|
Issue |
Title |
|
Vol 21, No 3 (2020) |
Small Sample Image Recognition Based on CNN and RBFNN |
Abstract
PDF
|
Biyuan Yao, Hui Zhou, Jianhua Yin, Guiqing Li, Chengcai Lv |
|
Vol 20, No 2 (2019) |
Smart Fire Evacuation Service Based on Internet of Things Computing for Web3D |
Abstract
PDF
|
Fengting Yan, Jinyuan Jia, Yonghao Hu, Qinghua Guo, Hehua Zhu |
|
Vol 21, No 2 (2020) |
Smart Hat: Design and Implementation of a Wearable Learning Device for Kids Using AI and IoTs Techniques |
Abstract
PDF
|
I-Hsiung Chang, Huan-Chao Keh, Bhargavi Dande, Diptendu Sinha Roy |
|
Vol 20, No 2 (2019) |
Smart Road Sign Design Based on Hydraulic Power Generation and Block Section Theory |
Abstract
PDF
|
Jinshuan Peng, Lei Xu, Zhenya Yu, Yiming Shao, Jin Xu |
|
Vol 19, No 5 (2018) |
Smart TV Face Monitoring for Children Privacy |
Abstract
PDF
|
Patrick C. K. Hung, Kamen Kanev, Shih-Chia Huang, Farkhund Iqbal, Benjamin C. M. Fung |
|
Vol 22, No 1 (2021) |
SMDAps: A Specification-based Misbehavior Detection System for Implantable Devices in Artificial Pancreas System |
Abstract
PDF
|
Philip Virgil Astillo, Jaemin Jeong, Wei-Che Chien, Bonam Kim, JoungSoon Jang, Ilsun You |
|
Vol 9, No 5 (2008) |
SMP叢集上考量記憶體之平行排程演算法 |
Abstract
|
王逸民(Yi-Min Wang), 簡克達(Ko-Ta Chien), 張沅合(Yuan-He Chang), 田尚修(Shang-Hsin Tien) |
|
Vol 19, No 1 (2018) |
Social Network Anonymization via Local-perturbing Approach |
Abstract
PDF
|
Peng Liu, Huanjie Wang, Shan Lin, Xianxian Li |
|
Vol 15, No 1 (2014) |
Software as a Service Adoption: Impact on IT Workers and Functions of IT Department |
Abstract
|
Freddie H. Mbuba, William Yu-Chung Wang |
|
Vol 21, No 5 (2020) |
Software Cost Estimation Using Flower Pollination Algorithm |
Abstract
PDF
|
Bilal Khan, Rashid Naseem, Muhammad Binsawad, Muzammil Khan, Arshad Ahmad |
|
Vol 19, No 5 (2018) |
Software Defined Wireless Sensor Networks (SDWSN): A Review on Efficient Resources, Applications and Technologies |
Abstract
PDF
|
Babedi Betty Letswamotse, Reza Malekian, Chi-Yuan Chen, Kgotlaetsile Mathews Modieginyane |
|
Vol 8, No 1 (2007) |
Software Piracy Attacks on Java Software Using Malicious Aspects |
Abstract
|
Kung Chen, Ju-Bing Chen |
|
Vol 14, No 3 (2013) |
Software RAID for Data Intensive Applications in Cloud Computing |
Abstract
|
Seok-Il Song, Ki-Jeong Khil, Yun-Sik Kwak, Dae-Sik Ko, Seung-Kook Cheong |
|
Vol 14, No 3 (2013) |
Solving Nonlinear SMT Problems Based on an Efficient Lazy Method |
Abstract
|
Xiao-Hui Ji, Fei-Fei Ma |
|
Vol 4, No 4 (2003) |
Some more Improvements on a fair non-repudiation protocol |
Abstract
|
Dimitrios Petropoulos, Panayiotis Kotzanikolaou |
|
Vol 4, No 2 (2003) |
SONET網路傳訊品質與UDP/ICMP訊務的迴歸相關分析 |
Abstract
|
楊素秋(Su-Chiu Yang), 曾黎明(Li-ming Tseng) |
|
Vol 19, No 6 (2018) |
Space Efficient and Integrity-ensured Secret Sharing Schemes for Multimedia Secrecy without Recursion |
Abstract
PDF
|
Wei-Liang Tai, Ya-Fen Chang |
|
Vol 18, No 1 (2017) |
Spam Detection in Social Bookmarking Systems Using Tag Scores and Selective Evaluation |
Abstract
|
Kyoung-Jun Sung, Soo-Cheol Kim, Sung Kwon Kim |
|
Vol 15, No 6 (2014) |
Sparse Ranking Model Adaptation for Cross Domain Learning to Rank |
Abstract
|
Feiyi (Aaron) Tang, Jing He, Yong Tang, Zewu Peng, Luyao Teng |
|
Vol 20, No 5 (2019) |
Sparse Selective Encryption for HEVC 4K Video Using Spatial Error Spread |
Abstract
PDF
|
Mengdie Huang, Cheng Yang, Hao Li, Jian Shen |
|
Vol 11, No 5 (2010) |
Spatial Exact Match Query in P2P Systems Using an NA-Tree Structure |
Abstract
|
Ye-In Chang, Chen-Chang Wu, Ching-I Wang |
|
Vol 19, No 5 (2018) |
Spatial-Temporal Compressive Sensing for Cross-Layer Optimization Data Transmission in Wireless Sensor Networks |
Abstract
PDF
|
Chengtie Li, Jinkuan Wang, Mingwei Li |
|
Vol 5, No 3 (2004) |
SpiderServer - Design and Implementation of a MetaSearch Engine |
Abstract
|
Nick Z. Zacharis, Themis Panayiotopoulos |
|
Vol 13, No 5 (2012) |
Splog Detection Using Structural Similarity between Posts and URL Biasedness in Posts |
Abstract
|
Soo-Cheol Kim, Su-Won Lee, Kyoung-Jun Sung, Sung Kwon Kim |
|
Vol 14, No 1 (2013) |
SRAG: A Priority-Based Rate Adaptation Scheme Using Game Theory for Vehicular Networks |
Abstract
|
Jian-Cheng Ye, Mounir Hamdi |
|
2251 - 2275 of 2669 Items |
<< < 86 87 88 89 90 91 92 93 94 95 > >> |