The ACM Computing Classification System (CCS)

  1. n tier architecture USE n-tier architectures
  2. n tier architectures USE n-tier architectures
  3. n tier computing model USE n-tier architectures
  4. n tier computing models USE n-tier architectures
  5. n tier model of computing USE n-tier architectures
  6. n tier models of computing USE n-tier architectures
  7. n tier system USE n-tier architectures
  8. n tier systems USE n-tier architectures
  9. n-tier architecture USE n-tier architectures
  10. n-tier architectures
  11. n-tier computing model USE n-tier architectures
  12. n-tier computing models USE n-tier architectures
  13. n-tier model of computing USE n-tier architectures
  14. n-tier models of computing USE n-tier architectures
  15. n-tier system USE n-tier architectures
  16. n-tier systems USE n-tier architectures
  17. nae USE National Academy of Engineering
  18. name resolution USE Entity resolution
  19. Naming and addressing
  20. nano electro mechanical system USE Nanoelectromechanical systems
  21. nano electro mechanical systems USE Nanoelectromechanical systems
  22. nano electro-mechanical system USE Nanoelectromechanical systems
  23. nano electro-mechanical systems USE Nanoelectromechanical systems
  24. nano electromechanical system USE Nanoelectromechanical systems
  25. nano electromechanical systems USE Nanoelectromechanical systems
  26. nano-electro-mechanical system USE Nanoelectromechanical systems
  27. nano-electro-mechanical systems USE Nanoelectromechanical systems
  28. nano-electromechanical systems USE Nanoelectromechanical systems
  29. nanoelectromechanical system USE Nanoelectromechanical systems
  30. Nanoelectromechanical systems
  31. nas USE National Academy of Sciences
  32. nas USE Network attached storage
  33. nasa jet propulsion laboratory USE Jet Propulsion Laboratory
  34. nasa langley research center USE Langley Research Center
  35. nati (nasdaq) USE National Instruments Corporation
  36. National Academy of Engineering
  37. National Academy of Sciences
  38. national bureau of standards USE National Institute of Standards and Technology
  39. National Center for Education Statistics
  40. National Institute of Standards and Technology
  41. National Institutes of Health
  42. national instruments USE National Instruments Corporation
  43. National Instruments Corporation
  44. national origin USE Geographic characteristics
  45. National Research Council
  46. National Science Foundation
  47. Natural language generation
  48. natural language interface USE Natural language interfaces
  49. Natural language interfaces
  50. Natural language processing
  51. natural language user interface USE Natural language interfaces
  52. natural language user interfaces USE Natural language interfaces
  53. natural-language interface USE Natural language interfaces
  54. natural-language interfaces USE Natural language interfaces
  55. natural-language user interface USE Natural language interfaces
  56. natural-language user interfaces USE Natural language interfaces
  57. navigation problem USE Motion path planning
  58. nbs USE National Institute of Standards and Technology
  59. nces USE National Center for Education Statistics
  60. near duplicate and plagiarism detection USE Near-duplicate and plagiarism detection
  61. near duplicate detection USE Near-duplicate and plagiarism detection
  62. near neighbor search USE Nearest-neighbor search
  63. near neighbor searching USE Nearest-neighbor search
  64. near neighbour search USE Nearest-neighbor search
  65. near neighbour searching USE Nearest-neighbor search
  66. Near-duplicate and plagiarism detection
  67. near-duplicate detection USE Near-duplicate and plagiarism detection
  68. near-neighbor search USE Nearest-neighbor search
  69. near-neighbor searching USE Nearest-neighbor search
  70. near-neighbour search USE Nearest-neighbor search
  71. near-neighbour searching USE Nearest-neighbor search
  72. nearest neighbor algorithm USE Nearest neighbor algorithms
  73. Nearest neighbor algorithms
  74. nearest neighbor queries USE Nearest-neighbor search
  75. nearest neighbor search USE Nearest-neighbor search
  76. nearest neighbor searching USE Nearest-neighbor search
  77. nearest neighbour queries USE Nearest-neighbor search
  78. nearest neighbour search USE Nearest-neighbor search
  79. nearest neighbour searching USE Nearest-neighbor search
  80. nearest-neighbor algorithm USE Nearest neighbor algorithms
  81. nearest-neighbor algorithms USE Nearest neighbor algorithms
  82. Nearest-neighbor search
  83. nearest-neighbor searching USE Nearest-neighbor search
  84. nearest-neighbour search USE Nearest-neighbor search
  85. nearest-neighbour searching USE Nearest-neighbor search
  86. nearshoring USE Offshoring
  87. nems USE Nanoelectromechanical systems
  88. net crime USE Computer crime
  89. net governance USE Internet governance / domain names
  90. Net neutrality
  91. netcrime USE Computer crime
  92. NetWare
  93. network USE Networks
  94. Network access control
  95. network access controls USE Network access control
  96. Network access restrictions
  97. network adapter USE Network adapters
  98. Network adapters
  99. network adaptors USE Network adapters
  100. network addressing USE Naming and addressing
  101. network algorithm USE Network algorithms
  102. Network algorithms
  103. network anonymity USE Network privacy and anonymity
  104. network appliance USE Middle boxes / network appliances
  105. network appliances USE Middle boxes / network appliances
  106. network architecture USE Network architectures
  107. Network architectures
  108. Network attached storage
  109. network bookmarking USE Social tagging
  110. network bridge USE Bridges and switches
  111. network bridges USE Bridges and switches
  112. network component USE Network components
  113. Network components
  114. network control algorithm USE Network control algorithms
  115. Network control algorithms
  116. network data model USE Network data models
  117. Network data models
  118. network database model USE Network data models
  119. network database models USE Network data models
  120. network design algorithm USE Network design and planning algorithms
  121. network design algorithms USE Network design and planning algorithms
  122. network design and planning algorithm USE Network design and planning algorithms
  123. Network design and planning algorithms
  124. network design principle USE Network design principles
  125. Network design principles
  126. network domain USE Network domains
  127. Network domains
  128. Network dynamics
  129. Network economics
  130. Network experimentation
  131. network file system USE Network File System (NFS) protocol
  132. Network File System (NFS) protocol
  133. network file system mirroring USE Mirroring
  134. network file system protocol USE Network File System (NFS) protocol
  135. network flow USE Network flows
  136. network flow algorithm USE Network flows
  137. network flow algorithms USE Network flows
  138. Network flows
  139. Network forensics
  140. Network formation
  141. network function USE Network operations
  142. network functions USE Network operations
  143. network game USE Network games
  144. Network games
  145. network governance USE Internet governance / domain names
  146. network hardware USE Network components
  147. network hardware USE Networking hardware
  148. network in data center USE Data center networks
  149. network in data centre USE Data center networks
  150. network interface card USE Network adapters
  151. network interface cards USE Network adapters
  152. network interface controller USE Network adapters
  153. network interface controllers USE Network adapters
  154. network layer protocol USE Network layer protocols
  155. Network layer protocols
  156. Network manageability
  157. Network management
  158. network management service USE Network management
  159. network management services USE Network management
  160. Network measurement
  161. Network mobility
  162. Network monitoring
  163. network monitoring service USE Network monitoring
  164. network monitoring services USE Network monitoring
  165. network naming USE Naming and addressing
  166. network naming scheme USE Naming and addressing
  167. network naming schemes USE Naming and addressing
  168. network neutrality USE Net neutrality
  169. network node USE Network components
  170. network nodes USE Network components
  171. network oa&m protocol USE OAM protocols
  172. network oa&m protocols USE OAM protocols
  173. network on a chip USE Network on chip
  174. Network on chip
  175. network operation USE Network operations
  176. Network operations
  177. network optimisation USE Network optimization
  178. Network optimization
  179. network performance USE Network performance evaluation
  180. network performance analyses USE Network performance analysis
  181. Network performance analysis
  182. Network performance evaluation
  183. Network performance modeling
  184. network performance modelling USE Network performance modeling
  185. network physical topologies USE Physical topologies
  186. network physical topology USE Physical topologies
  187. network planning algorithm USE Network design and planning algorithms
  188. network planning algorithms USE Network design and planning algorithms
  189. network policies USE Network policy
  190. Network policy
  191. network presentation protocol USE Presentation protocols
  192. network presentation protocols USE Presentation protocols
  193. network privacy USE Network privacy and anonymity
  194. Network privacy and anonymity
  195. Network properties
  196. network property USE Network properties
  197. network protocol USE Network protocols
  198. Network protocol design
  199. network protocol designs USE Network protocol design
  200. Network protocols