Browse Title Index


 
Issue Title
 
Vol 14, No 1 (2013) Cover the Trace of Image Forgery by PSO Abstract
Shen Wang, Xia-Mu Niu
 
Vol 20, No 3 (2019) Coverage Overlaps Reduction with Delaunay Triangulation for Visual Sensor Networks Abstract   PDF
Shun-Miao Zhang, De-Gen Huang
 
Vol 18, No 2 (2017) Coverless Image Steganography Based on SIFT and BOF Abstract
Chengsheng Yuan, Zhihua Xia, Xingming Sun
 
Vol 18, No 5 (2017) Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm Abstract
Zhili Zhou, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun, Zhaoqing Pan
 
Vol 18, No 6 (2017) Coverless Information Hiding Method Based on LSB of the Character's Unicode Abstract
Zhihua Xia, Xuan Li
 
Vol 18, No 2 (2017) Coverless Information Hiding Method Based on the Chinese Character Encoding Abstract
Xianyi Chen, Sheng Chen, Yulei Wu
 
Vol 19, No 2 (2018) Coverless Steganography Based on English Texts Using Binary Tags Protocol Abstract   PDF
Yulei Wu, Xianyi Chen, Xingming Sun
 
Vol 18, No 2 (2017) Coverless Text Information Hiding Method Based on the Rank Map Abstract
Jianjun Zhang, Lucai Wang, Haijun Lin
 
Vol 15, No 2 (2014) CPA: A Cluster-Based Packet Acknowledgement Approach in WSNs Abstract
Yun-Lei Sun, Xiu-Quan Qiao, Bo Cheng, Si-Da Xue, Jun-Liang Chen
 
Vol 19, No 3 (2018) CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing Abstract   PDF
Long Li, Tianlong Gu, Liang Chang, Jingjing Li, Junyan Qian
 
Vol 17, No 2 (2016) Creation Method and Evolution Evaluation of Concept Knowledge Maps Abstract
Meng Li, Sheng Cao, Zhi-Quang Qin
 
Vol 24, No 1 (2023) CRF-MEM: Conditional Random Field Model Based Modified Expectation Maximization Algorithm for Sarcasm Detection in Social Media Abstract   PDF
Anbarasu Sivalingam, Karthik Sundararajan, Anandhakumar Palanisamy
 
Vol 16, No 3 (2015) Critical Comparison of Access Control Models for Cloud Computing Abstract
Mutaz Beraka, Jalal Al-Muhtadi
 
Vol 8, No 3 (2007) Cross-layer Mobility with SIP and MIPv6 Abstract
Rui Prior, Susana Sargento
 
Vol 23, No 4 (2022) Cross-Project Defect Prediction Method based on Feature Distribution Alignment and Neighborhood Instance Selection Abstract   PDF
Yi Zhu, Yu Zhao, Qiao Yu, Xiaoying Chen
 
Vol 19, No 3 (2018) Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps Abstract   PDF
Chien-Ming Chen, Linlin Xu, King-Hang Wang, Shuai Liu, Tsu-Yang Wu
 
Vol 11, No 6 (2010) Cryptanalysis by Using Differential-Linear Hull: An Extension to Differential-Linear Cryptanalysis Abstract
Zhi-Qiang Liu, Da-Wu Gu, Shi-Jing Ge, Wei Li
 
Vol 14, No 2 (2013) Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves Abstract
Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen, Chi-Chun Lo
 
Vol 13, No 1 (2012) Cryptanalysis of the Knapsack Cipher 0/255 Abstract
Junfang Xiao, Guihua Zeng, Baocang Wang
 
Vol 24, No 2 (2023) CSCP: Energy Charging Mechanism for Surveillance Quality, Network Connectivity and Perpetual Lifetime in WRSNs Abstract   PDF
Yuanping Kan, Chih-Yung Chang, Shih-Jung Wu, Chin-Hwa Kuo, Diptendu Sinha Roy
 
Vol 13, No 3 (2012) CSP Based Web Service Composition Model with Buffer at the Business Logic Process Level Abstract
Hwa-Young Jeong, Yang-Sun Lee
 
Vol 25, No 3 (2024) Current Status and Emerging Trends of Generative Artificial Intelligence Technology: A Bibliometric Analysis Abstract
Nan Wang, Suqi Li, Chenhui Wang, Li Zhao
 
Vol 13, No 6 (2012) Customer Behavior Analysis by Using Multiple Databases: A Case of University Students' Use of Online Bookstore Services Abstract
Ko-Tsung Chu, Sheng-Ming Wang, Jia-Li Hou, Jih-Hsin Tang, Jyh-Jian Sheu
 
Vol 9, No 4 (2008) Customized Advertising in E-Commerce Services Provision Abstract
Vincenzo Loia, Sabrina Senatore, Maria I. Sessa, Mario Veniero
 
Vol 20, No 5 (2019) Customized Panorama System for Wayfinding and Walkthrough Abstract   PDF
Yu-Yi Chen, Yih-Jiun Lee, Kai-Wen Lien, Tzu-Yi Chen
 
951 - 975 of 2669 Items << < 34 35 36 37 38 39 40 41 42 43 > >>