Suggested Topics within your search.
Suggested Topics within your search.
- Communication 12
- Mass media 10
- Moral and ethical aspects 9
- Business communication 8
- Information technology 8
- Advertising 6
- Telecommunication 6
- Business writing 5
- Communication in management 4
- English language 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- Marketing 4
- Public relations 4
- Social aspects 4
- Social media 4
- Visual communication 4
- Business English 3
- Communicable diseases 3
- Communication in education 3
- Communication in marketing 3
- Criminal law 3
- Intercultural communication 3
- Interpersonal communication 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- methods 3
- Children 2
- Classroom environment 2
-
26661
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Get full text
Article -
26662
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Get full text
Article -
26663
Wireless virtual network embedding algorithm based on link reliability
Published 2012-09-01Get full text
Article -
26664
Anomaly detection algorithm based on fractal characteristics of large-scale network traffic
Published 2009-01-01Get full text
Article -
26665
-
26666
Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective
Published 2019-06-01Get full text
Article -
26667
Polynomial estimation method for PN sequence based on reliability accumulation
Published 2012-09-01Get full text
Article -
26668
-
26669
-
26670
Active deception defense method based on dynamic camouflage network
Published 2020-02-01Get full text
Article -
26671
-
26672
Strong measurement method of evidence conflict based on earth mover’s distance
Published 2022-05-01Get full text
Article -
26673
Risk assessment of autonomous vehicle based on six-dimensional semantic space
Published 2024-01-01Get full text
Article -
26674
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
Published 2023-04-01Get full text
Article -
26675
Coverage compensation algorithm based on vector algebra in hybrid wireless sensor networks
Published 2014-09-01Get full text
Article -
26676
Novel hierarchical identity-based encryption scheme from lattice
Published 2017-11-01Get full text
Article -
26677
Hierarchical data grid resource allocation based on quotient space theory
Published 2013-06-01Get full text
Article -
26678
Task-based access control mode of peer-to-peer network based on fuzzy theory
Published 2017-02-01Get full text
Article -
26679
In-band network telemetry system based on high-performance packet processing architecture VPP
Published 2021-03-01Get full text
Article -
26680
Novel reversible data hiding based on difference expansion
Published 2016-02-01Get full text
Article