|
Issue |
Title |
|
Vol 23, No 5 (2022) |
Flow Entry Timeouts Optimization over Software Defined Networks Supporting Elephant Flow Classification |
Abstract
|
Changqing Zhao, Ling Xia Liao, Han-Chieh Chao, Roy Xiaorong Lai, Miao Zhang |
|
Vol 24, No 7 (2023) |
Flow Table Overflow Attacks in Software Defined Networks: A Survey |
Abstract
|
Changqing Zhao, Ling Xia Liao, Han-Chieh Chao, Roy Xiaorong Lai, Miao Zhang |
|
Vol 16, No 7 (2015) |
Fluid Flow Approximation of the Mean Buffer Occupancy in a Packet-Speech Multiplexer |
Abstract
|
Branimir Trenkić, Dragan Mitić, Aleksandar Lebl, Žarko Markov |
|
Vol 7, No 4 (2006) |
Focus Based Resource-Aware Semantic Transcoding for Universal Access |
Abstract
|
Shiow-Yang Wu, Chun-Hsiung Huang |
|
Vol 19, No 1 (2018) |
Fog Computing Service Orchestration Mechanisms for 5G Networks |
Abstract
PDF
|
Stojan Kitanov, Toni Janevski |
|
Vol 23, No 2 (2022) |
Fog Managed Data Model for IoT based Healthcare Systems |
Abstract
PDF
|
Benila S., Usha Bhanu N. |
|
Vol 23, No 5 (2022) |
Forest Fire Recognition Based on Lightweight Convolutional Neural Network |
Abstract
|
Zhixiang Li, Hongbin Jiang, Qixiang Mei, Zhao Li |
|
Vol 18, No 4 (2017) |
Foreword: Special Issue for ICSEC 2015 |
Abstract
|
Manju Khari, Sheng-Lung Peng, Kosin Chamnongthai |
|
Vol 18, No 7 (2017) |
Foreword: Special Issue for JCSSE 2016 |
Abstract
|
Brojo Kishore Mishra, Sheng-Lung Peng, Sartra Wongthanavasu |
|
Vol 18, No 4 (2017) |
Formal Analysis on RFID Authentication Protocols Against De- Synchronization Attack |
Abstract
|
Kuo-Hui Yeh, Nai-Wei Lo, Ren-Zong Kuo, Chunhua Su, Hsuan-Yu Chen |
|
Vol 7, No 1 (2006) |
Formal Specification of the Intrusion-Tolerant System by Using Object-Z |
Abstract
|
Yuan-Bo Guo, Jian-Feng Ma, Huan-Guo Zhang |
|
Vol 18, No 5 (2017) |
Formally Modeling and Analyzing the Adaptive Resource Management for Cloud Applications |
Abstract
|
Liqiong Chen, Guisheng Fan, Huiqun Yu |
|
Vol 12, No 1 (2011) |
FR: A Novel Strategy to Improve Item-Oriented Collaborative Filtering |
Abstract
|
Xin Luo, Yuan-Xin Ouyang, Zhang Xiong |
|
Vol 24, No 3 (2023) |
Framework of Interaction Design Method Based on Blockchain System |
Abstract
PDF
|
Chao Ma, Faren Huo, Aiqin Shi |
|
Vol 11, No 3 (2010) |
Fraud Detection for Information Reliability from the Internet in Forensic Accounting |
Abstract
|
Yeog Kim, Sang Jin Lee, Jong In Lim |
|
Vol 20, No 6 (2019) |
From Attribution Theory and IS Success Aspects, Examining How and Why Nostalgia Affects the Introduction of a New IT System |
Abstract
PDF
|
Su-Tzu Hsieh |
|
Vol 12, No 3 (2011) |
From Large-Scale Systems to Cyber-Physical Systems |
Abstract
|
Mo Jamshidi |
|
Vol 18, No 7 (2017) |
FullDOSC: An Implementation of SDIPC for Embedded System |
Abstract
|
Pasakorn Tongsan, Korakit Seemakhupt, Krerk Piromsopa |
|
Vol 12, No 2 (2011) |
Function Assessment of Online Game Websites in Great China Area |
Abstract
|
Chi-I Hsu, Chih Hua Su |
|
Vol 19, No 4 (2018) |
Further Analysis on Smart TV Forensics |
Abstract
PDF
|
Minsu Park, Heesoo Kang, Seungsoo Baek, Seungjoo Kim |
|
Vol 23, No 4 (2022) |
Fusing Dual Geo-Social Relationship and Deep Implicit Interest Topic Similarity for POI Recommendation |
Abstract
PDF
|
Lin Cui, Caiyin Wang, Zhiwei Zhang, Xiaoyong Yu, Fanghui Zha |
|
Vol 12, No 6 (2011) |
Fuzzy Based Approach for P2P File Sharing Detection |
Abstract
|
Jian-Bo Chen |
|
Vol 21, No 3 (2020) |
Fuzzy Clustering Algorithm for Interval Data Based on Feedback RBF Neural Network |
Abstract
PDF
|
Hao Luo, Qing Hou, Yang Liu, Li Zhang, Yuanzhi Li |
|
Vol 13, No 6 (2012) |
Fuzzy Clustering and Visualization of Information for Web Search Results |
Abstract
|
Faraz Zaidi |
|
Vol 19, No 3 (2018) |
Fuzzy Decision Load-balancing Algorithm for Cloud-based Terminal Services |
Abstract
PDF
|
Hsin-Hung Chen, Li-Shing Huang, Jian-Bo Chen, Tsang-Long Pao |
|
1376 - 1400 of 2669 Items |
<< < 51 52 53 54 55 56 57 58 59 60 > >> |