|
Issue |
Title |
|
Vol 14, No 3 (2013) |
OEEABed-Online Distributed Energy Efficiency Analysis Testbed and Novel Monitoring Approach under Wireless Sensor Network |
Abstract
|
Bin Li, Bing Qi, Jian Yang, Yi Sun, Wei-Xin Cui, Hua-Guang Yan |
|
Vol 12, No 5 (2011) |
OH-MAP: Using DHT to Map Identifiers onto Locators in One Hop |
Abstract
|
Heng-Kui Wu, De-Yun Gao, Hong-Ke Zhang |
|
Vol 16, No 1 (2015) |
Old Tree Pilgrimage - A Mobile Application Combined with Cultural Landscape |
Abstract
|
Rung-Shiang Cheng, Lee-Wei Chang, Ting-Wei Hou |
|
Vol 7, No 3 (2006) |
On AP Buffer Effect upon TCP Fairness over WLAN |
Abstract
|
Feng Liang, Xiao-Yuan Wang, Lei Xu |
|
Vol 16, No 2 (2015) |
On Bandwidth-Rich and High-Efficient Cloud Transport Networks |
Abstract
|
Li-Mei Peng, Long Hu |
|
Vol 16, No 7 (2015) |
On Campus IPv6 Beta Site: Requirements, Solutions, and Product Defect Evaluation |
Abstract
|
Ying-Dar Lin, Ren-Hung Hwang, Raghavendra Kulkarni, Chinyang Henry Tseng, Chun-Hung Hsu |
|
Vol 10, No 3 (2009) |
On Centralized Scheduling and Channel Assignment Scheme for WiMAX Mesh Networks |
Abstract
|
Yu-Liang Tang, Rung-Shiang Cheng, Tin-Yu Wu, Jian-Ping Yu |
|
Vol 21, No 4 (2020) |
On Deep Learning Models for Detection of Thunderstorm Gale |
Abstract
PDF
|
Yan Li, Haifeng Li, Xutao Li, Xian Li, Pengfei Xie |
|
Vol 16, No 4 (2015) |
On Exploiting Trustors in Trust-Based Recommendation |
Abstract
|
Won-Seok Hwang, Shao-Yu Li, Sang-Wook Kim, Ho Jin Choi |
|
Vol 21, No 4 (2020) |
On Phalanx Graph Search Number |
Abstract
PDF
|
Ondřej Navrátil, Sanpawat Kantabutra, Sheng-Lung Peng |
|
Vol 14, No 3 (2013) |
On the Composability of Statistically Secure Bit Commitments |
Abstract
|
Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento |
|
Vol 22, No 4 (2021) |
On the Distributed Trigger Counting Problem for Dynamic Networks |
Abstract
PDF
|
Che-Cheng Chang, Jichiang Tsai, Tien-Yu Chang |
|
Vol 12, No 3 (2011) |
On the Effect of Link Break Problem on Routing Protocols in Wireless Ad Hoc Networks |
Abstract
|
Ying-Kwei Ho, Ching-Chuan Chiang, Ru-Sheng Liu, Yao-Pin Tsai |
|
Vol 11, No 6 (2010) |
On the Existence of Short Certificateless Signatures |
Abstract
|
Kyung-Ah Shim, Young-Ran Lee |
|
Vol 24, No 2 (2023) |
On The Impossibility of Providing Strong Anonymity in Blockchains via Linkable Ring Signatures |
Abstract
PDF
|
Huang Zhang, Fangguo Zhang, Ke Gu |
|
Vol 22, No 2 (2021) |
On the Retention Rate of Top Talkers for Sampled NetFlow |
Abstract
PDF
|
Shou-Chuan Lai, Jo-Chuan Cheng, Yu-Hsiu Chuang |
|
Vol 16, No 7 (2015) |
On the Security of a Proxy Ring Signature with Revocable Anonymity |
Abstract
|
Jianhong Zhang, Pengyan Li |
|
Vol 19, No 7 (2018) |
On the Security of an Improved Identity-based Proxy Signature Scheme without Random Oracles |
Abstract
PDF
|
Caixue Zhou, Zongmin Cui, Guangyong Gao |
|
Vol 23, No 4 (2022) |
On the Simulation of Communication Protocols with Multiple Mobile Nodes |
Abstract
PDF
|
Yuping Li, Sa Meng, Yilin Zhang, Ke Li, Zhanjie Guo |
|
Vol 6, No 3 (2005) |
On-Demand Link Padding in Traffic Anonymizing |
Abstract
|
Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan |
|
Vol 22, No 6 (2021) |
Online Art Design Education System Based On 3D Virtual Simulation Technology |
Abstract
PDF
|
Chao Yang |
|
Vol 21, No 6 (2020) |
Online Handwritten Verification Algorithms Based on DTW and SVM |
Abstract
PDF
|
Kuo-Kun Tseng, Xiao-Xiao An, Charles Chen |
|
Vol 15, No 7 (2014) |
Online Opponent Modeling for Action Prediction |
Abstract
|
Chih-Ming Chiu, Shao-Shin Hung, Jyh-Jong Tsay, Kuo-Kuang Fan, Der-Chian Tsaih |
|
Vol 11, No 6 (2010) |
Online Video Playing on Smartphones: A Context-Aware Approach Based on Cloud Computing |
Abstract
|
Jin-Lei Jiang, Yong-Wei Wu, Xiao-Meng Huang, Guang-Wen Yang, Wei-Min Zheng |
|
Vol 8, No 4 (2007) |
Ontology Based Scenarios for Query Expansion Systems-A Case Study Using a Basic Clinical Ontology of Breast Cancer |
Abstract
|
Tzone-I Wang, Ming-Che Lee, Ti-Kai Chiu |
|
1876 - 1900 of 2669 Items |
<< < 71 72 73 74 75 76 77 78 79 80 > >> |