Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
24841
-
24842
Research on multi-objective grid task scheduling algorithms based on survivability and Makespan
Published 2006-01-01Get full text
Article -
24843
-
24844
Privacy preserving approach based on proximity privacy for numerical sensitive attributes
Published 2015-04-01Get full text
Article -
24845
-
24846
Novel algorithm of maintaining packet order in two-stage switch
Published 2005-01-01Get full text
Article -
24847
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
Published 2011-01-01Get full text
Article -
24848
Research on space information representation model based on formal concept analysis
Published 2017-11-01Get full text
Article -
24849
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Get full text
Article -
24850
-
24851
-
24852
Attribute-based key-insulated signcryption with bidirectional anonymity
Published 2013-11-01Get full text
Article -
24853
Novel joint iterative channel estimation and space-frequency decoding algorithm for SFBC-OFDM systems
Published 2007-01-01Get full text
Article -
24854
Application of integration methods between university information systems and access control systems
Published 2024-11-01Get full text
Article -
24855
Performance analysis of generalized processor sharing based on fractal leaky bucket regulators
Published 2006-01-01Get full text
Article -
24856
Android malware detection based on improved random forest
Published 2017-04-01Get full text
Article -
24857
Cognitive wireless networks:key techniques and sate of the art
Published 2011-11-01Get full text
Article -
24858
Library resource sharing solution based on federated authentication and CALIS unified authentication
Published 2013-09-01Get full text
Article -
24859
Application research on distributed Zabbix network monitoring system
Published 2013-09-01Get full text
Article -
24860
Novel adaptive branching constraint solving algorithm with look-ahead strategy
Published 2013-06-01Get full text
Article