|
Issue |
Title |
|
Vol 21, No 1 (2020) |
An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X) |
Abstract
PDF
|
Vishal Sharma, Jiyoon Kim, Yongho Ko, Ilsun You, Jung Taek Seo |
|
Vol 12, No 5 (2011) |
An Optimization Method for Sequence Event Detection |
Abstract
|
Yuanping Li, Jun Wang, Ling Feng, Wenwei Xue |
|
Vol 17, No 3 (2016) |
An Optimization Scheduling Approach for Cloud Computing |
Abstract
|
Chih-Yung Chen, Jih-Fu Tu, Chien-Min Ou |
|
Vol 16, No 5 (2015) |
An Optimized LBS Technology for In-Hospital Environment |
Abstract
|
Telung Pan, Ting-Cheng Chang |
|
Vol 18, No 6 (2017) |
An Outsourcing Data Storage Scheme Based on Digital Watermarking |
Abstract
|
Zhangjie Fu, Lili Xia, Xingming Sun, Jiashuang Xu |
|
Vol 5, No 4 (2004) |
An Overlay Scheme for Live Streaming Media Distribution Using Minimum Spanning Tree Properties |
Abstract
|
Y. Despotopoulos, Ch. Patrikakis, P. Fafali, N. Minogiannis, A. Anagnostou |
|
Vol 4, No 4 (2003) |
An Overview of Mobile Commerce Security |
Abstract
|
David Taniar, Ian Ng, J. Wenny Rahayu |
|
Vol 15, No 5 (2014) |
An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard |
Abstract
|
Tsung-I Chuang, Wei-Ning Yang, Nai-Wei Lo |
|
Vol 17, No 7 (2016) |
An RR Intervals Based Arousal Level Index for Emotional IoT |
Abstract
|
Zhaofang Yang, Guangyuan Liu |
|
Vol 16, No 3 (2015) |
An SOA-Based System Modeling Methodology |
Abstract
|
Tao-Ku Chang, Elliott T. Y. Hwang |
|
Vol 12, No 3 (2011) |
An Ubiquitous Sleep Quality Monitoring and Evaluation |
Abstract
|
Jing-Zhi Yan, Bin Hu, Hong Peng, Hao-Yu Ma, Wen Zhao |
|
Vol 13, No 4 (2012) |
An Unconnected Clustering Negotiation Policy for a Distribution Cognitive Network |
Abstract
|
Lian-Fen Huang, Zi-long Gao, Yi-fei Zhao, Jing Wang, Chi-Hsiang Lo |
|
Vol 16, No 6 (2015) |
An Unequal Cluster-Based Routing Protocol for Wireless Heterogeneous Sensor Networks |
Abstract
|
Jin-Fang Jiang, Guang-Jie Han, Li Liu, Xu Jiang, Jian-Feng Huang |
|
Vol 20, No 2 (2019) |
An Unknown Attack Detection Scheme Based on Semi-supervised Learning and Information Gain Ratio |
Abstract
PDF
|
Meng-Fan Xu, Xing-Hua Li, Mei-Xia Miao, Cheng Zhong, Jian-Feng Ma |
|
Vol 16, No 4 (2015) |
Analysis of File Pollution in P2P Networks with Epidemic Model |
Abstract
|
Zhong-Wen Li, Kuan-Ching Li, Yi Xie, Hai Jiang, Liang Shi |
|
Vol 17, No 7 (2016) |
Analysis of Hierarchical Addressing in Different Deployment Ways |
Abstract
|
Xuan Lu, Wendong Wang, Xiangyang Gong, Xirong Que, Bai Wang |
|
Vol 3, No 4 (2002) |
Analysis of Parallel Query Processing Algorithms for Semi-structured Data |
Abstract
|
Wenjun Sun, Kevin Lu |
|
Vol 26, No 1 (2025) |
Analysis of Product Selection Strategy for Cross-Border E-Commerce with Assistance of Artificial Intelligence |
Abstract
|
Lin Feng |
|
Vol 25, No 3 (2024) |
Analysis of Reading Behavior Based on Students’ Cognitive Styles and Learning Styles |
Abstract
|
Juan Zhou, Hideyuki Takada, Chengjiu Yin |
|
Vol 16, No 3 (2015) |
Analysis of SCTP Concurrent Multipath Transfer in Vehicular Network Communication |
Abstract
|
Jing-Yi Gan, Neal Naixue Xiong, Hui-Min Wen, Qing-Zhen Zhu |
|
Vol 21, No 4 (2020) |
Analysis of the New Method for Assessing the Total Network Capacity of Wireless Mesh Networks for IoT Devices |
Abstract
PDF
|
El Miloud Ar-Reyouchi |
|
Vol 21, No 5 (2020) |
Analysis on Parking Sharing Capacity Based on Supply-Demand Relationship |
Abstract
PDF
|
Weiwei Liu, Chennan Zhang, Hao Sun, Jianming Zhang, Gwang-jun Kim |
|
Vol 24, No 3 (2023) |
Analysis on Risk Awareness Model and Economic Growth of Finance Industry |
Abstract
PDF
|
Renyang Wang, Badamasi Sani Mohammed, R. Parthasarathy |
|
Vol 17, No 7 (2016) |
Analytical Model of Adaptive Cross-Layer-Based TCP Congestion Control for Wireless Mobile Cloud Access |
Abstract
|
Ben-Jye Chang, Ying-Hsin Liang, Jun-Yu Jin |
|
Vol 16, No 1 (2015) |
Analyzing Distributed Remote Process Execution Using Queuing Model |
Abstract
|
Susmit Bagchi |
|
701 - 725 of 2657 Items |
<< < 24 25 26 27 28 29 30 31 32 33 > >> |