|
Issue |
Title |
|
Vol 23, No 3 (2022) |
Cloud-Based System for Sustainable Stingless Bee Farm |
Abstract
PDF
|
Chen Wang, Yutong Tang, Mohamed Faisal Ahmad-Akhia, Hamzah Abdul-Rahman, Jeffrey Boon Hui Yap |
|
Vol 20, No 6 (2019) |
Cloud-enabled Software-Defined Vehicular Networks: Architecture, Applications and Challenges |
Abstract
PDF
|
Qianpeng Wang, Deyun Gao, Wanting Zhu |
|
Vol 21, No 5 (2020) |
CloudIoT-based Jukebox Platform: A Music Player for Mobile Users in Café |
Abstract
PDF
|
Byungseok Kang, Joohyun Lee, Ovidiu Bagdasar, Hyunseung Choo |
|
Vol 20, No 5 (2019) |
Cloudlet Scheduling Based Load Balancing on Virtual Machines in Cloud Computing Environment |
Abstract
PDF
|
Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed |
|
Vol 20, No 3 (2019) |
CLUES: A Cross-Layer Energy Saving Scheme for Wi-Fi Networks |
Abstract
PDF
|
Jenn-Wei Lin, Chi-Yi Lin |
|
Vol 21, No 1 (2020) |
Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing |
Abstract
PDF
|
S. Ramasamy, R. K. Gnanamurthy |
|
Vol 19, No 2 (2018) |
Cluster Validity Indexes to Uncertain Data for Multi-Attribute Decision-Making Datasets |
Abstract
PDF
|
Ting-Cheng Chang, Chuen-Jiuan Jane, Michelle Chang |
|
Vol 22, No 4 (2021) |
Cluster-based Deep One-Class Classification Model for Anomaly Detection |
Abstract
PDF
|
Younghwan Kim, Huy Kang Kim |
|
Vol 22, No 1 (2021) |
Cluster-based Task Scheduling Using K-Means Clustering for Load Balancing in Cloud Datacenters |
Abstract
PDF
|
Geetha Muthusamy, Suganthe Ravi Chandran |
|
Vol 17, No 2 (2016) |
Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection |
Abstract
|
Shang-Nan Yin, Ho-Seok Kang, Sung-Ryul Kim |
|
Vol 21, No 6 (2020) |
Clustering of Domestic Locations in Layers for the Purpose of Breakout Prevention of Diseases |
Abstract
PDF
|
Varin Chouvatut, Ekkarat Boonchieng, Waraporn Boonchieng |
|
Vol 21, No 1 (2020) |
CO Multi-Forecasting Model for Indoor Health and Safety Management in Smart Home |
Abstract
PDF
|
Chih-Yuan Chang, Kuei-Sheng Ko, Sy-Jye Guo, San-Shan Hung, Yi-Ting Lin |
|
Vol 14, No 3 (2013) |
CoDaaS: Content Delivery as a Service for User Generated Contents |
Abstract
|
Yong-Gang Wen, Peng Sun, Jian-Fei Cai |
|
Vol 20, No 1 (2019) |
Coding Based Broadcast for Layered Video Streaming in Wireless Networks |
Abstract
PDF
|
Cheng Zhan, Fuyuan Xiao, Li Tao, Siqi Chen |
|
Vol 23, No 6 (2022) |
Cognitive Fuzzy-based Behavioral Learning System for Augmenting the Automated Multi-issue Negotiation in the E-commerce Applications |
Abstract
PDF
|
Rajkumar Rajavel, Dinesh Komarasamy, Iyapparaja Meenakshisundaram, Katarina Gubiniova, Celestine Iwendi |
|
Vol 22, No 2 (2021) |
Collaborative Framework of Accelerating Reinforcement Learning Training with Supervised Learning Based on Edge Computing |
Abstract
PDF
|
Yu-Shan Lin, Chin-Feng Lai, Chieh-Lin Chuang, Xiaohu Ge, Han-Chieh Chao |
|
Vol 19, No 4 (2018) |
Collaborative Web Service QoS Prediction via Location-Aware Matrix Factorization and Unbalanced Distribution |
Abstract
PDF
|
Wei Xiong, Qiong Gu, Bing Li, Zhao Wu, Lei Yuan |
|
Vol 23, No 6 (2022) |
College Students' Service Feedback Based on a Complex Network |
Abstract
PDF
|
Xinyi Wang, Jinji Fu, Rui Qi, Bokai Xu, Ming Huang |
|
Vol 24, No 1 (2023) |
Color and Texture Feature Recognition of Traditional Pen and Ink Painting Based on Visual Sensor |
Abstract
PDF
|
Shuo Zhang |
|
Vol 23, No 7 (2022) |
Combining GCN and Transformer for Chinese Grammatical Error Detection |
Abstract
PDF
|
Jinhong Zhang |
|
Vol 20, No 5 (2019) |
Communication Climate, Organizational Learning Readiness and Job Satisfaction in Information Technology Service Enterprises |
Abstract
PDF
|
Shyang-Yuh Wang, Carroll M. Graham, Chih-Hsien Hsia, Fredrick M. Nafukho, Hsiang-Wei Wang |
|
Vol 21, No 2 (2020) |
Comparative Performance Evaluation of Popular Virtual Private Servers |
Abstract
PDF
|
Josip Balen, Denis Vajak, Khaled Salah |
|
Vol 16, No 6 (2015) |
Comparing Group Characteristics to Explain Community Structures in Social Media Networks |
Abstract
|
Ruei-Yuan Chang, Sheng-Lung Peng, Guanling Lee, Chia-Jung Chang |
|
Vol 3, No 3 (2002) |
Comparison of Personal Firewalls Security and Performance Issues |
Abstract
|
Khaled M. Elleithy, Rama Ca Reddy |
|
Vol 4, No 4 (2003) |
Comparison of Wireless Token Ring Protocol with IEEE 802.11 |
Abstract
|
Mustafa Ergen, Duke Lee, Ruchira Datta, Jeff Ko, Anuj Puri, Raja Sengupta, Pravin Varaiya |
|
876 - 900 of 2657 Items |
<< < 31 32 33 34 35 36 37 38 39 40 > >> |