| Issue | Title | |
| Vol 24, No 6 (2023) | Consumers' Motivations for Reading Electronic Word of Mouth (eWOM): A 4-IS Typology | Abstract |
| Cheng-Wen Yao, Dah-Kwei Liou | ||
| Vol 23, No 4 (2022) | Container-based Service Relocation for Beyond 5G Networks | Abstract PDF |
| Yeonjoo Lim, Jong-Hyouk Lee | ||
| Vol 17, No 3 (2016) | Content Adaptive Intra Prediction Algorithm for HEVC Encoder | Abstract |
| Kuang-Han Tai, Mei-Juan Chen, Xin-Zhi Li | ||
| Vol 21, No 5 (2020) | Content Enrichment Using Linked Open Data for News Classification | Abstract PDF |
| Hsin-Chang Yang, Yu-Chih Wang | ||
| Vol 16, No 4 (2015) | Context-Aware Mobile Proactive Recommendation | Abstract |
| Shu-Dong Liu, Xiang-Wu Meng | ||
| Vol 23, No 6 (2022) | Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption | Abstract PDF |
| Qihong Yu, Jian Shen, Jin-Feng Lai, Sai Ji | ||
| Vol 20, No 6 (2019) | Contrasting the Motivations of Using Social Networking Sites between Western and Eastern Countries | Abstract PDF |
| Yun-Shan Cheng, Yu-Chin Liu | ||
| Vol 15, No 7 (2014) | Control and Evaluation Using a Parallel Robot | Abstract |
| Ko-Chun Chen, Yuh-Ming Cheng | ||
| Vol 21, No 2 (2020) | Control of a Six-axis Robotic Arm Using the Touch Panel | Abstract PDF |
| Shyh-Shing Perng, Pu-Sheng Tsai, Nien-Tsu Hu, Ter-Feng Wu, Jen-Yang Chen | ||
| Vol 17, No 1 (2016) | Control System Using Multithread and Stereo Vision to Tracking Target | Abstract |
| Ko-Chun Chen, Chia-Sui Wang | ||
| Vol 20, No 3 (2019) | Convergence of Newton-relaxed Non-stationary Multisplitting Multi-parameters Methods for Nonlinear Equations | Abstract PDF |
| Li-Tao Zhang, Chao-Qian Li, Yao-Tang Li | ||
| Vol 16, No 3 (2015) | Convergence of WiMAX-3G QoS Architecture with IMS Signaling Analysis | Abstract |
| G. Vijayalakshmy, G. Sivaradje | ||
| Vol 17, No 1 (2016) | Cooperative Balanced Transmit Scheme with Decode-and-Forward and Amplify-and-Forward in Relay Communication Network Systems | Abstract |
| Soobum Cho, Sang Kyu Park | ||
| Vol 11, No 1 (2010) | Cooperative Detection of Internet Prefix Hijacking | Abstract |
| Pei-Dong Zhu, Xin Liu, Wen-Ping Deng, Hua-Yang Cao | ||
| Vol 12, No 2 (2011) | Cooperative Failure Detection in Multi-Overlay Environments | Abstract |
| Chin-Jung Hsu, Wu-Chun Chung, Kuan-Chou Lai, Kuan-Ching Li, Yeh-Ching Chung | ||
| Vol 5, No 2 (2004) | Coordinated Call Admission Control for IPv6-based Integrated Hierarchical Wireless Access Networks | Abstract |
| Sheng-Tzong Cheng, Jian-Liang Lin | ||
| Vol 12, No 1 (2011) | Coordinated Checkpointing Algorithms for Mobile Agent Environments | Abstract |
| Cheng-Min Lin, Jin-Yu Bai | ||
| Vol 4, No 4 (2003) | Correlation Based Traffic Modeling of Sub-Networks | Abstract |
| Yen-Wen Chen, Chung-Chi Chou | ||
| Vol 5, No 3 (2004) | Cost Minimization of the Attack Graph for Thwarting Network Attacks | Abstract |
| Wen-Huei Chen, Gen-Yih Liao | ||
| Vol 14, No 1 (2013) | Cover the Trace of Image Forgery by PSO | Abstract |
| Shen Wang, Xia-Mu Niu | ||
| Vol 20, No 3 (2019) | Coverage Overlaps Reduction with Delaunay Triangulation for Visual Sensor Networks | Abstract PDF |
| Shun-Miao Zhang, De-Gen Huang | ||
| Vol 18, No 2 (2017) | Coverless Image Steganography Based on SIFT and BOF | Abstract |
| Chengsheng Yuan, Zhihua Xia, Xingming Sun | ||
| Vol 18, No 5 (2017) | Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm | Abstract |
| Zhili Zhou, Q. M. Jonathan Wu, Ching-Nung Yang, Xingming Sun, Zhaoqing Pan | ||
| Vol 18, No 6 (2017) | Coverless Information Hiding Method Based on LSB of the Character's Unicode | Abstract |
| Zhihua Xia, Xuan Li | ||
| Vol 18, No 2 (2017) | Coverless Information Hiding Method Based on the Chinese Character Encoding | Abstract |
| Xianyi Chen, Sheng Chen, Yulei Wu | ||
| 951 - 975 of 2731 Items | << < 34 35 36 37 38 39 40 41 42 43 > >> | |
