| Issue | Title | |
| Vol 23, No 5 (2022) | Effective Radio Resource Allocation for IoT Random Access by Using Reinforcement Learning | Abstract |
| Yen-Wen Chen, Ji-Zheng You | ||
| Vol 20, No 7 (2019) | Effective Tag Identification Algorithm for Dynamic Radio Frequency Identification Systems | Abstract PDF |
| Cheng-Huang Chang, Chen-Chuan Wu, Chiu-Kuo Liang | ||
| Vol 15, No 5 (2014) | Effectively Mining Network Traffic Intelligence to Detect Malicious Stealthy Port Scanning to Cloud Servers | Abstract |
| Yan-Zhen Qu, Qi-Kai Lu | ||
| Vol 25, No 6 (2024) | Effects of Facial Recognition and Text Semantic Recognition on Affective Tutoring System | Abstract |
| Hsin-Lan Liu, Chin-Feng Lai, Hao-Chiang Koong Lin | ||
| Vol 18, No 3 (2017) | Effi cient Algorithm for Data Retrieval Problem with Multi-Item Request in Wireless Data Broadcast | Abstract |
| Ping He, Hong Shen, Shuli Luan | ||
| Vol 24, No 6 (2023) | Efficiency Evaluation of Business in IoT Supply Chains by Network DEA | Abstract |
| Han-Ying Kao, Chien-Hao Lan, Chia-Hsien Hsu | ||
| Vol 25, No 4 (2024) | Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment | Abstract |
| Ji Su Park | ||
| Vol 19, No 4 (2018) | Efficient and Publicly Verifiable Outsourcing of Large-scale Matrix Multiplication | Abstract PDF |
| Gang Sheng, Chunming Tang, Wei Gao, Ying Yin, Yunlu Cai | ||
| Vol 22, No 6 (2021) | Efficient Barrage Video Recommendation Algorithm Based on Convolutional and Recursive Neural Network | Abstract PDF |
| Ping He, Siyuan Ma, Weidong Li | ||
| Vol 20, No 4 (2019) | Efficient Certificate Based One-pass Authentication Protocol for IMS | Abstract PDF |
| Humaira Ashraf, Ata Ullah, Shireen Tahira, Muhammad Sher | ||
| Vol 18, No 5 (2017) | Efficient Certificate-Based Signature Scheme for Electronic Commerce Security Using Bilinear Pairing | Abstract |
| Libing Wu, Yubo Zhang, Yongjun Ren, Debiao He | ||
| Vol 15, No 7 (2014) | Efficient Clustering Simulator for Hierarchical Management of High-Risk with Wellness | Abstract |
| Young-Sik Jeong, Hyun-Woo Kim, Doo-Soon Park, Jong Hyuk Park | ||
| Vol 13, No 5 (2012) | Efficient Content-Based Publish/Subscribe Systems over Peer-to-Peer Networks | Abstract |
| Shou-Chih Lo | ||
| Vol 23, No 7 (2022) | Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing | Abstract PDF |
| Fengwei Cheng, Sai Ji, Chin-Feng Lai | ||
| Vol 19, No 6 (2018) | Efficient Data-replication between Cluster-heads for Solar-powered Wireless Sensor Networks with Mobile Sinks | Abstract PDF |
| Jun Min Yi, Hong Sub Lee, Ikjune Yoon, Dong Kun Noh | ||
| Vol 25, No 6 (2024) | Efficient FPGA Implementation of Sine Cosine Algorithm using High Level Synthesis | Abstract |
| Jeng-Shyang Pan, Si-Qi Zhang, Shu-Chuan Chu, Chia-Cheng Hu, Jie Wu | ||
| Vol 23, No 7 (2022) | Efficient Fuzzy C-means Based Reduced Feature Set Association Rule Mining Approach for Predicting the User Behavioral Pattern in Web Usage Mining | Abstract PDF |
| J. Serin, J. SatheeshKumar, T. Amudha | ||
| Vol 21, No 1 (2020) | Efficient Hybrid Clustering Scheme for Data Delivery Using Internet of Things Enabled Vehicular Ad Hoc Networks in Smart City Traffic Congestion | Abstract PDF |
| Abida Sharif, Jian Ping Li, Muhammad Asim Saleem, Tanzila Saba, Rajesh Kumar | ||
| Vol 2, No 4 (2001) | Efficient Image Retrieval on Distributed Cluster Architectures | Abstract |
| Odej Kao | ||
| Vol 21, No 3 (2020) | Efficient Implementation of GMDA-based DOA Technique Using Pre-training Phase Unwrapping for Source Localization | Abstract PDF |
| Sang-Ick Kang, Seongbin Kim, Sangmin Lee | ||
| Vol 17, No 2 (2016) | Efficient Integration Method of Large-Scale Heterogeneous Security Logs Using NoSQL in Cloud Computing Environment | Abstract |
| Hui-Jin Jeong, Xue-Feng Piao, Jun-Ho Choi, Juh-Yun Shin, Pan-Koo Kim | ||
| Vol 18, No 7 (2017) | Efficient Interpolation Strategies in Multiscale Multigrid Computation | Abstract |
| Cong Zhang, Jun Zhang, Ai Sun, Yueh-Min Huang | ||
| Vol 14, No 2 (2013) | Efficient IP Routing Lookups for High-Performance Routers | Abstract |
| Hsin-Chou Chi, Chia-Ming Wu, Sheng-Chin Hsu | ||
| Vol 23, No 1 (2022) | Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application | Abstract PDF |
| Peng-Cheng Huang, Ching-Chun Chang, Yung-Hui Li | ||
| Vol 20, No 1 (2019) | Efficient Lookup Schemes Based on Splitting Name for NDN | Abstract PDF |
| Qingtao Wu, Jinrong Yan, Mingchuan Zhang, Junlong Zhu, Ruijuan Zheng | ||
| 1226 - 1250 of 2755 Items | << < 45 46 47 48 49 50 51 52 53 54 > >> | |
