|
Issue |
Title |
|
Vol 11, No 5 (2010) |
An Intelligent Internet Key Exchange Protocol Resistant to Denial-of-Service Attacks |
Abstract
|
Ming-Yang Su |
|
Vol 12, No 6 (2011) |
An Intelligent Military Scenario Development Platform Based on Cloud Computing |
Abstract
|
I-Ching Hsu, Yuan-Kwei Tzeng, Der-Chen Huang |
|
Vol 14, No 2 (2013) |
An Intelligent Transformation Knowledge Mining Method Based on Extenics |
Abstract
|
Xing-Sen Li, Hao-Lan Zhang, Zheng-Xiang Zhu, Zhong-Biao Xiang, Zheng-Xin Chen, Yong Shi |
|
Vol 7, No 1 (2006) |
An Intelligent Web Portal System for Web Information Integration |
Abstract
|
Jiun-Huei Ho, Chun-Wei Tsai, Ting-Wen Liang, Chu-Sing Yang |
|
Vol 12, No 4 (2011) |
An Interaction Vulnerability Detection Model in Large Distributed System Based on Finite State Machine |
Abstract
|
Jin-Jing Zhao, Gang Zhao, Yan Wen, Min-Huan Huang, Xiao-Hui Kuang |
|
Vol 2, No 2 (2001) |
An Interactive Videoconferencing System with Web-based Interfaces for Conference Control |
Abstract
|
Ting-Chao Hou, Chorng-Horng Yang, Chao-Chen Wen, Kim-Joan Chen |
|
Vol 23, No 2 (2022) |
An Internet of Medical Things Based Liver Tumor Detection System using Semantic Segmentation |
Abstract
PDF
|
Mehr Yahya Durrani, Sadaf Yasmin, Seungmin Rho |
|
Vol 2, No 4 (2001) |
An Internet-based Distance Learning for English based on Multimedia Database |
Abstract
|
Ying-Hong Wang, Chih-Hao Lin |
|
Vol 5, No 4 (2004) |
An Internet-Based PBL Teaching Case System with Multiple Viewpoints for Medical Education |
Abstract
|
Yuh-Ming Cheng, Lih-Shyang Chen, Sheng-Feng Weng, Chyi-Her Lin, Jyh-Hong Chen |
|
Vol 19, No 7 (2018) |
An Intrusion Detection Model Based on IPSO-SVM Algorithm in Wireless Sensor Network |
Abstract
PDF
|
Shuang Liu, Liejun Wang, Jiwei Qin, Yan Guo, Hang Zuo |
|
Vol 19, No 5 (2018) |
An Investigation of Visual Fatigue in Elementary School Students Resulting from Reading e-books |
Abstract
PDF
|
Pei-Yu Cheng, Yen-Ning Su, Yu-Cheng Chien, Ting-Ting Wu, Yueh-Min Huang |
|
Vol 19, No 2 (2018) |
An Investigator Unearths Illegal Behavior via a Subliminal Channel |
Abstract
PDF
|
Chin-Ling Chen, Tzay-Farn Shih, Kun-hao Wang, Chien-Hung Chen, Woei-Jiunn Tsaur |
|
Vol 13, No 1 (2012) |
An IP Header Extension Scheme for Route Optimization in Mobile IP Networks |
Abstract
|
Neng-Chung Wang, Young-Long Chen, Chin-Ling Chen, Yi-Jung Wu |
|
Vol 7, No 1 (2006) |
An IP Shared Device Based on the Network Port Translation |
Abstract
|
Wen-Sung Chen, Wen-Kang Jia |
|
Vol 11, No 4 (2010) |
An MPEG-21 SIP-Based Session Mobility Management for Ubiquitous Video Streaming over the Home Network and Vehicular Network Environment |
Abstract
|
Chung-Ming Huang, Chia-Ching Yang, Chung-Wei Lin |
|
Vol 18, No 5 (2017) |
An Offline Matching Method for Large Scale Trajectories |
Abstract
|
Luming Li, Xinhua Jiang, Renying Wang |
|
Vol 18, No 3 (2017) |
An On-Demand QoS Routing Protocol with TDMA-Based Bandwidth Reservation in Mobile Ad Hoc Networks |
Abstract
|
Qingbin She, Jipeng Zhou, Yuhui Deng, Jianzhu Lu |
|
Vol 15, No 4 (2014) |
An On-Demand Services Discovery Approach Based on Topic Clustering |
Abstract
|
Zheng Li, Keqing He, Jian Wang, Neng Zhang |
|
Vol 10, No 5 (2009) |
An Ontology-Based Trust Negotiation Framework in Advanced Communications and Computing Environments |
Abstract
|
Bai-Ling Liu, Hong-Wei Lu |
|
Vol 15, No 2 (2014) |
An Open and Automated Android Behavior Monitor in Cloud |
Abstract
|
Chun-Ying Huang, Shang-Pin Ma, Ming-Lun Chang, Chin-Hsiang Chiu, Ting-Chun Huang |
|
Vol 4, No 3 (2003) |
An Optimal Algorithm for IMT2000 Fast Power Control |
Abstract
|
Khaled Elleithy, Hyungtae Ha, Sagar Karki, Amol Kaulgud, Utpal Rana |
|
Vol 25, No 7 (2024) |
An Optimal Algorithm for Resource Optimization in 5G Networks Based on Machine Learning |
Abstract
|
Dong Sang, Hongwei Sun |
|
Vol 20, No 7 (2019) |
An Optimal Cache Resource Allocation in Fog Radio Access Networks |
Abstract
PDF
|
Sovit Bhandari, Hong Ping Zhao, Hoon Kim, John M. Cioffi |
|
Vol 4, No 3 (2003) |
An Optimal Call Admission and Bandwidth Reservation Scheme for Future Wireless Networks |
Abstract
|
Mehboob Alam, Wael Badawy, Graham Jullien |
|
Vol 8, No 3 (2007) |
An Optimal MILP Formulation for the Delay-and Delay Variation-Bounded Multicast Tree Problem |
Abstract
|
Pi-Rong Sheu, Hung-Yuan Tsai, Shao-Chi Chen |
|
676 - 700 of 2657 Items |
<< < 23 24 25 26 27 28 29 30 31 32 > >> |