| Issue | Title | |
| Vol 17, No 5 (2016) | A Hybrid Learning Algorithm for Generating Multi-Agent Daily Activity Plans | Abstract |
| Tai-Yu Ma, Philippe Gerber | ||
| Vol 18, No 6 (2017) | A Hybrid Learning System to Mitigate Botnet Concept Drift Attacks | Abstract |
| Zhi Wang, Meiqi Tian, Xiao Zhang, Junnan Wang, Zheli Liu, Chunfu Jia, Ilsun You | ||
| Vol 13, No 6 (2012) | A Hybrid Message Delivery Scheme for Improving Service Discovery in Mobile Ad-Hoc Networks | Abstract |
| Eun Young Kang, Heemin Park, Jinseok Chae | ||
| Vol 22, No 5 (2021) | A Hybrid Method of Heuristic Algorithm and Constraint Programming for No-wait Integrated Scheduling Problem | Abstract PDF |
| Zhiqiang Xie, Xiaowei Zhang, Yingchun Xia, Jing Yang, Yu Xin | ||
| Vol 16, No 5 (2015) | A Hybrid Partitioning Based Parallel Ontology Reasoning Approach | Abstract |
| Luo-Kai Hu, Nai-Xue Xiong, Chao Liang, Jin Liu | ||
| Vol 3, No 4 (2002) | A Java Web-based Multichannel Architecture for Distributed System Monitoring | Abstract |
| Fabrizio Lamberti, Andrea Sanna | ||
| Vol 21, No 1 (2020) | A Joint Iterative Quantization and Channel Estimation Scheme for One-Bit Massive MIMO Systems | Abstract PDF |
| Shuhui Zhong, Ziwei Zheng | ||
| Vol 17, No 3 (2016) | A Kansei Image Survey System Based on Shopping Channel’s Differences | Abstract |
| Chen-I Huang, Shing-Sheng Guan | ||
| Vol 13, No 2 (2012) | A Key Management Scheme for Security and Energy Efficiency in Sensor Networks | Abstract |
| Hye-Young Kim, Chang-Hoon Lee | ||
| Vol 24, No 6 (2023) | A k-hop Constrained Reachability Based Proactive Connectivity Maintaining Mechanism of UAV Swarm Networks | Abstract |
| Huibin Wang, Ming Chen, Xianglin Wei | ||
| Vol 24, No 6 (2023) | A Knowledge Graph Construction Method for Software Project Based on CAJP | Abstract |
| Yang Deng, Bangchao Wang, Zhongyuan Hua, Yong Xiao, Xingfu Li | ||
| Vol 17, No 3 (2016) | A Leading Indicator of Post-Release Defect Density in Refactoring-Based Software Maintenance: A Case Study | Abstract |
| Yu Chin Cheng, Jung-Sing Jwo, Ching-Tsorng Tsai | ||
| Vol 20, No 2 (2019) | A Life Extend Approach Based on Multiple Priority Queue N Strategy for Wireless Sensor Network | Abstract PDF |
| Der-Chen Huang, Ying-Yi Chu, Wei-Ming Chen | ||
| Vol 21, No 1 (2020) | A Lightweight Authentication and Key Agreement Scheme for Telecare Medicine Information System | Abstract PDF |
| Jung-Wen Lo, Chun-Yueh Wu, Shu-Fen Chiou | ||
| Vol 25, No 4 (2024) | A Lightweight Bilateral Left Ventricle Segmentation Method for Echocardiography | Abstract |
| Zi Ye, Dan Wang, Lijun Zhang | ||
| Vol 16, No 5 (2015) | A Light-Weight Linear Network Coding Cipher Model Based on Cloud Computing for Collaborative Wireless Sensor Networks | Abstract |
| Hai-Feng Lin, Di Bai, Anna Jiang, Yun-Fei Liu | ||
| Vol 26, No 3 (2025) | A Lightweight Pedestrian Tracking Target Detection Algorithm | Abstract |
| Miao Jin, Tianfu Huang, Chuning Peng, Xiwen Chen, Yanli Zhang | ||
| Vol 24, No 4 (2023) | A Lightweight Privacy-preserving Path Selection Scheme in VANETs | Abstract |
| Guojun Wang, Huijie Yang | ||
| Vol 26, No 3 (2025) | A Lightweight Small Object Detection Method for Birds Nest on Electric Tower Based on Attention Mechanism | Abstract |
| Jian Xu, Lei Lv, Ying Zhang, Xu Dai, Yaoran Huo | ||
| Vol 16, No 6 (2015) | A Link Prediction Algorithm that Solves the Data Sparsity Problem in Service QoS Prediction | Abstract |
| Meina Song, Haihong E, Jun-Jie Tong | ||
| Vol 19, No 1 (2018) | A List-wise Matrix Factorization Based POI Recommendation by Fusing Multi-Tag, Social and Geographical Influences | Abstract PDF |
| Zhiyuan Zhang, Yun Liu | ||
| Vol 6, No 1 (2005) | A Load-Balanced Multicast Protocol for Complete Exchange on Mobile Ad-Hoc Networks | Abstract |
| Kuei-Ping Shih, Sheng-Shih Wang, Sheng-Wei Lai | ||
| Vol 11, No 2 (2010) | A Loosely Coupled Interactive Web Data Extraction System | Abstract |
| Jui-Yuan Su, Lung-Pin Chen, I-Chen Wu | ||
| Vol 18, No 6 (2017) | A Lossless Data Hiding Scheme Based on VQ Index Frequency | Abstract |
| Junlan Bai, Chin-Chen Chang, Ce Zhu | ||
| Vol 5, No 3 (2004) | A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ | Abstract |
| Ren-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao | ||
| 151 - 175 of 2720 Items | << < 2 3 4 5 6 7 8 9 10 11 > >> | |
