| Issue | Title | |
| Vol 12, No 4 (2011) | Archived Video Delivery Based on Fast Dynamic Bandwidth Allocation | Abstract |
| Chih-Peng Lin, Wen-Jyi Hwang, Chia-Yi Jan, Hsing-Lung Chen | ||
| Vol 15, No 3 (2014) | ARES: Aggressive Replication Enabled Scheduler for Hadoop Systems | Abstract |
| Yizhi Ren, Laiping Zhao, Haiyang Hu | ||
| Vol 13, No 5 (2012) | Arrival Process Modelling in Internet Auction | Abstract |
| Chu-Fen Li | ||
| Vol 23, No 5 (2022) | Artificial Intelligence Based Traffic Control for Edge Computing Assisted Vehicle Networks | Abstract |
| Songlin Chen, Hong Wen, Jinsong Wu | ||
| Vol 25, No 7 (2024) | Aspect-based Sentiment Analysis with an Ensemble Learning Framework for Requirements Elicitation from App Reviews | Abstract |
| Zhiquan An, Teng Xiong, Zhiyuan Zou, Hongyan Wan | ||
| Vol 16, No 3 (2015) | Assessment Model of Job Delay for Variant Data Scale Processing on Cloud Computing | Abstract |
| Jih-Sheng Chang, Sheng-Wen Wang, Fang-Pang Lin | ||
| Vol 11, No 1 (2010) | Assessment Scheme for Performance of GSM-R | Abstract |
| Si-Yu Lin, Zhang-Dui Zhong, Bo Ai | ||
| Vol 21, No 4 (2020) | Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security | Abstract PDF |
| R. Senthilkumar, B. G. Geetha | ||
| Vol 11, No 2 (2010) | Asynchronous Parallel Finite Automaton: A New Mechanism for Deep Packet Inspection in Cloud Computing | Abstract |
| Zheng Li, Neng-Hai Yu, Yang Li | ||
| Vol 23, No 6 (2022) | Attention-Based Recurrent Autoencoder for Motion Capture Denoising | Abstract PDF |
| Yongqiong Zhu, Fan Zhang, Zhidong Xiao | ||
| Vol 21, No 3 (2020) | Attention-based Recurrent Neural Network for Traffic Flow Prediction | Abstract PDF |
| Qi Chen, Wei Wang, Xin Huang, Hai-ning Liang | ||
| Vol 21, No 3 (2020) | Attribute Inference by Link Strength Modeling in Online Social Networks with User Tags | Abstract PDF |
| Ya Xiao, Zhijie Fan, Chengxiang Tan, Qian Xu, Wenye Zhu | ||
| Vol 23, No 3 (2022) | Attributes Oriented Software Trustworthiness Measure Based on Axiomatic Approaches | Abstract PDF |
| Hongwei Tao, Yixiang Chen, Han Liu, Hengyang Wu, Yinghui Hu | ||
| Vol 12, No 5 (2011) | Augmented Reality on a Deformable Surface by Considering Self-Occlusion and Realistic Illu | Abstract |
| Young-Baek Kim, Sang-Yong Rhee | ||
| Vol 14, No 7 (2013) | Authentication, Authorization and File Synchronization for Hybrid Cloud-The Development Centric to Google Apps, Hadoop and Linux Local Hosts | Abstract |
| Jonannes K. Chiang | ||
| Vol 19, No 2 (2018) | Authentications for Internet of Things Security: Threats, Challenges and Studies | Abstract PDF |
| Seo Yeon Moon, Jin Ho Park, Jong Hyuk Park | ||
| Vol 19, No 4 (2018) | Authorized Client-side Deduplication Using Access Policy-based Convergent Encryption | Abstract PDF |
| Taek-Young Youn, Ku-Young Chang, Kyung Hyune Rhee, Sang Uk Shin | ||
| Vol 13, No 5 (2012) | Automatic Bibliographic Component Extraction Using Conditional Random Fields | Abstract |
| Sheng-Ming Wang, Wei-Pang Yang, Hsin-Ping Chou, Fu-Mei Chen, Jia-Li Hou, Jyh-Jian Sheu | ||
| Vol 23, No 1 (2022) | Automatic Docking Optimization Method of Bed and Chair Based on Multi-sensor Information Fusion | Abstract PDF |
| YingGang Xie, ShaoHua Guo, YuXin Li, XueYuan Zhang | ||
| Vol 24, No 3 (2023) | Automatic Path Planning for Spraying Drones Based on Deep Q-Learning | Abstract PDF |
| Ya-Yu Huang, Zi-Wen Li, Chun-Hao Yang, Yueh-Min Huang | ||
| Vol 17, No 3 (2016) | Automatic Test Environment Deployment and Service Testing Model in the Cloud | Abstract |
| Win-Tsung Lo, Ruey-Kai Sheu, Shyan-Ming Yuan, Guo-Heng Luo | ||
| Vol 18, No 6 (2017) | Automatic Web-Log Filtering Mechanism for Web Attack Digital Forensics | Abstract |
| Chinyang Henry Tseng, Chun-Wei Lai, Tong-Ying Juang | ||
| Vol 26, No 7 (2025) | Auto-weighted Multi-view Subspace Clustering with Consistency Learning | Abstract |
| Ao Li, Yong Wang, Lihao Yang, Shuai Meng | ||
| Vol 24, No 4 (2023) | Avoiding Optimal Mean Robust and Sparse BPCA with L1-norm Maximization | Abstract |
| Ganyi Tang, Lili Fan, Jianguo Shi, Jingjing Tan, Guifu Lu | ||
| Vol 16, No 7 (2015) | A^3srC: Autonomic Assessment Approach to IOT Security Risk Based on Multidimensional Normal Cloud | Abstract |
| Ruijuan Zheng, Mingchuan Zhang, Qingtao Wu, Wangyang Wei, Chunlei Yang | ||
| 801 - 825 of 2743 Items | << < 28 29 30 31 32 33 34 35 36 37 > >> | |
