網際網路技術學刊,201801,(19:1期)-ERICDATA高等教育知識庫
熱門:
朱丽彬
黃光男
王美玲
王善边
曾瓊瑤
崔雪娟
首頁
臺灣期刊
學校系所
學協會
民間出版
大陸/海外期刊
政府機關
學校系所
學協會
民間出版
DOI註冊服務
首頁
臺灣期刊
學協會基金會
網際網路技術學刊
201801 (19:1期)
網際網路技術學刊
Journal of Internet Technology
全文閱讀@
201801 (19:1期)期所有篇
Modified Discrete Glowworm Swarm Optimization Algorithm Based on Time Window Division for Multi-objective VRPTW
Modified Discrete Glowworm Swarm Optimization Algorithm Based on Time Window Division for Multi-objective VRPTW
A Performance-oriented Resource Allocation Algorithm with Insertion and Duplication for IaaS Clouds
A Performance-oriented Resource Allocation Algorithm with Insertion and Duplication for IaaS Clouds
Health Evaluation of a Domain Name System Based on the Analytic Hierarchy Process
Health Evaluation of a Domain Name System Based on the Analytic Hierarchy Process
An Approach to Improve Efficiency of Traditional Automated Trust Negotiation Strategies
An Approach to Improve Efficiency of Traditional Automated Trust Negotiation Strategies
Web Service Aggregation and Selection Based on Join Operation in RDB
Web Service Aggregation and Selection Based on Join Operation in RDB
Android App Copy Protection Mechanism with Semi-trusted Loader
Android App Copy Protection Mechanism with Semi-trusted Loader
QoS-Aware Routing in Wireless Networks Using Aerial Vehicles
QoS-Aware Routing in Wireless Networks Using Aerial Vehicles
Fingerprint Liveness Detection Adapted to Different Fingerprint Sensors Based on Multiscale Wavelet Transform and Rotation-Invarient Local Binary Pattern
Fingerprint Liveness Detection Adapted to Different Fingerprint Sensors Based on Multiscale Wavelet Transform and Rotation-Invarient Local Binary Pattern
Bit Rate-based H.264 Video Copy Detection
Bit Rate-based H.264 Video Copy Detection
An Energy Conserving Reversible and Irreversible Digital Watermarking Hybrid Scheme for Cluster-based Wireless Sensor Networks
An Energy Conserving Reversible and Irreversible Digital Watermarking Hybrid Scheme for Cluster-based Wireless Sensor Networks
An Energy-balanced Cluster Head Selection Method for Clustering Routing in WSN
An Energy-balanced Cluster Head Selection Method for Clustering Routing in WSN
A List-wise Matrix Factorization Based POI Recommendation by Fusing Multi-Tag, Social and Geographical Influences
A List-wise Matrix Factorization Based POI Recommendation by Fusing Multi-Tag, Social and Geographical Influences
Lyapunov-based Traffic Scheduling and Optimization in Smart Distribution Grid Communication Networks
Lyapunov-based Traffic Scheduling and Optimization in Smart Distribution Grid Communication Networks
A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment
A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment
A Tool for Access Control Policy Validation
A Tool for Access Control Policy Validation
A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack
A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack
A Queueing Model Based Periodical ACPI Global State Control for Web Server Cluster Energy Management
A Queueing Model Based Periodical ACPI Global State Control for Web Server Cluster Energy Management
Hybrid Clouds for Web Systems: Usability and Performance
Hybrid Clouds for Web Systems: Usability and Performance
A State-Space Approach for Service-oriented SLA Translation
A State-Space Approach for Service-oriented SLA Translation
Logic and Event Based Semantic Relationship Evolution in Service Semantic Link Network
Logic and Event Based Semantic Relationship Evolution in Service Semantic Link Network
A Performance-oriented Resource Allocation Algorithm with Insertion and Duplication for IaaS Clouds
A Performance-oriented Resource Allocation Algorithm with Insertion and Duplication for IaaS Clouds
A Two-Stage Failover Mechanism for High Availability in Service Function Chaining
A Two-Stage Failover Mechanism for High Availability in Service Function Chaining
An Energy-efficient Secure AODV Protocol in Industrial Sensor Network
An Energy-efficient Secure AODV Protocol in Industrial Sensor Network
Social Network Anonymization via Local-perturbing Approach
Social Network Anonymization via Local-perturbing Approach
A Comparison Model for WLAN Technologies, 802.11n and HeNB in LTE and the Future 5G Networks
A Comparison Model for WLAN Technologies, 802.11n and HeNB in LTE and the Future 5G Networks
Overload Control Technique for MTC Communications in Wireless Cellular Networks
Overload Control Technique for MTC Communications in Wireless Cellular Networks
Designing VNT Candidates Robust Against Network Failures
Designing VNT Candidates Robust Against Network Failures
High Precision Vehicle Positioning: Towards Cooperative Driving Based on VANET
High Precision Vehicle Positioning: Towards Cooperative Driving Based on VANET
Fog Computing Service Orchestration Mechanisms for 5G Networks
Fog Computing Service Orchestration Mechanisms for 5G Networks
Position-freshness Based Intermediate Vehicle Filtering Layer with Intersection Detection for VANET
Position-freshness Based Intermediate Vehicle Filtering Layer with Intersection Detection for VANET
教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達
知識達
知識達
知識達
知識達
知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司 All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500