|
Issue |
Title |
|
Vol 10, No 5 (2009) |
An Ontology-Based Trust Negotiation Framework in Advanced Communications and Computing Environments |
Abstract
|
Bai-Ling Liu, Hong-Wei Lu |
|
Vol 15, No 2 (2014) |
An Open and Automated Android Behavior Monitor in Cloud |
Abstract
|
Chun-Ying Huang, Shang-Pin Ma, Ming-Lun Chang, Chin-Hsiang Chiu, Ting-Chun Huang |
|
Vol 4, No 3 (2003) |
An Optimal Algorithm for IMT2000 Fast Power Control |
Abstract
|
Khaled Elleithy, Hyungtae Ha, Sagar Karki, Amol Kaulgud, Utpal Rana |
|
Vol 25, No 7 (2024) |
An Optimal Algorithm for Resource Optimization in 5G Networks Based on Machine Learning |
Abstract
|
Dong Sang, Hongwei Sun |
|
Vol 20, No 7 (2019) |
An Optimal Cache Resource Allocation in Fog Radio Access Networks |
Abstract
PDF
|
Sovit Bhandari, Hong Ping Zhao, Hoon Kim, John M. Cioffi |
|
Vol 4, No 3 (2003) |
An Optimal Call Admission and Bandwidth Reservation Scheme for Future Wireless Networks |
Abstract
|
Mehboob Alam, Wael Badawy, Graham Jullien |
|
Vol 8, No 3 (2007) |
An Optimal MILP Formulation for the Delay-and Delay Variation-Bounded Multicast Tree Problem |
Abstract
|
Pi-Rong Sheu, Hung-Yuan Tsai, Shao-Chi Chen |
|
Vol 21, No 1 (2020) |
An Optimal Security Management Framework for Backhaul-aware 5G-Vehicle to Everything (V2X) |
Abstract
PDF
|
Vishal Sharma, Jiyoon Kim, Yongho Ko, Ilsun You, Jung Taek Seo |
|
Vol 12, No 5 (2011) |
An Optimization Method for Sequence Event Detection |
Abstract
|
Yuanping Li, Jun Wang, Ling Feng, Wenwei Xue |
|
Vol 17, No 3 (2016) |
An Optimization Scheduling Approach for Cloud Computing |
Abstract
|
Chih-Yung Chen, Jih-Fu Tu, Chien-Min Ou |
|
Vol 16, No 5 (2015) |
An Optimized LBS Technology for In-Hospital Environment |
Abstract
|
Telung Pan, Ting-Cheng Chang |
|
Vol 18, No 6 (2017) |
An Outsourcing Data Storage Scheme Based on Digital Watermarking |
Abstract
|
Zhangjie Fu, Lili Xia, Xingming Sun, Jiashuang Xu |
|
Vol 5, No 4 (2004) |
An Overlay Scheme for Live Streaming Media Distribution Using Minimum Spanning Tree Properties |
Abstract
|
Y. Despotopoulos, Ch. Patrikakis, P. Fafali, N. Minogiannis, A. Anagnostou |
|
Vol 4, No 4 (2003) |
An Overview of Mobile Commerce Security |
Abstract
|
David Taniar, Ian Ng, J. Wenny Rahayu |
|
Vol 15, No 5 (2014) |
An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard |
Abstract
|
Tsung-I Chuang, Wei-Ning Yang, Nai-Wei Lo |
|
Vol 17, No 7 (2016) |
An RR Intervals Based Arousal Level Index for Emotional IoT |
Abstract
|
Zhaofang Yang, Guangyuan Liu |
|
Vol 16, No 3 (2015) |
An SOA-Based System Modeling Methodology |
Abstract
|
Tao-Ku Chang, Elliott T. Y. Hwang |
|
Vol 12, No 3 (2011) |
An Ubiquitous Sleep Quality Monitoring and Evaluation |
Abstract
|
Jing-Zhi Yan, Bin Hu, Hong Peng, Hao-Yu Ma, Wen Zhao |
|
Vol 13, No 4 (2012) |
An Unconnected Clustering Negotiation Policy for a Distribution Cognitive Network |
Abstract
|
Lian-Fen Huang, Zi-long Gao, Yi-fei Zhao, Jing Wang, Chi-Hsiang Lo |
|
Vol 16, No 6 (2015) |
An Unequal Cluster-Based Routing Protocol for Wireless Heterogeneous Sensor Networks |
Abstract
|
Jin-Fang Jiang, Guang-Jie Han, Li Liu, Xu Jiang, Jian-Feng Huang |
|
Vol 20, No 2 (2019) |
An Unknown Attack Detection Scheme Based on Semi-supervised Learning and Information Gain Ratio |
Abstract
PDF
|
Meng-Fan Xu, Xing-Hua Li, Mei-Xia Miao, Cheng Zhong, Jian-Feng Ma |
|
Vol 16, No 4 (2015) |
Analysis of File Pollution in P2P Networks with Epidemic Model |
Abstract
|
Zhong-Wen Li, Kuan-Ching Li, Yi Xie, Hai Jiang, Liang Shi |
|
Vol 17, No 7 (2016) |
Analysis of Hierarchical Addressing in Different Deployment Ways |
Abstract
|
Xuan Lu, Wendong Wang, Xiangyang Gong, Xirong Que, Bai Wang |
|
Vol 3, No 4 (2002) |
Analysis of Parallel Query Processing Algorithms for Semi-structured Data |
Abstract
|
Wenjun Sun, Kevin Lu |
|
Vol 26, No 1 (2025) |
Analysis of Product Selection Strategy for Cross-Border E-Commerce with Assistance of Artificial Intelligence |
Abstract
|
Lin Feng |
|
701 - 725 of 2669 Items |
<< < 24 25 26 27 28 29 30 31 32 33 > >> |