Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Social media 3
- Information technology 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Business-to-Business-Marketing 1
- Industrial marketing 1
- Journalism 1
- Marketing 1
- Mass media 1
- Mobile communication systems 1
- Online journalism 1
- Study and teaching (Higher) 1
-
821
Approach of service evaluation based on trust reasoning for cloud computing
Published 2011-01-01Get full text
Article -
822
Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback
Published 2022-02-01Get full text
Article -
823
Multiple targets localization via compressive sensing from mere connectivity
Published 2016-05-01Get full text
Article -
824
Geometrical statistical channel model with an Inverted-Parabolic spatial distribution
Published 2014-03-01Get full text
Article -
825
Multi-channel MAC protocol based on network partitioning for wireless sensor networks
Published 2014-11-01Get full text
Article -
826
Piecing together ‘big pictures’ with social network analysis and digital tools
Published 2024-01-01Get full text
Article -
827
Constructions of Golomb Costas arrays and their applications in OFDM systems
Published 2013-07-01Get full text
Article -
828
Visualising the design of conditions for urban social sustainability
Published 2015-09-01Get full text
Article -
829
Realist evaluation of the impact of the research translation process on health system sustainability: a study protocol
Published 2022-06-01“…Results will be published in scientific journals, and communicated to respondents and relevant partners.…”
Get full text
Article -
830
-
831
LDPC code reconstruction based on algorithm of finding low weight code-words
Published 2017-06-01Get full text
Article -
832
Analysis and improvement of the BACnet/IP based on identity authentication
Published 2024-03-01Get full text
Article -
833
Scrambler blind recognition method based on soft information
Published 2017-03-01Get full text
Article -
834
-
835
DFT-SV-OFDM based adaptive multi-rate DFT scrambling vector code division multiple access
Published 2017-09-01Get full text
Article -
836
Intelligent planning method for cyber defense strategies based on bounded rationality
Published 2023-05-01Get full text
Article -
837
-
838
Performance study of hybrid spectrum access scheme in millimeter wave cellular network
Published 2018-08-01Get full text
Article -
839
Dynamic trust model based on recommendation chain classification in complex network environment
Published 2015-09-01Get full text
Article -
840
Evaluation and protection of multi-level location privacy based on an information theoretic approach
Published 2019-12-01Get full text
Article