Behaviorial-Based Network Flow Analyses For Anomaly Detection In Sequential Data Using Temporal Convolutional Networks | 0 | 0.34 | 2019 |
An Exercise Fatigue Detection Model Based on Machine Learning Methods. | 0 | 0.34 | 2018 |
A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices | 0 | 0.34 | 2018 |
An Augmented Reality Question Answering System Based on Ensemble Neural Networks. | 1 | 0.35 | 2017 |
Using ontologies to perform threat analysis and develop defensive strategies for mobile security | 3 | 0.39 | 2017 |
A Face-Recognition Approach Using Deep Reinforcement Learning Approach for User Authentication | 0 | 0.34 | 2017 |
Using Malware For Software-Defined Networking-Based Smart Home Security Management Through A Taint Checking Approach | 1 | 0.34 | 2016 |
Vehicle Localization and Velocity Estimation Based on Mobile Phone Sensing. | 5 | 0.52 | 2016 |
An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine | 0 | 0.34 | 2016 |
A Wearable Channel Selection-Based Brain-Computer Interface for Motor Imagery Detection. | 6 | 0.49 | 2016 |
Using Dynamic Taint Approach for Malware Threat. | 0 | 0.34 | 2015 |
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory | 3 | 0.41 | 2015 |
A reputation-based computing approach in trusted web service provisions. | 0 | 0.34 | 2015 |
A trustworthy QoS-based collaborative filtering approach for web service discovery. | 16 | 0.80 | 2014 |
Using Taint Analysis for Threat Risk of Cloud Applications | 0 | 0.34 | 2014 |
Research of Ontology and Semantic Web Apply for Building Information Model | 0 | 0.34 | 2013 |
A Social Trust Based Recommendation Mechanism for Web Service Dynamic Collaboration | 3 | 0.45 | 2013 |
A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management | 1 | 0.35 | 2013 |
Traffic speed estimation based on normal location updates and call arrivals from cellular networks. | 4 | 0.89 | 2013 |
Distributed dynamic data driven prediction based on reinforcement learning approach | 2 | 0.37 | 2013 |
A hybrid information security risk assessment procedure considering interdependences between controls | 18 | 0.85 | 2012 |
A green positioning algorithm for Campus Guidance System | 4 | 1.15 | 2012 |
Mitigating routing misbehavior in Dynamic Source Routing protocl using trust-based reputation mechanism for wireless ad-hoc networks | 2 | 0.37 | 2011 |
Intelligent interactive system for collaborative green computing | 1 | 0.36 | 2011 |
An evidence-based scheme for web service selection | 16 | 0.79 | 2011 |
A channel-based key management protocol for IPTV service | 0 | 0.34 | 2011 |
A Consumer Trust-Based Approach in Web Services Selection | 0 | 0.34 | 2011 |
Ubiquitous Healthcare Service System with Context-awareness Capability: Design and Implementation | 10 | 0.65 | 2011 |
Service-oriented dynamic data driven application systems to potential field method vehicle navigation | 1 | 0.37 | 2011 |
Multi-group QoS consensus for web services | 7 | 0.52 | 2011 |
A user centric service-oriented modeling approach | 14 | 0.63 | 2011 |
Mobile merchandise evaluation service using novel information retrieval and image recognition technology | 5 | 0.48 | 2011 |
A Two-Key Agreement Based Supervising Mechanism for Cluster-Based Peer-to-Peer Applications | 0 | 0.34 | 2010 |
Threshold Based Group-Oriented Nominative Proxy Signature Scheme for Digital Rights Management | 0 | 0.34 | 2010 |
Service-oriented dynamic data driven application systems to traffic signal control | 3 | 0.45 | 2010 |
Service Selection Based on Fuzzy TOPSIS Method | 17 | 0.78 | 2010 |
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks | 73 | 3.00 | 2010 |
Personalized blog content recommender system for mobile phone users | 17 | 0.77 | 2010 |
On optimal decision for QoS-aware composite service selection | 33 | 1.06 | 2010 |
Dynamic data driven smart home system based on a Service Component Architecture | 3 | 0.52 | 2010 |
Integrating Semantic Web and Object-Oriented Programming for Cooperative Design | 1 | 0.35 | 2009 |
A reputation scheme with witness reasoning for service selection | 2 | 0.38 | 2009 |
Fuzzy Similarity Clustering For Consumer-Centric Qos-Aware Selection Of Web Services | 4 | 0.41 | 2009 |
A Reputation-Based Service Selection Scheme | 6 | 0.49 | 2009 |
QoS-Aware Service Selection under Consumer's Reputation | 3 | 0.45 | 2008 |
A study on e-Taiwan information system security classification and implementation | 8 | 0.79 | 2008 |
Consumer-centric QoS-aware selection of web services | 17 | 0.78 | 2008 |
A Study on Representation of QoS in UDDI for Web Services Composition | 3 | 0.42 | 2008 |
A Semantic Web Methodology for Situation-Aware Curative Food Service Recommendation System | 3 | 0.41 | 2008 |
A fuzzy outranking approach in risk analysis of web service security | 7 | 0.71 | 2007 |