|
Issue |
Title |
|
Vol 17, No 5 (2016) |
Feature Selection with Multi-Cost Constraint |
Abstract
|
Jing-Kuan Li, Hong Zhao, William Zhu |
|
Vol 17, No 6 (2016) |
Feature Selection with Test Cost Constraint through a Simulated Annealing Algorithm |
Abstract
|
Junxia Niu, Hong Zhao, William Zhu |
|
Vol 14, No 2 (2013) |
Feature-Based High Availability Mechanism for Extreme Aggregation Tasks in Real-Time Data Stream Processing |
Abstract
|
Wei-Long Ding, Yan-Bo Han, Jing Wang, Zhuo-Feng Zhao |
|
Vol 24, No 2 (2023) |
Few Shot Object Detection via a Generalized Feature Extraction Net |
Abstract
PDF
|
Dengyong Zhang, Huaijian Pu, Feng Li, R. Simon Sherratt, Se-Jung Lim |
|
Vol 19, No 6 (2018) |
Finding An Optimal Disturbed Square Matrix Using Dynamic Programming Strategy for Steganography |
Abstract
PDF
|
Chi-Shiang Chan, Yuan-Yu Tsai |
|
Vol 20, No 4 (2019) |
Finding Potential Objects in Uncertain Dataset by Using Competition Power |
Abstract
PDF
|
Sheng-Fu Yang, Guanling Lee, Shou-Chih Lo |
|
Vol 20, No 7 (2019) |
Fine-grained and Efficient Access Control in E-health Environment |
Abstract
PDF
|
Tiantian Miao, Jian Shen, Xin Jin, Jin-Feng Lai |
|
Vol 19, No 6 (2018) |
Fine-grained Image Authorization Mechanism for Image Management Systems |
Abstract
PDF
|
Yi-Hui Chen, Eric Jui-Lin Lu, Ping-Jung Chen |
|
Vol 19, No 1 (2018) |
Fingerprint Liveness Detection Adapted to Different Fingerprint Sensors Based on Multiscale Wavelet Transform and Rotation-Invarient Local Binary Pattern |
Abstract
PDF
|
Chengsheng Yuan, Xingming Sun |
|
Vol 19, No 5 (2018) |
Fingerprint Liveness Detection Using Histogram of Oriented Gradient Based Texture Feature |
Abstract
PDF
|
Chengsheng Yuan, Xingming Sun |
|
Vol 11, No 4 (2010) |
FIRST: Korean Future Internet Testbed for Media-Oriented Service Overlay Network Architecture |
Abstract
|
Sung-Won Lee, Sang-Woo Han, Jong-Won Kim, Seung-Gwan Lee |
|
Vol 23, No 6 (2022) |
Fish Migration Optimization with Dynamic Grouping Strategy for Solving Job-Shop Scheduling Problem |
Abstract
PDF
|
Qingyong Yang, Shu-Chuan Chu, Chia-Cheng Hu, Jimmy Ming-Tai Wu, Jeng-Shyang Pan |
|
Vol 17, No 2 (2016) |
FiT-PA: Fixed Scale FFT Based Privacy Amplification Algorithm for Quantum Key Distribution |
Abstract
|
Bo Liu, Bao-Kang Zhao, Wan-Rong Yu, Chun-Qing Wu |
|
Vol 24, No 4 (2023) |
Five Phases Algorithm: A Novel Meta-heuristic Algorithm and Its Application on Economic Load Dispatch Problem |
Abstract
|
Xiaopeng Wang, Shu-Chuan Chu, Václav Snášel, Hisham A. Shehadeh, Jeng-Shyang Pan |
|
Vol 22, No 1 (2021) |
Flexible Resource-constrained Discrete Time-cost Trade-off Problem Considering Resource Transfer |
Abstract
PDF
|
Haobo Zou, Guohua Zhou |
|
Vol 23, No 5 (2022) |
Flow Entry Timeouts Optimization over Software Defined Networks Supporting Elephant Flow Classification |
Abstract
|
Changqing Zhao, Ling Xia Liao, Han-Chieh Chao, Roy Xiaorong Lai, Miao Zhang |
|
Vol 24, No 7 (2023) |
Flow Table Overflow Attacks in Software Defined Networks: A Survey |
Abstract
|
Changqing Zhao, Ling Xia Liao, Han-Chieh Chao, Roy Xiaorong Lai, Miao Zhang |
|
Vol 16, No 7 (2015) |
Fluid Flow Approximation of the Mean Buffer Occupancy in a Packet-Speech Multiplexer |
Abstract
|
Branimir Trenkić, Dragan Mitić, Aleksandar Lebl, Žarko Markov |
|
Vol 7, No 4 (2006) |
Focus Based Resource-Aware Semantic Transcoding for Universal Access |
Abstract
|
Shiow-Yang Wu, Chun-Hsiung Huang |
|
Vol 19, No 1 (2018) |
Fog Computing Service Orchestration Mechanisms for 5G Networks |
Abstract
PDF
|
Stojan Kitanov, Toni Janevski |
|
Vol 23, No 2 (2022) |
Fog Managed Data Model for IoT based Healthcare Systems |
Abstract
PDF
|
Benila S., Usha Bhanu N. |
|
Vol 23, No 5 (2022) |
Forest Fire Recognition Based on Lightweight Convolutional Neural Network |
Abstract
|
Zhixiang Li, Hongbin Jiang, Qixiang Mei, Zhao Li |
|
Vol 18, No 4 (2017) |
Foreword: Special Issue for ICSEC 2015 |
Abstract
|
Manju Khari, Sheng-Lung Peng, Kosin Chamnongthai |
|
Vol 18, No 7 (2017) |
Foreword: Special Issue for JCSSE 2016 |
Abstract
|
Brojo Kishore Mishra, Sheng-Lung Peng, Sartra Wongthanavasu |
|
Vol 18, No 4 (2017) |
Formal Analysis on RFID Authentication Protocols Against De- Synchronization Attack |
Abstract
|
Kuo-Hui Yeh, Nai-Wei Lo, Ren-Zong Kuo, Chunhua Su, Hsuan-Yu Chen |
|
1351 - 1375 of 2657 Items |
<< < 50 51 52 53 54 55 56 57 58 59 > >> |