Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
25121
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
Published 2017-09-01Get full text
Article -
25122
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Get full text
Article -
25123
Research on large-scale identity authentication architecture based on combined symmetric key
Published 2009-01-01Get full text
Article -
25124
Multi-user channel estimation for uplink OFDMA systems based on the random-set theory
Published 2012-01-01Get full text
Article -
25125
-
25126
Adaptive area location algorithm combining with packet lost rate and RSSI in wireless sensor networks
Published 2009-01-01Get full text
Article -
25127
Algorithm for blind separation of PCMA based on CHASE decoding
Published 2015-03-01Get full text
Article -
25128
Hierarchical certificateless authenticated key agreement protocol
Published 2016-07-01Get full text
Article -
25129
-
25130
Auto-negotiation time division MAC protocol for periodical data gathering in sensor networks
Published 2008-01-01Get full text
Article -
25131
Recommendation model combining review’s feature and rating graph convolutional representation
Published 2022-03-01Get full text
Article -
25132
Network security situation evaluation method for multi-step attack
Published 2017-01-01Get full text
Article -
25133
Hole recovery algorithm based on mobile inner nodes in wireless sensor networks
Published 2012-09-01Get full text
Article -
25134
Novel low-delay video transmission scheme based on SR-SW-HARQ
Published 2009-01-01Get full text
Article -
25135
Channel width adaptation algorithm in multi-channel vehicular networks
Published 2010-01-01Get full text
Article -
25136
Rearch and implementation of constant beamwidth time-demain beamformer based on Farrow structure
Published 2014-06-01Get full text
Article -
25137
Anonymization algorithm based on time density for data stream
Published 2014-11-01Get full text
Article -
25138
Design and implementation of an intrusion-tolerant application server middleware
Published 2009-01-01Get full text
Article -
25139
Research of survivability enhancement algorithm based on autonomous configuration
Published 2007-01-01Get full text
Article -
25140
Perceptual image hashing sensitive to content modification
Published 2012-11-01Get full text
Article