-
41
-
42
REMOTELY CONTROLLED CAR SPEED GOVERNOR
Published 2021-01-01Subjects: “…car, speed, speed limiter, relay, alarm, message…”
Get full text
Article -
43
Generalization and improvement of Nyberg-Rueppel message recovery blind signatures
Published 2005-01-01Subjects: Get full text
Article -
44
ANALISIS UNSUR KOHESI DALAM WACANA BAHASA SMS (SHORT MESSAGE SERVICE)
Published 2015-12-01Subjects: “…cohesion, ellipsis, lexical, reference, short message service,…”
Get full text
Article -
45
Implemention scheme of IP short message for VoLTE users
Published 2017-12-01Subjects: Get full text
Article -
46
-
47
CONFIDENCE IN COMMUNICATION CHANNEL AS A FACTOR OF INFLUENCE ON CONSUMER BEHAVIOR
Published 2017-02-01Subjects: Get full text
Article -
48
Using Video Messages to Promote Residential Adoption of Fertilizer Best Management Practices
Published 2018-07-01Subjects: Get full text
Article -
49
Adaptive message sending rate control method based on channel congestion cost calculation in VANET
Published 2016-10-01Subjects: Get full text
Article -
50
Using Video Messages to Promote Residential Adoption of Fertilizer Best Management Practices
Published 2018-07-01Subjects: Get full text
Article -
51
-
52
Scalable data assimilation with message passing
Published 2025-01-01Subjects: Get full text
Article -
53
Formal analysis of non-repudiation protocol by spi
Published 2009-01-01Subjects: Get full text
Article -
54
Energy balanced routing algorithm for opportunistic network based on message importance
Published 2018-12-01Subjects: Get full text
Article -
55
Model Selection from Multiple Model Families in Species Distribution Modeling Using Minimum Message Length
Published 2024-12-01Subjects: “…minimum message length…”
Get full text
Article -
56
Research and Realization of Abis Interface Monitor Technology in User-Aware Intelligence Analysis System
Published 2012-09-01Subjects: Get full text
Article -
57
Information: on the question as for the meaningful evolution of the term
Published 2021-09-01Subjects: Get full text
Article -
58
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
Published 2015-03-01Subjects: Get full text
Article -
59
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: Get full text
Article -
60
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01Subjects: Get full text
Article