| Issue | Title | |
| Vol 21, No 5 (2020) | Analysis on Parking Sharing Capacity Based on Supply-Demand Relationship | Abstract PDF |
| Weiwei Liu, Chennan Zhang, Hao Sun, Jianming Zhang, Gwang-jun Kim | ||
| Vol 24, No 3 (2023) | Analysis on Risk Awareness Model and Economic Growth of Finance Industry | Abstract PDF |
| Renyang Wang, Badamasi Sani Mohammed, R. Parthasarathy | ||
| Vol 17, No 7 (2016) | Analytical Model of Adaptive Cross-Layer-Based TCP Congestion Control for Wireless Mobile Cloud Access | Abstract |
| Ben-Jye Chang, Ying-Hsin Liang, Jun-Yu Jin | ||
| Vol 16, No 1 (2015) | Analyzing Distributed Remote Process Execution Using Queuing Model | Abstract |
| Susmit Bagchi | ||
| Vol 20, No 1 (2019) | Analyzing Google Trends with Travel Keyword Rankings to Predict Tourists into a Group | Abstract PDF |
| Jui-Hung Chang, Chien-Yuan Tseng | ||
| Vol 11, No 5 (2010) | Analyzing Mediated Service Protocol Interactions Considering User's Expectation | Abstract |
| Zhang-Bing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth | ||
| Vol 12, No 6 (2011) | Analyzing Mediated Service Protocol Interactions Considering User's Expectation | Abstract |
| Zhangbing Zhou, Han-Chieh Chao, Sami Bhiri, Lei Shu, Manfred Hauswirth | ||
| Vol 24, No 6 (2023) | Analyzing the Influence of Internet Usage Behavior on Spectator Sports Consumption Among College Students: An Empirical SEM Study Based on the SOR Model | Abstract |
| Yujie Zhang, Yuyang Hou, Luning Cao, You Xiong, Qian Huang | ||
| Vol 19, No 1 (2018) | Android App Copy Protection Mechanism with Semi-trusted Loader | Abstract PDF |
| Kuo-Yu Tsai | ||
| Vol 23, No 6 (2022) | Android Malware Application Detection Method Based on RGB Image Features in E-Commerce | Abstract PDF |
| Xingyu Li, Yongli Tang, Mary Subaja Christo, Zongqu Zhao, Ying Li | ||
| Vol 3, No 2 (2002) | Animation Templates for WAP | Abstract |
| Jyh-Huei Chang | ||
| Vol 21, No 3 (2020) | Anomaly Detection in Crowded Scenes Based on Group Motion Features | Abstract PDF |
| Shuqiang Guo, Dongxue Li, Lili Yao | ||
| Vol 25, No 3 (2024) | Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning | Abstract |
| Wen-Jen Ho, Hsin-Yuan Hsieh, Chia-Wei Tsai | ||
| Vol 23, No 4 (2022) | Anomaly Detection of Dam Monitoring Data based on Improved Spectral Clustering | Abstract PDF |
| Lixia Ji, Xiao Zhang, Yao Zhao, Zongkun Li | ||
| Vol 10, No 3 (2009) | Anonymity Scheme for Interactive P2P Services | Abstract |
| Sharon Shitrit, Eyal Felstaine, Niv Gilboa, Ofer Hermoni | ||
| Vol 15, No 6 (2014) | Anonymous Authentication and Key-Agreement Schemes in Vehicular Ad-Hoc Networks | Abstract |
| Cheng-Yeh Chen, Te-Cheng Hsu, Hsin-Te Wu, John Y. Chiang, Wen-Shyong Hsieh | ||
| Vol 10, No 1 (2009) | Anonymous Authentication for Wireless Access in Internet from Pairings | Abstract |
| Shyi-Tsong Wu, Jung-Hui Chiu, Bin-Chang Chieu | ||
| Vol 20, No 1 (2019) | Anonymous Delegation-based Authenticated Key Agreement Protocol for Global Mobility Networks with Communication Privacy | Abstract PDF |
| Zuowen Tan | ||
| Vol 20, No 7 (2019) | Anonymous Message Authentication Using Modified Random Secret Pre-distribution for VANETs under Sparse RSUs Environment | Abstract PDF |
| Chih-Hsueh Lin | ||
| Vol 11, No 4 (2010) | Another Security Weakness in an Authenticated Group Key Agreement | Abstract |
| Z. Eslami, S. Kabiri Rad | ||
| Vol 14, No 5 (2013) | Ant-Based Balancing Energy Routing Protocol for Mobile Ad Hoc Networks | Abstract |
| Ji-Peng Zhou, Jian-Zhu Lu, Jin Li | ||
| Vol 17, No 2 (2016) | Antenna Design and Cell Division for HAPS Communication | Abstract |
| Ming-Xiang Guan, Le Wang | ||
| Vol 13, No 1 (2012) | Anti-Monitoring Algorithm for Target Traversing Through Anisotropic Sensory Networks | Abstract |
| Lei Wang | ||
| Vol 21, No 6 (2020) | Appearance Based Gaze Estimation Using Eye Region Landmarks and Math Approach | Abstract PDF |
| Shichao Cheng, Bocheng Zhang, Jianjun Li, Zheng Tang, Korhan Cengiz | ||
| Vol 13, No 6 (2012) | Application in Social Network English Learning Based on Virtual Cloud Technology Combined with Essential Articles Classification | Abstract |
| Shu-Chen Cheng, Chung-Kuang Chen | ||
| 751 - 775 of 2743 Items | << < 26 27 28 29 30 31 32 33 34 35 > >> | |
