|
Issue |
Title |
|
Vol 23, No 1 (2022) |
Dynamic Pyramid Attention Networks for multi-orientation object detection |
Abstract
PDF
|
Hongchun Yuan, Hui Zhou, Zhenyu Cai, Shuo Zhang, Ruoyou Wu |
|
Vol 20, No 5 (2019) |
Dynamic Skyline Maintaining Strategies for Moving Query Points in Road Networks |
Abstract
PDF
|
Jiping Zheng, Shunqing Jiang, Jialiang Chen, Wei Yu, Siman Zhang |
|
Vol 22, No 1 (2021) |
Dynamic Spectrum Allocation Mechanism of Joint Power Control and Channel Allocation |
Abstract
PDF
|
Zhicheng Tan, Yun Li, Shanlin Sun, Rongyao Zhang, Xing Yao |
|
Vol 19, No 5 (2018) |
Dynamic Spectrum Tracking through Quickest Detection Techniques: A Clustered Approach |
Abstract
PDF
|
Muhammad Sajjad Khan, Muhammad Usman, Insoo Koo |
|
Vol 26, No 4 (2025) |
Dynamic Weather-Adaptive Enhanced Barrier Coverage with Adjustable-Range Sensors for WRSNs |
Abstract
|
Pei Xu, Youxi Li, Chih-Yung Chang, Chin-Hwa Kuo, Diptendu Sinha Roy |
|
Vol 15, No 6 (2014) |
Dynamical Multicast Light-Tree Construction in Intra-Datacenter Networks with Fast Optical Switching |
Abstract
|
Wan Tang, Ximin Yang, Jingcong Li, Zilong Ye |
|
Vol 14, No 6 (2013) |
Dynamically Iterative MapReduce |
Abstract
|
Wei-Tsong Lee, Ming-Zhi Wu, Hsin-Wen Wei, Fang-Yi Yu, Yu-Sun Lin |
|
Vol 18, No 1 (2017) |
Dynamically Reconfigurable Queue for Intel IXP2400 Network Processor |
Abstract
|
A. Satheesh, D. Kumar, P. Dharmalingam, T. K. S. Lakshmipriya, S. Krishnaveni |
|
Vol 25, No 4 (2024) |
Ease of Use or Fun Perception? Factors Affecting Retention of Newly Registered Mobile Game Players Based on Flow Theory and The Technology Acceptance Model |
Abstract
|
Yujie Zhan, Zunxiang Qiu, Xinchun Li, Zishuo Zhao |
|
Vol 16, No 3 (2015) |
ECC-Based Multi-Document Fail-Stop Signature Encryption Scheme |
Abstract
|
Chien-Hua Tsai, Pin-Chang Su |
|
Vol 23, No 1 (2022) |
Edge Based Lightweight Authentication Architecture Using Deep Learning for Vehicular Networks |
Abstract
PDF
|
Hyunhee Park |
|
Vol 23, No 6 (2022) |
Edge Computing Offloading at Middle-sea Scenario for Maritime Video Surveillances |
Abstract
PDF
|
Ziyang Gong, Ziyi Wang, Xin Su, Chang Choi |
|
Vol 11, No 7 (2010) |
Edge-and-Motion-Based Video Object Extraction and Application to Scene Composition |
Abstract
|
Yih-Haw Jan |
|
Vol 19, No 1 (2018) |
Editorial: Research Activities in Future Internet Technologies |
Abstract
PDF
|
Syed Hassan Ahmed, Safdar Hussain Bouk, Waleed Ejaz, Houbing Song |
|
Vol 19, No 4 (2018) |
Editorial: Special Issue on “Selected Papers from MobiSec 2016” |
Abstract
PDF
|
Ilsun You, Hsing-Chung Chen, Fang-Yie Leu |
|
Vol 19, No 4 (2018) |
Editorial: The 10th International Conference on Network and System Security (NSS 2016) |
Abstract
PDF
|
Kuo-Hui Yeh, Chunhua Su, Jiageng Chen, Nai-Wei Lo |
|
Vol 21, No 2 (2020) |
EEQRPI-MRP: A Quality of Service Based Interference Aware Multipath Routing Protocol for MANETs |
Abstract
PDF
|
A. Kingsly Jabakumar, S. Sasipriya |
|
Vol 21, No 1 (2020) |
Effect of Behavior Patterns of Accessing Learning Materials on Learning Performance in Student-generated Question Activities |
Abstract
PDF
|
Pham Duc Tho, Chih-Hung Lai, Ondrej Navratil |
|
Vol 20, No 6 (2019) |
Effect of Facebook Social Comparison on Well-being: A Meta-Analysis |
Abstract
PDF
|
Fu-Rung Yang, Chih-Fen Wei, Jih-Hsin Tang |
|
Vol 23, No 3 (2022) |
Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection |
Abstract
PDF
|
Su-Gyeong Yu, So-Eui Kim, Kun Ha Suh, Eui Chul Lee |
|
Vol 8, No 3 (2007) |
Effective and Efficient Approach to Web Accounts Management and Authentication Minimizing Password Compromise Risk and Possible Loss |
Abstract
|
Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang |
|
Vol 22, No 5 (2021) |
Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data |
Abstract
PDF
|
Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi |
|
Vol 23, No 5 (2022) |
Effective Radio Resource Allocation for IoT Random Access by Using Reinforcement Learning |
Abstract
|
Yen-Wen Chen, Ji-Zheng You |
|
Vol 20, No 7 (2019) |
Effective Tag Identification Algorithm for Dynamic Radio Frequency Identification Systems |
Abstract
PDF
|
Cheng-Huang Chang, Chen-Chuan Wu, Chiu-Kuo Liang |
|
Vol 15, No 5 (2014) |
Effectively Mining Network Traffic Intelligence to Detect Malicious Stealthy Port Scanning to Cloud Servers |
Abstract
|
Yan-Zhen Qu, Qi-Kai Lu |
|
1176 - 1200 of 2695 Items |
<< < 43 44 45 46 47 48 49 50 51 52 > >> |