Basic Search
/ Search Result
Search Result: 86results Search Strategy: "賴源正".cadvisor (Phrase)
Refine the results:
Search
Expand the trend chart of search results
Individualized services
:
My Search Strategy
Sort:
Results per page:
Selected0results
Select all on this page
|
1
|
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection
-
Department of Information Management
/110/ Master
-
Author:
Jheng-Yan Lin
Advisor:
-
Traditional intrusion detection systems (IDSs) require manual updates, which cannot usually keep up…
-
Clicks: 388
Downloads: 0
- Full text public date 2025/09/20 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
2
|
Multi-Resource Network Slicing with Deep Reinforcement Learning for Optimal QoS Satisfaction Ratio
-
Department of Information Management
/111/ Master
-
Author:
Hui-Chu Yang
Advisor:
-
The 5G networks provide the services with low latency, high speed, and large bandwidth, which short…
-
Clicks: 795
Downloads: 0
- Full text public date 2033/03/29 (Intranet public)
- Full text public date 2033/03/29 (Internet public)
- Full text public date 2033/03/29 (National library)
|
3
|
Reinforcement Learning-based Offloading in a Device-Edge-Cloud Computing Environment
-
Department of Information Management
/110/ Master
-
Author:
Yun-Chen Chang
Advisor:
-
Today's mobile applications require more computing resources, but Device has limited computing reso…
-
Clicks: 501
Downloads: 0
- Full text public date 2025/09/22 (Intranet public)
- Full text public date 2032/09/22 (Internet public)
- Full text public date 2032/09/22 (National library)
|
4
|
Cache Slicing with Minimum QoS Violation Probability in the Cloud and Edge Systems
-
Department of Information Management
/108/ Master
-
Author:
Pei-Yin Chen
Advisor:
-
The 5G network architecture includes radio access network (RAN) and core network. However, diverse …
-
Clicks: 726
Downloads: 0
- Full text public date 2025/08/19 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
5
|
A Generative Adversarial Network to Generate Link Flooding Attacks
-
Department of Information Management
/108/ Master
-
Author:
Yu-Ching Huang
Advisor:
-
Link Flooding Attack (LFA) will not only attack one server but a target area, which include several…
-
Clicks: 1049
Downloads: 0
- Full text public date 2025/08/21 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
6
|
Defending Link Flooding Attacks with Blocking and Rerouting Attack Traffic in Hybrid SDN
-
Department of Information Management
/108/ Master
-
Author:
Si-Ru Lin
Advisor:
-
Link Flooding Attack (LFA) is a new type of DDoS attack that targets a specific low-density data st…
-
Clicks: 404
Downloads: 0
- Full text public date 2025/03/23 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
7
|
Social-Aware multi-hop Grouping Scheme for Multicast D2D Communications
-
Department of Information Management
/109/ Master
-
Author:
Shih-Hung Lo
Advisor:
-
Considering the increasing demands of spectrum in the future, spectrum resources are getting less a…
-
Clicks: 459
Downloads: 0
- Full text public date 2025/11/14 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
8
|
Multi-Hop Multi-Interface Routing Schemes in Software Defined Wireless Networks
-
Department of Information Management
/106/ Doctor
-
Author:
Riyanto Jayadi
Advisor:
-
The rapid growth of mobile traffic in a user equipment (UE) demands more energy and drain battery l…
-
Clicks: 376
Downloads: 0
|
9
|
Three-Tier Capacity and Traffic Optimization for Core, Edges, and Devices in Mobile Edge Computing
-
Department of Information Management
/105/ Master
-
Author:
Jian-Xun Huang
Advisor:
-
5G wireless communications systems has been proposed under the dramatical growth demand. The vision…
-
Clicks: 508
Downloads: 0
- Full text public date 2022/08/21 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|
10
|
Buffering and Prioritization in Switches for Reducing the Controller’s Load
-
Department of Information Management
/105/ Master
-
Author:
Yi-Ting Kuo
Advisor:
-
Software-Defined Networks (SDN), which decouples the control plane from the data plane, can fast de…
-
Clicks: 452
Downloads: 0
- Full text public date 2022/08/21 (Intranet public)
- Full text public date This full text is not authorized to be published. (Internet public)
- Full text public date This full text is not authorized to be published. (National library)
|