Abstract is missing.
- High-Radix Interconnection NetworksDong Xiang. 3-9 [doi]
- String Editing Under Pattern ConstraintsRobert D. Barish, Tetsuo Shibuya. 13-24 [doi]
- Priority Algorithms with Advice for Disjoint Path Allocation Problems (Extended Abstract)Hans-Joachim Böckenhauer, Fabian Frei, Silvan Horvath. 25-36 [doi]
- On Two Variants of Induced MatchingsJuhi Chaudhary, B. S. Panda 0001. 37-48 [doi]
- A Tree Structure for Local Diagnosis in Multiprocessor Systems Under Comparison ModelMeirun Chen, Cheng-Kuan Lin, Kung-Jui Pai. 49-60 [doi]
- Multiagent Learning for Competitive Opinion Optimization (Extended Abstract)Po-An Chen, Chi-Jen Lu, Chuang-Chieh Lin, Ke-Wei Fu. 61-72 [doi]
- The Maximum Zero-Sum Partition ProblemGuillaume Fertin, Oscar Fontaine, Géraldine Jean, Stéphane Vialette. 73-85 [doi]
- Combined Bayesian and RNN-Based Hyperparameter Optimization for Efficient Model Selection Applied for autoMLRuei-Sing Guan, Yu-Chee Tseng, Jen-Jee Chen, Po-Tsun Kuo. 86-97 [doi]
- Adiabatic Quantum Computation for Cyber Attack and Defense StrategiesSanpawat Kantabutra. 98-110 [doi]
- Computation Offloading Algorithm Based on Deep Reinforcement Learning and Multi-Task Dependency for Edge ComputingTengxiang Lin, Cheng-Kuan Lin, Zhen Chen, Hongju Cheng. 111-122 [doi]
- A Comparison Diagnosis Algorithm for Conditional Fault Local Diagnosis of Multiprocessor SystemsYali Lv, Cheng-Kuan Lin, D. Frank Hsu, Jianxi Fan. 123-134 [doi]
- Novel Ways of Enumerating Restrained Dominating Sets of CyclesSushmita Paul, Ratanjeet Pratap Chauhan, Srinibas Swain. 135-144 [doi]
- Fault Diagnosability of Multigraph Matching Composition NetworksXiao-Wen Qin, Rong-Xia Hao, Sheng-Lung Peng. 145-155 [doi]
- Generating Scale-Free Outerplanar NetworksMd. Tahmidur Rafid, Rabeeb Ibrat, Md. Saidur Rahman. 156-166 [doi]
- Hamiltonian Properties of the Dragonfly NetworkSuying Wu, Baolei Cheng, Yan Wang 0078, Yuejuan Han, Jianxi Fan. 167-179 [doi]
- Fine Grained Space Complexity and the Linear Space Hypothesis (Preliminary Report)Tomoyuki Yamakami. 180-191 [doi]
- Partition-Edge Fault-Tolerant Hamiltonicity of Pancake GraphsKun Zhao, Hongbin Zhuang, Xiao-yan Li, Fangying Song, Lichao Su. 192-204 [doi]
- Query Regrouping Problem on Tree Structure for GPUs Accelerated PlatformChe-Wei Chang, Xinyu Zhang, Hung-Chang Hsiao. 207-211 [doi]
- The Enhancement of Classification of Imbalanced Dataset for Edge ComputingChih-Ming Huang, Ming-Ya Hsu, Chuan-Sheng Hung, Chun-Hung Richard Lin, Shi-Huang Chen. 212-222 [doi]
- Development of Personnel Epidemic Prevention Monitoring Access Control SystemShih-Wen Jiang, Syuan-You Chen, Whai-En Chen, Hsin-Te Wu. 223-229 [doi]
- The Use of Serverless Processing in Web Application DevelopmentRobert Banaszak, Anna Kobusinska. 230-242 [doi]
- Scaling Model for vIMS on the CloudMing-Huang Tsai, Yun-He Wang 0002, Wu-Chun Chung. 243-254 [doi]
- Using Classification Algorithms to Predict Taiwan Stock Market - A Case Study of Taiwan Index FuturesChen-Shu Wang, Yean-Lin Lee. 255-266 [doi]
- Semi-automatic Chatbot Generation for Web APIsSheng-Kai Wang, Wan-Lin You, Shang-Pin Ma. 267-278 [doi]
- Prediction of Middle-Aged Unhealthy Facial Skin Using VGG19 and Support Vector Machine ModelsRita Wiryasaputra, Chin-Yin Huang, Rio Williyanto, Chao-Tung Yang. 279-289 [doi]
- Real-Time Intentional Eye Blink Detection Using Rhombus IdentificationAlan Shu-Luen Chang. 293-304 [doi]
- Difficulty-Aware Mixup for Replay-based Continual LearningYu-Kai Ling, Ren Chieh Yang, Sheng-De Wang. 305-316 [doi]
- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement TechnologyKai-Xiang Liu, Chuan-Yu Chang, Huei-Ming Ma. 317-328 [doi]
- GAN-Based Criminal Suspect Face GeneratorSophia Yang, Jun-Teng Zhang, Chia-Wen Lin, Chih-Chung Hsu. 329-340 [doi]
- Automatic Summarization of Critical Threat Intelligence Using Transfer LearningChia-Mei Chen, Yu-Xuan Wang, Zheng-Xun Cai, Boyi Lee, Gu Hsin Lai. 343-348 [doi]
- Anti-screenshot Watermarking Algorithm About Archives Image Based on Deep Learning ModelWei Gu, Ching-Chun Chang, Yu Bai, Yunyuan Fan, Liang Tao, Li Li. 349-361 [doi]
- Detecting Android Malware by Combining System Call Sequence Relationships with Local Feature CalculationChien-Hui Hung, Yi-Ming Chen, Chao-Ching Wu. 362-373 [doi]
- A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with ObfuscationsShin-Jia Hwang, Tzu-Ping Chen. 374-386 [doi]
- A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing EnvironmentsBo-An Lai, Yi-Hsiu Yeh, Guan-Yu Chen, Jheng-Jia Huang, Nai-Wei Lo. 387-397 [doi]
- Image Compression and Meaningful Ciphertext Encryption Based on Histogram Shift EmbeddingZheng Tang, Shiwei Jing, Jianjun Li, Guobao Hui, Wanyong Tian. 398-406 [doi]
- A Robust Two Factor Authentication Scheme with Fine Grained Biometrics VerificationFang-Ting Wu, Shao-Wei Tung, Jheng-Jia Huang. 407-418 [doi]
- Applying an IoT Analytics Framework in East Asia AreaChih-Che Chang, Chia-Mei Chen, Han-Wei Hsiao. 421-433 [doi]
- Android Malware Classifier Combining Permissions and API Features to Face Model DriftingWen-Ting Chang, Yi-Ming Chen, Hui-Hsuan Yang. 434-446 [doi]
- Design and Implementation of the Optimized Computing Architecture for Matrix Decomposition AlgorithmsJih-Ching Chiu, Yu-Quen Chen, Yi-Xiang Wang, Yung-Chi Liu. 447-459 [doi]
- Design and Implementation of the CNN Accelator Based on Multi-streaming SIMD MechanismsJih-Ching Chiu, Zhe-You Yan, Yung-Chi Liu. 460-473 [doi]
- Design and Implementation of the Link-List DMA Controller for High Bandwidth Data StreamingJih-Ching Chiu, Yan-Ting Wu, Yung-Chi Liu, Chi-Yang Hsieh. 474-486 [doi]
- STEM Education Meets HPCHsiu-Mei Chou, Sugita Norika, Ching-Yeh Hsin, Tso-Chung Sung. 487-492 [doi]
- Research on KNN-Based GNSS Coordinate Classification for Epidemic ManagementChi-Yueh Hsu, Chun-Ming Kuo, Ruo-Wei Hung, Jong-Shin Chen. 493-500 [doi]
- An Improved Light Weight Countermeasure Scheme to Efficiently Mitigate TCP Attacks in SDNYung-Fa Huang, Shu-Wai Chang, Chuan-Bi Lin, Chun-Jung Chen, Shi-Jun Li, Ching-Mu Chen. 501-511 [doi]
- The Effectiveness of Block-Based Programming Learning on the Problem-Solving Skills of the FreshmenAh-Fur Lai, Cheng-Ying Yang. 512-520 [doi]
- Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log MiningJason Lin, Chia-Wei Tsai, Chun-Wei Yang, Elie Lafortune. 521-532 [doi]
- The Impact of Live Streaming on Personal Purchase BehaviorPai-Ching Tseng, Yi-Li Liou, Iuon-Chang Lin, Tzu-ching Weng. 533-544 [doi]
- Stochastic-Gradient-Descent-Based Max-Margin Early Event DetectorHong-Wen Wang, Dai-Yi Chiu, Wei-Chung Chan, Zhi-Fang Yang. 545-552 [doi]
- AHP-Based Assessment of Developing Online Virtual Reality Services with Progressive Web AppsSheng-Ming Wang, Muhammad Ainul Yaqin, Fu-Hsiang Hsu. 553-566 [doi]
- From Data of Internet of Things to Domain Knowledge: A Case Study of Exploration in Smart AgricultureMei-Yu Wu, Chih-Kun Ke. 567-576 [doi]
- Physical Layer Coding and Cryptanalysis for the Secure CommunicationsCheng-Ying Yang, Chuan-Bi Lin, Jenq-Foung J. F. Yao, Ming-Hsiang Hwang. 577-584 [doi]
- 5G Network Slice Scalability Based on Management Data Analytics Function (MDAF)Chun Hsiung, Fuchun Joseph Lin, Jyh-Cheng Chen, Chien Chen. 587-598 [doi]
- Design and Analysis for Wireless Tire Pressure Sensing SystemShashank Mishra, Jia-Ming Liang. 599-610 [doi]
- Preserving Collusion-Free and Traceability in Car-Sharing System Based on BlockchainTzu-Hao Chen, Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee. 613-624 [doi]
- Utilization of Theoretical Domains Framework (TDF) to Validate the Digital Piracy Behaviour Constructs - A Systematic Literature Review StudyNompilo Fakude, Elmarie Kritzinger. 625-636 [doi]
- Domain-Specific Anomaly Detection for In-Vehicle NetworksEdy Kristianto, Po-Ching Lin, Ren-Hung Hwang. 637-648 [doi]
- LED: Learnable Encryption with DeniabilityZhe-Wei Lin, Tzu-Hung Liu, Po-Wen Chi. 649-660 [doi]
- Module Architecture of Docker Image and Container SecurityGuan-Yu Wang, Hung-Jui Ko, Min-Yi Tsai, Wei-Jen Wang. 661-669 [doi]
- High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic CubeHao-Yu Weng, Min-Yi Tsai, Wei-Jen Wang, Cheng-Ta Huang. 670-678 [doi]