Linked e-resources

Details

Invited Paper
High-Radix Interconnection Networks. -Algorithms, Bioinformatics, and Computation Theory
String editing under pattern constraints
Priority Algorithms with Advice for Disjoint Path Allocation Problems (Extended Abstract)
On Two Variants of Induced Matchings
A tree structure for local diagnosis in multiprocessor systems under comparison model
Multiagent Learning for Competitive Opinion Optimization (Extended Abstract)
The Maximum Zero-Sum Partition Problem
Combined Bayesian and RNN-based Hyperparameter Optimization for Efficient Model Selection Applied for autoML
Adiabatic Quantum Computation for Cyber Attack and Defense Strategies
Computation Offloading Algorithm Based on Deep Reinforcement Learning and Multi-Task Dependency for Edge Computing
A Comparison Diagnosis Algorithm for Conditional Fault Local Diagnosis of Multiprocessor Systems
Novel ways of enumerating restrained dominating sets of cycles
Fault Diagnosability of Multigraph Matching Composition Networks
Generating Scale-Free Outerplanar Networks
Hamiltonian Properties of the Dragonfly Network
Fine Grained Space Complexity and the Linear Space Hypothesis (Preliminary Report)
Partition-Edge Fault-Tolerant Hamiltonicity of Pancake Graphs
Cloud Computing and Big Data
Query Regrouping Problem on Tree Structure for GPUs Accelerated Platform
The Enhancement of Classification of Imbalanced Dataset for Edge Computing
Development of Personnel Epidemic Prevention Monitoring Access Control System
The Use of Serverless Processing in Web Application Development
Scaling Model for vIMS on the Cloud
Using classification algorithms to predict Taiwan Stock Market - A Case study of Taiwan Index Futures
Semi-Automatic Chatbot Generation for Web APIs
Prediction of Middle-Aged Unhealthy Facial Skin using VGG19 and Support Vector Machine Models
Computer Vision and Image Processing
Real-Time Intentional Eye Blink Detection Using Rhombus Identification
Difficulty-Aware Mixup for Replay-based Continual Learning
Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology
GAN-based Criminal Suspect Face Generator
Cryptography and Information Security
Automatic Summarization of Critial Threat Intelligence Using Transfer Learning
Anti-screenshot Watermarking Algorithm about Archives Image Based on Deep Learning Model
Detecting Android malware by combining system call sequence relationships with local feature calculation
A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments
Image compression and meaningful ciphertext encryption based on improved infinite collapse 2D hyperchaos and histogram shift embedding
A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification
Electronics and Information Technology
Applying an IoT Analytics Framework in East Asia Area
Android Malware Classifier Combining Permissions and API Features to face model drifting
Design and Implementation of the Optimized Computing Architecture for Matrix Decomposition Algorithms
Design and Implememtation of The CNN Accelator Based on Multi-streaming SIMD Mechanisms
Design and Implementation of The Link-list DMA Controller for High Bandwidth Data Streaming
STEM Education Meets HPC
Research on KNN-based GNSS Coordinate Classification for Epidemic Management
An Improved Light Weight Countermeasure Scheme to Efficiently Mitigate TCP Attacks in SDN
The Effectiveness of Block-based Visualized Programming Learning on the problem-solving skills of the Freshmen
Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log Mining
The impact of live streaming on personal purchase behavior
Stochastic-Gradient-Descent-Based Max-Margin Early Event Detector
AHP-based Assessment of Developing Online Virtual Reality Services with Progressive Web Apps
From Data of Internet of Things to Domain Knowledge: A Case Study of Exploration in Smart Agriculture
Physical Layer Coding and Cryptanalysis for The Security Communications
Mobile Computation and Wireless Communication
5G Network Slice Scalability based on Management Data Analytics Function (MDAF)
Design and Analysis for Wireless Tire Pressure Sensing System
Ubiquitous Cybersecurity and Forensics
Preserving Collusion-free and Traceability in Car-sharing System based on Blockchain
Utilization of Theoretical Domains Framework (TDF) to Validate the Digital Piracy Behaviour Constructs A systematic Literature Review Study
Domain-specific Anomaly Detection for In-vehicle Networks
LED: Learnable Encryption with Deniability
Module Architecture of Docker Image and Container Security
High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube.

Browse Subjects

Show more subjects...

Statistics

from
to
Export