|
Issue |
Title |
|
Vol 19, No 1 (2018) |
Fingerprint Liveness Detection Adapted to Different Fingerprint Sensors Based on Multiscale Wavelet Transform and Rotation-Invarient Local Binary Pattern |
Abstract
PDF
|
Chengsheng Yuan, Xingming Sun |
|
Vol 19, No 5 (2018) |
Fingerprint Liveness Detection Using Histogram of Oriented Gradient Based Texture Feature |
Abstract
PDF
|
Chengsheng Yuan, Xingming Sun |
|
Vol 11, No 4 (2010) |
FIRST: Korean Future Internet Testbed for Media-Oriented Service Overlay Network Architecture |
Abstract
|
Sung-Won Lee, Sang-Woo Han, Jong-Won Kim, Seung-Gwan Lee |
|
Vol 23, No 6 (2022) |
Fish Migration Optimization with Dynamic Grouping Strategy for Solving Job-Shop Scheduling Problem |
Abstract
PDF
|
Qingyong Yang, Shu-Chuan Chu, Chia-Cheng Hu, Jimmy Ming-Tai Wu, Jeng-Shyang Pan |
|
Vol 17, No 2 (2016) |
FiT-PA: Fixed Scale FFT Based Privacy Amplification Algorithm for Quantum Key Distribution |
Abstract
|
Bo Liu, Bao-Kang Zhao, Wan-Rong Yu, Chun-Qing Wu |
|
Vol 24, No 4 (2023) |
Five Phases Algorithm: A Novel Meta-heuristic Algorithm and Its Application on Economic Load Dispatch Problem |
Abstract
|
Xiaopeng Wang, Shu-Chuan Chu, Václav Snášel, Hisham A. Shehadeh, Jeng-Shyang Pan |
|
Vol 22, No 1 (2021) |
Flexible Resource-constrained Discrete Time-cost Trade-off Problem Considering Resource Transfer |
Abstract
PDF
|
Haobo Zou, Guohua Zhou |
|
Vol 23, No 5 (2022) |
Flow Entry Timeouts Optimization over Software Defined Networks Supporting Elephant Flow Classification |
Abstract
|
Changqing Zhao, Ling Xia Liao, Han-Chieh Chao, Roy Xiaorong Lai, Miao Zhang |
|
Vol 24, No 7 (2023) |
Flow Table Overflow Attacks in Software Defined Networks: A Survey |
Abstract
|
Changqing Zhao, Ling Xia Liao, Han-Chieh Chao, Roy Xiaorong Lai, Miao Zhang |
|
Vol 16, No 7 (2015) |
Fluid Flow Approximation of the Mean Buffer Occupancy in a Packet-Speech Multiplexer |
Abstract
|
Branimir Trenkić, Dragan Mitić, Aleksandar Lebl, Žarko Markov |
|
Vol 7, No 4 (2006) |
Focus Based Resource-Aware Semantic Transcoding for Universal Access |
Abstract
|
Shiow-Yang Wu, Chun-Hsiung Huang |
|
Vol 19, No 1 (2018) |
Fog Computing Service Orchestration Mechanisms for 5G Networks |
Abstract
PDF
|
Stojan Kitanov, Toni Janevski |
|
Vol 23, No 2 (2022) |
Fog Managed Data Model for IoT based Healthcare Systems |
Abstract
PDF
|
Benila S., Usha Bhanu N. |
|
Vol 23, No 5 (2022) |
Forest Fire Recognition Based on Lightweight Convolutional Neural Network |
Abstract
|
Zhixiang Li, Hongbin Jiang, Qixiang Mei, Zhao Li |
|
Vol 18, No 4 (2017) |
Foreword: Special Issue for ICSEC 2015 |
Abstract
|
Manju Khari, Sheng-Lung Peng, Kosin Chamnongthai |
|
Vol 18, No 7 (2017) |
Foreword: Special Issue for JCSSE 2016 |
Abstract
|
Brojo Kishore Mishra, Sheng-Lung Peng, Sartra Wongthanavasu |
|
Vol 18, No 4 (2017) |
Formal Analysis on RFID Authentication Protocols Against De- Synchronization Attack |
Abstract
|
Kuo-Hui Yeh, Nai-Wei Lo, Ren-Zong Kuo, Chunhua Su, Hsuan-Yu Chen |
|
Vol 7, No 1 (2006) |
Formal Specification of the Intrusion-Tolerant System by Using Object-Z |
Abstract
|
Yuan-Bo Guo, Jian-Feng Ma, Huan-Guo Zhang |
|
Vol 18, No 5 (2017) |
Formally Modeling and Analyzing the Adaptive Resource Management for Cloud Applications |
Abstract
|
Liqiong Chen, Guisheng Fan, Huiqun Yu |
|
Vol 12, No 1 (2011) |
FR: A Novel Strategy to Improve Item-Oriented Collaborative Filtering |
Abstract
|
Xin Luo, Yuan-Xin Ouyang, Zhang Xiong |
|
Vol 24, No 3 (2023) |
Framework of Interaction Design Method Based on Blockchain System |
Abstract
PDF
|
Chao Ma, Faren Huo, Aiqin Shi |
|
Vol 11, No 3 (2010) |
Fraud Detection for Information Reliability from the Internet in Forensic Accounting |
Abstract
|
Yeog Kim, Sang Jin Lee, Jong In Lim |
|
Vol 20, No 6 (2019) |
From Attribution Theory and IS Success Aspects, Examining How and Why Nostalgia Affects the Introduction of a New IT System |
Abstract
PDF
|
Su-Tzu Hsieh |
|
Vol 12, No 3 (2011) |
From Large-Scale Systems to Cyber-Physical Systems |
Abstract
|
Mo Jamshidi |
|
Vol 18, No 7 (2017) |
FullDOSC: An Implementation of SDIPC for Embedded System |
Abstract
|
Pasakorn Tongsan, Korakit Seemakhupt, Krerk Piromsopa |
|
1376 - 1400 of 2683 Items |
<< < 51 52 53 54 55 56 57 58 59 60 > >> |