3

Theories of Social Media: Philosophical Foundations

Year:
2018
Language:
english
File:
PDF, 679 KB
english, 2018
4

Cyberspace Sovereignty || Conflicts of Cyberspace Sovereignty Concept

Year:
2018
Language:
english
File:
PDF, 511 KB
english, 2018
6

Cyberspace Sovereignty ||

Year:
2018
Language:
english
File:
PDF, 5.22 MB
english, 2018
15

Cyberspace Sovereignty || Understanding of the Traditional Sovereignty Concept

Year:
2018
Language:
english
File:
PDF, 320 KB
english, 2018
16

Cyberspace Sovereignty || Extension of Cyberspace Sovereignty

Year:
2018
Language:
english
File:
PDF, 305 KB
english, 2018
18

Cyberspace Sovereignty || Main Initiatives to Safeguard Cyberspace Sovereignty

Year:
2018
Language:
english
File:
PDF, 346 KB
english, 2018
20

Cyberspace Sovereignty || China’s Declaration of Cyberspace Sovereignty

Year:
2018
Language:
english
File:
PDF, 280 KB
english, 2018
26

Structure and Evolution || 2. Social network structure analysis and modeling

Year:
2019
Language:
english
File:
PDF, 1.09 MB
english, 2019
30

How to construct secure proxy cryptosystem

Year:
2007
Language:
english
File:
PDF, 216 KB
english, 2007
31

The wide window string matching algorithm

Year:
2005
Language:
english
File:
PDF, 272 KB
english, 2005
32

A parallel programming interface for out-of-core cluster applications

Year:
2006
Language:
english
File:
PDF, 461 KB
english, 2006
36

Identifying heavy hitters in high-speed network monitoring

Year:
2010
Language:
english
File:
PDF, 811 KB
english, 2010
38

Parallelizing weighted frequency counting in high-speed network monitoring

Year:
2011
Language:
english
File:
PDF, 809 KB
english, 2011
40

Heterogeneous search in unstructured peer-to-peer networks

Year:
2005
Language:
english
File:
PDF, 290 KB
english, 2005
42

Worm attack detection and response

Year:
2007
Language:
english
File:
PDF, 1.67 MB
english, 2007
49

Predicting the topic influence trends in social media with multiple models

Year:
2014
Language:
english
File:
PDF, 1.14 MB
english, 2014