|
Issue |
Title |
|
Vol 23, No 4 (2022) |
Applying Evolutionary-based User Characteristic Clustering and Matrix Factorization to Collaborative Filtering for Recommender Systems |
Abstract
PDF
|
R. J. Kuo, Zhen Wu |
|
Vol 9, No 4 (2008) |
Applying Fuzzy Candlestick Pattern Ontology to Investment Knowledge Management |
Abstract
|
Chiung-Hon Leon Lee, Alan Liu |
|
Vol 19, No 2 (2018) |
Applying Queueing Theory for the Optimization of a Banking Model |
Abstract
PDF
|
Kevin W. G. Cowdrey, Jaco de Lange, Reza Malekian, Johan Wanneburg, Arun Cyril Jose |
|
Vol 18, No 7 (2017) |
APSON: Anonymous and Private SOcial Network |
Abstract
|
Kai Dong, Taolin Guo, Zhen Ling, Ming Yang, Wenjia Wu |
|
Vol 20, No 1 (2019) |
A-RAFF: A Ranked Frequent Pattern-growth Subgraph Pattern Discovery Approach |
Abstract
PDF
|
Saif Ur Rehman, Sohail Asghar |
|
Vol 21, No 2 (2020) |
Arbitrary Style Transfer of Facial Image Based on Feed-forward Network and Its Application in Aesthetic QR Code |
Abstract
PDF
|
Shanqing Zhang, Shengqi Su, Li Li, Jianfeng Lu, Ching-Chun Chang |
|
Vol 7, No 1 (2006) |
Architecture and Implementation of Cluster-based Peer-to-Peer Topology and Its Application in Search |
Abstract
|
Tein-Yaw Chung, Chia-Hung Tsai, Ming-Hong Wu, Ming-Yen Lai |
|
Vol 12, No 4 (2011) |
Archived Video Delivery Based on Fast Dynamic Bandwidth Allocation |
Abstract
|
Chih-Peng Lin, Wen-Jyi Hwang, Chia-Yi Jan, Hsing-Lung Chen |
|
Vol 15, No 3 (2014) |
ARES: Aggressive Replication Enabled Scheduler for Hadoop Systems |
Abstract
|
Yizhi Ren, Laiping Zhao, Haiyang Hu |
|
Vol 13, No 5 (2012) |
Arrival Process Modelling in Internet Auction |
Abstract
|
Chu-Fen Li |
|
Vol 23, No 5 (2022) |
Artificial Intelligence Based Traffic Control for Edge Computing Assisted Vehicle Networks |
Abstract
|
Songlin Chen, Hong Wen, Jinsong Wu |
|
Vol 25, No 7 (2024) |
Aspect-based Sentiment Analysis with an Ensemble Learning Framework for Requirements Elicitation from App Reviews |
Abstract
|
Zhiquan An, Teng Xiong, Zhiyuan Zou, Hongyan Wan |
|
Vol 16, No 3 (2015) |
Assessment Model of Job Delay for Variant Data Scale Processing on Cloud Computing |
Abstract
|
Jih-Sheng Chang, Sheng-Wen Wang, Fang-Pang Lin |
|
Vol 11, No 1 (2010) |
Assessment Scheme for Performance of GSM-R |
Abstract
|
Si-Yu Lin, Zhang-Dui Zhong, Bo Ai |
|
Vol 21, No 4 (2020) |
Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security |
Abstract
PDF
|
R. Senthilkumar, B. G. Geetha |
|
Vol 11, No 2 (2010) |
Asynchronous Parallel Finite Automaton: A New Mechanism for Deep Packet Inspection in Cloud Computing |
Abstract
|
Zheng Li, Neng-Hai Yu, Yang Li |
|
Vol 23, No 6 (2022) |
Attention-Based Recurrent Autoencoder for Motion Capture Denoising |
Abstract
PDF
|
Yongqiong Zhu, Fan Zhang, Zhidong Xiao |
|
Vol 21, No 3 (2020) |
Attention-based Recurrent Neural Network for Traffic Flow Prediction |
Abstract
PDF
|
Qi Chen, Wei Wang, Xin Huang, Hai-ning Liang |
|
Vol 21, No 3 (2020) |
Attribute Inference by Link Strength Modeling in Online Social Networks with User Tags |
Abstract
PDF
|
Ya Xiao, Zhijie Fan, Chengxiang Tan, Qian Xu, Wenye Zhu |
|
Vol 23, No 3 (2022) |
Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches |
Abstract
PDF
|
Hongwei Tao, Yixiang Chen, Han Liu, Hengyang Wu, Yinghui Hu |
|
Vol 12, No 5 (2011) |
Augmented Reality on a Deformable Surface by Considering Self-Occlusion and Realistic Illu |
Abstract
|
Young-Baek Kim, Sang-Yong Rhee |
|
Vol 14, No 7 (2013) |
Authentication, Authorization and File Synchronization for Hybrid Cloud-The Development Centric to Google Apps, Hadoop and Linux Local Hosts |
Abstract
|
Jonannes K. Chiang |
|
Vol 19, No 2 (2018) |
Authentications for Internet of Things Security: Threats, Challenges and Studies |
Abstract
PDF
|
Seo Yeon Moon, Jin Ho Park, Jong Hyuk Park |
|
Vol 19, No 4 (2018) |
Authorized Client-side Deduplication Using Access Policy-based Convergent Encryption |
Abstract
PDF
|
Taek-Young Youn, Ku-Young Chang, Kyung Hyune Rhee, Sang Uk Shin |
|
Vol 13, No 5 (2012) |
Automatic Bibliographic Component Extraction Using Conditional Random Fields |
Abstract
|
Sheng-Ming Wang, Wei-Pang Yang, Hsin-Ping Chou, Fu-Mei Chen, Jia-Li Hou, Jyh-Jian Sheu |
|
776 - 800 of 2683 Items |
<< < 27 28 29 30 31 32 33 34 35 36 > >> |