Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
1401
Radiologic assessment of the optimal point for tube thoracostomy using the sternum as a landmark: a computed tomography‐based analysis
Published 2024-03-01Subjects: Get full text
Article -
1402
Computation task offloading algorithm and system level simulation for vehicles
Published 2019-09-01Subjects: Get full text
Article -
1403
Evaluation of composite resin microleakage with using different bonding agents by micro computed tomography
Published 2021-07-01Subjects: “…Micro computed tomography…”
Get full text
Article -
1404
Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform
Published 2013-10-01Subjects: “…cloud computing…”
Get full text
Article -
1405
MEC enabled satellite-terrestrial network:architecture,key technique and challenge
Published 2020-04-01Subjects: Get full text
Article -
1406
Dynamic service migration strategy based on MDP model with multiple parameter in vehicular edge network
Published 2020-01-01Subjects: “…edge computing…”
Get full text
Article -
1407
The Effects of Single and Bimetallic Silicon Composite Shields in Medical Imaging Methods: A Monte Carlo Study
Published 2025-01-01Subjects: Get full text
Article -
1408
Editorial: Data-driven approaches for efficient smart grid systems
Published 2025-01-01Subjects: Get full text
Article -
1409
Method of designing security protocol for remote attestation
Published 2008-01-01Subjects: Get full text
Article -
1410
Trusted solution monitoring system based on ZigBee wireless sensor network
Published 2017-11-01Subjects: Get full text
Article -
1411
-
1412
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: “…cloud computing…”
Get full text
Article -
1413
Research on DDoS detection in multi-tenant cloud based on entropy change
Published 2016-10-01Subjects: Get full text
Article -
1414
Research of Sliding Mode Variable Structure Control for a New Robot Wrist Structure
Published 2017-01-01Subjects: Get full text
Article -
1415
-
1416
ESTRATEGIA ROBIN HOOD EN CHILE. Distribución e incidencia
Published 2011-01-01Subjects: Get full text
Article -
1417
Location privacy preservation approach towards to content sharing on mobile online social network
Published 2016-11-01Subjects: Get full text
Article -
1418
Encouraging, empowering, and educating: Informal educators, caregivers, and children as partners in computational thinking activities
Published 2024-12-01Subjects: “…computational thinking…”
Get full text
Article -
1419
Signaling collection and monitoring technology based on FKS
Published 2018-03-01Subjects: Get full text
Article -
1420
Competing fairness ideals underlie wealth inequality across decision contexts
Published 2024-12-01Subjects: Get full text
Article