| Issue | Title | |
| Vol 11, No 1 (2010) | Runtime Prediction Based Grid Scheduling of Parameter Sweep Jobs | Abstract |
| Sam Verboven, Peter Hellinckx, Frans Arickx, Jan Broeckhove | ||
| Vol 22, No 6 (2021) | Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN | Abstract PDF |
| Saravanakumar Pichumani, T. V. P. Sundararajan, Rajesh Kumar Dhanaraj, Yunyoung Nam, Seifedine Kadry | ||
| Vol 24, No 6 (2023) | S2F-YOLO: An Optimized Object Detection Technique for Improving Fish Classification | Abstract |
| Feng Wang, Jing Zheng, Jiawei Zeng, Xincong Zhong, Zhao Li | ||
| Vol 19, No 7 (2018) | S3: Size-aware Sequential Scheduling to Meet Deadlines in Data Center Networks | Abstract PDF |
| Chang Ruan, Jianxin Wang, Jiawei Huang, Yi Pan, Naixue Xiong | ||
| Vol 24, No 1 (2023) | Safe and Efficient Delegated Proof of Stake Consensus Mechanism Based on Dynamic Credit in Electronic Transaction | Abstract PDF |
| Mingjie Zhao, Cheng Dai, Bing Guo | ||
| Vol 26, No 7 (2025) | Safe Policy Improvement via Diffusion Model for Offline Reinforcement Learning | Abstract |
| Xiaohan Yang, Jun Li, Jiang Liu, Mengting Sun, Baozhu Chen | ||
| Vol 23, No 4 (2022) | Safety Analysis Method of Mixed Failure Model using Temporal Bayesian Network | Abstract PDF |
| Li Wei, Bing-Wu Fang | ||
| Vol 21, No 3 (2020) | SAR Image Segmentation with Structure Tensor Based Hierarchical Student’s t-Mixture Model | Abstract PDF |
| Huilin Ge, Yahui Sun, Yueh-Min Huang, Se-Jung Lim | ||
| Vol 12, No 6 (2011) | Saturation Performance Assessment of Differentiation Services Supported in IEEE 802.11e | Abstract |
| Bor-Jiunn Hwang, I-Shyan Hwang, Hsin-Hao Chang | ||
| Vol 2, No 4 (2001) | Scalable and Resilient Application Sharing System for Internet Collaboration | Abstract |
| Agustin Jose Gonzalez, Hussein Abdel-Wahab, J. Christian Wild | ||
| Vol 14, No 6 (2013) | Scalable and Secure Information-Centric Networking | Abstract |
| Zhi-Wei Yan, Hua-Pei Chiang, Yong-Jin Park, Xiao-Dong Lee, Yueh-Min Huang | ||
| Vol 10, No 2 (2009) | Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments | Abstract |
| Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu | ||
| Vol 25, No 2 (2024) | Scalable Authenticated Communication in Drone Swarm Environment | Abstract |
| Kyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun | ||
| Vol 8, No 3 (2007) | Scalable IPv6 Lookup/Update Design for High-Throughput Routers | Abstract |
| Chung-Ho Chen, Chao-Hsien Hsu, Chen-Chieh Wang | ||
| Vol 19, No 7 (2018) | Scalable Multicasting through Hexagonal Zone Based Structure Over Mobile Adhoc Networks | Abstract PDF |
| R. Shankar, E. Ilavarasan | ||
| Vol 11, No 2 (2010) | SDIPR: A Generic P2P Semantic Distance Inference Approach Based on Spring Relaxation System | Abstract |
| Yu-Feng Wang, Akihiro Nakao, Jian-Hua Ma | ||
| Vol 16, No 6 (2015) | SDN-Based Resource Allocation for Multi-Channel Wireless Mesh Networks | Abstract |
| Saehoon Kang, YongYoon Shin, Sunhee Yang, Wonyong Yoon | ||
| Vol 6, No 3 (2005) | Seamless Handover Optimization Based on L2 Triggers Information | Abstract |
| Nicolas Montavont, Thomas Noel | ||
| Vol 13, No 4 (2012) | Secure Address Configuration in IPv6 Networks | Abstract |
| Su-Kit Tang, Kai-Hau Yeung, Kin-Yeung Wong | ||
| Vol 20, No 3 (2019) | Secure and Efficient Data Aggregation Scheme with Fine-Grained Access Control and Verifiability for CWBANs | Abstract PDF |
| Xuefeng Fang, Qingqing Gan, Xiaoming Wang | ||
| Vol 20, No 1 (2019) | Secure and Lightweight Remote Medical System | Abstract PDF |
| Yining Liu, Yuanjian Zhou, Youliang Tian, Mingzhe Liu, Yanbin Zheng | ||
| Vol 17, No 2 (2016) | Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet | Abstract |
| Tao Jiang, Xiao-Feng Chen, Jin Li, Jian-Feng Ma | ||
| Vol 21, No 2 (2020) | Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing | Abstract PDF |
| Munivel E, Kannammal A | ||
| Vol 5, No 2 (2004) | Secure Bootstrapping and Routing in an IPv6- Based Ad Hoc Network | Abstract |
| Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee | ||
| Vol 12, No 3 (2011) | Secure Data Aggregation Solution Based on Dynamic Multiple Cluster Key Management Model | Abstract |
| Feng-Yu Lei, Cai Fu, Xi Li, Jing Chen | ||
| 2226 - 2250 of 2743 Items | << < 85 86 87 88 89 90 91 92 93 94 > >> | |
