|
Issue |
Title |
|
Vol 20, No 2 (2019) |
RSCMF: A Mapping Framework for Resource Scalability Collaboration in Radio Access Networks with SDR and Virtualization |
Abstract
PDF
|
Sai Zou, Yuliang Tang, Yanglong Sun |
|
Vol 7, No 4 (2006) |
Rule Base Partitioning for Constructing Meta-rule |
Abstract
|
Shun-Chieh Lin, Chien-Hao Wen, Shian-Shyong Tseng, Yao-Tsung Lin |
|
Vol 11, No 1 (2010) |
Runtime Prediction Based Grid Scheduling of Parameter Sweep Jobs |
Abstract
|
Sam Verboven, Peter Hellinckx, Frans Arickx, Jan Broeckhove |
|
Vol 22, No 6 (2021) |
Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN |
Abstract
PDF
|
Saravanakumar Pichumani, T. V. P. Sundararajan, Rajesh Kumar Dhanaraj, Yunyoung Nam, Seifedine Kadry |
|
Vol 24, No 6 (2023) |
S2F-YOLO: An Optimized Object Detection Technique for Improving Fish Classification |
Abstract
|
Feng Wang, Jing Zheng, Jiawei Zeng, Xincong Zhong, Zhao Li |
|
Vol 19, No 7 (2018) |
S3: Size-aware Sequential Scheduling to Meet Deadlines in Data Center Networks |
Abstract
PDF
|
Chang Ruan, Jianxin Wang, Jiawei Huang, Yi Pan, Naixue Xiong |
|
Vol 24, No 1 (2023) |
Safe and Efficient Delegated Proof of Stake Consensus Mechanism Based on Dynamic Credit in Electronic Transaction |
Abstract
PDF
|
Mingjie Zhao, Cheng Dai, Bing Guo |
|
Vol 23, No 4 (2022) |
Safety Analysis Method of Mixed Failure Model using Temporal Bayesian Network |
Abstract
PDF
|
Li Wei, Bing-Wu Fang |
|
Vol 21, No 3 (2020) |
SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model |
Abstract
PDF
|
Huilin Ge, Yahui Sun, Yueh-Min Huang, Se-Jung Lim |
|
Vol 12, No 6 (2011) |
Saturation Performance Assessment of Differentiation Services Supported in IEEE 802.11e |
Abstract
|
Bor-Jiunn Hwang, I-Shyan Hwang, Hsin-Hao Chang |
|
Vol 2, No 4 (2001) |
Scalable and Resilient Application Sharing System for Internet Collaboration |
Abstract
|
Agustin Jose Gonzalez, Hussein Abdel-Wahab, J. Christian Wild |
|
Vol 14, No 6 (2013) |
Scalable and Secure Information-Centric Networking |
Abstract
|
Zhi-Wei Yan, Hua-Pei Chiang, Yong-Jin Park, Xiao-Dong Lee, Yueh-Min Huang |
|
Vol 10, No 2 (2009) |
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments |
Abstract
|
Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu |
|
Vol 25, No 2 (2024) |
Scalable Authenticated Communication in Drone Swarm Environment |
Abstract
|
Kyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun |
|
Vol 8, No 3 (2007) |
Scalable IPv6 Lookup/Update Design for High-Throughput Routers |
Abstract
|
Chung-Ho Chen, Chao-Hsien Hsu, Chen-Chieh Wang |
|
Vol 19, No 7 (2018) |
Scalable Multicasting through Hexagonal Zone Based Structure Over Mobile Adhoc Networks |
Abstract
PDF
|
R. Shankar, E. Ilavarasan |
|
Vol 11, No 2 (2010) |
SDIPR: A Generic P2P Semantic Distance Inference Approach Based on Spring Relaxation System |
Abstract
|
Yu-Feng Wang, Akihiro Nakao, Jian-Hua Ma |
|
Vol 16, No 6 (2015) |
SDN-Based Resource Allocation for Multi-Channel Wireless Mesh Networks |
Abstract
|
Saehoon Kang, YongYoon Shin, Sunhee Yang, Wonyong Yoon |
|
Vol 6, No 3 (2005) |
Seamless Handover Optimization Based on L2 Triggers Information |
Abstract
|
Nicolas Montavont, Thomas Noel |
|
Vol 13, No 4 (2012) |
Secure Address Configuration in IPv6 Networks |
Abstract
|
Su-Kit Tang, Kai-Hau Yeung, Kin-Yeung Wong |
|
Vol 20, No 3 (2019) |
Secure and Efficient Data Aggregation Scheme with Fine-Grained Access Control and Verifiability for CWBANs |
Abstract
PDF
|
Xuefeng Fang, Qingqing Gan, Xiaoming Wang |
|
Vol 20, No 1 (2019) |
Secure and Lightweight Remote Medical System |
Abstract
PDF
|
Yining Liu, Yuanjian Zhou, Youliang Tian, Mingzhe Liu, Yanbin Zheng |
|
Vol 17, No 2 (2016) |
Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet |
Abstract
|
Tao Jiang, Xiao-Feng Chen, Jin Li, Jian-Feng Ma |
|
Vol 21, No 2 (2020) |
Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing |
Abstract
PDF
|
Munivel E, Kannammal A |
|
Vol 5, No 2 (2004) |
Secure Bootstrapping and Routing in an IPv6- Based Ad Hoc Network |
Abstract
|
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee |
|
2151 - 2175 of 2657 Items |
<< < 82 83 84 85 86 87 88 89 90 91 > >> |