Engineering & Materials Science
Communication
100%
Graphics processing unit
73%
Data storage equipment
71%
Internet of things
58%
Algebra
47%
Scheduling
45%
Machine learning
42%
Virtual reality
39%
Servers
38%
Throughput
38%
Parallel algorithms
36%
Security of data
36%
Polynomials
35%
Semantics
35%
Feedback
34%
Students
34%
Labeling
34%
Deep neural networks
33%
Intrusion detection
32%
Application programs
31%
Blockchain
30%
Network protocols
29%
Computer programming
29%
Computer hardware
28%
Software engineering
27%
Education
27%
Distributed computer systems
26%
Set theory
25%
Topology
25%
Computer programming languages
24%
Marketing
24%
Wireless networks
24%
Cryptography
24%
Testing
23%
Software defined networking
23%
Curricula
21%
Scalability
20%
Entropy
19%
Industry
19%
Message passing
19%
Jamming
18%
Edge computing
18%
Redundancy
18%
Diamonds
17%
Convolution
17%
Deep learning
17%
Ad hoc networks
17%
Specifications
17%
Agglomeration
16%
Data privacy
16%
Parallel programming
16%
High level languages
16%
Experiments
16%
Chemical analysis
16%
Sustainable development
15%
Base stations
15%
Vehicular ad hoc networks
15%
Costs
14%
Phase locked loops
14%
Wearable technology
14%
Data Analytics
13%
Static analysis
13%
Neural networks
13%
Metadata
13%
Random number generation
13%
Risk perception
13%
Mobile commerce
13%
Surges (fluid)
13%
Health
12%
Computer systems
12%
Dedicated short range communications
12%
Telecommunication links
12%
Graph algorithms
12%
Data flow graphs
12%
Data flow analysis
12%
Fusion reactions
12%
Radio interference
12%
Ecosystems
11%
Functional programming
11%
Substitution reactions
11%
Millimeter waves
11%
User interfaces
11%
Information dissemination
11%
Ethical aspects
11%
Economics
11%
Program processors
11%
Websites
11%
Unmanned vehicles
10%
Broadcasting
10%
Coarsening
10%
Synchronization
10%
Prisms
10%
Transfer learning
10%
Computer science
10%
Tuning
10%
Long short-term memory
10%
Block codes
10%
Navigation
10%
Specification languages
10%
Data integration
10%
Mathematics
Calculus
54%
Interference
54%
Communication
48%
Concurrency
44%
Concurrent
40%
Privacy
40%
Throughput
39%
Smart Home
38%
Wireless Networks
35%
Anonymous Networks
35%
Limited Feedback
34%
Framework
30%
Multiple Access Channel
29%
Broadcast
29%
Hardware
28%
Dynamic Networks
27%
Vertex of a graph
27%
Jamming
27%
Genetic Code
26%
Attack
26%
Model
25%
Group Testing
24%
Linear Logic
24%
Virtual Reality
24%
Query
24%
Head-mounted Display
23%
Scheduling
22%
Fault-tolerant
22%
Schedule
21%
Correctness
21%
Intuitionistic Logic
20%
Text
19%
Type Theory
19%
Knowledge
19%
Programming
19%
Vehicular Ad Hoc Networks
18%
Network Intrusion Detection
17%
Crash
17%
Medium Access Control
17%
Communication Protocol
16%
Resources
16%
Process Calculi
16%
Deterministic Algorithm
16%
Performance
16%
Sensing
16%
Time Complexity
16%
Dependent
16%
Privacy Preserving
15%
Graph Clustering
15%
Evaluate
15%
Ad Hoc Wireless Networks
15%
Web Application
15%
Optimization
15%
Collision Detection
14%
Multi-hop
14%
Queue
14%
Wireless Ad Hoc Networks
14%
Ergonomics
14%
Information Dissemination
14%
Radio Networks
14%
Data Flow
14%
Eye Movements
14%
Scenarios
13%
Scaling
13%
Conductance
13%
Syntax
13%
Leader Election
13%
Gossip
13%
Queueing
13%
Software Engineering
13%
Reinforcement Learning
13%
Contention
13%
Graph Partition
12%
String Matching
12%
Image Compression
12%
Scheduling Algorithm
12%
Arbitrary
12%
Locomotion
12%
Compiler
12%
Lambek Calculus
12%
Graph in graph theory
12%
Optimal Partition
12%
Preemption
12%
Speculation
12%
Distributed Computing
12%
Cycling
12%
Server
12%
Systems Engineering
11%
Vulnerability
11%
Placement
11%
Replication
11%
Finite State Machine
11%
Compilation
11%
Functional Programming
11%
Design
11%
Speculative Execution
11%
Bone
10%
Transactions
10%
Cut-elimination
10%
Latency
10%
Business & Economics
Attack
62%
Phishing
37%
Machine Learning
32%
Privacy
29%
Intrusion Detection
28%
Vulnerability
25%
Privacy Preserving
24%
Learning Model
22%
Internet of Things
20%
Apps
19%
Deep Learning
16%
Data Access
15%
Vulnerability Analysis
14%
Data Extraction
13%
Transfer Learning
13%
Communication
13%
Latency
13%
Software
12%
Web Application
12%
Leakage
12%
Recommendation System
12%
Tutorial
11%
Data Protection
11%
Evasion
11%
Cybersecurity
11%
Readability
11%
Logging
11%
Filter
11%
Randomness
11%
Incubator
10%
Dynamic Analysis
10%
Node
10%
Injection
10%
Integrity
10%
Network Effects
9%
Breach
9%
Broadcasting
9%
Random Walk
9%
Crash
9%
Open Source
9%
Classifier
8%
Isolation
8%
Data Sources
8%
Violations
8%
Spectacle
8%
Graph
8%
Developer
8%
Convolution
8%
Clustering
8%
Semantic Similarity
7%
Inference
7%
Broadcast
6%
Data Base
6%
Governance Structure
6%
Intrusion Detection System
6%
Governance
6%
Information Quality
6%
Data Sharing
6%
Apple
6%
Railway
6%
Health
5%
Propagation
5%
Smoothing
5%
Anonymization
5%
Empirical Study
5%
Incidents
5%