|
Issue |
Title |
|
Vol 24, No 3 (2023) |
Study on Shadow Detection of World View-II Remote Sensing Image Based on Band Standardization |
Abstract
PDF
|
Junwei Xin, Xiaoyong Chen, Zixin Liu, Yan Luo, Zhenxing Liu |
|
Vol 3, No 4 (2002) |
Study on the Computer Network and Virtual Reality Technology for e-Learning ----Baed on WebDeGrator System |
Abstract
|
Shih-Ching Ou, Wen-Tsai Sung, Sung-Jung Hsiao |
|
Vol 22, No 3 (2021) |
Study on the Selection of Middle Urban Mass Rapid Transit System and Adaptability Analysis |
Abstract
PDF
|
Weiwei Liu, Chennan Zhang, Fu Wang, Jingyu Zhang, Lei Wang |
|
Vol 15, No 3 (2014) |
Study on the Theoretical Framework of Not So Cooperative Caching |
Abstract
|
Xiao-Yan Hu, Jian Gong |
|
Vol 24, No 3 (2023) |
Study on Trends and Predictions of Convergence in Cybersecurity Technology Using Machine Learning |
Abstract
PDF
|
Sungwook Ryu, Jinsu Kim, Namje Park |
|
Vol 18, No 7 (2017) |
Subquadratic Complexity Gaussian Normal Basis Multiplier over GF(2^m) Using Addition of HMVP and TMVP |
Abstract
|
Chun-Sheng Yang, Jeng-Shyang Pan, Chiou-Yng Lee |
|
Vol 18, No 1 (2017) |
Subspace Clustering for Vector Clusters |
Abstract
|
Kun Niu, Zhipeng Gao, Haizhen Jiao, Xiuquan Qiao, Yao Zhao |
|
Vol 22, No 4 (2021) |
Sufficient Conditions Analysis of Coverage Algorithm Constructed Positive Definite Tridiagonal Matrices in WSNs |
Abstract
PDF
|
Wei Wei, Qiao Ke, Fan Gao, Rafał Scherer, Shujia Fan |
|
Vol 5, No 1 (2004) |
Suffix–Window Caching:為異質環境下傳輸連續媒體而設計之代理伺服器快取策略 |
Abstract
|
童曉儒(Sheau-Ru Tong), 林青(Chin Lin) |
|
Vol 13, No 2 (2012) |
Summarizing Association Patterns Efficiently by Using PI Tree in a Data Stream Environment |
Abstract
|
Guan-Ling Lee, Yu-Tang Zhu, Yi-Chun Chen |
|
Vol 20, No 4 (2019) |
Super Connectivity and Diagnosability of Crossed Cubes |
Abstract
PDF
|
Shiying Wang, Xiaolei Ma |
|
Vol 13, No 2 (2012) |
Super-Resolution Iris Image Restoration Based on Multiple MLPs and CLS Filter |
Abstract
|
Kwang-Yong Shin, Byung-Jun Kang, Kang-Ryoung Park |
|
Vol 17, No 3 (2016) |
Supporting Content-Based Music Retrieval in Structured Peer-to-Peer Overlays |
Abstract
|
I-Jan Wang, Guanling Lee, Sheng-Lung Peng, Yi-Chun Chen |
|
Vol 1, No 1 (2000) |
Supporting Quality of Service Communications for Mobile Hosts with Advanced Resource Reservations |
Abstract
|
Ruay-Shiung Chang, Andrew Chu |
|
Vol 17, No 4 (2016) |
Supporting Scalable Source Mobility Management for Named Data Networking |
Abstract
|
Shuai Gao, Hongke Zhang, Ai Sun, Yueh-Min Huang |
|
Vol 12, No 2 (2011) |
Survey of Security Issues in Cognitive Radio Networks |
Abstract
|
Wassim El-Hajj, Haidar Safa, Mohsen Guizani |
|
Vol 22, No 2 (2021) |
Survey on Communication for Mobile Sinks in Wireless Sensor Networks: Mobility Pattern Perspective |
Abstract
PDF
|
Sangdae Kim, Beom-Su Kim, Babar Shah, Sana Ullah, Ki-Il Kim |
|
Vol 14, No 7 (2013) |
Survey on Networking for Internet of Vehicles |
Abstract
|
Bo-Chao Cheng, Chun-Ting Chou, Chia-Hsuan Chang, Kuo-Hsuan Lo, Phone Lin, Russell To Hsing |
|
Vol 22, No 2 (2021) |
Suspected Vehicle Detection for Driving Without License Plate Using Symmelets and Edge Connectivity |
Abstract
PDF
|
Jun-Wei Hsieh, Hung Chun Chen, Ping-Yang Chen, Shiao-Peng Huang |
|
Vol 17, No 5 (2016) |
Sustained and Authenticated of a Universal Construction for Multiple Key Agreement Based on Chaotic Maps with Privacy Preserving |
Abstract
|
Hong-Feng Zhu |
|
Vol 23, No 6 (2022) |
SV-PBFT: An Efficient and Stable Blockchain PBFT Improved Consensus Algorithm for Vehicle-to-Vehicle Energy Transactions |
Abstract
PDF
|
Yao Suo, Yingsen Wang, Shichao Luo, Qianqian Yang, Juanjuan Zhao |
|
Vol 17, No 4 (2016) |
Swarm-Based Routing Protocol Assisted by Weakly Connected Dominating Sets for Mobile Ad-Hoc Networks |
Abstract
|
Kuen-Han Li, Jenq-Shiou Leu, Jiri Hosek |
|
Vol 21, No 7 (2020) |
Symmetric-bivariate-polynomial-based Lightweight Authenticated Group Key Agreement for Industrial Internet of Things |
Abstract
PDF
|
Shan Wu, Chingfang Hsu, Zhe Xia, Jinlong Zhang, Di Wu |
|
Vol 17, No 6 (2016) |
Symmetric-Matrix Automatic-Repeat-Request Scheme |
Abstract
|
Chi-Yuan Lin, Jyun-Jie Wang |
|
Vol 15, No 5 (2014) |
Synchronization Simulations of Secure Knowledge Transfer in Cloud Networks |
Abstract
|
Sheng-Hua Xu, Hong Zou |
|
2301 - 2325 of 2669 Items |
<< < 88 89 90 91 92 93 94 95 96 97 > >> |