Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
24601
Adaptive algorithm to compensate varying group<sub>d</sub>elay
Published 2006-01-01Get full text
Article -
24602
Large scale network worm detection using automatic signature extraction
Published 2006-01-01Get full text
Article -
24603
Design scheme of linear dispersive space-time codes for downlink multiuser MIMO systems
Published 2010-01-01Get full text
Article -
24604
Bayes decision theory based risk minimization authorization mapping
Published 2015-11-01Get full text
Article -
24605
Nonlinear scale-space based boundary localization for nonideal iris
Published 2014-03-01Get full text
Article -
24606
Noisy template skip list based log filtering in cloud systems
Published 2011-01-01Get full text
Article -
24607
-
24608
Bayesian network-based video QoE assessment method using image sustained damage analysis
Published 2017-06-01Get full text
Article -
24609
Joint transmit and receive antenna selection in mimo systems for maximize channel capacity
Published 2009-01-01Get full text
Article -
24610
Study of a new packet marking scheme for DDoS attack source traceback
Published 2005-01-01Get full text
Article -
24611
MQAM modulation scheme recognition using Hilbert transform
Published 2007-01-01Get full text
Article -
24612
-
24613
Survey of differential privacy in frequent pattern mining
Published 2014-10-01Get full text
Article -
24614
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Get full text
Article -
24615
ID-based threshold decryption with non-reconstruction of the private key
Published 2009-01-01Get full text
Article -
24616
Survivable virtual network mapping with differentiated services QoP
Published 2013-12-01Get full text
Article -
24617
Effects on lifetime of opportunistic network based on Epidemic routing under flooding attacks
Published 2012-09-01Get full text
Article -
24618
-
24619
Image spam identification method based on gray-gradient co-occurrence matrix
Published 2013-09-01Get full text
Article -
24620
Vector space embedding of DNS query behaviors by deep learning
Published 2016-03-01Get full text
Article