網際網路技術學刊,201907,(20:4期)-ERICDATA高等教育知識庫
熱門:
羅文君
赵志纯
蘇玲慧
吳清山
侯一欣
陳淑敏
首頁
臺灣期刊
學校系所
學協會
民間出版
大陸/海外期刊
政府機關
學校系所
學協會
民間出版
DOI註冊服務
首頁
臺灣期刊
學協會基金會
網際網路技術學刊
201907 (20:4期)
網際網路技術學刊
Journal of Internet Technology
全文閱讀@
201907 (20:4期)期所有篇
An Architecture-Centric Development Approach for Service-Oriented Product Lines
An Architecture-Centric Development Approach for Service-Oriented Product Lines
Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems
Secure Routing for WSN-Based Tactical-Level Intelligent Transportation Systems
Novel Attack Tree Analysis Scheme to Assess the Security Risks on the Cloud Platform
Novel Attack Tree Analysis Scheme to Assess the Security Risks on the Cloud Platform
Information Retrieval Using the Reduced Row Echelon Form of a Term-Document Matrix
Information Retrieval Using the Reduced Row Echelon Form of a Term-Document Matrix
BitTorrent Locality-Awareness Application with Colorless ONUs in an Enhanced EPON System
BitTorrent Locality-Awareness Application with Colorless ONUs in an Enhanced EPON System
TS-SMOSA: A Multi-Objective Optimization Method for Task Scheduling in Mobile Edge Computing
TS-SMOSA: A Multi-Objective Optimization Method for Task Scheduling in Mobile Edge Computing
DBTCP: A Transmission Mechanism of the Backup for Disaster Recovery in DCNs
DBTCP: A Transmission Mechanism of the Backup for Disaster Recovery in DCNs
A Novel Approach to Adaptive Flow Scheduling for Energy Efficient Data Center Network
A Novel Approach to Adaptive Flow Scheduling for Energy Efficient Data Center Network
An Efficient Approach of GPU-accelerated Stochastic Gradient Descent Method for Matrix Factorization
An Efficient Approach of GPU-accelerated Stochastic Gradient Descent Method for Matrix Factorization
An Algorithmic Approach for Core Election in Mobile Ad-hoc Network
An Algorithmic Approach for Core Election in Mobile Ad-hoc Network
An Efficient and Secure Smart Card Based Authentication Scheme
An Efficient and Secure Smart Card Based Authentication Scheme
Constructing Competence Indicators for Makers in Elementary School
Constructing Competence Indicators for Makers in Elementary School
Efficient Certificate Based One-pass Authentication Protocol for IMS
Efficient Certificate Based One-pass Authentication Protocol for IMS
A Novel Rough Fuzzy Clustering Algorithm with A New Similarity Measurement
A Novel Rough Fuzzy Clustering Algorithm with A New Similarity Measurement
A Forwarder Based Temperature Aware Routing Protocol in Wireless Body Area Networks
A Forwarder Based Temperature Aware Routing Protocol in Wireless Body Area Networks
A Novel Method of Speech Information Hiding Based on 3D-Magic Matrix
A Novel Method of Speech Information Hiding Based on 3D-Magic Matrix
Local and Outsourced Simultaneous Verification of Pairing-based Signatures
Local and Outsourced Simultaneous Verification of Pairing-based Signatures
An Improvised Sub-Document Based Framework for Efficient Document Clustering
An Improvised Sub-Document Based Framework for Efficient Document Clustering
Hierarchical Feature Selection with Orthogonal Transfer
Hierarchical Feature Selection with Orthogonal Transfer
An Efficient Implementation of Artificial Neural Networks with K-fold Cross-validation for Process Optimization
An Efficient Implementation of Artificial Neural Networks with K-fold Cross-validation for Process Optimization
Calibration Method Simulation of Linear-array Hydrophone in Underwater Acoustic Network
Calibration Method Simulation of Linear-array Hydrophone in Underwater Acoustic Network
Short-time Traffic Flow Prediction Based on Wavelet Neural Network
Short-time Traffic Flow Prediction Based on Wavelet Neural Network
Secure Human Authentication with Graphical Passwords
Secure Human Authentication with Graphical Passwords
Multiple Task-driven Face Detection Based on Super-resolution Pyramid Network
Multiple Task-driven Face Detection Based on Super-resolution Pyramid Network
Application of Google Trends to Forecast Tourism Demand
Application of Google Trends to Forecast Tourism Demand
Mitigating DoS Attacks in SDN Using Offloading Path Strategies
Mitigating DoS Attacks in SDN Using Offloading Path Strategies
Super Connectivity and Diagnosability of Crossed Cubes
Super Connectivity and Diagnosability of Crossed Cubes
A New Method to Detect the Adversarial Attack Based on the Residual Image
A New Method to Detect the Adversarial Attack Based on the Residual Image
Finding Potential Objects in Uncertain Dataset by Using Competition Power
Finding Potential Objects in Uncertain Dataset by Using Competition Power
The Prototype of the Integration between Low Cost Single Private LoRa Gateway and Public AIS NB-IOT
The Prototype of the Integration between Low Cost Single Private LoRa Gateway and Public AIS NB-IOT
教師服務
合作出版
期刊徵稿
聯絡高教
高教FB
讀者服務
圖書目錄
教育期刊
訂購服務
活動訊息
數位服務
高等教育知識庫
國際資料庫收錄
投審稿系統
DOI註冊
線上購買
高點網路書店
元照網路書店
博客來網路書店
教育資源
教育網站
國際教育網站
關於高教
高教簡介
出版授權
合作單位
知識達
知識達
知識達
知識達
知識達
知識達
版權所有‧轉載必究 Copyright2011 高等教育文化事業股份有限公司 All Rights Reserved
服務信箱:edubook@edubook.com.tw 台北市館前路 26 號 6 樓 Tel:+886-2-23885899 Fax:+886-2-23892500