Computer Science
Edge Computing
100%
Instant Messaging
100%
Business Application
100%
External Resource
100%
Multi-Access Edge Computing
100%
Use Case
100%
Provider Service
100%
Authentication
100%
Provider Attribute
50%
Authenticate User
50%
Protection Mechanism
50%
Intensive Task
50%
Intensive Application
50%
Trusted Resource
50%
Technological Advance
50%
Pervasive Computing
50%
Government Computing
50%
End User Device
50%
Resource Discovery
50%
Battery Capacity
50%
Locality Sensitive Hashing
50%
e-Services
50%
Federated Identity
50%
ontology alignment
50%
Collection Process
50%
Hashing Function
50%
Effective Solution
50%
Single Application
50%
Essential Concept
50%
Storage Solution
33%
Protect Sensitive Data
33%
Distributed Application
33%
Infrastructure Component
33%
Party Component
33%
Potential Solution
33%
Reducing Latency
25%
Core Component
25%
Computing Units
25%
User Authentication
25%
Accessibility Standard
25%
Electronic Signature
25%
Open Source Software
25%
Key Requirement
25%
Network File System
22%
Legal Compliance
20%
Nonrepudiation
20%
Business-to-Business
20%
Related Technology
20%
Community Cloud
20%
Software Building Block
20%
Engineering
Blockchain
100%
Research Project
100%
Member State
100%
Service Provider
100%
Infrastructure
100%
Limitations
16%
Conducted Experiment
16%
Applicability
14%
Information Technology
14%
Comparability
14%
Process Step
14%