Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
24481
-
24482
Joint source-channel iterative decoding based on hidden markov model
Published 2006-01-01Get full text
Article -
24483
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Get full text
Article -
24484
-
24485
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Get full text
Article -
24486
Analysis of loss probabilities on the call level and packet level in a multi-rate system
Published 2007-01-01Get full text
Article -
24487
PN code acquisition method based on prepositive 3-order correlated detection
Published 2009-01-01Get full text
Article -
24488
New approach to evaluate the capacity of signature-based intrusion detection systems
Published 2007-01-01Get full text
Article -
24489
Access control model based on trusted computing for integrated avionics system
Published 2009-01-01Get full text
Article -
24490
-
24491
Anonymous and authenticated routing protocol for mobile ad hoc networks
Published 2009-01-01Get full text
Article -
24492
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Get full text
Article -
24493
Research on TCP performance improvement in wireless ad hoc networks based on topology control
Published 2006-01-01Get full text
Article -
24494
Improved shuffled frog-leaping algorithm based network community detection method
Published 2014-11-01Get full text
Article -
24495
Analysis on the DOA estimation of uniform circular arrays based on compressive sensing
Published 2015-02-01Get full text
Article -
24496
Resilient method for recovering coverage holes of wireless sensor networks by using mobile nodes
Published 2011-01-01Get full text
Article -
24497
Secure distributed signcryption scheme based on vector space
Published 2009-01-01Get full text
Article -
24498
Linearized distortion model for robust speech recognition in noisy environments
Published 2010-01-01Get full text
Article -
24499
-
24500
Cluster ensemble selection based on validity index in evidence space
Published 2015-08-01Get full text
Article