|
Issue |
Title |
|
Vol 25, No 2 (2024) |
Designing a Multi-Criteria Decision-Making Framework to Establish a Value Ranking System for the Quality Evaluation of Long-Term Care Services |
Abstract
|
Lun-Ping Hung, Weidong Huang, Sheng-Tzong Cheng, Zong-Jie Wu, Syuan Ou Yang |
|
Vol 13, No 1 (2012) |
Designing a Scalable Distributed Tabletop System for Collocated and Remote Collaboration |
Abstract
|
Minyoung Kim, Yongjoo Cho, Kyoung Shin Park |
|
Vol 5, No 3 (2004) |
Designing and Implementing a Dynamic Domain Name System for Wireless LANs |
Abstract
|
Chiao Yu, Ko-Shung Chen |
|
Vol 8, No 1 (2007) |
Designing Directional Antennas to Maximize Spatio-temporal Sampling Rates in Multi-hop Clustered Sensor Networks |
Abstract
|
Qing-Jiang Tian, Seema Bandyopadhyay, Edward J. Coyle |
|
Vol 11, No 6 (2010) |
Designing Integrated High Performance Web Portals for GIScience Research |
Abstract
|
Tong Zhang, Ming-Hsiang Tsou, Qing-Hua Qiao, Bin Hu |
|
Vol 19, No 1 (2018) |
Designing VNT Candidates Robust Against Network Failures |
Abstract
PDF
|
Onur Alparslan, Shin’ichi Arakawa, Masayuki Murata |
|
Vol 15, No 2 (2014) |
Designs of Enhanced CAC with QoS Scheme for Efficient Resource Allocations on the IEEE 802.16 Network |
Abstract
|
Shin-Jer Yang, Chun-Hsiu Cheng |
|
Vol 18, No 3 (2017) |
Detect Online Review Spammers Based on Comprehensive Trustiness Propagation Model |
Abstract
|
Xiangwen Liao, Xiaoting Xu, Jengshyang Pan, Guolong Chen |
|
Vol 15, No 6 (2014) |
Detecting Cache-Based Side Channel Attacks in the Cloud: An Approach with Cascade Detection Mode |
Abstract
|
Si Yu, Xiaolin Gui, Xuejun Zhang, Jiancai Lin, Min Dai |
|
Vol 18, No 4 (2017) |
Detecting Code Injection Attacks on Hybrid Apps with Machine Learning |
Abstract
|
Xi Xiao, Ruibo Yan, Runguo Ye, Sancheng Peng, Qing Li |
|
Vol 17, No 2 (2016) |
Detecting DGA-Based Botnet with DNS Traffic Analysis in Monitored Network |
Abstract
|
Dinh-Tu Truong, Guang Cheng, Ahmad Jakalan, Xiao-Jun Guo, Ai-Ping Zhou |
|
Vol 9, No 3 (2008) |
Detecting Drifting Concepts on the Internet |
Abstract
|
Chien-I Lee, Cheng-Jung Tsai, Chien-Hui Hsieh |
|
Vol 21, No 4 (2020) |
Detecting Malicious Fast-Flux Domains Using Feature-based Classification Techniques |
Abstract
PDF
|
Dinh-Tu Truong, Dac-Tot Tran, Bao Huynh |
|
Vol 17, No 6 (2016) |
Detecting Spam Bots by Sequential Analysis of Encrypted Traffic |
Abstract
|
Po-Ching Lin, Chi-Fang Chen, Pin-Ren Chiou |
|
Vol 14, No 2 (2013) |
Detecting Spammers in Microblogs |
Abstract
|
Zhao-Yun Ding, Jian-Feng Zhang, Jia Yan, Li He, Bin Zhou |
|
Vol 16, No 2 (2015) |
Detecting Strategy of Fast Flux Domain Based on Hidden Markov Model |
Abstract
|
Ren-De Huang, Shu-Yu Kuo, Yao-Hsin Chou |
|
Vol 23, No 4 (2022) |
Detection and Blocking Method against DLL Injection Attack Using PEB-LDR of ICS EWS in Smart IoT Environments |
Abstract
PDF
|
Junwon Kim, Jiho Shin, Jung Taek Seo |
|
Vol 23, No 2 (2022) |
Detection Method of Photovoltaic Panel Defect Based on Improved Mask R-CNN |
Abstract
PDF
|
Shuqiang Guo, Zhiheng Wang, Yue Lou, Xianjin Li, Huanqiang Lin |
|
Vol 19, No 7 (2018) |
Detection of Abnormal Weak Correlated Data in Network Communication Based on Feature Analysis |
Abstract
PDF
|
Shufen Liu, Xuejun Ma, Zhixiang Hou |
|
Vol 6, No 3 (2005) |
Detection of Mobile User Location on Next Generation Wireless Networks |
Abstract
|
Saowanee Thongthammachart Schou, Henning Olesen |
|
Vol 12, No 3 (2011) |
Determination of K-Coverage Configuration for Meeting Desired Quality of Surveillance on WSNs |
Abstract
|
Meng-Chun Wueng, Shyh-In Hwang, I-Shyan Hwang |
|
Vol 16, No 7 (2015) |
Deterministic and Stochastic Performance Analysis for Real-Time Avionics Networks |
Abstract
|
Bin Wen, Jian Li, Guchuan Zhu, Dongshan Huang |
|
Vol 14, No 6 (2013) |
Deterministic Measurement Matrix Generation for Compressive Data Gathering and Reconstruction in WSNs |
Abstract
|
Wen-Jie Yan, Qiang Wang, Yi Shen, Qi-Tao Han |
|
Vol 20, No 6 (2019) |
Developing A Customized Web Mining System with PHP Language: A Case of Kaohsiung Land Administration Website Data |
Abstract
PDF
|
Chuan-Fu Chuang, Shiuann-Shuoh Chen |
|
Vol 21, No 3 (2020) |
Developing a Mobile-Assisted Software Application to Observe University Students’ Vocabulary Growth Through Extensive Reading |
Abstract
PDF
|
Wei-Wei Shen, Zeng-Wei Hong, Chun-Po Huang, Jim-Min Lin |
|
1076 - 1100 of 2657 Items |
<< < 39 40 41 42 43 44 45 46 47 48 > >> |