|
Issue |
Title |
|
Vol 16, No 7 (2015) |
Synchronous Interleaved DBA for QoS over GPON-LTE Converged Network |
Abstract
|
I-Shyan Hwang, Tzu-Jui Yeh, Bor-Jiunn Hwang, Ching-Hu Lu, Jhong-Yue Lee |
|
Vol 11, No 3 (2010) |
System Modeling and Analysis for an Efficient Resource Allocation in MC-CDMA Cellular Wireless Networks to Support Internet Traffic |
Abstract
|
Dhananjay Kumar, C. Chellappan |
|
Vol 7, No 3 (2006) |
System Support for Workload-aware Content-based Request Distribution is Web Clusters |
Abstract
|
Yu-Chen Lin, Mei-Ling Chiang, Lian-Feng Guo |
|
Vol 14, No 5 (2013) |
Tag Based Collaborative Knowledge Management System with Crowdsourcing |
Abstract
|
Mu-Cheol Kim, Sang-Oh Park, Won-Kyun Joo, Ki-Seok Choi, Young-Sik Jeong, Yong-Ki Kim |
|
Vol 21, No 3 (2020) |
Target Detection Method for SAR Images Based on Feature Fusion Convolutional Neural Network |
Abstract
PDF
|
Yufeng Li, Kaixuan Liu, Weiping Zhao, Yufeng Huang |
|
Vol 11, No 7 (2010) |
Target Tracking in Wireless Sensor Networks with Guard Nodes |
Abstract
|
Hung-Chi Chu, Lin-Huang Chang, Hong-Wen Yu, Jiun-Jian Liaw, Yong-Hsun Lai |
|
Vol 11, No 3 (2010) |
Task Allocation Algorithm Based on Particle Swarm Optimization in Heterogeneous Computing Environments |
Abstract
|
Wen-Zhong Guo, Nai-Xue Xiong, Changhoon Lee, Laurence T. Yang, Guo-Long Chen, Qian Weng |
|
Vol 20, No 5 (2019) |
Task Scheduling and Resource Allocation Based on Ant-Colony Optimization and Deep Reinforcement Learning |
Abstract
PDF
|
Ulysse Rugwiro, Chunhua Gu, Weichao Ding |
|
Vol 24, No 7 (2023) |
TA-Sum: The Extractive Summarization Research Based on Topic Information |
Abstract
|
Fang Xie, Hao Li, Beiye Zhang, Jianan He, Xincong Zhong |
|
Vol 6, No 1 (2005) |
TbOT: A High-accuracy Low-energy-consumption Object Tracking Scheme for Sensor Networks |
Abstract
|
Yu-Chi Chung, Chao-Chun Chen, Chiang Lee |
|
Vol 22, No 1 (2021) |
Teaching and Experimental Schema of Data Mining Technology Combined with the Cloud Computing |
Abstract
PDF
|
Hong Shi, Hongxia Deng |
|
Vol 12, No 2 (2011) |
TELS: A Voice-Response Internet-Based Learning System |
Abstract
|
Vassilis Kolias, Constantinos Kolias, Ioannis E. Anagnostopoulos, Georgios Kambourakis, Eleftherios Kayafas |
|
Vol 14, No 4 (2013) |
Temporal Error Concealment Algorithm with Improved Ability on Motion Vector Recovery for H.264/AVC Decoder |
Abstract
|
Xin-Gang Liu, Wen-Jie Yang, Chao Sun |
|
Vol 7, No 4 (2006) |
Temporal Error Concealment for MPEG-Coded Video over Error-Prone Networks |
Abstract
|
Yu-Len Huang, Hsiu-Yi Lien |
|
Vol 14, No 2 (2013) |
Temporary Ownership Sharing in RFID Systems |
Abstract
|
Tong-Liang Li, Zhi-Gang Jin, Xiao-Kun Si |
|
Vol 19, No 3 (2018) |
Text Coverless Information Hiding Method Based on Hybrid Tags |
Abstract
PDF
|
Yulei Wu, Xingming Sun |
|
Vol 18, No 1 (2017) |
Text-Based Searchable Encryption in Cloud: A Survey |
Abstract
|
Xinle Wu, Zhangjie Fu, Xingming Sun |
|
Vol 16, No 5 (2015) |
Texture Classification Using Local Derivative Binary Pattern |
Abstract
|
Jun Shang, Naixue Xiong, Runze Wan, Bo Guo |
|
Vol 17, No 5 (2016) |
The 5R Adaptation Framework: Concepts, Systems, and Learning Scenarios |
Abstract
|
Qing Tan, Xiao-Kun Zhang, Frederique C. Pivot, Joshua Evans, Kinshuk , Rory McGreal |
|
Vol 18, No 5 (2017) |
The Advanced Analysis of Digital Traces Recoverability of WhatsApp Program on MacBook |
Abstract
|
Ai Sun, Yueh-Min Huang, Hai-Cheng Chu |
|
Vol 9, No 1 (2008) |
The Agent Messaging Mechanism to Research in ISO 9001:2000 Electronic Documentation Management |
Abstract
|
Po-Hsian Huang |
|
Vol 20, No 1 (2019) |
The Analysis of Cross-border Venture Capital Networks and Investment Performances Using a Logit Model |
Abstract
PDF
|
Veronica Lee |
|
Vol 6, No 4 (2005) |
The Application of Face Authentication System for Internet Security Using Object-Oriented Technology |
Abstract
|
Chia-Te Chu, Ching-Han Chen |
|
Vol 15, No 4 (2014) |
The Association between College Students' Internet Usage and Interpersonal Relationships |
Abstract
|
Chih-Hung Lai, Chunn-Ying Lin, Cheng-Hung Chen, Sufen Chen, Hwei-Ling Gwung |
|
Vol 4, No 4 (2003) |
The Behavior-based Intrusion Detection and Response System for the Internet Worm |
Abstract
|
Jason C. Hung |
|
2326 - 2350 of 2669 Items |
<< < 89 90 91 92 93 94 95 96 97 98 > >> |