The ACM Computing Classification System (CCS)

  1. d&c USE Divide and conquer
  2. dae USE Differential algebraic equations
  3. daes USE Differential algebraic equations
  4. dai USE Distributed artificial intelligence
  5. dai cooperation USE Cooperation and coordination
  6. dai coordination USE Cooperation and coordination
  7. dam USE Database activity monitoring
  8. dap USE Portable media players
  9. daps USE Portable media players
  10. darknet USE Deep web
  11. darpa USE Defense Advanced Research Projects Agency
  12. das USE Direct attached storage
  13. data access method USE Data access methods
  14. data access methodologies USE Data access methods
  15. data access methodology USE Data access methods
  16. Data access methods
  17. data analysis USE Data analytics
  18. Data analytics
  19. data anonymisation USE Data anonymization and sanitization
  20. data anonymisation and sanitisation USE Data anonymization and sanitization
  21. data anonymization USE Data anonymization and sanitization
  22. Data anonymization and sanitization
  23. Data assimilation
  24. data canonicalisation USE Data encoding and canonicalization
  25. data canonicalisation and encoding USE Data encoding and canonicalization
  26. data canonicalization USE Data encoding and canonicalization
  27. data canonicalization and encoding USE Data encoding and canonicalization
  28. data center USE Data centers
  29. data center network USE Data center networks
  30. Data center networks
  31. data center power issue USE Enterprise level and data centers power issues
  32. data center power issues USE Enterprise level and data centers power issues
  33. Data centers
  34. data centers power issue USE Enterprise level and data centers power issues
  35. data centers power issues USE Enterprise level and data centers power issues
  36. data centre USE Data centers
  37. data centre network USE Data center networks
  38. data centre networks USE Data center networks
  39. data centres USE Data centers
  40. Data cleaning
  41. data cleansing USE Data cleaning
  42. data cloud USE Cloud computing
  43. data communications USE Networks
  44. Data compression
  45. Data conversion
  46. data crossing borders USE Transborder data flow
  47. data de-identification USE Data anonymization and sanitization
  48. data deduplication USE Deduplication
  49. Data dictionaries
  50. data dictionary USE Data dictionaries
  51. data encoding USE Data encoding and canonicalization
  52. data encoding and canonicalisation USE Data encoding and canonicalization
  53. Data encoding and canonicalization
  54. Data encryption
  55. Data exchange
  56. data extraction USE Data extraction and integration
  57. Data extraction and integration
  58. Data federation tools
  59. data flow architecture USE Data flow architectures
  60. Data flow architectures
  61. data flow language USE Data flow languages
  62. Data flow languages
  63. data flow programming language USE Data flow languages
  64. data flow programming languages USE Data flow languages
  65. data inconsistencies USE Inconsistent data
  66. data inconsistency USE Inconsistent data
  67. Data integration
  68. data interchange, electronic USE Electronic data interchange
  69. Data layout
  70. data layouts USE Data layout
  71. data lineage USE Data provenance
  72. Data locking
  73. data management system USE Data management systems
  74. Data management systems
  75. data manipulation languages USE Query languages
  76. Data mining
  77. data mining wrapper USE Wrappers (data mining)
  78. data mining wrappers USE Wrappers (data mining)
  79. data model USE Database design and models
  80. data model extension USE Data model extensions
  81. Data model extensions
  82. data model theories USE Data modeling
  83. data model theory USE Data modeling
  84. Data modeling
  85. data modelling USE Data modeling
  86. data path algorithm USE Data path algorithms
  87. data path algorithms USE Data path algorithms
  88. Data path algorithms
  89. Data provenance
  90. data purging USE Data anonymization and sanitization
  91. data query processing USE Database query processing
  92. Data recovery
  93. Data replication tools
  94. data sanitisation USE Data anonymization and sanitization
  95. data sanitisation and anonymisation USE Data anonymization and sanitization
  96. data sanitization USE Data anonymization and sanitization
  97. data sanitization and anonymization USE Data anonymization and sanitization
  98. data scan USE Data scans
  99. Data scans
  100. data scrubbing USE Data cleaning
  101. data stream USE Data streams
  102. data stream management USE Stream management
  103. Data stream mining
  104. Data streaming
  105. Data streams
  106. data structure USE Data structures
  107. data structure analysis USE Data structures design and analysis
  108. data structure design USE Data structures design and analysis
  109. data structure design and analysis USE Data structures design and analysis
  110. Data structures
  111. data structures analysis USE Data structures design and analysis
  112. Data structures and algorithms for data management
  113. data structures design USE Data structures design and analysis
  114. Data structures design and analysis
  115. data structures for data management USE Data structures and algorithms for data management
  116. data transfer, electronic USE Electronic data interchange
  117. data type and structure USE Data types and structures
  118. Data types and structures
  119. data visualisation USE Visualization
  120. data visualisation systems USE Visualization systems and tools
  121. data visualisation systems and tools USE Visualization systems and tools
  122. data visualisation tools USE Visualization systems and tools
  123. data visualization USE Visualization
  124. data visualization systems USE Visualization systems and tools
  125. data visualization systems and tools USE Visualization systems and tools
  126. data visualization tools USE Visualization systems and tools
  127. data warehouse USE Data warehouses
  128. Data warehouses
  129. data warehousing institute USE TDWI
  130. data-flow architecture USE Data flow architectures
  131. data-flow architectures USE Data flow architectures
  132. data-flow computing architecture USE Data flow architectures
  133. data-flow computing architectures USE Data flow architectures
  134. data-flow language USE Data flow languages
  135. data-flow languages USE Data flow languages
  136. data-flow programming language USE Data flow languages
  137. data-flow programming languages USE Data flow languages
  138. data-path algorithm USE Data path algorithms
  139. data-path algorithms USE Data path algorithms
  140. data-stream mining USE Data stream mining
  141. database USE Data management systems
  142. Database activity monitoring
  143. Database administration
  144. Database and storage security
  145. database buffer management USE Record and buffer management
  146. database constraint theory USE Database constraints theory
  147. Database constraints theory
  148. database deadlock USE Deadlocks
  149. database deadlocks USE Deadlocks
  150. database design USE Database design and models
  151. Database design and models
  152. database engine USE Database management system engines
  153. database engines USE Database management system engines
  154. database extension USE Data model extensions
  155. database extensions USE Data model extensions
  156. database integrity check USE Integrity checking
  157. database integrity checking USE Integrity checking
  158. database integrity checks USE Integrity checking
  159. Database interoperability
  160. database locking USE Data locking
  161. database management system USE Data management systems
  162. database management system administration USE Database administration
  163. database management system engine USE Database management system engines
  164. database management system engine architecture USE DBMS engine architectures
  165. database management system engine architectures USE DBMS engine architectures
  166. Database management system engines
  167. database management systems USE Data management systems
  168. database mirroring USE Mirroring
  169. database model USE Database design and models
  170. database models USE Database design and models
  171. database monitoring USE Database activity monitoring
  172. Database performance evaluation
  173. Database protection laws
  174. database query language principles USE Database query languages (principles)
  175. Database query languages (principles)
  176. database query planning USE Query planning
  177. Database query processing
  178. Database query processing and optimization (theory)
  179. database record management USE Record and buffer management
  180. Database recovery
  181. database rule USE Triggers and rules
  182. database rules USE Triggers and rules
  183. database rules and triggers USE Triggers and rules
  184. database scan USE Data scans
  185. database scans USE Data scans
  186. database security USE Database and storage security
  187. database shard USE Horizontal partitioning
  188. database system administration USE Database administration
  189. Database theory
  190. database tool USE Database utilities and tools
  191. database tools USE Database utilities and tools
  192. database tools and utilities USE Database utilities and tools
  193. database transaction locking USE Data locking
  194. database transaction logging USE Transaction logging
  195. Database transaction processing
  196. database transaction recovery USE Database recovery
  197. database trigger USE Triggers and rules
  198. database triggers USE Triggers and rules
  199. database triggers and rules USE Triggers and rules
  200. database utilities USE Database utilities and tools