|
Issue |
Title |
|
Vol 16, No 7 (2015) |
Non-Local Regularized Variational Model for Image Deblurring under Mixed Gaussian-Impulse Noise |
Abstract
|
Chenyang Zhang, Di Wu, Ryan Wen Liu, Naixue Xiong |
|
Vol 18, No 7 (2017) |
No-Reference Image Quality Assessment for Multiple Distortions Using Saliency Map Based on Dual-Convolutional Neural Networks |
Abstract
|
Jian-Jun Li, Lan-Lan Xu, Zhi-Hui Wang, Chin-Chen Chang |
|
Vol 17, No 7 (2016) |
Novel Application of Fuzzy Multi-Objective Linear Programming to Components Designed for Game or Animation Characters |
Abstract
|
Yih-Jou Tzang, Ting-Yun Chi, Hong-Yi Chang, Chih-Hsuan Tzang, Chun-Yen Huang |
|
Vol 20, No 4 (2019) |
Novel Attack Tree Analysis Scheme to Assess the Security Risks on the Cloud Platform |
Abstract
PDF
|
Shin-Jer Yang, Ya-Hui Yeh |
|
Vol 20, No 7 (2019) |
Novel Attacks and Novel Efficient Three-Party Authenticated Key Agreement Schemes for Resource-limited Devices |
Abstract
PDF
|
Hung-Yu Chien |
|
Vol 22, No 4 (2021) |
Novel Data Fusion Scheme of WBAN for Medical Monitoring |
Abstract
PDF
|
Jian Yan, Qingxu Deng, Guangjie Han, Yuhan Lin |
|
Vol 20, No 5 (2019) |
Novel Dynamic KNN with Adaptive Weighting Mechanism for Beacon-based Indoor Positioning System |
Abstract
PDF
|
Chong-Yi Yang, Yi-Wei Ma, Jiann-Liang Chen, Chia-Ju Lin, Wei-Lun Lee |
|
Vol 7, No 1 (2006) |
Novel On-line Game Rating System of Go |
Abstract
|
Shi-Jim Yen, Tai-Ning Yang, Wen-Pin Chen |
|
Vol 17, No 7 (2016) |
Novel Sensor Selection Technique for Moving Object Tracking Based on Pre-Defined Division Structure in Wireless Sensor Network |
Abstract
|
Jine Tang, Haiqin Wu, Zhangbing Zhou, Liangmin Wang |
|
Vol 16, No 6 (2015) |
NSVM: A New SVM Algorithm Based on Traffic Flow Metric |
Abstract
|
Shi Dong, Wei Liu, Ding-Ding Zhou, Ying-Chun Qi |
|
Vol 6, No 4 (2005) |
Object-Oriented Analysis and Design: Transformation from Class Diagram to Relational Table and Application Template |
Abstract
|
Jen-Her Wu, Yen-Chieh Huang, Shin-Shing Shin |
|
Vol 18, No 1 (2017) |
Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing |
Abstract
|
Jung-San Lee, Bo Li, Bo-Ruei Huang |
|
Vol 17, No 4 (2016) |
Obstacle Avoidance System for Wheeled Mobile Robots by CMOS Image Sensors |
Abstract
|
Pu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu, Jen-Yang Chen |
|
Vol 16, No 7 (2015) |
Obtaining Evidence Model of an Expert System Based on Machine Learning in Cloud Environment |
Abstract
|
Chen Guo, Yuelan Liu, Ming Huang |
|
Vol 14, No 3 (2013) |
OEEABed-Online Distributed Energy Efficiency Analysis Testbed and Novel Monitoring Approach under Wireless Sensor Network |
Abstract
|
Bin Li, Bing Qi, Jian Yang, Yi Sun, Wei-Xin Cui, Hua-Guang Yan |
|
Vol 12, No 5 (2011) |
OH-MAP: Using DHT to Map Identifiers onto Locators in One Hop |
Abstract
|
Heng-Kui Wu, De-Yun Gao, Hong-Ke Zhang |
|
Vol 16, No 1 (2015) |
Old Tree Pilgrimage - A Mobile Application Combined with Cultural Landscape |
Abstract
|
Rung-Shiang Cheng, Lee-Wei Chang, Ting-Wei Hou |
|
Vol 7, No 3 (2006) |
On AP Buffer Effect upon TCP Fairness over WLAN |
Abstract
|
Feng Liang, Xiao-Yuan Wang, Lei Xu |
|
Vol 16, No 2 (2015) |
On Bandwidth-Rich and High-Efficient Cloud Transport Networks |
Abstract
|
Li-Mei Peng, Long Hu |
|
Vol 16, No 7 (2015) |
On Campus IPv6 Beta Site: Requirements, Solutions, and Product Defect Evaluation |
Abstract
|
Ying-Dar Lin, Ren-Hung Hwang, Raghavendra Kulkarni, Chinyang Henry Tseng, Chun-Hung Hsu |
|
Vol 10, No 3 (2009) |
On Centralized Scheduling and Channel Assignment Scheme for WiMAX Mesh Networks |
Abstract
|
Yu-Liang Tang, Rung-Shiang Cheng, Tin-Yu Wu, Jian-Ping Yu |
|
Vol 21, No 4 (2020) |
On Deep Learning Models for Detection of Thunderstorm Gale |
Abstract
PDF
|
Yan Li, Haifeng Li, Xutao Li, Xian Li, Pengfei Xie |
|
Vol 16, No 4 (2015) |
On Exploiting Trustors in Trust-Based Recommendation |
Abstract
|
Won-Seok Hwang, Shao-Yu Li, Sang-Wook Kim, Ho Jin Choi |
|
Vol 21, No 4 (2020) |
On Phalanx Graph Search Number |
Abstract
PDF
|
Ondřej Navrátil, Sanpawat Kantabutra, Sheng-Lung Peng |
|
Vol 14, No 3 (2013) |
On the Composability of Statistically Secure Bit Commitments |
Abstract
|
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento |
|
1851 - 1875 of 2657 Items |
<< < 70 71 72 73 74 75 76 77 78 79 > >> |