Engineering & Materials Science
Access control
96%
Network protocols
68%
Derivatives
63%
Mobile ad hoc networks
61%
Authentication
55%
Defects
50%
Wireless sensor networks
46%
NASA
40%
Robots
39%
Medium access control
39%
Wireless networks
37%
Semantics
35%
Human robot interaction
34%
Taylor series
33%
Cones
33%
Public key cryptography
31%
Data storage equipment
31%
Internet of things
30%
Reduced instruction set computing
29%
Computer hardware
29%
Cryptography
29%
Scheduling
28%
Hash functions
27%
Experiments
26%
Servers
24%
Intrusion detection
24%
Botnet
22%
Set theory
22%
Network performance
22%
Security of data
22%
Availability
22%
Costs
22%
Support vector machines
20%
Computer systems
20%
Glass
18%
Racing automobiles
17%
Patents and inventions
17%
Function evaluation
16%
Sleep
16%
Containers
16%
Quantum computers
16%
Computer program listings
16%
Cloning
15%
Network security
15%
Classifiers
15%
Graph algorithms
14%
Gabor filters
14%
Theaters
14%
Malware
14%
Energy resources
14%
Mathematics
Automatic Differentiation
100%
Security Protocols
79%
Reverse
60%
Order Continuous Norm
55%
Banach Lattice
41%
Authentication
39%
Anonymity
39%
Delegation
38%
Fixed point
33%
Access Control
33%
Public key
32%
Trust Region Method
31%
Relay
31%
Authorization
30%
Positive Cone
30%
Hardware
30%
Positive Linear Operators
29%
Context
27%
Taylor series
26%
Smart Card
25%
Gradient
25%
Target
24%
Integrity
24%
Collision
23%
Pervasive Computing
23%
Trust Management
23%
Security Policy
22%
Endomorphism
22%
Global Convergence
22%
Attack
22%
Facial Expression
22%
Semigroup
22%
Audit
20%
Code Generation
20%
Crescent
20%
Peer-to-peer Networks
20%
Optimization Problem
19%
Semantics
19%
Error Estimates
19%
Key Agreement
18%
Requirements
18%
Emulation
18%
Conjugate Gradient
18%
Remodeling
18%
Preventive Maintenance
17%
Parallel Architectures
17%
Wireless Sensor Networks
17%
Quantum Measurement
17%
Confidentiality
17%
Human
17%