|
Issue |
Title |
|
Vol 3, No 2 (2002) |
Knowledge-Based Call Admission Control with Bandwidth Reallocation in Wireless Multimedia Networks |
Abstract
|
鍾順平(Shun-Ping Chung), 李金漳(Jin-Chang Lee) |
|
Vol 12, No 1 (2011) |
Kurihara Green ICT Project-Towards Symbiosis between Human's Life and Nature |
Abstract
|
Norio Shiratori, Kazuo Hashimoto, Debasish Chakraborty, Hideyuki Takahashi, Takuo Suganuma, Naoki Nakamura, Atushi Takeda |
|
Vol 19, No 5 (2018) |
Label Model Based Coverless Information Hiding Method |
Abstract
PDF
|
Zhangjie Fu, Hongyong Ji, Yong Ding |
|
Vol 14, No 2 (2013) |
Labeling Blog Posts with Wikipedia Entries through LDA-Based Topic Modeling of Wikipedia |
Abstract
|
Kensaku Makita, Hiroko Suzuki, Daichi Koike, Takehito Utsuro, Yasuhide Kawada, Tomohiro Fukuhara |
|
Vol 18, No 7 (2017) |
LARB-Alpha: A Quantitative Study of Location-Aware Reliable Broadcasting Protocol in VANET |
Abstract
|
Nattakan Pramuanyat, Kulit Na Nakorn, Kiattikun Kawila, Kultida Rojviboonchai |
|
Vol 14, No 6 (2013) |
Large-Scale IP Network Flow-Level Abnormal Behavior Trends Analysis Using Combined Anomaly Grey Forecasting Algorithm |
Abstract
|
Wei-Song He, Rui Dai, Guang-Min Hu |
|
Vol 20, No 5 (2019) |
Lattice-based Fuzzy Conditional Proxy Re-encryption |
Abstract
PDF
|
BaoHong Li, JieFei Xu, YanZhi Liu |
|
Vol 1, No 2 (2000) |
Laws of Computing: a View from Forth |
Abstract
|
Tak-Goa Tsuei, C.H. Ting, Han-Chieh Chao |
|
Vol 14, No 7 (2013) |
LC-CloudTV: A Low-Cost Cloud-Based IPTV Platform with SVC Technology |
Abstract
|
Hong-Yi Chang |
|
Vol 20, No 6 (2019) |
LCRec: Learning Content Recommendation (Wiki-based Skill Book) |
Abstract
PDF
|
Chalothon Chootong, Timothy K. Shih, Ankhtuya Ochirbat, Worapot Sommool, W. K. T. M. Gunarathne, Carl K. Chang |
|
Vol 26, No 1 (2025) |
Learning Based Patch Overfitting Detection: A Survey |
Abstract
|
Xuanyan Li, Dongcheng Li, Man Zhao, W. Eric Wong, Hui Li |
|
Vol 18, No 7 (2017) |
Learning Discriminative Sentiment Chunk Vectors for Twitter Sentiment Analysis |
Abstract
|
Leiming Yan, Wenying Zheng, Huajie (Harry) Zhang, Hao Tao, Ming He |
|
Vol 21, No 2 (2020) |
Learning with Concept Drift Detection based on Sub-concepts from k Time Sub Windows |
Abstract
PDF
|
Li Liu, Nathalie Japkowicz, Dan Tao, Zhen Liu |
|
Vol 17, No 1 (2016) |
Least Popularly Used: A Cache Replacement Policy for Information-Centric Networking |
Abstract
|
Bohao Feng, Hua-Chun Zhou, Guang-Lei Li, Hong-Ke Zhang, Han-Chieh Chao |
|
Vol 9, No 3 (2008) |
Lecture Structure via Automatic Item Classification |
Abstract
|
Chun-Wei Tsai, Chi-Hui Feng, Po-Jen Chuang, Ming-Chao Chiang, Chu-Sing Yang |
|
Vol 18, No 2 (2017) |
Legislative Technical Safeguards regarding Personal Data in Cybersecurity: The US and EU Approaches and Protection Networks |
Abstract
|
Chinhsien Sung |
|
Vol 23, No 3 (2022) |
LighterKGCN: A Recommender System Model Based on Bi-layer Graph Convolutional Networks |
Abstract
PDF
|
Peng Chen, Jiancheng Zhao, Xiaosheng Yu |
|
Vol 24, No 5 (2023) |
Lightweight and Anonymous Group Authentication Scheme Based on PUF in the Smart Grid |
Abstract
|
Yang Zhou, Bing Yang, Dengzhi Liu |
|
Vol 19, No 7 (2018) |
Lightweight Certificateless Two-Factor Authentication Protocol Using Smart Cards |
Abstract
PDF
|
Wenying Zheng, Ziyuan Gui, Dengzhi Liu, Xiong Li, Bing Chen |
|
Vol 25, No 7 (2024) |
Lightweight CNN Architecture for IoT: Enhancing Character Recognition in Multiple Fonts |
Abstract
|
Chung-Hsing Chen, Ko-Wei Huang |
|
Vol 25, No 5 (2024) |
Lightweight Deep Learning Algorithm for Sorting Medical Waste Embedded System |
Abstract
|
Y. S. Gan, Yuan-Zhi Liu, Bo-Cheng Tseng, Gen-Bing Liong, Sze-Teng Liong |
|
Vol 20, No 3 (2019) |
Lightweight, Low-Rate Denial-of-Service Attack Prevention and Control Program for IoT Devices |
Abstract
PDF
|
Chi-Che Wu, Rung-Shiang Cheng, Chiung-Wen Hsu, Li-Wei Wu |
|
Vol 19, No 6 (2018) |
Limited-length Suffix-array-based Method for Variable-length Motif Discovery in Time Series |
Abstract
PDF
|
Le Sun, Jinyuan He, Jiangang Ma, Hai Dong, Yanchun Zhang |
|
Vol 22, No 5 (2021) |
Linear and Lossy Identification Schemes Derive Tightly Secure Multisignatures |
Abstract
PDF
|
Masayuki Fukumitsu, Shingo Hasegawa |
|
Vol 18, No 1 (2017) |
Link Importance Evaluation of Data Center Network Based on Maximum Flow |
Abstract
|
Kai Peng, Rongheng Lin, Binbin Huang, Hua Zou, Fangchun Yang |
|
1676 - 1700 of 2669 Items |
<< < 63 64 65 66 67 68 69 70 71 72 > >> |