Browsing by Subject
Showing results 383 to 402 of 2601
< previous
next >
- Asynchronous consensus | Cross-chain | Data integrity | Data interaction | Relay network | Smart contract 1
- Asynchronous Cooperation | Information Exchange | Multiprocessor Scheduling 1
- asynchronous multiparty session types | completeness | pi-calculus | session types | soundness | subtyping | typing systems 1
- atmospheric turbulence | error probability | free-space optics | phase noise | phase-shift keying 1
- Atomic data | Plasmas | Stars : chemically peculiar 1
- Atomistic lattice | CEP | CIP | Codistributive element | Weak congruences 1
- Attached point masses | Bloch waves | Embedded lattices | Hurty-Craig-Bampton method | Pre-stressed Timoshenko beams | Veering phenomena 1
- Attachment lugs | Crack path | Fatigue crack growth | Life estimation | Surface flaws 1
- Attacking scenarios | Authentication protocols | Computational capability | Cryptographic security | High performance computing | Implementation complexity | Learning parity with noise | Man in the middle 1
- Attentional information | Cognition | Focus tree | Human-machine interaction | Utterance processing 1
- attitude | East Serbia | environment | environmental awareness 1
- Attitude | Motivation | Personality tests | Semen | Serbia | Tissue donors 1
- Attraction probabilities | Continuous location | Convergence | Metaheuristics | Variable neighborhood search 1
- Auction | Internet of things | Metaheuristics | Revenue | Variable neighbourhood search 1
- Augmented Reality | Cultural Heritage | Mobile Guide 1
- augmented reality | mobile application | monument, history 1
- Augmented reality | Occupational safety | Mobile devices | Virtual reality | Real world interaction 1
- augmented reality | occupational safety | mobile systems | industry 1
- authentication protocol | HB | man-in-the-middle attack | cryptanalysis | performance | RFID 1
- Authentication | Information theory | Network protocols | Number theory | Random processes | Spectroscopy 1