Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
1381
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01Subjects: Get full text
Article -
1382
-
1383
Role-based fine-grained delegation constraint framework in collaborative environments
Published 2008-01-01Subjects: “…computer software…”
Get full text
Article -
1384
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: “…Cloud Computing Security…”
Get full text
Article -
1385
Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment
Published 2025-01-01Subjects: Get full text
Article -
1386
Enjeux de la médiatisation du travail coopératif distribué dans les équipes de projets de conception
Published 2007-10-01Subjects: Get full text
Article -
1387
Trust-aware dynamic level scheduling algorithm in cloud environment
Published 2014-11-01Subjects: “…cloud computing…”
Get full text
Article -
1388
In silico modelling of organ-on-a-chip devices: an overview
Published 2025-01-01Subjects: Get full text
Article -
1389
Research on the incentive mechanism of trusted transactions based on blockchain
Published 2024-08-01Subjects: “…computing power network…”
Get full text
Article -
1390
LTE Network Planning in Current Co-Existing GSM/TD-SCDMA/WLAN Systems
Published 2014-09-01Subjects: “…coverage and capacity computing…”
Get full text
Article -
1391
-
1392
Analysis and verification of safety computer time constraints for train-to-train communications
Published 2018-12-01Subjects: Get full text
Article -
1393
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: “…cloud computing…”
Get full text
Article -
1394
Klippel–Trenaunay syndrome presenting as pulmonary embolism in an elderly person
Published 2024-12-01Subjects: “…computed tomography angiogram…”
Get full text
Article -
1395
A Real-Time Vision Transformers-Based System for Enhanced Driver Drowsiness Detection and Vehicle Safety
Published 2025-01-01Subjects: Get full text
Article -
1396
Editorial: Exploring the emotional landscape: cutting-edge technologies for emotion assessment and elicitation
Published 2025-01-01Subjects: Get full text
Article -
1397
Modulating Alkyl Groups in Copolymer to Control Ion Transport in Electrolyte‐Gated Organic Transistors for Neuromorphic Computing
Published 2025-01-01Subjects: Get full text
Article -
1398
Lentil plant disease and quality assessment: A detailed dataset of high-resolution images for deep learning researchMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
1399
Resource-sharing allocation method based on dwarf mongoose optimization algorithm in vehicle computing
Published 2024-12-01Subjects: “…vehicle computing…”
Get full text
Article -
1400
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01Subjects: “…mobile edge computing…”
Get full text
Article