Basic Search / Search Result

  • Search Result: 86results Search Strategy: "賴源正".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection
    • Department of Information Management /110/ Master
    • Author: Jheng-Yan Lin Advisor:
    • Traditional intrusion detection systems (IDSs) require manual updates, which cannot usually keep up…
    • Clicks: 388Downloads: 0
    • Full text public date 2025/09/20 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    2

    Multi-Resource Network Slicing with Deep Reinforcement Learning for Optimal QoS Satisfaction Ratio
    • Department of Information Management /111/ Master
    • Author: Hui-Chu Yang Advisor:
    • The 5G networks provide the services with low latency, high speed, and large bandwidth, which short…
    • Clicks: 795Downloads: 0
    • Full text public date 2033/03/29 (Intranet public)
    • Full text public date 2033/03/29 (Internet public)
    • Full text public date 2033/03/29 (National library)

    3

    Reinforcement Learning-based Offloading in a Device-Edge-Cloud Computing Environment
    • Department of Information Management /110/ Master
    • Author: Yun-Chen Chang Advisor:
    • Today's mobile applications require more computing resources, but Device has limited computing reso…
    • Clicks: 501Downloads: 0
    • Full text public date 2025/09/22 (Intranet public)
    • Full text public date 2032/09/22 (Internet public)
    • Full text public date 2032/09/22 (National library)

    4

    Cache Slicing with Minimum QoS Violation Probability in the Cloud and Edge Systems
    • Department of Information Management /108/ Master
    • Author: Pei-Yin Chen Advisor:
    • The 5G network architecture includes radio access network (RAN) and core network. However, diverse …
    • Clicks: 726Downloads: 0
    • Full text public date 2025/08/19 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    A Generative Adversarial Network to Generate Link Flooding Attacks
    • Department of Information Management /108/ Master
    • Author: Yu-Ching Huang Advisor:
    • Link Flooding Attack (LFA) will not only attack one server but a target area, which include several…
    • Clicks: 1049Downloads: 0
    • Full text public date 2025/08/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    Defending Link Flooding Attacks with Blocking and Rerouting Attack Traffic in Hybrid SDN
    • Department of Information Management /108/ Master
    • Author: Si-Ru Lin Advisor:
    • Link Flooding Attack (LFA) is a new type of DDoS attack that targets a specific low-density data st…
    • Clicks: 404Downloads: 0
    • Full text public date 2025/03/23 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    Social-Aware multi-hop Grouping Scheme for Multicast D2D Communications
    • Department of Information Management /109/ Master
    • Author: Shih-Hung Lo Advisor:
    • Considering the increasing demands of spectrum in the future, spectrum resources are getting less a…
    • Clicks: 459Downloads: 0
    • Full text public date 2025/11/14 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Multi-Hop Multi-Interface Routing Schemes in Software Defined Wireless Networks
    • Department of Information Management /106/ Doctor
    • Author: Riyanto Jayadi Advisor:
    • The rapid growth of mobile traffic in a user equipment (UE) demands more energy and drain battery l…
    • Clicks: 376Downloads: 0

    9

    Three-Tier Capacity and Traffic Optimization for Core, Edges, and Devices in Mobile Edge Computing
    • Department of Information Management /105/ Master
    • Author: Jian-Xun Huang Advisor:
    • 5G wireless communications systems has been proposed under the dramatical growth demand. The vision…
    • Clicks: 508Downloads: 0
    • Full text public date 2022/08/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    Buffering and Prioritization in Switches for Reducing the Controller’s Load
    • Department of Information Management /105/ Master
    • Author: Yi-Ting Kuo Advisor:
    • Software-Defined Networks (SDN), which decouples the control plane from the data plane, can fast de…
    • Clicks: 452Downloads: 0
    • Full text public date 2022/08/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)