| Issue | Title | |
| Vol 19, No 5 (2018) | Label Model Based Coverless Information Hiding Method | Abstract PDF |
| Zhangjie Fu, Hongyong Ji, Yong Ding | ||
| Vol 14, No 2 (2013) | Labeling Blog Posts with Wikipedia Entries through LDA-Based Topic Modeling of Wikipedia | Abstract |
| Kensaku Makita, Hiroko Suzuki, Daichi Koike, Takehito Utsuro, Yasuhide Kawada, Tomohiro Fukuhara | ||
| Vol 18, No 7 (2017) | LARB-Alpha: A Quantitative Study of Location-Aware Reliable Broadcasting Protocol in VANET | Abstract |
| Nattakan Pramuanyat, Kulit Na Nakorn, Kiattikun Kawila, Kultida Rojviboonchai | ||
| Vol 14, No 6 (2013) | Large-Scale IP Network Flow-Level Abnormal Behavior Trends Analysis Using Combined Anomaly Grey Forecasting Algorithm | Abstract |
| Wei-Song He, Rui Dai, Guang-Min Hu | ||
| Vol 20, No 5 (2019) | Lattice-based Fuzzy Conditional Proxy Re-encryption | Abstract PDF |
| BaoHong Li, JieFei Xu, YanZhi Liu | ||
| Vol 1, No 2 (2000) | Laws of Computing: a View from Forth | Abstract |
| Tak-Goa Tsuei, C.H. Ting, Han-Chieh Chao | ||
| Vol 14, No 7 (2013) | LC-CloudTV: A Low-Cost Cloud-Based IPTV Platform with SVC Technology | Abstract |
| Hong-Yi Chang | ||
| Vol 20, No 6 (2019) | LCRec: Learning Content Recommendation (Wiki-based Skill Book) | Abstract PDF |
| Chalothon Chootong, Timothy K. Shih, Ankhtuya Ochirbat, Worapot Sommool, W. K. T. M. Gunarathne, Carl K. Chang | ||
| Vol 26, No 1 (2025) | Learning Based Patch Overfitting Detection: A Survey | Abstract |
| Xuanyan Li, Dongcheng Li, Man Zhao, W. Eric Wong, Hui Li | ||
| Vol 18, No 7 (2017) | Learning Discriminative Sentiment Chunk Vectors for Twitter Sentiment Analysis | Abstract |
| Leiming Yan, Wenying Zheng, Huajie (Harry) Zhang, Hao Tao, Ming He | ||
| Vol 21, No 2 (2020) | Learning with Concept Drift Detection based on Sub-concepts from k Time Sub Windows | Abstract PDF |
| Li Liu, Nathalie Japkowicz, Dan Tao, Zhen Liu | ||
| Vol 17, No 1 (2016) | Least Popularly Used: A Cache Replacement Policy for Information-Centric Networking | Abstract |
| Bohao Feng, Hua-Chun Zhou, Guang-Lei Li, Hong-Ke Zhang, Han-Chieh Chao | ||
| Vol 9, No 3 (2008) | Lecture Structure via Automatic Item Classification | Abstract |
| Chun-Wei Tsai, Chi-Hui Feng, Po-Jen Chuang, Ming-Chao Chiang, Chu-Sing Yang | ||
| Vol 18, No 2 (2017) | Legislative Technical Safeguards regarding Personal Data in Cybersecurity: The US and EU Approaches and Protection Networks | Abstract |
| Chinhsien Sung | ||
| Vol 23, No 3 (2022) | LighterKGCN: A Recommender System Model Based on Bi-layer Graph Convolutional Networks | Abstract PDF |
| Peng Chen, Jiancheng Zhao, Xiaosheng Yu | ||
| Vol 24, No 5 (2023) | Lightweight and Anonymous Group Authentication Scheme Based on PUF in the Smart Grid | Abstract |
| Yang Zhou, Bing Yang, Dengzhi Liu | ||
| Vol 19, No 7 (2018) | Lightweight Certificateless Two-Factor Authentication Protocol Using Smart Cards | Abstract PDF |
| Wenying Zheng, Ziyuan Gui, Dengzhi Liu, Xiong Li, Bing Chen | ||
| Vol 25, No 7 (2024) | Lightweight CNN Architecture for IoT: Enhancing Character Recognition in Multiple Fonts | Abstract |
| Chung-Hsing Chen, Ko-Wei Huang | ||
| Vol 25, No 5 (2024) | Lightweight Deep Learning Algorithm for Sorting Medical Waste Embedded System | Abstract |
| Y. S. Gan, Yuan-Zhi Liu, Bo-Cheng Tseng, Gen-Bing Liong, Sze-Teng Liong | ||
| Vol 20, No 3 (2019) | Lightweight, Low-Rate Denial-of-Service Attack Prevention and Control Program for IoT Devices | Abstract PDF |
| Chi-Che Wu, Rung-Shiang Cheng, Chiung-Wen Hsu, Li-Wei Wu | ||
| Vol 19, No 6 (2018) | Limited-length Suffix-array-based Method for Variable-length Motif Discovery in Time Series | Abstract PDF |
| Le Sun, Jinyuan He, Jiangang Ma, Hai Dong, Yanchun Zhang | ||
| Vol 22, No 5 (2021) | Linear and Lossy Identification Schemes Derive Tightly Secure Multisignatures | Abstract PDF |
| Masayuki Fukumitsu, Shingo Hasegawa | ||
| Vol 18, No 1 (2017) | Link Importance Evaluation of Data Center Network Based on Maximum Flow | Abstract |
| Kai Peng, Rongheng Lin, Binbin Huang, Hua Zou, Fangchun Yang | ||
| Vol 11, No 2 (2010) | Live Information Discovery of the P2P Instant Messaging Based on Skype's Finger Printing | Abstract |
| Hai-Cheng Chu, Whe Dar Lin | ||
| Vol 3, No 4 (2002) | Load Balancing and Fault Tolerance in a Condensed Graphs based Metacomputer | Abstract |
| John P. Morrison, James J. Kennedy, David A. Power | ||
| 1726 - 1750 of 2743 Items | << < 65 66 67 68 69 70 71 72 73 74 > >> | |
