Class information for:
Level 1: APPLICATION LAYERS//AUTOMOTIVE ASSEMBLY PLANT//BITCLOUD

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
30633 165 15.8 18%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
313 3       TELECOMMUNICATIONS//QUEUEING SYSTEMS//PERFORMANCE EVALUATION 40047
2317 2             COMPUTER NETWORKS AND ISDN SYSTEMS//POLLING SYSTEMS//DQDB 4477
30633 1                   APPLICATION LAYERS//AUTOMOTIVE ASSEMBLY PLANT//BITCLOUD 165

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 APPLICATION LAYERS authKW 185064 1% 100% 1
2 AUTOMOTIVE ASSEMBLY PLANT authKW 185064 1% 100% 1
3 BITCLOUD authKW 185064 1% 100% 1
4 CCCNS address 185064 1% 100% 1
5 CONTROL OF INTERNETWORK TRAFFIC authKW 185064 1% 100% 1
6 COST OF SECURE PROTOCOLS authKW 185064 1% 100% 1
7 DESIGN OF SECURE PROTOCOLS authKW 185064 1% 100% 1
8 DTAM authKW 185064 1% 100% 1
9 ENFORCEMENT OF NETWORK POLICIES authKW 185064 1% 100% 1
10 FLASH PROGRAMMING TIME authKW 185064 1% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Telecommunications 4749 45% 0% 74
2 Engineering, Electrical & Electronic 1662 58% 0% 96
3 Computer Science, Hardware & Architecture 1369 16% 0% 27
4 Computer Science, Information Systems 890 19% 0% 32
5 Computer Science, Theory & Methods 431 15% 0% 24
6 COMPUTER APPLICATIONS & CYBERNETICS 279 1% 0% 2
7 Computer Science, Software Engineering 233 9% 0% 15
8 Transportation Science & Technology 12 1% 0% 2
9 Imaging Science & Photographic Technology 9 1% 0% 2
10 Computer Science, Artificial Intelligence 8 2% 0% 4

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 CCCNS 185064 1% 100% 1
2 SIULA 185064 1% 100% 1
3 BIOSECUR PUBL HLTH INFORMAT 92531 1% 50% 1
4 PROSEC 46264 1% 25% 1
5 CONSUMER TECHNOL 37011 1% 20% 1
6 BT S 23131 1% 13% 1
7 TRUSTWORTHY DISTRIBUTED COMP SERV BUPT 14234 1% 8% 1
8 CEMISID 4743 1% 3% 1
9 INFORMAT 3 2533 1% 1% 1
10 HLTH INFORMAT SCI 417 1% 0% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 HIGH PERFORMANCE SYSTEMS-THE MAGAZINE FOR TECHNOLOGY CHAMPIONS 56939 1% 15% 2
2 IEEE CONSUMER ELECTRONICS MAGAZINE 31493 2% 4% 4
3 JOURNAL OF TELECOMMUNICATION NETWORKS 18503 1% 5% 2
4 COMPUTER NETWORKS AND ISDN SYSTEMS 10301 5% 1% 8
5 MICROPROCESSING AND MICROPROGRAMMING 8083 4% 1% 7
6 IEEE COMMUNICATIONS MAGAZINE 6020 7% 0% 12
7 COMPUTER COMMUNICATIONS 5047 7% 0% 11
8 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 4907 7% 0% 12
9 COMPUTING SURVEYS 4623 1% 1% 2
10 AFIPS CONFERENCE PROCEEDINGS 4510 1% 1% 2

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 APPLICATION LAYERS 185064 1% 100% 1 Search APPLICATION+LAYERS Search APPLICATION+LAYERS
2 AUTOMOTIVE ASSEMBLY PLANT 185064 1% 100% 1 Search AUTOMOTIVE+ASSEMBLY+PLANT Search AUTOMOTIVE+ASSEMBLY+PLANT
3 BITCLOUD 185064 1% 100% 1 Search BITCLOUD Search BITCLOUD
4 CONTROL OF INTERNETWORK TRAFFIC 185064 1% 100% 1 Search CONTROL+OF+INTERNETWORK+TRAFFIC Search CONTROL+OF+INTERNETWORK+TRAFFIC
5 COST OF SECURE PROTOCOLS 185064 1% 100% 1 Search COST+OF+SECURE+PROTOCOLS Search COST+OF+SECURE+PROTOCOLS
6 DESIGN OF SECURE PROTOCOLS 185064 1% 100% 1 Search DESIGN+OF+SECURE+PROTOCOLS Search DESIGN+OF+SECURE+PROTOCOLS
7 DTAM 185064 1% 100% 1 Search DTAM Search DTAM
8 ENFORCEMENT OF NETWORK POLICIES 185064 1% 100% 1 Search ENFORCEMENT+OF+NETWORK+POLICIES Search ENFORCEMENT+OF+NETWORK+POLICIES
9 FLASH PROGRAMMING TIME 185064 1% 100% 1 Search FLASH+PROGRAMMING+TIME Search FLASH+PROGRAMMING+TIME
10 HANDWRITING AUTHENTICATION 185064 1% 100% 1 Search HANDWRITING+AUTHENTICATION Search HANDWRITING+AUTHENTICATION

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 DECUIR, J , (2015) BLUETOOTH SMART SUPPORT FOR 6LOBTLE APPLICATIONS AND CONNECTION QUESTIONS.IEEE CONSUMER ELECTRONICS MAGAZINE. VOL. 4. ISSUE 2. P. 67 -70 3 100% 1
2 KARSHMER, AI , THOMAS, JN , KRIVOKAPIC, N , (1994) ON IMPLEMENTING COMPUTER NETWORKING ON EXISTING CABLE TV PLANTS - SOME INTERESTING PROPOSALS.MICROPROCESSING AND MICROPROGRAMMING. VOL. 40. ISSUE 5. P. 355-373 5 71% 0
3 POON, FSF , IQBAL, MS , (1992) DESIGN OF A PHYSICAL LAYER SECURITY MECHANISM FOR CSMA/CD NETWORKS.IEE PROCEEDINGS-I COMMUNICATIONS SPEECH AND VISION. VOL. 139. ISSUE 1. P. 103-112 5 71% 1
4 WISEMAN, SR , FIELDRICHARDS, HS , (1995) HOLISTIC COMPUTING.MICROPROCESSORS AND MICROSYSTEMS. VOL. 19. ISSUE 5. P. 261-267 3 100% 0
5 SCHINDLER, S , (1982) KEYWORDS IN COMMUNICATIONS TECHNOLOGY.COMPUTER COMMUNICATIONS. VOL. 5. ISSUE 3. P. 140-147 5 100% 0
6 ROGERS, MB , (1989) CONSIDERATIONS FOR APPLYING MULTIPLE-LEVEL PROTOCOLS TO SATELLITE COMMUNICATION-NETWORKS.JOURNAL OF SYSTEMS AND SOFTWARE. VOL. 10. ISSUE 3. P. 201-212 3 100% 0
7 HARDJONO, T , OHTA, T , (1994) SECURE END-TO-END DELEGATIONS IN DISTRIBUTED SYSTEMS.COMPUTER COMMUNICATIONS. VOL. 17. ISSUE 3. P. 230-238 3 75% 1
8 HARDJONO, T , SEBERRY, J , (1995) APPLICATIONS OF SMARTCARDS FOR ANONYMOUS AND VERIFIABLE DATABASES.COMPUTERS & SECURITY. VOL. 14. ISSUE 5. P. 465 -472 2 100% 0
9 ESTRIN, D , TSUDIK, G , (1991) SECURE CONTROL OF TRANSIT INTERNETWORK TRAFFIC.COMPUTER NETWORKS AND ISDN SYSTEMS. VOL. 22. ISSUE 5. P. 363-382 3 75% 1
10 WEI, J , (2014) HOW WEARABLES INTERSECT WITH THE CLOUD AND THE INTERNET OF THINGS CONSIDERATIONS FOR THE DEVELOPERS OF WEARABLES.IEEE CONSUMER ELECTRONICS MAGAZINE. VOL. 3. ISSUE 3. P. 53 -56 1 100% 5

Classes with closest relation at Level 1



Rank Class id link
1 17505 PROTOCOL SYNTHESIS//ESTELLE//PROTOCOL VALIDATION
2 23571 COUNTING TO INFINITY//ROUTING INFORMATION PROTOCOL//BIDIRECTIONAL MULTIPLE QOS REQUIREMENTS
3 4120 POLLING SYSTEMS//DQDB//COMPUTER NETWORKS AND ISDN SYSTEMS
4 31074 MANUFACTURING MESSAGE SPECIFICATION//MULTI INTERACTION SYSTEMS//MANUFACTURING MESSAGE SPECIFICATION MMS
5 35274 ADAPTIVE COMPUTING SYSTEMS//AGILE BUSINESS DEVELOPMENT//ANTI JAMMING AJ
6 24218 PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS//BIODISTRIBUTION DATA//CERTIFICATE OF NEED CON
7 37532 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
8 36388 IMSI CATCHER//ADMINISTRATION TOOLS//APPLICATION FIREWALLS
9 25699 USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT
10 17399 RECEIVE LIVELOCK//ZERO COPY//SIMICS

Go to start page