Fingerprint The fingerprint is based on mining the text of the research documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit.

Engineering & Materials Science

Authentication
Access control
Cryptography
Unmanned aerial vehicles (UAV)
Internet
Communication
Classifiers
Servers
Telecommunication networks
Network coding
Experiments
Costs
Application programs
Data storage equipment
Cloud computing
Overlay networks
Electronic mail
Wireless networks
Flow control
Bulletin boards
Learning systems
Embedded systems
Computer networks
Internet service providers
Processing
Availability
Packet networks
Mobile cloud computing
Throughput
Electronic data interchange
Network architecture
Decomposition
Topology
Computability and decidability
Application programming interfaces (API)
Metadata
Glycoproteins
Telemedicine
Telecommunication links
Ad hoc networks
Scheduling
Smartphones
Recommender systems
Websites
Wireless ad hoc networks
Mobile devices
Hardware
State estimation
Routers
Graphical user interfaces
Electric power systems
Information management
Fruits
Scalability
Middleware
Data privacy
Linear programming
Infiltration
Sugars
Transparency
Particle swarm optimization (PSO)
Monitoring
Feedback
Polynomials
Carbon footprint
Security of data
Network protocols
Luminance
Outsourcing
Video on demand
Lighting
Interoperability
Technical presentations
Visualization
Quality of service
Malware
Genes
Query languages
History
Factorization
Computer systems
Computer architecture
Electricity
Sensors
Specification languages
Proteins
Control systems
Electric power utilization
Mobile ad hoc networks
Graphics processing unit
Networks (circuits)
Cleaning
Testing
Distributed computer systems
Antennas
Fusion reactions
Parallel algorithms
Telecommunication traffic
Landing
Fault detection

Mathematics

Access Control
Query
Leakage
Integrity
Malware
Data Placement
Cost Optimization
Sentiment Analysis
Skyline
Electric Power System
Attack
Resources
Denial of Service
Overlay Networks
Privacy Preserving
Data Center
Control Policy
State Estimation
Context-aware
Decidability
Flow Control
Sugars
Data Flow
Vulnerability
Middleware
Fidelity
Encryption
Injection
Data analysis
Monitor
Costs
Coverage
Visualization
Data Exchange
Evaluation
Traffic
Certificate
Monitoring
kernel
Privacy
Signed
Multi Criteria Analysis
Decompose
Software
Testing
Outsourcing
Mobile Ad Hoc Networks
K-tree
Multicast
Classifier
Server
Honeypot
Authentication
Coding
Model
Experiment
Security Policy
Network Topology
Query Language
Tree Decomposition
B-tree
Grid
Symbolic Execution
Modeling
Data Integrity
Nonlinear Estimation
Amplification
Grouping
Snapshot