default search action
11th WICON 2018: Taipei, Taiwan
- Jiann-Liang Chen, Ai-Chun Pang, Der-Jiunn Deng, Chun-Cheng Lin:
Wireless Internet - 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 264, Springer 2019, ISBN 978-3-030-06157-9
Wireless Network
- Chih-Cheng Tseng, Hwang-Cheng Wang, Ling-Han Wang:
Improving Uplink Resource Batch Utilization in LTE Licensed-Assisted Access. 3-13 - Yu-Sun Liu, Shingchern D. You, Zong-Ru Jhan, Meng-Fan Li:
Comparative Study of Two Signal-to-Noise Ratio Calculation Methods in LTE Downlink Simulations. 14-23 - Xuewei Cai, Bo Li, Mao Yang, Zhongjiang Yan, Bo Yang, Yi Jin, Xiaobo Li:
Fractional Backoff Algorithm for the Next Generation WLAN. 24-31 - Syrine Lahmadi, Jamel Bel Hadj Tahar:
A60 GHz UWB-MIMO Antenna with Defected Ground for WPAN Applications. 32-40 - Zhao Shen, Bo Li, Mao Yang, Zhongjiang Yan, Xiaobo Li, Yi Jin:
Research and Performance Evaluation of Spatial Reuse Technology for Next Generation WLAN. 41-51 - Peng Tan, Ding Wang, Mao Yang, Zhongjiang Yan, Bo Li:
CRJT: Channel Reservation Based Joint Transmission MAC Protocol for the Next Generation WLAN. 52-61
Artificial Intelligence
- Ching-Ming Chao, Pozung Chen, Shih-Yang Yang, Cheng-Hung Yen:
An Efficient MapReduce-Based Apriori-Like Algorithm for Mining Frequent Itemsets from Big Data. 76-85 - Chia-Ming Hsu, He-Yen Hsieh, Setya Widyawan Prakosa, Muhammad Zulfan Azhari, Jenq-Shiou Leu:
Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detection. 86-94 - Shaoqian Wang, Bo Li, Mao Yang, Zhongjiang Yan:
Intrusion Detection for WiFi Network: A Deep Learning Approach. 95-104 - Jose Marie Mendoza, Vanessa Tan, Vivencio Fuentes Jr., Gabriel Perez, Nestor Michael C. Tiglao:
Audio Event Detection Using Wireless Sensor Networks Based on Deep Learning. 105-115
Security
- Shih-Yang Yang, Jian-Wen Peng, Wen-Bing Horng, Ching-Ming Chao:
A Robust Remote Authentication Scheme for M-Commerce Environments. 119-128 - Fang-Yie Leu, Kun-Lin Tsai, Rui-Ting Hung:
MIH-Based eNB Selection for Untrusted Networks. 129-140 - Neng-Tang Norman Huang, Hui-Lin Lee:
Using Instant Messaging for Collaboration: A Study of the Relationships Among Organizational Trust, Justice, and Spirituality. 141-147 - Cheng-Yong Liu, Cheng Chen:
Application and Challenges of Blockchain Technology to Big Data-Based Credit Reference in China. 148-155 - Hsing-Chung Chen:
A Trust Evaluation Gateway for Distributed Blockchain IoT Network. 156-162 - Chunhsien Sung, Shangchien Lu:
Personal Data and Identifiers: Some Issues Regarding General Data Protection Regulations. 163-169
Internet of Things
- Chung-Ming Huang, Rung-Shiang Cheng, Hsing-Han Chen:
A Channel Selection Method for Device to Device (D2D) Communication Using the Mobile Edge Computing (MEC) Paradigm. 173-182 - Lun-Ping Hung, Cheng-Jung Peng, Chien-Liang Chen:
Using Internet of Things Technology to Improve Patient Safety in Surgical Instrument Sterilization Control. 183-192 - Chia-Wei Chang, Yi-Bing Lin, Jyh-Cheng Chen:
Reporting Mechanisms for Internet of Things. 193-202 - Endah Kristiani, Chao-Tung Yang, Yuan-Ting Wang, Chin-Yin Huang, Po-Cheng Ko:
Container-Based Virtualization for Real-Time Data Streaming Processing on the Edge Computing Architecture. 203-211
Location-Based Services
- Ching-Sheng Wang, Wei-Tsung Su:
An Efficient Mobile AR Navigation System Using Polygon Approximation Based Data Acquisition. 215-224 - Chien-Liang Chen, Ching-Sheng Wang, Ding-Jung Chiang:
Location-Based Hotel Recommendation System. 225-234 - Chih-Kun Ke, Wang-Chi Ho, Ke-Cheng Lu:
Developing a Beacon-Based Location System Using Bluetooth Low Energy Location Fingerprinting for Smart Home Device Management. 235-244
Financial Applications
- Huan-Siang Luo, Kou-Hsiu Tesng:
Applying Information Quantity Analysis to Sold Price of Real Estate. 247-253 - Chih-Ching Hung, Nai-Chang Cheng, Shang-En Yu, Hong-Tsu Young:
Factors Influencing Online Group Buying in Taiwan: An Empirical Study Based on the TPB Framework. 254-262 - Shih-Yung Wei, Xiu-Wen Ye, Cheng-Yong Liu, Kuo-Chu Yang, Chih-Chun Hou:
Empirical Analysis on Price-volume Relation in the Stock Market of Shanghai and Shenzhen. 263-276 - Shih-Yung Wei, Xiu-Wen Ye, Cheng-Yong Liu, Chih-Chun Hou:
Heterogeneous Goods, Strategic Investment, and First Mover Advantages: Real Options Theory and Empirical Study. 277-294 - Cheng-Yong Liu, Shih-Yung Wei, Xiu-Wen Ye:
Analysis on Excess Return and Risk of Individual Stock - The Case Study of China. 295-306
Vehicular Ad Hoc Network
- Yinuo Qin, Bo Li, Zhongjiang Yan, Mao Yang, Changtian Peng:
A Load Statistics-Based Frequency-Hopping Multiple Access Protocol with QoS Guarantee. 309-318 - Chih-Kun Ke, Szu-Cheng Lai, Li-Te Huang:
Developing a Context-Aware POI Network of Adaptive Vehicular Traffic Routing for Urban Logistics. 319-328 - Le Xu, Yuliang Tang:
Efficient 3D Placement of Drone Base Stations with Frequency Planning. 329-338 - Zhiping Lin, Wenting Zeng, Weihong Xu, Yuliang Tang:
GLCV: A Routing Scheme Based on Geographic Link Connectivity Management for Urban Vehicular Environments. 339-349
Services and Applications
- Chih-Ching Hung, Shang-En Yu, Nai-Chang Cheng, Chun-Hsien Wang, Wen-Hsin Chiang, Hong-Tsu Young:
An Investigation of Alliance Portfolio Diversity Impact on Firm Performance. 353-366 - Pei-Fen Tsai:
Research on the Related Issues About the Service of Mutual Legal Assistance Documents Through Electronic Delivery. 367-374 - Wen-Chi Chen, Jin-De Chang, Wen-Hong Chiu, Cheng-Lung Lee, Hui-Ru Chi, Pei-Fen Tsai:
Mathematical Demonstration of Astronomical and Geographical Knowledge. 375-386 - Ku-Yun Chen:
Practical Internet Usage for Cultural Appropriation Development. 387-392 - Huan-Siang Luo, Yee-Chaur Lee:
Applying Information Quantity Analysis to the Ecological Conservation Development. 393-399
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.