Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
26281
Combinatorial double auction-based allocation of retrieval tasks in Internet of Things
Published 2015-12-01Get full text
Article -
26282
Trust-driven job scheduling heuristics for computing grid
Published 2006-01-01Get full text
Article -
26283
-
26284
-
26285
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Get full text
Article -
26286
Differential detection scheme for distributed MIMO systems in fast fading channel
Published 2012-06-01Get full text
Article -
26287
Trust expansion and listwise learning-to-rank based service recommendation method
Published 2018-01-01Get full text
Article -
26288
Method of node distribution for heterogeneous WMSN based on load balancing
Published 2015-10-01Get full text
Article -
26289
Optimal cross-layer power allocation with channel and queue state information
Published 2007-01-01Get full text
Article -
26290
Network traffic detection based on multi-resolution low rank model
Published 2012-01-01Get full text
Article -
26291
Improved ant colony optimization algorithm for solving constraint satisfaction problem
Published 2015-05-01Get full text
Article -
26292
Detecting and preventing collusion attack in DPoS based on power index
Published 2022-12-01Get full text
Article -
26293
Endogenous trusted network architecture for intelligent sharing
Published 2020-11-01Get full text
Article -
26294
Array gain and phase calibration in the presence of multipath based on weighted spatial smoothing
Published 2004-01-01Get full text
Article -
26295
Automatic exploitation generation method of write-what-where vulnerability
Published 2022-01-01Get full text
Article -
26296
Metric and classification model for privacy data based on Shannon information entropy and BP neural network
Published 2018-12-01Get full text
Article -
26297
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Get full text
Article -
26298
Optimal coalition structure generation strategy in multi-task concurrent edge computing environment
Published 2023-02-01Get full text
Article -
26299
-
26300
Histogram affine invariants extraction method based on two-scale auto-convolution
Published 2012-12-01Get full text
Article