網際網路技術學刊,201805,(19:3期)-ERICDATA高等教育知識庫
熱門:
張敏琪
楊惠卿
李明昆
王善边
朱丽彬
黃光男
首頁
臺灣期刊
學校系所
學協會
民間出版
大陸/海外期刊
政府機關
學校系所
學協會
民間出版
DOI註冊服務
首頁
臺灣期刊
學協會基金會
網際網路技術學刊
201805 (19:3期)
網際網路技術學刊
Journal of Internet Technology
全文閱讀@
201805 (19:3期)期所有篇
Group Key Based Session Key Establishment Protocol for a Secure Remote Vehicle Diagnosis
Group Key Based Session Key Establishment Protocol for a Secure Remote Vehicle Diagnosis
An Improved Filtering Method Applied in Digital Mobile Terminal for Images Getting from Wireless Network Remote Transmission
An Improved Filtering Method Applied in Digital Mobile Terminal for Images Getting from Wireless Network Remote Transmission
Text Coverless Information Hiding Method Based on Hybrid Tags
Text Coverless Information Hiding Method Based on Hybrid Tags
Exploiting a Self-learning Predictor for Session-based Remote Management Systems in a Large-scale Environment
Exploiting a Self-learning Predictor for Session-based Remote Management Systems in a Large-scale Environment
MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps ·
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
Fuzzy Decision Load-balancing Algorithm for Cloud-based Terminal Services
Fuzzy Decision Load-balancing Algorithm for Cloud-based Terminal Services
Uncertain Composition of Web Services via Non-Deterministic Planning
Uncertain Composition of Web Services via Non-Deterministic Planning
Improving the Performance of Wikipedia Based on the Entry Relationship between Articles
Improving the Performance of Wikipedia Based on the Entry Relationship between Articles
A Two-Level Intelligent Web Caching Scheme with a Hybrid Extreme Learning Machine and Least Frequently Used
A Two-Level Intelligent Web Caching Scheme with a Hybrid Extreme Learning Machine and Least Frequently Used
New Security Concurrent Signature Design
New Security Concurrent Signature Design
Intelligent Agents in Securing Internet
Intelligent Agents in Securing Internet
A Context and Emotion Aware System for Personalized Music Recommendation
A Context and Emotion Aware System for Personalized Music Recommendation
Distributed and Load Adaptive Energy Management Algorithm for Ethernet Green Routers
Distributed and Load Adaptive Energy Management Algorithm for Ethernet Green Routers
A Bandwidth-Efficient MAC Scheme for Mission-Critical Applications in Industrial Wireless Sensor Networks
A Bandwidth-Efficient MAC Scheme for Mission-Critical Applications in Industrial Wireless Sensor Networks
A Distribution Outsourcing Scheme Based on Partial Image Encryption
A Distribution Outsourcing Scheme Based on Partial Image Encryption
Trajectory Topic Modelling to Characterize Driving Behaviors with GPS-Based Trajectory Data
Trajectory Topic Modelling to Characterize Driving Behaviors with GPS-Based Trajectory Data
CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing
CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing
A Green and Secure IoT Framework for Intelligent Buildings based on Fog Computing
A Green and Secure IoT Framework for Intelligent Buildings based on Fog Computing
A Framework to Address Communication Issues during Requirements Engineering Process for Software Development Outsourcing
A Framework to Address Communication Issues during Requirements Engineering Process for Software Development Outsourcing
Facebook Interactions Utilization for Addressing Recommender Systems Cold Start Problem across System Domain
Facebook Interactions Utilization for Addressing Recommender Systems Cold Start Problem across System Domain
Implementation of Android Application for Indoor Positioning System with Estimote BLE Beacons
Implementation of Android Application for Indoor Positioning System with Estimote BLE Beacons
Malware Detection Using Semantic Features and Improved Chi-square
Malware Detection Using Semantic Features and Improved Chi-square
Medical Advertising Content Filtering System in Online Knowledge Sharing Service
Medical Advertising Content Filtering System in Online Knowledge Sharing Service
Adaptive Control of IoT Wireless Networks in Shadowed Fading Channels
Adaptive Control of IoT Wireless Networks in Shadowed Fading Channels
A Coverage and Repair Optimization Algorithm for Hybrid Sensor Networks
A Coverage and Repair Optimization Algorithm for Hybrid Sensor Networks
Hybrid Recommendation Algorithm based on Latent Factor Model and PersonalRank
Hybrid Recommendation Algorithm based on Latent Factor Model and PersonalRank
Wireless Network Localization Algorithm Based on Tikhonov Regularization for Anisotropic Networks
Wireless Network Localization Algorithm Based on Tikhonov Regularization for Anisotropic Networks
Multiple-Instance Support Vector Machine Based on a New Local Feature of Hierarchical Weighted Spatio-Temporal Interest Points
Multiple-Instance Support Vector Machine Based on a New Local Feature of Hierarchical Weighted Spatio-Temporal
Prompt Image Search with Deep Convolutional Neural Network via Efficient Hashing Code and Addictive Latent Semantic Layer
Prompt Image Search with Deep Convolutional Neural Network via Efficient Hashing Code and Addictive Latent Semantic Layer
MeteCloud: Meteorological Cloud Computing Platform for Mobile Weather Forecasts based on Energy-aware Scheduling
MeteCloud: Meteorological Cloud Computing Platform for Mobile Weather Forecasts based on Energy-aware Scheduling
教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達
知識達
知識達
知識達
知識達
知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司 All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500