Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
961
Tendencies of development of youth extremism in the conditions of progress of information and computer technologies
Published 2013-06-01Subjects: Get full text
Article -
962
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01Subjects: “…compute first networking…”
Get full text
Article -
963
Second Mesiobuccal Canal Evaluation Features with Cone-Beam Computed Tomography
Published 2019-01-01Get full text
Article -
964
Modeling Short-Range Microwave Networks to Scale Superconducting Quantum Computation
Published 2025-01-01“…A core challenge for superconducting quantum computers is to scale up the number of qubits in each processor without increasing noise or cross-talk. …”
Get full text
Article -
965
Sigmoid Volvulus in Pregnancy Assessed by Contrast-Enhanced Computed Tomography Scanning
Published 2021-01-01Get full text
Article -
966
A computation offloading scheme for energy consumption optimization in Internet of vehicles
Published 2023-10-01Subjects: Get full text
Article -
967
A Computer Vision-Based Framework for Snow Removal Operation Routing
Published 2024-01-01Subjects: Get full text
Article -
968
Stability and Hopf Bifurcation for a Delayed SLBRS Computer Virus Model
Published 2014-01-01“…By incorporating the time delay due to the period that computers use antivirus software to clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed in this paper. …”
Get full text
Article -
969
Analysis and verification of safety computer time constraints for train-to-train communications
Published 2018-12-01Subjects: Get full text
Article -
970
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: “…cloud computing…”
Get full text
Article -
971
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
972
Adaptive Language Processing Based on Deep Learning in Cloud Computing Platform
Published 2020-01-01Get full text
Article -
973
Sensitivity Improvement of Optical Computed Tomography Scanners for Scanning Gel Dosimeters
Published 2025-01-01Subjects: “…Optical Computed Tomography…”
Get full text
Article -
974
Key Technology of Internet of Things Middleware and Computer Event Matching Algorithm
Published 2022-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
975
Novel Techniques to Speed Up the Computation of the Automorphism Group of a Graph
Published 2014-01-01“…Graph automorphism (GA) is a classical problem, in which the objective is to compute the automorphism group of an input graph. …”
Get full text
Article -
976
Reputation computation based on new metric in P2P network
Published 2008-01-01Subjects: Get full text
Article -
977
A Numerical Method for Computing the Principal Square Root of a Matrix
Published 2014-01-01Get full text
Article -
978
Analytically Simple and Computationally Efficient Results for the GIX/Geo/c Queues
Published 2019-01-01“…The purpose of this paper is to use the roots method to solve the model GIX/Geo/c that leads to a result that is analytically elegant and computationally efficient. This method works well even for the case when the inter-batch-arrival times follow heavy-tailed distributions. …”
Get full text
Article -
979
Analysis of some key technical problems in the development of computing power network
Published 2022-06-01Subjects: “…computing power network…”
Get full text
Article -
980
Analytical skills of computer security students in the structure of analytical thinking readiness
Published 2015-11-01Subjects: Get full text
Article