| Issue | Title | |
| Vol 23, No 6 (2022) | Probit Cryptographic Blockchain for Secure Data Transmission in Intelligent Transportation Systems | Abstract PDF |
| Rajesh Kumar Dhanaraj, Seifedine Kadry, Byeong-Gwon Kang, Yunyoung Nam | ||
| Vol 14, No 4 (2013) | Problem Based Learning Theory Oriented Portable Medical Training Platform | Abstract |
| Lun-Ping Hung, Kuo-Chung Chu, Der-Jiunn Deng | ||
| Vol 14, No 3 (2013) | Process Socio Space Discovery Based on Semantic Logs | Abstract |
| Rami Sellami, Walid Gaaloul, Bruno Defude | ||
| Vol 20, No 1 (2019) | Processing Directional Continuous Queries for Mobile Objects on Road Networks | Abstract PDF |
| Chow-Sing Lin, Ci-Ruei Jiang | ||
| Vol 13, No 1 (2012) | Producing Security Policy of IPSec Based on Improved λ-ID3 Algorithm | Abstract |
| Ming Yang, Shuxu Guo, Jun Wang | ||
| Vol 15, No 7 (2014) | Product Design Prediction Using Integrated Dynamic Kansei Engineering Scheme | Abstract |
| Kun-Chieh Wang | ||
| Vol 18, No 6 (2017) | Professional Social Networks: An Essential Tool for Professionals and Companies in the Global Economy | Abstract |
| José Luis Fernández-Alemán, Juan Manuel Carrillo de Gea, Ambrosio Toval, Joaquín Nicolás, Mario Piattini | ||
| Vol 18, No 3 (2017) | Prominent Causes of Poor Quality of Service in Network Communication | Abstract |
| Ijaz Ali Shoukat, Abdullah Al-Dhelaan, Mohsin Iftikhar, Mznah Al-Rodhaan | ||
| Vol 23, No 6 (2022) | Promoting Students’ Math Learning Performance and Engagement: A Help-seeking Mechanism-based Mobile Gaming Approach | Abstract PDF |
| Kai-Hsiang Yang, Hui-Chun Chu, Chin-Chung Hsieh, Fan-Ray Kuo | ||
| Vol 19, No 3 (2018) | Prompt Image Search with Deep Convolutional Neural Network via Efficient Hashing Code and Addictive Latent Semantic Layer | Abstract PDF |
| Jun-yi Li, Jian-hua Li | ||
| Vol 19, No 7 (2018) | Proposal and Assessment of Algorithms for Power Consumption Reduction in Wireless Networks with E-Ink Displays | Abstract PDF |
| Diego Sánchez-de-Rivera, Ramón Alcarria, Diego Martín, Gabriel Huecas | ||
| Vol 19, No 6 (2018) | Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client | Abstract PDF |
| Gandeva Bayu Satrya, Soo Young Shin | ||
| Vol 23, No 3 (2022) | Protocol and Evaluation of Network Mobility with Producer Nodes in Named Data Networking | Abstract PDF |
| Lee Chee Hang, Yu-Beng Leau, Yong Jin Park, Zhiwei Yan, Supriyanto Praptodiyono | ||
| Vol 23, No 2 (2022) | Provably Secure Certificateless Proxy Signature Scheme in the Standard Model | Abstract PDF |
| Lunzhi Deng, Zhenyu Hu, Yu Ruan, Tao Wang | ||
| Vol 5, No 2 (2004) | Providing Internet Access and Efficient Mobility Support to IPv6 Personal Area Networks | Abstract |
| Nikolaos Alexiou, Georgios Tsiouris, Efstathios Sykas | ||
| Vol 13, No 4 (2012) | Providing Secure Location-Aware Services for Cooperative Vehicular Ad Hoc Networks | Abstract |
| Chul Sur, Youngho Park, Kouichi Sakurai, Kyung Hyune Rhee | ||
| Vol 5, No 3 (2004) | Proxy-Assisted Periodic Broadcast Architecture for Large-Scale Video Streaming | Abstract |
| Ewa Kusmierek, David H. C. Du, Yingfei Dong | ||
| Vol 7, No 3 (2006) | Pseudo MIPv6 for Anycast and Fault Tolerance Services | Abstract |
| Ting-Yun Chi, Han-Chieh Chao | ||
| Vol 23, No 3 (2022) | PSO-VFA: A Hybrid Intelligent Algorithm for Coverage Optimization of UAV-Mounted Base Stations | Abstract PDF |
| Xuefeng Chen, Wan Tang, Ximin Yang, Lingyun Zhou, Liuhuan Li | ||
| Vol 22, No 3 (2021) | Psychological Factors in Consumer Acceptance of Artificial Intelligence in Leisure Economy: A Structural Equation Model | Abstract PDF |
| Xuelin Xian | ||
| Vol 24, No 6 (2023) | Public Integrity Verification for Cloud Storage with Efficient Key-update | Abstract |
| Hao Yan, Yanan Liu, Dandan Huang, Shuo Qiu, Zheng Zhang | ||
| Vol 17, No 6 (2016) | Public Possession Checking for Shared Data with User Revocation in Cloud Computing | Abstract |
| Jinxia Wei, Jianyi Liu, Ru Zhang, Xinxin Niu, Yuangang Yao | ||
| Vol 26, No 5 (2025) | PUF-Based Device Authentication with Zero-Knowledge Proof in IoT | Abstract |
| Tung-Tsun Lee, Shyi-Tsong Wu, Yao-Jen Liang | ||
| Vol 23, No 7 (2022) | PyRS: Cross-platform Data Fault-tolerant Storage Library Based on RS Erasure Code | Abstract PDF |
| Junqiang Ma, Weihao Yan, Xiaotian Zhang, Min Huang, Jingyang Wang | ||
| Vol 15, No 6 (2014) | QoS Aware for Peer Selection on P2P Streaming Services | Abstract |
| Sinchai Kamolphiwong, Supitchaya Chanpong, Thossaporn Kamolphiwong | ||
| 2076 - 2100 of 2743 Items | << < 79 80 81 82 83 84 85 86 87 88 > >> | |
