tang Hong, Guofeng Zhao, Chuan Xu, Muhammad Azeem Abbas |
|
Vol 19, No 1 (2018) |
An Energy Conserving Reversible and Irreversible Digital Watermarking Hybrid Scheme for Cluster-based Wireless Sensor Networks |
Abstract
PDF
|
Chu-Fu Wang, An-Ting Wu, Shu-Chien Huang |
|
Vol 24, No 3 (2023) |
An Energy Efficiency Based Secure Data Transmission in WBSN Using Novel Id-Based Group Signature Model and SECC Technique |
Abstract
PDF
|
C. Ramesh Kumar, T. Ganesh Kumar, A. Hemlathadhevi, D. R. Thirupurasundari |
|
Vol 19, No 6 (2018) |
An Energy-aware Method for Multi-domain Service Function Chaining |
Abstract
PDF
|
Qi Xu, Deyun Gao, Huachun Zhou, Wei Quan, Wenfeng Shi |
|
Vol 19, No 1 (2018) |
An Energy-balanced Cluster Head Selection Method for Clustering Routing in WSN |
Abstract
PDF
|
Libing Wu, Lei Nie, Bingyi Liu, Jianqun Cui, Naixue Xiong |
|
Vol 19, No 1 (2018) |
An Energy-efficient Secure AODV Protocol in Industrial Sensor Network |
Abstract
PDF
|
Weidong Fang, Chuanlei Zhang, Wei Chen, Ming Li, Fengying Ma |
|
Vol 17, No 5 (2016) |
An Energy-Saving Node Communicability Computation Scheme in Opportunistic Mobile Social Networks Using Cloud Assistance |
Abstract
|
Qing-Song Cai, Yu-Qing Bai, Guang-Jie Han, Chun-hyok Pak, Hai Zhao |
|
Vol 13, No 1 (2012) |
An Enhanced Case-Based Reasoning Model for Supporting Inference Missing Attribute and Its Feature Weight |
Abstract
|
Hei-Chia Wang, Tian-Hsiang Huang |
|
Vol 24, No 2 (2023) |
An Enhanced Explicit Port Forwarding Solution for Improving Video Delivery over Software-Defined Networks |
Abstract
PDF
|
Chih-Heng Ke, Yu-Wen Lo, Yeong-Sheng Chen, Hung-Pai Chen |
|
Vol 21, No 5 (2020) |
An Enhanced PROMOT Algorithm with D2D and Robust for Mobile Edge Computing |
Abstract
PDF
|
Jin Wang, Wenbing Wu, Zhuofan Liao, Yeon-Woong Jung, Jeong-Uk Kim |
|
Vol 22, No 6 (2021) |
An Ensemble Machine Learning Botnet Detection Framework Based on Noise Filtering |
Abstract
PDF
|
Tzong-Jye Liu, Tze-Shiun Lin, Ching-Wen Chen |
|
Vol 19, No 4 (2018) |
An Evaluation and Analysis of Static and Adaptive Bayesian Spam Filters |
Abstract
PDF
|
Qussai Yaseen, Yaser Jararweh, Khanh Nguyen Viet |
|
Vol 18, No 1 (2017) |
An Evolutionary Web Clustering for Web Page Predicting |
Abstract
|
Rui Wu, Ling Zhang |
|
Vol 19, No 6 (2018) |
An Examination of Online Discussion Quality of STEM-based Instruction |
Abstract
PDF
|
Chih-Hung Lai, Chih-Ming Chu, Chih-Hui Chen |
|
Vol 21, No 6 (2020) |
An Expected Value Prediction of Game Theory for Pre-copy over Cloud Computing |
Abstract
PDF
|
Yao-Chiang Yang, Wei-Tsong Lee, Hsin-Wen Wei, Vooi Voon Yap |
|
Vol 11, No 4 (2010) |
An Experiment Description Language for Wireless Network Research |
Abstract
|
Mesut Günes, Felix Juraschek, Bastian Blywis |
|
Vol 15, No 1 (2014) |
An Experimental Study of Incremental SVD on Latent Semantic Analysis |
Abstract
|
Bo Shen, Ying-Si Zhao |
|
Vol 16, No 3 (2015) |
An Explorative Study of Continuance Intention on Cloud Learning with Applying Social Networks Blended in New Era of Internet Technology Applications |
Abstract
|
Hsing-Wen Wang |
|
Vol 21, No 6 (2020) |
An Explorative Study on Constructing Indices for Web Television Viewing |
Abstract
PDF
|
Yu-Chi Chen, Hai-Xiang He |
|
Vol 14, No 3 (2013) |
An Exploratory Study for Designing Business Services Based on Sensor Networks |
Abstract
|
Yang-Hoon Kim, Hang-Bae Chang |
|
Vol 21, No 7 (2020) |
An Image Authentication Method for Secure Internet-Based Communication in Human-Centric Computing |
Abstract
PDF
|
Yung-Yao Chen, Chih-Hsien Hsia, Hsiang-Yun Kao, You-An Wang, Yu-Chen Hu |
|
Vol 22, No 6 (2021) |
An Image Reconstruction Algorithm Based on Frequency Domain for Deep Subcooling of Melt Drops |
Abstract
PDF
|
Keqing Ning, Ze Su, Zhihao Zhang, Gwang-jun Kim |
|
Vol 24, No 5 (2023) |
An Image Steganographic Scheme Based on Edge Detection and Least Significant Bit Substitution |
Abstract
|
Hsing-Han Liu, Sheng-Chih Ho, Tai-Hsiu Wu |
|
Vol 17, No 6 (2016) |
An Implementation of the Efficient Huge Amount of Pseudo-Random Unique Numbers Generator and the Acceleration Analysis of Parallelization |
Abstract
|
Yun-Te Lin, Yu-Jung Cheng, Yung-Hsiang Hung, Fang-Pang Lin, Chung-Ming Wang |
|
626 - 650 of 2695 Items |
<< < 21 22 23 24 25 26 27 28 29 30 > >> |