|
Issue |
Title |
|
Vol 20, No 4 (2019) |
Constructing Competence Indicators for Makers in Elementary School |
Abstract
PDF
|
Chun-Yen Yeh, Yuh-Ming Cheng, Shi-Jer Lou, Mong-Fong Horng |
|
Vol 8, No 3 (2007) |
Constructing Long-Lived Scatternets in Bluetooth Networks |
Abstract
|
Hong-Yi Chang, Chang Wu Yu |
|
Vol 12, No 6 (2011) |
Constructing Service-Oriented Integrated EDA Environment with Agent Technology |
Abstract
|
Guo-Ming Fang, Jim-Min Lin, Zeng-Wei Hong, De-Sheng Chen, Wei-Tsong Lee |
|
Vol 11, No 7 (2010) |
Construction of Compactly Supported Biorthogonal Multiwavelets: An Abstract Algebraic Approach |
Abstract
|
Yi-Gang Cen |
|
Vol 21, No 1 (2020) |
Construction of Value Classification Model by Tracking NBA Center Players’ Performance with Virtual IoT Tagging Technology |
Abstract
PDF
|
Che-Wei Chang |
|
Vol 21, No 6 (2020) |
Consumer Behavioral Intension for Using Mobile Payment for E-commerce in Taiwan |
Abstract
PDF
|
Jich-Yan Tsai, Xiu-Wen Ye, Chien-Hua Wang |
|
Vol 24, No 6 (2023) |
Consumers' Motivations for Reading Electronic Word of Mouth (eWOM): A 4-IS Typology |
Abstract
|
Cheng-Wen Yao, Dah-Kwei Liou |
|
Vol 23, No 4 (2022) |
Container-based Service Relocation for Beyond 5G Networks |
Abstract
PDF
|
Yeonjoo Lim, Jong-Hyouk Lee |
|
Vol 17, No 3 (2016) |
Content Adaptive Intra Prediction Algorithm for HEVC Encoder |
Abstract
|
Kuang-Han Tai, Mei-Juan Chen, Xin-Zhi Li |
|
Vol 21, No 5 (2020) |
Content Enrichment Using Linked Open Data for News Classification |
Abstract
PDF
|
Hsin-Chang Yang, Yu-Chih Wang |
|
Vol 16, No 4 (2015) |
Context-Aware Mobile Proactive Recommendation |
Abstract
|
Shu-Dong Liu, Xiang-Wu Meng |
|
Vol 23, No 6 (2022) |
Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption |
Abstract
PDF
|
Qihong Yu, Jian Shen, Jin-Feng Lai, Sai Ji |
|
Vol 20, No 6 (2019) |
Contrasting the Motivations of Using Social Networking Sites between Western and Eastern Countries |
Abstract
PDF
|
Yun-Shan Cheng, Yu-Chin Liu |
|
Vol 15, No 7 (2014) |
Control and Evaluation Using a Parallel Robot |
Abstract
|
Ko-Chun Chen, Yuh-Ming Cheng |
|
Vol 21, No 2 (2020) |
Control of a Six-axis Robotic Arm Using the Touch Panel |
Abstract
PDF
|
Shyh-Shing Perng, Pu-Sheng Tsai, Nien-Tsu Hu, Ter-Feng Wu, Jen-Yang Chen |
|
Vol 17, No 1 (2016) |
Control System Using Multithread and Stereo Vision to Tracking Target |
Abstract
|
Ko-Chun Chen, Chia-Sui Wang |
|
Vol 20, No 3 (2019) |
Convergence of Newton-relaxed Non-stationary Multisplitting Multi-parameters Methods for Nonlinear Equations |
Abstract
PDF
|
Li-Tao Zhang, Chao-Qian Li, Yao-Tang Li |
|
Vol 16, No 3 (2015) |
Convergence of WiMAX-3G QoS Architecture with IMS Signaling Analysis |
Abstract
|
G. Vijayalakshmy, G. Sivaradje |
|
Vol 17, No 1 (2016) |
Cooperative Balanced Transmit Scheme with Decode-and-Forward and Amplify-and-Forward in Relay Communication Network Systems |
Abstract
|
Soobum Cho, Sang Kyu Park |
|
Vol 11, No 1 (2010) |
Cooperative Detection of Internet Prefix Hijacking |
Abstract
|
Pei-Dong Zhu, Xin Liu, Wen-Ping Deng, Hua-Yang Cao |
|
Vol 12, No 2 (2011) |
Cooperative Failure Detection in Multi-Overlay Environments |
Abstract
|
Chin-Jung Hsu, Wu-Chun Chung, Kuan-Chou Lai, Kuan-Ching Li, Yeh-Ching Chung |
|
Vol 5, No 2 (2004) |
Coordinated Call Admission Control for IPv6-based Integrated Hierarchical Wireless Access Networks |
Abstract
|
Sheng-Tzong Cheng, Jian-Liang Lin |
|
Vol 12, No 1 (2011) |
Coordinated Checkpointing Algorithms for Mobile Agent Environments |
Abstract
|
Cheng-Min Lin, Jin-Yu Bai |
|
Vol 4, No 4 (2003) |
Correlation Based Traffic Modeling of Sub-Networks |
Abstract
|
Yen-Wen Chen, Chung-Chi Chou |
|
Vol 5, No 3 (2004) |
Cost Minimization of the Attack Graph for Thwarting Network Attacks |
Abstract
|
Wen-Huei Chen, Gen-Yih Liao |
|
926 - 950 of 2669 Items |
<< < 33 34 35 36 37 38 39 40 41 42 > >> |