| Issue | Title | |
| Vol 16, No 6 (2015) | Enterprise Solution of Video Rate Adaptation for Wireless Bandwidth Fluctuation | Abstract |
| Shehzad Amir, Kyungtae Kim, Young-June Choi | ||
| Vol 22, No 5 (2021) | Entropy and Structural-Hole Based Node Ranking Methods | Abstract PDF |
| Chinenye Ezeh, Tao Ren, Yan-Jie Xu, Shi-Xiang Sun, Zhe Li | ||
| Vol 16, No 3 (2015) | Entropy-Based Audio Watermarking via the Point of View on the Compact Particle Swarm Optimization | Abstract |
| Ming Zhao, Jeng-Shyang Pan, Shuo-Tsung Chen | ||
| Vol 20, No 1 (2019) | ENUM-based Number Portability for Mobile Communication Networks | Abstract PDF |
| Whai-En Chen, Yi-Lun Ciou | ||
| Vol 23, No 3 (2022) | EQ-RPL: An Energy-Efficient and Quality-Aware Routing Protocol for IoT-Based Low-Power and Lossy Networks | Abstract PDF |
| Sheng-Shih Wang, Hsing-Tsai Liu | ||
| Vol 15, No 1 (2014) | Equilibrium Flows and Path Dilation for a Network Forwarding Game | Abstract |
| George Karakostas, Anastasios Viglas | ||
| Vol 3, No 3 (2002) | Equitably Fair Internet Voting | Abstract |
| Emmanouil Magkos, Vassilios Chrissikopoulos | ||
| Vol 16, No 3 (2015) | ER-CLT: A Secure Emotion Recognition-Based Child Location Tracking System | Abstract |
| Won Min Kang, Jae Woong Joo, Jong Min Kim, Jong Hyuk Park | ||
| Vol 27, No 1 (2026) | ERS-TD: An Efficient Reconstruction and Sampling Method for TDOM Based on 3D Point Cloud Geometry in Image Cloud Computing | Abstract |
| Jianyin Tang, Mingyu Lin, Zhenglin Yu, Zhenhua Xiao, Neal N. Xiong | ||
| Vol 21, No 1 (2020) | ES-DAS: An Enhanced and Secure Dynamic Auditing Scheme for Data Storage in Cloud Environment | Abstract PDF |
| Esther Daniel, N. A. Vasanthi | ||
| Vol 16, No 1 (2015) | Essentiality of Deadline for Task Scheduling in Cloud Computing | Abstract |
| Li-Ya Tseng, Shun-Sheng Wang, Shu-Ching Wang, Kuo-Qin Yan | ||
| Vol 25, No 3 (2024) | Establishing a Big Data Driver for Digital Transformation, Supplier Concentration and Total Factor Productivity in Enterprises | Abstract |
| Hua Zhang, Xinyan Gao, Hengrui Chen, Zhongxi Lu, Hongji Yang | ||
| Vol 14, No 6 (2013) | Establishment and Application for a Mobile Learning Communities System over Cloud Network: A Case Study of Digital Archives Resource into Outdoor Environmental Education | Abstract |
| Shih-Yeh Chen, Yueh-Min Huang | ||
| Vol 19, No 2 (2018) | ETC Intelligent Navigation Path Planning Method | Abstract PDF |
| Jieren Cheng, Boyi Liu, Kuanqi Cai, Xiangyan Tang, Boyun Zhang | ||
| Vol 3, No 2 (2002) | Euro6IX:Pan-European IPv6 Internet Exchanges Bacbone(Invited Paper) | Abstract |
| Jordi Palet Martinez | ||
| Vol 24, No 2 (2023) | Evaluating Cybersecurity Capacity Building of ASEAN Plus Three through Social Network Analysis | Abstract PDF |
| Yu-Kyung Kim, Myong-Hyun Go, Sonyong Kim, Jaeyeon Lee, Kyungho Lee | ||
| Vol 17, No 4 (2016) | Evaluating Defense Simulation Packages Using AnalyticHierarchy Process | Abstract |
| Yasmeen Alomair, Iftikhar Ahmad, Abdullah Alghamdi, Fazal-e-Amin , Saeed Saad Alhaznawi | ||
| Vol 5, No 4 (2004) | Evaluating Performance Tradeoffs in a One-to-Many Peer Content Distribution Architecture | Abstract |
| Sami Rollins, Kevin C. Almeroth | ||
| Vol 25, No 5 (2024) | Evaluating the Robustness of Transfer Learning with Recipes on Small Data– Using Data of Birds as an Example | Abstract |
| Chuan-Ming Liu, Jung-Chih Wu, Chih-Le Chang, Hsiu-Hsia Lin | ||
| Vol 12, No 4 (2011) | Evaluating Trustworthiness of Prefix Announcements in Internet Routing | Abstract |
| Wen-Ping Deng, Pei-Dong Zhu, Xi-Cheng Lu | ||
| Vol 5, No 4 (2004) | Evaluation of Contention-Based EDCA for IEEE 802.11e Wireless LAN | Abstract |
| Chung-Sheng Li, Tak-Goa Tsuei, Han-Chieh Chao | ||
| Vol 26, No 1 (2025) | Evaluation of Cross-border E-commerce Economic and Trade Data Management Device Based on Blockchain Technology | Abstract |
| Jie Cao | ||
| Vol 24, No 1 (2023) | Evaluation of IoT Applications for UV Curing Temperature Variation of Gel Nails | Abstract PDF |
| Shu-Ting Chen | ||
| Vol 16, No 1 (2015) | Evaluation of Performance of Genetic Algorithms for Network Tomography | Abstract |
| Sameer Qazi, Rashida Ali Memon, Adnan Ahmed Farooqui | ||
| Vol 8, No 1 (2007) | Evasive Routing: Achieving Anonymity Using Multiple ISPs | Abstract |
| Yuval Elovici, Yehuda Ben-Shimol, Gad Alon | ||
| 1301 - 1325 of 2743 Items | << < 48 49 50 51 52 53 54 55 56 57 > >> | |
