Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
26061
-
26062
Defense policies selection method based on attack-defense signaling game model
Published 2016-05-01Get full text
Article -
26063
-
26064
Optimal path identification to defend against DDoS attacks
Published 2008-01-01Get full text
Article -
26065
Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV
Published 2014-10-01Get full text
Article -
26066
α-spectrum estimation method for ARMA SαS process based on FLOC
Published 2007-01-01Get full text
Article -
26067
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01Get full text
Article -
26068
Design of network management and regulation system over flexible reconfiguration
Published 2012-11-01Get full text
Article -
26069
Heterogeneous executor scheduling algorithm for mimic cloud service
Published 2020-03-01Get full text
Article -
26070
Resource allocation algorithm based on non-cooperative game theory in uplink OFDMA multi-hop relay networks
Published 2012-03-01Get full text
Article -
26071
-
26072
BiRch:a bidirectional search algorithm for k-step reachability queries
Published 2015-08-01Get full text
Article -
26073
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Get full text
Article -
26074
Fast recursive algorithm for implementation of MIMO ZF-SIC detection
Published 2012-07-01Get full text
Article -
26075
-
26076
Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters
Published 2012-07-01Get full text
Article -
26077
-
26078
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01Get full text
Article -
26079
-
26080
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Get full text
Article