Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
601
Hybrid Hamiltonian Simulation Approach for the Analysis of Quantum Error Correction Protocol Robustness
Published 2024-01-01Subjects: Get full text
Article -
602
Privacy cloud storage scheme based on fog computing
Published 2019-03-01Subjects: Get full text
Article -
603
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01Subjects: “…Fully Homomorphic Encryption, Cloud computing, Asymmetric Encryption, Large number, Banking security.…”
Get full text
Article -
604
Hybrid Henry Gas-Harris Hawks Comprehensive-Opposition Algorithm for Task Scheduling in Cloud Computing
Published 2025-01-01Subjects: “…Cloud computing…”
Get full text
Article -
605
Uncovering and estimating complementarity in urban lives
Published 2025-02-01Subjects: Get full text
Article -
606
Dynamic fair allocation of multi-resources based on shared resource quantity
Published 2016-07-01Subjects: “…cloud computing…”
Get full text
Article -
607
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Subjects: Get full text
Article -
608
Cloud-based intelligent computing center ten-thousand card cluster innovation and practice
Published 2024-12-01Subjects: Get full text
Article -
609
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
610
-
611
Research on energy management of multi-user mobile edge computing offloading
Published 2019-03-01Subjects: Get full text
Article -
612
Application of Phi (<italic>Φ</italic>), the Golden Ratio, in Computing: A Systematic Review
Published 2025-01-01Subjects: Get full text
Article -
613
An unplugged remix of culturally responsive computing for early childhood education
Published 2024-12-01Subjects: “…computational thinking…”
Get full text
Article -
614
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01Subjects: “…cloud computing…”
Get full text
Article -
615
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Subjects: Get full text
Article -
616
Design of a small-scale and failure-resistant IaaS cloud using OpenStack
Published 2025-01-01Subjects: Get full text
Article -
617
Research category and future development trend of data elements circulation and security
Published 2024-05-01Subjects: Get full text
Article -
618
Service migration optimization method for resource competition in mobile edge computing scenarios
Published 2024-08-01Subjects: “…mobile edge computing…”
Get full text
Article -
619
Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and Challenges
Published 2025-01-01Subjects: Get full text
Article -
620
Intelligent collaborative management technology of virtual resources based on internet of vehicles remote driving
Published 2020-04-01Subjects: “…remote driving,mobile edge computing…”
Get full text
Article