Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
26081
Detection of selfish nodes based on credit mechanism in opportunistic networks
Published 2012-11-01Get full text
Article -
26082
New construction of secure range query on encrypted data in cloud computing
Published 2015-02-01Get full text
Article -
26083
Multi-factor identity authentication scheme for trusted sharing of cultural resources
Published 2023-10-01Get full text
Article -
26084
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Get full text
Article -
26085
Analysis of energy efficiency for cooperative beamforming in wireless sensor networks
Published 2008-01-01Get full text
Article -
26086
Minimum energy consumption multicast routing in ad hoc networks based on particle swarm optimization
Published 2012-03-01Get full text
Article -
26087
-
26088
Symbolic execution optimization method based on input constraint
Published 2019-03-01Get full text
Article -
26089
Risk assessing and privacy-preserving scheme for privacy leakage in APP
Published 2019-05-01Get full text
Article -
26090
Parallel complex event processing system based on S4 framework
Published 2012-09-01Get full text
Article -
26091
Coverage control algorithm for wireless sensor networks based on non-cooperative game
Published 2019-01-01Get full text
Article -
26092
Optimization method through topology reconfiguration for mobile underwater wireless sensor networks
Published 2015-06-01Get full text
Article -
26093
Certificateless-based efficient aggregate signature scheme with universal designated verifier
Published 2015-02-01Get full text
Article -
26094
Computing method for periodic stream reservation in TSN combined with SDN controller
Published 2021-10-01Get full text
Article -
26095
Survey on adversarial attacks and defenses for object detection
Published 2023-11-01Get full text
Article -
26096
-
26097
Optimization design of structure invulnerability for air defense multiple sensor network
Published 2017-06-01Get full text
Article -
26098
Concatenated space-time block coding with asymmetric MPSK TCM
Published 2010-01-01Get full text
Article -
26099
Research on end-to-end network link delay inference based on link reconstruction-destruction
Published 2014-01-01Get full text
Article -
26100
Adaptive transmission scheme with delayed channel state information for multiuser MIMO-OFDM systems
Published 2008-01-01Get full text
Article