|
Issue |
Title |
|
Vol 12, No 6 (2011) |
Saturation Performance Assessment of Differentiation Services Supported in IEEE 802.11e |
Abstract
|
Bor-Jiunn Hwang, I-Shyan Hwang, Hsin-Hao Chang |
|
Vol 2, No 4 (2001) |
Scalable and Resilient Application Sharing System for Internet Collaboration |
Abstract
|
Agustin Jose Gonzalez, Hussein Abdel-Wahab, J. Christian Wild |
|
Vol 14, No 6 (2013) |
Scalable and Secure Information-Centric Networking |
Abstract
|
Zhi-Wei Yan, Hua-Pei Chiang, Yong-Jin Park, Xiao-Dong Lee, Yueh-Min Huang |
|
Vol 10, No 2 (2009) |
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments |
Abstract
|
Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu |
|
Vol 25, No 2 (2024) |
Scalable Authenticated Communication in Drone Swarm Environment |
Abstract
|
Kyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun |
|
Vol 8, No 3 (2007) |
Scalable IPv6 Lookup/Update Design for High-Throughput Routers |
Abstract
|
Chung-Ho Chen, Chao-Hsien Hsu, Chen-Chieh Wang |
|
Vol 19, No 7 (2018) |
Scalable Multicasting through Hexagonal Zone Based Structure Over Mobile Adhoc Networks |
Abstract
PDF
|
R. Shankar, E. Ilavarasan |
|
Vol 11, No 2 (2010) |
SDIPR: A Generic P2P Semantic Distance Inference Approach Based on Spring Relaxation System |
Abstract
|
Yu-Feng Wang, Akihiro Nakao, Jian-Hua Ma |
|
Vol 16, No 6 (2015) |
SDN-Based Resource Allocation for Multi-Channel Wireless Mesh Networks |
Abstract
|
Saehoon Kang, YongYoon Shin, Sunhee Yang, Wonyong Yoon |
|
Vol 6, No 3 (2005) |
Seamless Handover Optimization Based on L2 Triggers Information |
Abstract
|
Nicolas Montavont, Thomas Noel |
|
Vol 13, No 4 (2012) |
Secure Address Configuration in IPv6 Networks |
Abstract
|
Su-Kit Tang, Kai-Hau Yeung, Kin-Yeung Wong |
|
Vol 20, No 3 (2019) |
Secure and Efficient Data Aggregation Scheme with Fine-Grained Access Control and Verifiability for CWBANs |
Abstract
PDF
|
Xuefeng Fang, Qingqing Gan, Xiaoming Wang |
|
Vol 20, No 1 (2019) |
Secure and Lightweight Remote Medical System |
Abstract
PDF
|
Yining Liu, Yuanjian Zhou, Youliang Tian, Mingzhe Liu, Yanbin Zheng |
|
Vol 17, No 2 (2016) |
Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet |
Abstract
|
Tao Jiang, Xiao-Feng Chen, Jin Li, Jian-Feng Ma |
|
Vol 21, No 2 (2020) |
Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing |
Abstract
PDF
|
Munivel E, Kannammal A |
|
Vol 5, No 2 (2004) |
Secure Bootstrapping and Routing in an IPv6- Based Ad Hoc Network |
Abstract
|
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee |
|
Vol 12, No 3 (2011) |
Secure Data Aggregation Solution Based on Dynamic Multiple Cluster Key Management Model |
Abstract
|
Feng-Yu Lei, Cai Fu, Xi Li, Jing Chen |
|
Vol 23, No 4 (2022) |
Secure Data Deduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage |
Abstract
PDF
|
R. Vignesh, J. Preethi |
|
Vol 21, No 7 (2020) |
Secure Federated Learning with Efficient Communication in Vehicle Network |
Abstract
PDF
|
Yinglong Li, Zhenjiang Zhang, Zhiyuan Zhang, Yi-Chih Kao |
|
Vol 21, No 4 (2020) |
Secure Fine-grained Attribute-based Access Control with Hidden Policy for Electronic Health Record System |
Abstract
PDF
|
Sai Ji, Xin Jin, Jin-Feng Lai, Jian Shen |
|
Vol 17, No 4 (2016) |
Secure HDFS Design Using Group Key Management System |
Abstract
|
Jungho Kang, Jaesoo Kim |
|
Vol 20, No 4 (2019) |
Secure Human Authentication with Graphical Passwords |
Abstract
PDF
|
Zayabaatar Dagvatur, Aziz Mohaisen, Kyunghee Lee, DaeHun Nyang |
|
Vol 23, No 5 (2022) |
Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications |
Abstract
|
Xin Liu, Yang Xu, Gang Xu, Xiu-Bo Chen, Yu-Ling Chen |
|
Vol 11, No 6 (2010) |
Secure Many-to-Many Multicast in Heterogeneous Networks |
Abstract
|
Junbeom Hur, Dongyoung Koo, Hyunsoo Yoon |
|
Vol 15, No 5 (2014) |
Secure Nano Communication |
Abstract
|
Aneel Rahim, Paul Malone, Abdullah Sharaf Alghamdi |
|
2201 - 2225 of 2707 Items |
<< < 84 85 86 87 88 89 90 91 92 93 > >> |