Browse Title Index


 
Issue Title
 
Vol 23, No 1 (2022) Dynamic Pyramid Attention Networks for multi-orientation object detection Abstract   PDF
Hongchun Yuan, Hui Zhou, Zhenyu Cai, Shuo Zhang, Ruoyou Wu
 
Vol 20, No 5 (2019) Dynamic Skyline Maintaining Strategies for Moving Query Points in Road Networks Abstract   PDF
Jiping Zheng, Shunqing Jiang, Jialiang Chen, Wei Yu, Siman Zhang
 
Vol 22, No 1 (2021) Dynamic Spectrum Allocation Mechanism of Joint Power Control and Channel Allocation Abstract   PDF
Zhicheng Tan, Yun Li, Shanlin Sun, Rongyao Zhang, Xing Yao
 
Vol 19, No 5 (2018) Dynamic Spectrum Tracking through Quickest Detection Techniques: A Clustered Approach Abstract   PDF
Muhammad Sajjad Khan, Muhammad Usman, Insoo Koo
 
Vol 26, No 4 (2025) Dynamic Weather-Adaptive Enhanced Barrier Coverage with Adjustable-Range Sensors for WRSNs Abstract
Pei Xu, Youxi Li, Chih-Yung Chang, Chin-Hwa Kuo, Diptendu Sinha Roy
 
Vol 15, No 6 (2014) Dynamical Multicast Light-Tree Construction in Intra-Datacenter Networks with Fast Optical Switching Abstract
Wan Tang, Ximin Yang, Jingcong Li, Zilong Ye
 
Vol 14, No 6 (2013) Dynamically Iterative MapReduce Abstract
Wei-Tsong Lee, Ming-Zhi Wu, Hsin-Wen Wei, Fang-Yi Yu, Yu-Sun Lin
 
Vol 18, No 1 (2017) Dynamically Reconfigurable Queue for Intel IXP2400 Network Processor Abstract
A. Satheesh, D. Kumar, P. Dharmalingam, T. K. S. Lakshmipriya, S. Krishnaveni
 
Vol 25, No 4 (2024) Ease of Use or Fun Perception? Factors Affecting Retention of Newly Registered Mobile Game Players Based on Flow Theory and The Technology Acceptance Model Abstract
Yujie Zhan, Zunxiang Qiu, Xinchun Li, Zishuo Zhao
 
Vol 16, No 3 (2015) ECC-Based Multi-Document Fail-Stop Signature Encryption Scheme Abstract
Chien-Hua Tsai, Pin-Chang Su
 
Vol 23, No 1 (2022) Edge Based Lightweight Authentication Architecture Using Deep Learning for Vehicular Networks Abstract   PDF
Hyunhee Park
 
Vol 23, No 6 (2022) Edge Computing Offloading at Middle-sea Scenario for Maritime Video Surveillances Abstract   PDF
Ziyang Gong, Ziyi Wang, Xin Su, Chang Choi
 
Vol 11, No 7 (2010) Edge-and-Motion-Based Video Object Extraction and Application to Scene Composition Abstract
Yih-Haw Jan
 
Vol 19, No 1 (2018) Editorial: Research Activities in Future Internet Technologies Abstract   PDF
Syed Hassan Ahmed, Safdar Hussain Bouk, Waleed Ejaz, Houbing Song
 
Vol 19, No 4 (2018) Editorial: Special Issue on “Selected Papers from MobiSec 2016” Abstract   PDF
Ilsun You, Hsing-Chung Chen, Fang-Yie Leu
 
Vol 19, No 4 (2018) Editorial: The 10th International Conference on Network and System Security (NSS 2016) Abstract   PDF
Kuo-Hui Yeh, Chunhua Su, Jiageng Chen, Nai-Wei Lo
 
Vol 21, No 2 (2020) EEQRPI-MRP: A Quality of Service Based Interference Aware Multipath Routing Protocol for MANETs Abstract   PDF
A. Kingsly Jabakumar, S. Sasipriya
 
Vol 21, No 1 (2020) Effect of Behavior Patterns of Accessing Learning Materials on Learning Performance in Student-generated Question Activities Abstract   PDF
Pham Duc Tho, Chih-Hung Lai, Ondrej Navratil
 
Vol 20, No 6 (2019) Effect of Facebook Social Comparison on Well-being: A Meta-Analysis Abstract   PDF
Fu-Rung Yang, Chih-Fen Wei, Jih-Hsin Tang
 
Vol 23, No 3 (2022) Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection Abstract   PDF
Su-Gyeong Yu, So-Eui Kim, Kun Ha Suh, Eui Chul Lee
 
Vol 8, No 3 (2007) Effective and Efficient Approach to Web Accounts Management and Authentication Minimizing Password Compromise Risk and Possible Loss Abstract
Hung-Yu Chien, Wei Sheng Lin, Chun Yi Lin, Shu Chun Juan, Yun Zhen Ku, Shu Hua Wang
 
Vol 22, No 5 (2021) Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data Abstract   PDF
Shuji Yamaguchi, Hidehito Gomi, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi
 
Vol 23, No 5 (2022) Effective Radio Resource Allocation for IoT Random Access by Using Reinforcement Learning Abstract
Yen-Wen Chen, Ji-Zheng You
 
Vol 20, No 7 (2019) Effective Tag Identification Algorithm for Dynamic Radio Frequency Identification Systems Abstract   PDF
Cheng-Huang Chang, Chen-Chuan Wu, Chiu-Kuo Liang
 
Vol 15, No 5 (2014) Effectively Mining Network Traffic Intelligence to Detect Malicious Stealthy Port Scanning to Cloud Servers Abstract
Yan-Zhen Qu, Qi-Kai Lu
 
1176 - 1200 of 2695 Items << < 43 44 45 46 47 48 49 50 51 52 > >>