|
Issue |
Title |
|
Vol 26, No 4 (2025) |
Review of the Development and Application of Visual Sensors based on Event Streaming |
Abstract
|
Heng Zhang, Zheng Li, Yanli Liu, Neal Naixue Xiong |
|
Vol 18, No 4 (2017) |
RGB-D Abandoned Object Detection Based on GrabCut Using Kinect |
Abstract
|
Chia-Hung Yeh, Chih-Yang Lin, Kahlil Muchtar |
|
Vol 23, No 4 (2022) |
Risk of Internet Money Market Funds and Its Spillover Effect: Based on La-VaR, DCC-GARCH and Minimum Spanning Tree |
Abstract
PDF
|
Huizi Ma, Yuting Wang, Lin Lin, Xiangrong Wang |
|
Vol 17, No 2 (2016) |
RLER: A Reliable Location-Based and Energy-Aware Routing Protocol for Underwater Acoustic Sensor Networks |
Abstract
|
Ning Sun, Guang-Jie Han, Jie Zhang, Tong-Tong Wu, Jin-Fang Jiang, Lei Shu |
|
Vol 15, No 4 (2014) |
Robot Service Framework Based on Big Data Technology |
Abstract
|
Yunsick Sung, Hwa-Young Jeong, Kyungeun Cho, Kyhyun Um |
|
Vol 21, No 5 (2020) |
Robotic Relocalization Algorithm Assisted by Industrial Internet of Things and Artificial Intelligence |
Abstract
PDF
|
Bi Zeng, Shuang Yang, Xiuwen Yin |
|
Vol 16, No 5 (2015) |
Robust Android Botnet C&C over GTalk Service |
Abstract
|
Jong-Ho Shin, Yoo-Kun Cho, Seong-Bae Eun, Young-Sun Yun, Jin-Man Jung |
|
Vol 26, No 4 (2025) |
Robust ECC-based Three-factors Authentication and Key Agreement for Smart Home |
Abstract
|
Xiaoming Huang, Tao Zhang, Wenying Zheng, Huijie Yang, Yunpeng Song |
|
Vol 8, No 3 (2007) |
Robust Header Compression with Load Balance and Dynamic Bandwidth Aggregation Capabilities in WLAN |
Abstract
|
Chi-Yuan Chang, Tin-Yu Wu, Chin-Cheng Huang, Allen Jong-Woei Whang, Han-Chieh Chao |
|
Vol 19, No 2 (2018) |
Robust Image Watermarking Based On Quantization Index Modulation in the DCT Domain |
Abstract
PDF
|
Min Lei, Xiaoming Liu, Mian Wang, Yu Yang, Zhiguo Qu |
|
Vol 22, No 7 (2021) |
Robust Recognition of Indoor Educational Activity Based on Wi-Fi Signals with SSGAN |
Abstract
PDF
|
Jian Zhao, Xin Li, Liang Huang, Shangwu Chong, Jian Jia |
|
Vol 16, No 7 (2015) |
Robust Remote Mutual Authentication Scheme with Key Agreement |
Abstract
|
Chih-Ho Chou, Kuo-Yu Tsai, Tzong-Chen Wu |
|
Vol 22, No 4 (2021) |
Robust Truth Discovery Scheme Based on Mean Shift Clustering Algorithm |
Abstract
PDF
|
Jingxue Chen, Jingkang Yang, Juan Huang, Yining Liu |
|
Vol 21, No 3 (2020) |
Roofline-based Data Migration Methodology for Hybrid Memories |
Abstract
PDF
|
Jongmin Lee, Kwangho Lee, Mucheol Kim, Geunchul Park, Chan Yeol Park |
|
Vol 18, No 6 (2017) |
Router-Level Internet Topology Evolution Model based on Multi-Subnet Composited Complex Network Model |
Abstract
|
Gengxin Sun, Sheng Bin |
|
Vol 11, No 4 (2010) |
Routing with Localized Clusters for Wireless Sensor Networks |
Abstract
|
Yan-Xia Jia, Jaime Mickelson, Tabatha Simpson, Qiang Ye |
|
Vol 20, No 2 (2019) |
RSCMF: A Mapping Framework for Resource Scalability Collaboration in Radio Access Networks with SDR and Virtualization |
Abstract
PDF
|
Sai Zou, Yuliang Tang, Yanglong Sun |
|
Vol 7, No 4 (2006) |
Rule Base Partitioning for Constructing Meta-rule |
Abstract
|
Shun-Chieh Lin, Chien-Hao Wen, Shian-Shyong Tseng, Yao-Tsung Lin |
|
Vol 11, No 1 (2010) |
Runtime Prediction Based Grid Scheduling of Parameter Sweep Jobs |
Abstract
|
Sam Verboven, Peter Hellinckx, Frans Arickx, Jan Broeckhove |
|
Vol 22, No 6 (2021) |
Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN |
Abstract
PDF
|
Saravanakumar Pichumani, T. V. P. Sundararajan, Rajesh Kumar Dhanaraj, Yunyoung Nam, Seifedine Kadry |
|
Vol 24, No 6 (2023) |
S2F-YOLO: An Optimized Object Detection Technique for Improving Fish Classification |
Abstract
|
Feng Wang, Jing Zheng, Jiawei Zeng, Xincong Zhong, Zhao Li |
|
Vol 19, No 7 (2018) |
S3: Size-aware Sequential Scheduling to Meet Deadlines in Data Center Networks |
Abstract
PDF
|
Chang Ruan, Jianxin Wang, Jiawei Huang, Yi Pan, Naixue Xiong |
|
Vol 24, No 1 (2023) |
Safe and Efficient Delegated Proof of Stake Consensus Mechanism Based on Dynamic Credit in Electronic Transaction |
Abstract
PDF
|
Mingjie Zhao, Cheng Dai, Bing Guo |
|
Vol 23, No 4 (2022) |
Safety Analysis Method of Mixed Failure Model using Temporal Bayesian Network |
Abstract
PDF
|
Li Wei, Bing-Wu Fang |
|
Vol 21, No 3 (2020) |
SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model |
Abstract
PDF
|
Huilin Ge, Yahui Sun, Yueh-Min Huang, Se-Jung Lim |
|
2176 - 2200 of 2707 Items |
<< < 83 84 85 86 87 88 89 90 91 92 > >> |