


default search action
11th WICON 2018: Taipei, Taiwan
- Jiann-Liang Chen, Ai-Chun Pang, Der-Jiunn Deng, Chun-Cheng Lin:

Wireless Internet - 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 264, Springer 2019, ISBN 978-3-030-06157-9
Wireless Network
- Chih-Cheng Tseng, Hwang-Cheng Wang, Ling-Han Wang:

Improving Uplink Resource Batch Utilization in LTE Licensed-Assisted Access. 3-13 - Yu-Sun Liu, Shingchern D. You

, Zong-Ru Jhan, Meng-Fan Li:
Comparative Study of Two Signal-to-Noise Ratio Calculation Methods in LTE Downlink Simulations. 14-23 - Xuewei Cai, Bo Li, Mao Yang, Zhongjiang Yan

, Bo Yang, Yi Jin, Xiaobo Li:
Fractional Backoff Algorithm for the Next Generation WLAN. 24-31 - Syrine Lahmadi, Jamel Bel Hadj Tahar:

A60 GHz UWB-MIMO Antenna with Defected Ground for WPAN Applications. 32-40 - Zhao Shen, Bo Li, Mao Yang, Zhongjiang Yan

, Xiaobo Li, Yi Jin:
Research and Performance Evaluation of Spatial Reuse Technology for Next Generation WLAN. 41-51 - Peng Tan, Ding Wang, Mao Yang, Zhongjiang Yan

, Bo Li:
CRJT: Channel Reservation Based Joint Transmission MAC Protocol for the Next Generation WLAN. 52-61
Artificial Intelligence
- Ching-Ming Chao, Pozung Chen, Shih-Yang Yang, Cheng-Hung Yen:

An Efficient MapReduce-Based Apriori-Like Algorithm for Mining Frequent Itemsets from Big Data. 76-85 - Chia-Ming Hsu, He-Yen Hsieh, Setya Widyawan Prakosa

, Muhammad Zulfan Azhari, Jenq-Shiou Leu:
Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection. 86-94 - Shaoqian Wang, Bo Li, Mao Yang, Zhongjiang Yan

:
Intrusion Detection for WiFi Network: A Deep Learning Approach. 95-104 - Jose Marie Mendoza, Vanessa Tan

, Vivencio Fuentes Jr., Gabriel Perez, Nestor Michael C. Tiglao
:
Audio Event Detection Using Wireless Sensor Networks Based on Deep Learning. 105-115
Security
- Shih-Yang Yang, Jian-Wen Peng, Wen-Bing Horng, Ching-Ming Chao:

A Robust Remote Authentication Scheme for M-Commerce Environments. 119-128 - Fang-Yie Leu, Kun-Lin Tsai

, Rui-Ting Hung:
MIH-Based eNB Selection for Untrusted Networks. 129-140 - Neng-Tang Norman Huang, Hui-Lin Lee:

Using Instant Messaging for Collaboration: A Study of the Relationships Among Organizational Trust, Justice, and Spirituality. 141-147 - Cheng-Yong Liu, Cheng Chen:

Application and Challenges of Blockchain Technology to Big Data-Based Credit Reference in China. 148-155 - Hsing-Chung Chen:

A Trust Evaluation Gateway for Distributed Blockchain IoT Network. 156-162 - Chunhsien Sung, Shangchien Lu:

Personal Data and Identifiers: Some Issues Regarding General Data Protection Regulations. 163-169
Internet of Things
- Chung-Ming Huang, Rung-Shiang Cheng, Hsing-Han Chen:

A Channel Selection Method for Device to Device (D2D) Communication Using the Mobile Edge Computing (MEC) Paradigm. 173-182 - Lun-Ping Hung, Cheng-Jung Peng, Chien-Liang Chen:

Using Internet of Things Technology to Improve Patient Safety in Surgical Instrument Sterilization Control. 183-192 - Chia-Wei Chang, Yi-Bing Lin, Jyh-Cheng Chen:

Reporting Mechanisms for Internet of Things. 193-202 - Endah Kristiani

, Chao-Tung Yang
, Yuan-Ting Wang, Chin-Yin Huang
, Po-Cheng Ko:
Container-Based Virtualization for Real-Time Data Streaming Processing on the Edge Computing Architecture. 203-211
Location-Based Services
- Ching-Sheng Wang, Wei-Tsung Su:

An Efficient Mobile AR Navigation System Using Polygon Approximation Based Data Acquisition. 215-224 - Chien-Liang Chen, Ching-Sheng Wang, Ding-Jung Chiang:

Location-Based Hotel Recommendation System. 225-234 - Chih-Kun Ke, Wang-Chi Ho, Kecheng Lu:

Developing a Beacon-Based Location System Using Bluetooth Low Energy Location Fingerprinting for Smart Home Device Management. 235-244
Financial Applications
- Huan-Siang Luo, Kou-Hsiu Tesng:

Applying Information Quantity Analysis to Sold Price of Real Estate. 247-253 - Chih-Ching Hung, Nai-Chang Cheng, Shang-En Yu, Hong-Tsu Young:

Factors Influencing Online Group Buying in Taiwan: An Empirical Study Based on the TPB Framework. 254-262 - Shih-Yung Wei

, Xiu-Wen Ye, Cheng-Yong Liu, Kuo-Chu Yang, Chih-Chun Hou:
Empirical Analysis on Price-volume Relation in the Stock Market of Shanghai and Shenzhen. 263-276 - Shih-Yung Wei

, Xiu-Wen Ye, Cheng-Yong Liu, Chih-Chun Hou:
Heterogeneous Goods, Strategic Investment, and First Mover Advantages: Real Options Theory and Empirical Study. 277-294 - Cheng-Yong Liu, Shih-Yung Wei

, Xiu-Wen Ye:
Analysis on Excess Return and Risk of Individual Stock - The Case Study of China. 295-306
Vehicular Ad Hoc Network
- Yinuo Qin, Bo Li, Zhongjiang Yan

, Mao Yang, Changtian Peng:
A Load Statistics-Based Frequency-Hopping Multiple Access Protocol with QoS Guarantee. 309-318 - Chih-Kun Ke, Szu-Cheng Lai, Li-Te Huang:

Developing a Context-Aware POI Network of Adaptive Vehicular Traffic Routing for Urban Logistics. 319-328 - Le Xu, Yuliang Tang

:
Efficient 3D Placement of Drone Base Stations with Frequency Planning. 329-338 - Zhiping Lin, Wenting Zeng, Weihong Xu, Yuliang Tang:

GLCV: A Routing Scheme Based on Geographic Link Connectivity Management for Urban Vehicular Environments. 339-349
Services and Applications
- Chih-Ching Hung, Shang-En Yu, Nai-Chang Cheng, Chun-Hsien Wang, Wen-Hsin Chiang, Hong-Tsu Young:

An Investigation of Alliance Portfolio Diversity Impact on Firm Performance. 353-366 - Pei-Fen Tsai:

Research on the Related Issues About the Service of Mutual Legal Assistance Documents Through Electronic Delivery. 367-374 - Wen-Chi Chen, Jin-De Chang, Wen-Hong Chiu, Cheng-Lung Lee, Hui-Ru Chi, Pei-Fen Tsai:

Mathematical Demonstration of Astronomical and Geographical Knowledge. 375-386 - Ku-Yun Chen:

Practical Internet Usage for Cultural Appropriation Development. 387-392 - Huan-Siang Luo, Yee-Chaur Lee:

Applying Information Quantity Analysis to the Ecological Conservation Development. 393-399

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














