Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
25881
Virtual machine co-residency method on cloud computing platform
Published 2018-11-01Get full text
Article -
25882
Equity decentralized consensus algorithm based on incentive compatibility
Published 2022-12-01Get full text
Article -
25883
Adaptive spectrum sensing algorithm based on cyclostationary spectrum energy
Published 2011-11-01Get full text
Article -
25884
Related-key impossible differential attack on a lightweight block cipher MIBS
Published 2014-02-01Get full text
Article -
25885
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01Get full text
Article -
25886
Study on security routing algorithm based on dynamic adjacent trust
Published 2013-06-01Get full text
Article -
25887
-
25888
Approach of wideband robust adaptive beamforming based on microphone arrays
Published 2006-01-01Get full text
Article -
25889
Label flipping adversarial attack on graph neural network
Published 2021-09-01Get full text
Article -
25890
Topology control scheme based on simulated annealing algorithm in wireless sensor networks
Published 2006-01-01Get full text
Article -
25891
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01Get full text
Article -
25892
Reliable heuristic mapping method for survivable virtual network
Published 2015-07-01Get full text
Article -
25893
-
25894
POI recommendation by incorporating trust-distrust relationship in LBSN
Published 2018-07-01Get full text
Article -
25895
Research on RFID anti-collision hybrid algorithm based on discrete processing
Published 2013-08-01Get full text
Article -
25896
Anomaly detection in backbone networks using Filter-ary-Sketch
Published 2011-01-01Get full text
Article -
25897
Incremental dynamic community discovery algorithm based on multi-core nodes
Published 2024-03-01Get full text
Article -
25898
Deterministic upper bounds on performance of generalized processor sharing based on fractal regulators
Published 2007-01-01Get full text
Article -
25899
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Get full text
Article -
25900
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Get full text
Article