<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Accelerometer based north finding system
2
Accelerometer Based on High T
c
Piezoelectric Ceramics
3
Accelerometer based on non-linear micromechanical transformer with frequency output
4
Accelerometer based real-time activity analysis on a microcontroller
5
Accelerometer based robotic joint orientation estimation
6
Accelerometer Based Transportation Mode Recognition on Mobile Phones
7
Accelerometer based wireless air mouse using Arduino micro-controller board
8
Accelerometer based wireless wheel rotating sensor for navigation usage
9
Accelerometer body sensor network improves systolic time interval assessment with wearable ballistocardiography
10
Accelerometer Calibration and Dynamic Bias and Gravity Estimation: Analysis, Design, and Experimental Evaluation
11
Accelerometer Characteristics of a Drag-Cup Induction Machine
12
Accelerometer detection in a camera view based on feature point tracking
13
Accelerometer feedforward servo for disk drives
14
Accelerometer for mobile robot positioning
15
Accelerometer for mobile robot positioning
16
Accelerometer input axis angular acceleration sensitivity
17
Accelerometer Localization in the View of a Stationary Camera
18
Accelerometer measurements for noninvasive diagnosis of degenerative joint diseases
19
Accelerometer Placement for Posture Recognition and Fall Detection
20
Accelerometer Sensor Using Piezoelectric ZnO Thin Films
21
Accelerometer signal pre-processing influence on human activity recognition
22
Accelerometer signal-based human activity recognition using augmented autoregressive model coefficients and artificial neural nets
23
Accelerometer simulation for biologically inspired applications
24
Accelerometer transverse sensitivity testing with double turntable centrifuge
25
Accelerometer type cardiac transducer for detection of low-level heart sounds
26
Accelerometer tyre to estimate the aquaplaning state of the tyre-road contact
27
Accelerometer using MI sensor
28
Accelerometer using MOSFET with movable gate electrode: Electroplating thick nickel proof mass on flexible Parylene beam for enhancing sensitivity
29
Accelerometer versus footswitch evaluation of gait unsteadiness and temporal characteristics of gait in two elderly patient groups
30
Accelerometer vibration analysis in finding out velocities of pen input device
31
Accelerometer´s position free human activity recognition using a hierarchical recognition model
32
Accelerometer-assisted tracking and pointing for deep space optical communications
33
Accelerometer-based activity recognition on a mobile phone using cepstral features and quantized gmms
34
Accelerometer-based angle measurement system with application in hospital bed
35
Accelerometer-based body sensing for healthy aging
36
Accelerometer-Based Breathing Signal Acquisition with Empirical Mode Decomposition
37
Accelerometer-based control of an industrial robotic arm
38
Accelerometer-based data-driven hazard detection and classification for motorcycles
39
Accelerometer-based estimation of the elongation speed in a motorcycle suspension via Kalman-filter techniques
40
Accelerometer-based fall detection for smartphones
41
Accelerometer-based fall detection sensor system for the elderly
42
Accelerometer-based fetal movement detection
43
Accelerometer-Based Gait Recognition by Sparse Representation of Signature Points With Clusters
44
Accelerometer-based gait recognition via voting by signature points
45
Accelerometer-based gesture classification using principal component analysis
46
Accelerometer-based gesture recognition via dynamic-time warping, affinity propagation, & compressive sensing
47
Accelerometer-based hand gesture recognition system for interaction in digital TV
48
Accelerometer-based HUD input for car navigation
49
Accelerometer-based human activity classification using Water Wave Optimization approach
50
Accelerometer-based measurement of exercise and mobility for pulmonary rehabilitation
51
Accelerometer-based methods for energy expenditure using the smartphone
52
Accelerometer-based online reconstruction of vibrations from delayed measurements
53
Accelerometer-Based Respiratory Measurement During Speech
54
Accelerometer-based sensor network for fall detection
55
Accelerometer-based swinging gesture detection for an electronic handbell
56
Accelerometer-based tilt estimation of a rigid body with only rotational degrees of freedom
57
Accelerometers
58
Accelerometers and an aircraft attitude evaluation
59
Accelerometers and Force Sensing Resistors for Optimal Control of Walking of a Hemiplegic
60
Accelerometers for vehicle chassis systems
61
Accelerometers: An underutilized resource in sports monitoring
62
Accelerometric activity identification for remote assessment of quality of movement
63
Accelerometry based classification of gait patterns using empirical mode decomposition
64
Accelerometry Based Classification of Walking Patterns Using Time-frequency Analysis
65
Accelerometry to quantify frequency-dependence of surgical energy-induced neuromuscular stimulation
66
Accelerometry-Based Berg Balance Scale Score Estimation
67
Accelerometry-Based Gait Analysis and Its Application to Parkinson´s Disease Assessment— Part 1: Detection of Stride Event
68
Accelerometry-Based Gait Analysis and Its Application to Parkinson´s Disease Assessment— Part 2 : A New Measure for Quantifying Walking Behavior
69
Accelerometry-Based Home Monitoring for Detection of Nocturnal Hypermotor Seizures Based on Novelty Detection
70
Accelerometry-based study of body vibration dampening during whole-body vibration training
71
AccelPen: Detecting Writing Action with Pen Acceleration Toward Learning Support Systems
72
Accelview: A graphical means for driving integrated numerical experiments
73
Accent adaptation in speech user interface
74
Accent adaptation using Subspace Gaussian Mixture Models
75
Accent classification in speech
76
Accent Classification Using Support Vector Machines
77
Accent classification with phonetic vowel representation
78
Accent conversion through cross-speaker articulatory synthesis
79
Accent Detection in Handwriting Based on Writing Styles
80
Accent detection of Telugu speech using prosodic and formant features
81
Accent extraction of emotional speech based on modified ensemble empirical mode decomposition
82
Accent Group modeling for improved prosody in statistical parameteric speech synthesis
83
Accent identification
84
Accent level adjustment in bilingual Thai-English text-to-speech synthesis
85
Accent phrase segmentation using pitch pattern clustering
86
Accent rating by native and non-native listeners
87
Accent recognition using i-vector, Gaussian Mean Supervector and Gaussian posterior probability supervector for spontaneous telephone speech
88
Accent reduction for computer-aided language learning
89
Accent training for new arrivals
90
Accent type recognition and syntactic boundary detection of Japanese using statistical modeling of moraic transitions of fundamental frequency contours
91
Accented Handwritten Character Recognition Using SVM - Application to French
92
Accented Indian english ASR: Some early results
93
Accept No Substitutes [The Interface]
94
Accept the Challenge, Set the Stage for the Future... Join MITRE´s Signal Processing R&D Team.
95
Accept vs. What?
96
Acceptability and difficulties of (fuzzy) decision support systems in clinical practice
97
Acceptability and Quality of Experience in over the top video
98
Acceptability of a companion robot for children in daily life situations
99
Acceptability of driving an equipped vehicle with drive recorder: the impact of the context
100
Acceptability of Four Transformer Top-Oil Thermal Models—Part I: Defining Metrics
101
Acceptability of Four Transformer Top-Oil Thermal Models—Part II: Comparing Metrics
102
Acceptability of Hear-O as a mobile hearing screening tool
103
Acceptability of Lean Six Sigma in a developing economy: Results from exploratory research in Nigerian consulting companies
104
Acceptability of robot assisted active arm exercise as part of rehabilitation after stroke
105
Acceptability of Three Transformer Hottest-Spot Temperature Models
106
Acceptability ratings by humans and automatic gesture recognition for variations in sign productions
107
Acceptability-Based QoE Models for Mobile Video
108
Acceptable bubble size in potting materials
109
Acceptable capacity of PV system according to capacity of NaS battery in a microgrid under 30 min Power balancing control
110
Acceptable decision processes and acceptable risks in public sector regulations
111
Acceptable direct current in three-phase power transformers: comparative analysis
112
Acceptable gamma camera nonlinearities for SPECT imaging: myocardial, bones, and hot lesions
113
Acceptable gas-in-oil levels in generation and transmission power transformers
114
Acceptable Gas-in-oil Levels In Instrument Transformers (current Vs Voltage Equipement)
115
Acceptable input sequences for singular 2-D linear systems
116
Acceptable legal standards for software
117
ACCEPTABLE LIMITS OF GAMMA FOH A TFT-LIQUID CRYSTAL DISPLAY ON SUBJECTIVE EVALUATION OF PICTURE QUAL
118
Acceptable limits of gamma for a TFT-liquid crystal display on subjective evaluation of picture quality
119
Acceptable Mode Types for Inhomogeneous Media (Corrections)
120
Acceptable Mode Types for Inhomogeneous Media (Correspondence)
121
Acceptable operating force for buttons on in-ear type headphones
122
Acceptable Residual Risk - Principles, Philosophies and Practicalities
123
Acceptable Risk
124
Acceptable standards of quality in sound-broadcast transmission and reception. Radio Section discussion meeting, 22nd February, 1954
125
Acceptable Testing of VLSI Components Which Contain Error Correctors
126
Acceptable Testing of VLSI Components Which Contain Error Correctors
127
Acceptable traceability of a distributed national metrological system
128
Acceptable Use of Technology in Schools: Risks, Policies, and Promises
129
Acceptable use policies and electronic mail: what are the frontiers?
130
Acceptance
131
Acceptance and Adoption of Industrial Mobile Solutions: Factors Affecting to Professional Use and Exploitation of Mobility
132
Acceptance and Applications of Smart Cards Technology in University Settings
133
Acceptance and perceptions of advanced mobile services: alterations during a field study
134
Acceptance and random generation of event sequences under real time calculus constraints
135
Acceptance and rejection of manuscripts
136
Acceptance and usage of ERP systems: The role of institutional factors in ERP post-implementation
137
Acceptance and usage of management information system in small scale and medium to large scale industries
138
Acceptance and use of a social robot by elderly users in a domestic environment
139
Acceptance and Use of an E-Publishing Platform: An Empirical Study on Chinese SciencePaper Online
140
Acceptance and use of mobile phone mediated communication technologies in community communications
141
Acceptance angle improvement in the holographic spectrometer for diffuse source spectroscopy
142
Acceptance Angle Influence on the Optimum Incident Spot Size for High-Finesse Microcavity Two-Photon Absorption Photodetectors
143
Acceptance as a success factor for planning wireless network infrastructure
144
Acceptance based assurance
145
Acceptance by transformation monoids (with an application to local self reductions)
146
Acceptance criteria and workmanship standards at Semicon Associates
147
Acceptance curve for overhead line damper evaluation
148
Acceptance factors of Social shopping
149
Acceptance factors: An iPad in classroom ecology
150
Acceptance in the deployment of blended learning as a learning resource in information technology and computer science program, Brawijaya university
151
Acceptance issues in metrics program implementation
152
Acceptance of automatic situation assessment in surveillance systems
153
Acceptance of communication media in organizations: richness or features?
154
Acceptance of decisions on the cognitive cards of socially-economic systems
155
Acceptance of e-cash and usage implications of associated system: The case of mobile-online gaming services
156
Acceptance of e-commerce services: the case of electronic brokerages
157
Acceptance of e-Government Services in Sudan: an Empirical Investigation
158
Acceptance of ICT-intensive socio-technical infrastructure systems: Smart metering case in the Netherlands
159
Acceptance of location-based service technology—The Facebook Check-in function
160
Acceptance of microelectronics in the industrial environment
161
Acceptance of mobile TV channel switching delays
162
Acceptance of Mobile, Classroom-Bound E-Learning Systems from the Perspective of Students and Lectures
163
Acceptance of Mobile-Based Assessment from the Perspective of Self-Determination Theory of Motivation
164
Acceptance of Papers for Publication
165
Acceptance of pervasive healthcare systems: A comparison of different implementation concepts
166
Acceptance of Professional Web 2.0 Platforms in Regional SME Networks: An Evaluation Based on the Unified Theory of Acceptance and Use of Technology
167
Acceptance of Tablet PC technology by engineering faculty
168
Acceptance of the medal
169
Acceptance of verificator by information science students
170
Acceptance probability of IP-MCMC-PF: revisited
171
Acceptance sampling plan for Marshall-Olkin extended Fréchet distribution
172
Acceptance Sampling Plan of Accelerated Life Testing for Exponential Distribution under Time-Censoring
173
Acceptance sampling: An efficient, accurate method for estimating and optimizing parametric yield
174
Acceptance sampling: an efficient, accurate method for estimating and optimizing parametric yield [IC manufacture]
175
Acceptance Speech by Alberto Isidori [People in Control]
176
Acceptance Speech of Arthur J. Krener for the 2012 Richard E. Bellman Control Heritage Award [People in Control]
177
Acceptance Speech of Eduardo D. Sontag for the 2011 IEEE Control Systems Award [People in Control]
178
Acceptance statement
179
Acceptance test case driven component selection approach
180
Acceptance test charts for machine tools
181
Acceptance Test of the First Power Supply and Protection System Module for W7-X
182
Acceptance test performance of the Rocketdyne radio frequency power system
183
Acceptance test requirements for the procurement of electrostatic discharge (ESD) protective workstations
184
Acceptance Testing - The Critical Problem in Software Acquisition
185
Acceptance testing and commissioning of a Ximatron radiotherapy simulator
186
Acceptance testing and validation of Stability Type models of wind power plants
187
Acceptance testing of BGA ball alloys
188
Acceptance testing of electric motors and generators
189
Acceptance testing of electric motors and generators
190
Acceptance testing protocols: immunity of medical equipment to electrical mains borne interference
191
Acceptance tests and criteria of the ATLAS transition radiation tracker
192
Acceptance tests and monitoring of the next generation polarimetric weather radar network in Switzerland
193
Acceptance tests conducted on optical ground wires for checking additional fibre length
194
Acceptance tests for hydroelectric plants
195
Acceptance Tests for Hydroelectric Plants
196
Acceptance tests of distributed processing orientated supervisory control and data acquisition (SCADA) systems for offshore platforms
197
Acceptance tests of iter vertical target divertor full scale plasma facing units fabricated by HRP
198
Acceptance, usability and usefulness of WebLab-Deusto from students point of view
199
Acceptance-Based Software Architecture Deployment for Improvement of Existing Applications
200
Acceptances Sampling of Reliable Tubes
201
Accepted but unformated papers [breaker page]
202
Accepted but unformated papers [breaker page]
203
Accepted papers by country
204
Accepted papers by country
205
Accepting more general telephone calls in emergency situations by limiting general call holding time under trunk reservation control
206
Accepting performance degradation in fault-tolerant control system design
207
Accesing Internet Applications From Wireless Cotnputers
208
Access
209
Access
210
Access
211
Access
212
Access
213
Access
214
Access
215
Access (DS-CDMA) receiver for a shallow-water asynchronous multiuser network
216
ACCESS 2010 Preface
217
ACCESS 2010 Program Committee
218
ACCESS 2010 Reviewers
219
Access algorithm for packetized wireless transmission in the presence of cochannel interference
220
Access algorithms for packetized transmission in the presence of co-channel interference
221
Access all areas
222
Access all areas
223
Access all areas - analysis - [briefing in depth]
224
Access and alignment of arrays for a bidimensional parallel memory
225
Access and Alignment of Data in an Array Processor
226
Access and control in a cellular wireless ATM network
227
Access and Exchange of Hierarchically Structured Resources on the Web with the NESTOR Framework
228
Access and flexibility in a changing marketplace-case study: the 2002 Salt Lake City Winter Games
229
Access and Handover Management for Femtocell Systems
230
Access and information transfer protocols in low earth orbit communication network "GONETS"
231
Access and internal network protocols for providing switched multi-megabit data service
232
Access and metro networks based on WDM technologies
233
Access and metro scalable WDM architectures with medium access control protocol featuring optical burst switching
234
Access and metro technologies for services, transport, and domain hand-off
235
Access and monitor vulnerability of urban metro network system in China
236
Access and Path Selection in Ambient Networks
237
Access and Pricing of Distribution Network with Distributed Generation
238
Access and Retrieval from Image Databases Using Image Thumbnails
239
Access and storage techniques
240
Access and switching techniques in an ATM user-oriented satellite system
241
Access and synchronization schemes in the ESA OBP system
242
Access and usage of open educational resources
243
Access anomaly of emergency traffic in CSMA/CA of IEEE 802.15.6
244
Access aspects of voice/data convergence
245
Access Authentication to IMS Systems in Next Generation Networks
246
Access based data decomposition fam distributed memory machines
247
Access by design: Web sites for audiences of all abilities
248
Access Channel Performance in CDMA2000
249
Access channel slot acquisition in cellular DS/CDMA reverse link
250
Access Channels in m-Commerce Services
251
Access Control Agnostic Trust Negotiation Decision Engine
252
Access Control Algorithm on File View in Intranets
253
Access control and applications on trusted systems
254
Access Control and Authentication for Converged Wireless Networks
255
Access Control and Authentication for Converged Wireless Networks
256
Access Control and Authorization Constraints for WS-BPEL
257
Access Control and Authorization for Security of RFID Multi-Domain Using SAML and XACML
258
Access control and authorization plan for customer control of network services
259
Access control and cell association in two-tier femtocell networks
260
Access control and collaborative authoring on the Semantic Web.
261
Access control and content authentication for hybrid DVB-T2/P2P broadcasting
262
Access control and handoff management in multi-tier multimedia wireless systems
263
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges
264
Access control and interlock system at the Advanced Photon Source
265
Access control and intrusion detection
266
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent
267
Access Control and Labeling Scheme for Dynamic XML Data
268
Access control and monitoring in a prison environment
269
Access Control and Performance Optimization Based on Fine Granularity
270
Access Control and Privacy in Location-Aware Services forMobile Organizations
271
Access control and privacy in MANET emergency environment
272
Access Control and Security Properties Requirements Specification for Clouds´ SecLAs
273
Access control and session management in the HTTP environment
274
Access control and signatures via quorum secret sharing
275
Access Control and the Internet of Things
276
Access control and user authentication concerns in cloud computing environments
277
Access control and verification in Petri-net-based hyperdocuments
278
Access Control Architecture Design Issues in Enterprise Collaborative Environment
279
Access Control Architecture Separating Privilege by a Thread on a Web Server
280
Access Control as a Service for Public Cloud Storage
281
Access Control Aware Search on the Cloud Computing
282
Access control based on gait analysis and face recognition
283
Access control based on group signatures in cloud service
284
Access control based on performance estimation and client clustering in large-scale distributed systems
285
Access Control Based on RBAC in Distributed Cooperation Environment
286
Access control based on visual face recognition using Depth Spatiograms of Local Quantized Patterns
287
Access control by Boolean expression evaluation
288
Access control by RFID and face recognition based on neural network
289
Access control by tracking shallow execution history
290
Access control by using object properties and categorized methods
291
Access control cube model in the administrative system a single level
292
Access control delegation for the cloud
293
Access Control Design and Implementations in the ATLAS Experiment
294
Access Control Enforcement Based on Proxy Re-encryption in Data Outsourcing Environment
295
Access control enforcement in Named Data Networking
296
Access Control Enforcement of Organizational Wide Policies in Object-Oriented Application
297
Access control enforcement on outsourced data ensuring privacy of access control policies
298
Access Control Enforcement on Query-Aware Encrypted Cloud Databases
299
Access control enforcement testing
300
Access control for a modular, extensible storage service
301
Access control for a Smart Grid SOA
302
Access control for Active Spaces
303
Access Control for Adaptive Reservations on Multi-User Systems
304
Access Control for Apps Running on Constrained Devices in the Internet of Things
305
Access control for big data using data content
306
Access Control for Cloud Applications
307
Access Control for Collaborative Systems: A Web Services Based Approach
308
Access control for cooperative systems: A comparative analysis
309
Access Control For Distribution Automation Using Ethernet Passive Optical Network
310
Access control for future mobile devices
311
Access control for healthcare data using extended XACML-SRBAC model
312
Access Control for Human Tasks in Service Oriented Architecture
313
Access control for hybrid femtocell network based on AGV mechanism
314
Access control for local personal smart spaces
315
Access Control for Middleware in RFID Systems
316
Access Control for Multi-tenancy in Cloud-Based Health Information Systems
317
Access control for OSGi-based reconfigurable RFID middleware
318
Access Control for OSGi-Based Reconfigurable RFID Middleware
319
Access Control for Privacy Protection for Dynamic and Correlated Databases
320
Access control for semantic Web services
321
Access Control for Shared Resources
322
Access Control for the Cloud Based on Multi-device Authentication
323
Access Control for the Smart Meters Based on ABE
324
Access control for the SPIN extensible operating system
325
Access control for untrusted content distribution clouds using unidirectional re-encryption
326
Access control for web page resources based on data stream filtration
327
Access control for Web Services Based on feedback and decay
328
Access Control Framework for Secure Network Computing Environment
329
Access control in a collaborative session in multi tenant environment
330
Access control in a cooperative editing system
331
Access control in a privacy-aware eLearning environment
332
Access control in a virtual university
333
Access control in a workstation-based distributed computing environment
334
Access control in ad hoc groups
335
Access control in an open distributed environment
336
Access Control in Communication Systems
337
Access control in cyber-physical systems using steganography and digital signatures
338
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance
339
Access control in distributed object systems: problems with access control lists
340
Access Control in Distributed Systems: Merging Theory with Practice
341
Access Control in e-Health Portal Systems
342
Access control in Group Communication Systems
343
Access control in IPv6-based roaming scenarios
344
Access Control in JavaScript
345
Access control in metropolitan area networks
346
Access control in mobile databases using mobile agents
347
Access control in multicast packet switching
348
Access control in network management system
349
Access Control in Parallel Programs
350
Access control in peer-to-peer collaborative systems
351
Access control in probative value Cloud
352
Access Control in Social Enterprise Applications: An Empirical Evaluation
353
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
354
Access control in wide-area networks
355
Access control inference and feedback for policy managers: a fine-grained analysis
356
Access control infrastructure for on-demand provisioned virtualised infrastructure services
357
Access Control List Mediation System for Large-Scale Network
358
Access control management as a service for NoSQL big data
359
Access Control Management for Cloud
360
Access control management of the cloud service platform
361
Access Control Mechanism Based on Entity Authentication with IPv6 Header "Flow Label" Field
362
Access Control Mechanism Based on Trust Quantification
363
Access control mechanism for collaborative video database production applications
364
Access Control Mechanism for Multi-user Data Sharing in Social Networks
365
Access Control Mechanism For Web Databases By Using Parameterized Cursor
366
Access control mechanisms for femtocells
367
Access control mechanisms for fraglets
368
Access control mechanisms for outsourced data in cloud
369
Access control mechanisms in a distributed, persistent memory system
370
Access Control Mechansim for Mobile Ad Hoc Network of Networks (MANoN)
371
Access control meets public key infrastructure, or: assigning roles to strangers
372
Access control method based on multi-level security tag for distributed database system
373
Access Control Method Based on Sample Monitoring for Volatile Traffic in Interactive TV Services
374
Access Control Method for Web of Things Based on Role and SNS
375
Access control method with variable retransmission probability in ad-hoc networks
376
Access control method with variable retransmission probability in ad-hoc networks and its consideration of the changing point
377
Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes
378
Access Control Model and Design for Delegation Using Authorization Tokens
379
Access control model based on multi-role and task
380
Access control model based on role and attribute and its applications on space-ground integration networks
381
Access Control Model Based on Trust and Risk Evaluation in IDMaaS
382
Access control model for composite web services
383
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation
384
Access control model for secure XML documents
385
Access Control Model for the My Number National Identification Program in Japan
386
Access Control Model for Web Services with Attribute Disclosure Restriction
387
Access Control Model Formalism using Adaptive Automaton
388
Access control model in object-oriented systems
389
Access control model with enhanced flexibility and scalability for cloud
390
Access control models for business processes
391
Access control models in heterogeneous information systems: From conception to exploitation
392
Access control models in IoT: The road ahead
393
Access Control models: State of the art and comparative study
394
Access control module for local integrated optical network
395
Access Control of Cloud Computing Using Rapid Face and Fingerprint Identification
396
Access control of data in integrated voice/data CDMA systems: benefits and tradeoffs
397
Access control of data in integrated voice/data CDMA systems: benefits and tradeoffs
398
Access control of data in integrated voice/data/video CDMA systems
399
Access Control of Data in Integrated Voice/Video/Data Wireless CDMA Systems
400
Access control of global distributed storage system
401
Access control of multimedia traffic in a 3.5G wireless network
402
Access Control of RFID Middleware Using Extended Usage Control Model
403
Access Control of Software Source Code by CRYPTEX Model
404
Access Control of Web and Java Based Applications
405
Access Control of XML Documents and Business Rule Processing for Advanced Information Exchange
406
Access Control on the Composition of Web Services
407
Access control on the Web using proof-carrying authorization
408
Access control policies enforcement in a cloud environment: Openstack
409
Access Control Policies for Semantic Networks
410
Access Control Policies for Web Services in Medical Aid System
411
Access Control Policy Based on Behavior Patterns
412
Access Control Policy Combinations for the Grid Using the Policy Machine
413
Access control policy embedded composition algorithm for web services
414
Access Control Policy Evolution: An Empirical Study
415
Access Control Policy Extraction from Unconstrained Natural Language Text
416
Access Control Policy Management Framework based on RBAC in OSGi Service Platform
417
Access Control Policy Misconfiguration Detection in Online Social Networks
418
Access Control Policy Model for Implementing Network Based Authorization Framework
419
Access control policy negotiation for remote hot-deployed grid services
420
Access Control Protocol for Conversation Based Composite Web Services in Pervasive Computing
421
Access control protocols for multi-view on-the-fly memory computer system
422
Access control reinforcement over searchable encryption
423
Access control requirements for environmental information knowledge base systems
424
Access control requirements in a mature pay television industry
425
Access Control Research Based on Trusted Computing Android Smartphone
426
Access control research on data security in Cloud computing
427
Access control scheme for Web services ( ACSWS )
428
Access Control Scheme for Workflow
429
Access control schemes for DS-CDMA cellular system supporting an integrated voice/data traffic
430
Access control schemes for high-speed train communications
431
Access control schemes of integrated voice/data traffic in CDMA cellular system
432
Access Control Solution for Command and Control Systems Integration
433
Access Control Strategies for Virtualized Environments in Grid Computing Systems
434
Access control system based on the emerging European standard for 5.8 GHz short range communication
435
Access Control System for Grid Security Infrastructure
436
Access control system on the M6 motorway
437
Access Control System Using an Embedded System and Radio Frequency Identification Technology
438
Access control system using NFC and Arduino
439
Access control system using palm of the hand image processing
440
Access control system with hand geometry verification and smart cards
441
Access control system with hand geometry verification and smart cards
442
Access control system with high level security using fingerprints
443
Access control system with neuro-fuzzy supervision
444
Access Control System: A Cost Effective Protection Scheme for Fiber Fault Identification
445
Access control systems and reductions of driver´s wait time at the entrance of a car park
446
Access control taxonomy for social networks
447
Access control techniques for CDMA ALOHA
448
Access control technology research in embedded operating system
449
Access control through self-existent mechanism
450
Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS
451
Access control to two multiserver loss queues in series
452
Access control using automated face recognition: Based on the PCA & LDA algorithms
453
Access Control Using Extended Role Graph Corresponding to Organizational Hierarchy
454
Access control using mobile agents
455
Access control validation by ontologies
456
Access control via coalitional power game
457
Access control via lightweight ontologies
458
Access Control with Hidden Policies and Credentials for Service Computing
459
Access Control with Privacy Enhancements a Unified Approach
460
Access control with prohibitions and obligations
461
Access Control with RFID in the Internet of Things
462
Access Control with Single-Key-Lock
463
Access control with uncertain surveillance
464
Access control, code allocation, and adaptive scheduling for UMTS TDD
465
Access control: principle and practice
466
Access controls for open architecture in intelligent networks
467
Access cost estimation for unified grid storage systems
468
Access Decision System for Seamless Connectivity in Heterogeneous Wireless Networks
469
Access delay analysis in reservation multiple access protocols for broadband local and cellular network
470
Access delay analysis of a distributed queue based ATM distributor-concentrator network
471
Access delay analysis of adaptive traffic load - type protocols for S-ALOHA and CSMA in EDGE
472
Access Delay Analysis of IEEE 802.11 DCF in the Presence of Hidden Stations
473
Access Delay Analysis of ZigBee Protocol with Delay Line
474
Access Delay of Cognitive Radio Networks Based on Asynchronous Channel-Hopping Rendezvous and CSMA/CA MAC
475
Access delay of efficient media access schemes for wireless LAN with smart antenna
476
Access delay performance of resilient packet ring under bursty periodic class B traffic load
477
Access denied [digital rights management]
478
Access Denied: The Practice and Policy of Global Internet Filtering - Book Review
479
Access descriptor based locality analysis for Distributed-Shared Memory multiprocessors
480
Access Discovery in Always Best Connected Networks
481
Access emulation and buffering technique for streaming of non-stream format video files
482
Access emulation and buffering techniques for streaming of non-stream format video files
483
Access Everywhere [Analysis]
484
Access Flow based Multi-Radio Access Connectivity
485
Access flow control algorithms in broadband networks
486
Access flow control scheme for ATM networks using adaptive linear prediction
487
Access flow control scheme for ATM networks using neural-network-based traffic prediction
488
Access Flow: A Protection Model which Integrates Access Control and Information Flow
489
Access for all [Point of View]
490
Access for everyone: introducing accessibility issues to students in Internet programming courses
491
Access for people with intellectual impairment: results from the ACT-IT project
492
Access fuzzy controller for CDMA networks
493
Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular Network
494
Access Governance: Flexibility with Escalation and Audit
495
Access granted: The imperative of innovation and standardization in information security
496
Access Graph Based Risk Assessment Model for Network Information System
497
Access Graph to Analyze Network Vulnerabilities
498
Access graphs: a model for investigating memory consistency
499
Access Grid
500
Access improvements in dynamic channel assignment methods for TDMA wireless systems
501
Access independent mobile core networks
502
Access interface congestion controls for packetized voice transport in wideband networks
503
Access invariance and its use in high contention environments
504
Access key distribution scheme for level-based hierarchy
505
Access Keys Warehouse: a new approach to the development of cooperative information systems
506
Access List Based VLAN Map Architecture and Modified 802.1q Frame Scheme for Addressing VTP Issues
507
Access Log Generator for Analyzing Malicious Website Browsing Behaviors
508
Access LUT without CAM - Improved Pearson hashing for collision reduction
509
Access management in CeRA of India: Strategies to maximize use of e-resources
510
Access management in the ATLAS TDAQ
511
Access management in the ATLAS TDAQ
512
Access Mechanism for Multihop Cellular Networks
513
Access mechanisms in Wi-Fi networks state of art, flaws and proposed solutions
514
Access meditation in a message passing kernel
515
Access Methods for Distributed Multimedia Information Systems Based on Private Broadband Communication Networks
516
Access methods for fiber-optic interconnection of LAN´s
517
Access Methods for Markovian Streams
518
Access methods for online information: A cost/benefit approach to users´ choices
519
Access methods on aggregation of object-oriented database
520
Access methods to WiMAX femtocells: A downlink system-level case study
521
Access mode of EVs to grid based on VPP
522
Access Model of Web Users Based on Multi-chains Hidden Markov Models
523
Access modernization for next generation networks
524
Access network - choices and organisational environments in india
525
Access network architectural issues for future telecommunication networks
526
Access network architecture and economics for Internet
527
Access network characterization-an aid to planning
528
Access network controlled fast handoff for streaming multimedia in WLAN
529
Access Network Design for Optical Flow Switching
530
Access network dimensioning with uncertain traffic forecasts
531
Access network dimensioning with uncertain traffic forecasts
532
Access network energy efficient dynamic power scaling
533
Access network evolution beyond third generation mobile communications
534
Access network evolution scenario and key technological concepts for the broadband network
535
Access network evolution to serve broadband business subscribers
536
Access network for PCS
537
Access network management modeling
538
Access network management standardisation
539
Access network market regulations
540
Access network operation support tool (ACTRESS-OpS) based on object-oriented technology
541
Access network optimization
542
Access Network Reselection Based on Momentary Resources in a Converged Wireless Environment
543
Access network segment design process in future mobile communications systems
544
Access Network Selection Scheme for beyond 3G System
545
Access network selection using combined fuzzy control and MCDM in heterogeneous networks
546
Access network service delivery using nested workflow process
547
Access Network Sharing between Core Networks with Different QoS Policies
548
Access network sharing between core networks with different QoS policies
549
Access Network Sharing by QoS-Guaranteed Network and Conventional Best-Effort-Based Network
550
Access network target architecture
551
Access network traffic models for energy efficient architectures
552
Access Networks Based on Tunable Lasers
553
Access networks based on tunable transmitters
554
Access networks evolution & revolution
555
Access networks for broadband services using WDM technology
556
Access networks for mobility A techno-economic model for broadband access technologies
557
Access networks for personal communication systems
558
Access Networks In Japan
559
Access networks with route diversity: a planning approach and field evaluations
560
Access networks: an European perspective
561
Access networks-beyond MANS to solutions compatible with B-ISDN
562
Access Office by Iris Recognition
563
Access optimizer to overcome the "future walls of embedded DRAMs" in the era of systems on silicon
564
Access order and effective bandwidth for streams on a Direct Rambus memory
565
Access order to avoid inter-vector-conflicts in complex memory systems
566
Access ordering and memory-conscious cache utilization
567
Access over 1 million articles - The IEEE Digital Library [advertisement]
568
Access over 1 million articles - The IEEE Digital Library [advertisement]
569
Access over 1 million articles - The IEEE Digital Library [advertisement]
570
Access over 1 million articles - The IEEE Digital Library [advertisement]
571
Access over 1 million articles - The IEEE Digital Library [advertisement]
572
Access over 1 million articles - The IEEE Digital Library [advertisement]
573
Access over 1 million articles - The IEEE Digital Library [advertisement]
574
Access over 1 million articles - The IEEE Digital Library [advertisement]
575
Access over 1 million articles - The IEEE Digital Library [advertisement]
576
Access over 1 million articles - The IEEE Digital Library [advertisement]
577
Access over 1 million articles - The IEEE Digital Library [advertisement]
578
Access over 1 million articles - The IEEE Digital Library [advertisement]
579
Access over 1 million articles - The IEEE Digital Library [advertisement]
580
Access over 1 million articles - The IEEE Digital Library [advertisement]
581
Access over 1 million articles - The IEEE Digital Library [advertisement]
582
Access over 1 million articles - The IEEE Digital Library [advertisement]
583
Access over 1 million articles - The IEEE Digital Library [advertisement]
584
Access over 1 million articles - The IEEE Digital Library [advertisement]
585
Access over 1 million articles - The IEEE Digital Library [advertisement]
586
Access over 1 million articles - The IEEE Digital Library [advertisement]
587
Access over 1 million articles - The IEEE Digital Library [advertisement]
588
Access over 1 million articles - The IEEE Digital Library [advertisement]
589
Access over 1 million articles - The IEEE Digital Library [advertisement]
590
Access over 1 million articles - The IEEE Digital Library [advertisement]
591
Access over 1 million articles - The IEEE Digital Library [advertisement]
592
Access over 1 million articles - The IEEE Digital Library [advertisement]
593
Access over 1 million articles - The IEEE Digital Library [advertisement]
594
Access over 1 million articles - The IEEE Digital Library [advertisement]
595
Access over 1 million articles - The IEEE Digital Library [advertisement]
596
Access over 1 million articles - The IEEE Digital Library [advertisement]
597
Access over 1 million articles - The IEEE Digital Library [advertisement]
598
Access over 1 million articles - The IEEE Digital Library [advertisement]
599
Access over 1 million articles - The IEEE Digital Library [advertisement]
600
Access over 1 million articles - The IEEE Digital Library [advertisement]
601
Access over 1 million articles - The IEEE Digital Library [advertisement]
602
Access over 1 million articles - The IEEE Digital Library [advertisement]
603
Access over 1 million articles - The IEEE Digital Library [advertisement]
604
Access over 1 million articles - The IEEE Digital Library [advertisement]
605
Access over 1 million articles - The IEEE Digital Library [advertisement]
606
Access over 1 million articles - The IEEE Digital Library [advertisement]
607
Access over 1 million articles - The IEEE Digital Library [advertisement]
608
Access over 1 million articles - The IEEE Digital Library [advertisement]
609
Access over 1 million articles - The IEEE Digital Library [advertisement]
610
Access over 1 million articles - The IEEE Digital Library [advertisement]
611
Access over 1 million articles - The IEEE Digital Library [advertisement]
612
Access over 1 million articles - The IEEE Digital Library [advertisement]
613
Access over 1 million articles - The IEEE Digital Library [advertisement]
614
Access over 1 million articles - The IEEE Digital Library [advertisement]
615
Access over 1 million articles - The IEEE Digital Library [advertisement]
616
Access over 1 million articles - The IEEE Digital Library [advertisement]
617
Access over 1 million articles - The IEEE Digital Library [advertisement]
618
Access over 1 million articles - The IEEE Digital Library [advertisement]
619
Access over 1 million articles - The IEEE Digital Library [advertisement]
620
Access over 1 million articles - The IEEE Digital Library [advertisement]
621
Access over 1 million articles - The IEEE Digital Library [advertisement]
622
Access over 1 million articles - The IEEE Digital Library [advertisement]
623
Access over 1 million articles - The IEEE Digital Library [advertisement]
624
Access over 1 million articles - The IEEE Digital Library [advertisement]
625
Access over 1 million articles - The IEEE Digital Library [advertisement]
626
Access over 1 million articles - The IEEE Digital Library [advertisement]
627
Access over 1 million articles - The IEEE Digital Library [advertisement]
628
Access over 1 million articles - The IEEE Digital Library [advertisement]
629
Access over 1 million articles - The IEEE Digital Library [advertisement]
630
Access over 1 million articles - The IEEE Digital Library [advertisement]
631
Access over 1 million articles - The IEEE Digital Library [advertisement]
632
Access over 1 million articles - The IEEE Digital Library [advertisement]
633
Access over 1 million articles - The IEEE Digital Library [advertisement]
634
Access over 1 million articles - The IEEE Digital Library [advertisement]
635
Access over 1 million articles - The IEEE Digital Library [advertisement]
636
Access over 1 million articles - The IEEE Digital Library [advertisement]
637
Access over 1 million articles - The IEEE Digital Library [advertisement]
638
Access over 1 million articles - The IEEE Digital Library [advertisement]
639
Access over 1 million articles - The IEEE Digital Library [advertisement]
640
Access over 1 million articles - The IEEE Digital Library [advertisement]
641
Access over 1 million articles - The IEEE Digital Library [advertisement]
642
Access over 1 million articles - The IEEE Digital Library [advertisement]
643
Access over 1 million articles - The IEEE Digital Library [advertisement]
644
Access over 1 million articles - The IEEE Digital Library [advertisement]
645
Access over 1 million articles - The IEEE Digital Library [advertisement]
646
Access over 1 million articles - The IEEE Digital Library [advertisement]
647
Access over 1 million articles - The IEEE Digital Library [advertisement]
648
Access paths and testing in an ultra high-performance ATM switch
649
Access pattern analysis for a directional cache scheduling scheme on vehicular telematics networks
650
Access pattern based local memory customization for low power embedded systems
651
Access Pattern Based Re-reference Interval Table for Last Level Cache
652
Access pattern based stream buffer management scheme for portable media players
653
Access pattern reshaping for eMMC-enabled SSDs
654
Access pattern restructuring for memory energy
655
Access pattern-based code compression for memory-constrained embedded systems
656
Access plan recommendation: A clustering based approach using queries similarity
657
Access point assignment algorithms in WLANs based on throughput objectives
658
Access point association in IEEE 802.11 WLAN
659
Access Point Buffer Management for Power Saving in IEEE 802.11 WLANs
660
Access point centric scheduling for dash streaming in multirate 802.11 wireless network
661
Access point cooperation for collision-free polling between distributed real-time networks
662
Access Point Density and Bandwidth Partitioning in Ultra Dense Wireless Networks
663
Access Point Design with a Genetic Algorithm
664
Access Point discovery in 802.11 networks
665
Access point evaluation using packet transfer ratio in multihop wireless networks
666
Access Point Initiated Approach for Interfered Node Detection in 802.11 WLANs
667
Access point placement for fingerprint-based localization
668
Access point power saving in solar/battery powered IEEE 802.11 ESS mesh networks
669
Access Point priority based Capacity Enhancement scheme for VoIP over WLAN
670
Access Point Research in Rail Train Safety Monitoring Sensor Network
671
Access Point Reselection and Adaptive Cluster Splitting-Based Indoor Localization in Wireless Local Area Networks
672
Access point selection algorithms for maximizing throughputs in wireless LAN environment
673
Access point selection and reducing the handoff latency to support VoIP traffic
674
Access point selection before attaching to foreign network for mobile networks
675
Access point selection for improving the voice quality and overall throughput in wireless LANs
676
Access Point Selection for Improving Throughput Fairness in Wireless LANs
677
Access Point Selection for Multi-Rate IEEE 802.11 Wireless LANs
678
Access Point Selection for WLANs with Cognitive Radio: A Restless Bandit Approach
679
Access Point selection game for mobile wireless users
680
Access point selection mechanism to circumvent rogue access points using voting-based query procedure
681
Access Point Selection Strategy for Large-Scale Wireless Local Area Networks
682
Access point selection strategy in IEEE802.11e WLAN networks
683
Access Point Selection Tradeoff for IEEE 802.11 Wireless Mesh Network
684
Access Point Selection under QoS Requirements in Variable Channel-Width WLANs
685
Access point significance measures in WLAN-based location
686
Access point-coordinated contention resolution for channel access in wireless LANs
687
Access point-less wireless location method based on peer-to-peer ranging of impulse radio ultra-wideband
688
Access Points Planning in Urban Area for Data Dissemination to Drivers
689
Access points vulnerabilities to DoS attacks in 802.11 networks
690
Access Policies for Frequency Hopping System Based on Frequency Relativity in ISM Band
691
Access Policy Consolidation for Event Processing Systems
692
Access policy design for a cognitive secondary user under a primary type-II HARQ process
693
Access Policy Design for Cognitive Secondary Users Under a Primary Type-I HARQ Process
694
Access policy specification for Web applications
695
Access PON using downstream 1550-nm WDM routing and upstream 1300-nm SCMA combining through a fiber-grating router
696
Access popularity based wireless broadcasting mechanism
697
Access pricing model of telecommunication interconnection
698
Access pricing of network essential facilities for Chinese railways
699
Access priority for throughput sensitive and delay sensitive users in S-ALOHA using different backoff policies
700
Access priority schemes in UMTS MAC
701
Access Probability Analysis of IEEE802.15.4
702
Access probability aware cell reselection for load balancing
703
Access protection for fairness in a distributed queue dual bus metropolitan area network
704
Access protocol for broadband multimedia centralized wireless local area networks
705
Access protocols and on-board switch techniques for multimedia personal satellite communications
706
Access protocols for an efficient optical packet-switched metropolitan area ring network supporting IP datagrams
707
Access Protocols in Data Partitioning Based Cloud Storage
708
Access Provisioning Expert (APEX): a knowledge-based approach to `no order provisioning´ in the interexchange carrier market
709
Access Queues for Multi-Bank Register Files Enabling Enhanced Performance of Highly Parallel Processors
710
Access radio systems in SDH and mobile networks
711
Access Rcent Books and Articles on Microcomputing
712
Access Recent Articles on Microcomputing
713
Access Recent Articles on Microcomputing
714
Access Recent Articles on Microcomputing
715
Access Recent Articles on Microcomputing
716
Access Recent Articles on Microcomputing
717
Access Recent Articles on Microcomputing
718
Access Recent Articles on Microcomputing
719
Access recent articles on microcomputing
720
Access Recent Books and Articles on Microcomputing
721
Access Recent Books and Articles on Microcomputing
722
Access Recent Books and Articles on Microcomputing
723
Access Recent Books and Articles on Microcomputing
724
Access Recent Books and Articles on Microcomputing
725
Access Recent Books and Articles on Microcomputing
726
Access Recent Books and Articles on Microcomputing
727
Access Recent Books and Articles on Microcomputing
728
Access Recent Books and Articles on Microcomputing
729
Access Recent Books and Articles on Microcomputing
730
Access Recent Books And Articles on microcomputing
731
Access region cache: a multi-porting solution for future wide-issue processors
732
Access region locality for high-bandwidth processor memory system design
733
Access Regulation to Hot-Modules in Wormhole NoCs
734
Access regulatory remedies in point-to-multipoint fiber access networks
735
Access restricted [Electronics Space]
736
Access revocation and prevention of false repudiation in secure email exchanges
737
Access right assignment mechanisms for secure home networks
738
Access router based fast handover for mobile IPv6
739
Access router information protocol with FMIPv6 for efficient handovers and their implementations
740
Access rule consistency in cooperative data access environment
741
Access Scheduling Based on Time Water-Filling for Next Generation Wireless LANs
742
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks
743
Access scheduling schemes using global information on local area networks
744
Access scheme for integrated voice/data transmissions over common packet channel in 3GPP
745
Access scheme of Multi-Level Cell Spin-Transfer Torque Random Access Memory and its optimization
746
Access Schemes for an IP-Over-WDM Metro Network
747
Access Schemes for Mitigating the Effects of Sensing Errors in Cognitive Wireless Networks
748
Access Schemes for Mobile Cloud Computing
749
Access Security Based on Bayesian Trust Network
750
Access security in CDMA2000, including a comparison with UMTS access security
751
Access Security on Cloud Computing Implemented in Hadoop System
752
Access selection and joint pricing in multi-operator wireless networks: A Stackelberg game
753
Access Selection in Always Best Connected Networks
754
Access Selection in Partially Backhaul-Limited Multi-Operator IEEE 802.11 Networks
755
Access selection in WCDMA and WLAN multi-access networks
756
Access Selection with Anticipatory Vertical Handover for Multi-Access Networks
757
Access selection with connection reallocation for multi-access networks
758
Access Service Network (ASN) Gateway Relocation Algorithms in WiMAX Networks
759
Access services and private line restoration using microwave radio facilities
760
Access services availability and traffic forecast in PON deployment
761
Access services based on mhp interactive applications
762
Access services based on MHP interactive applications
763
Access signaling and IN-based mobility management for wireless ATM systems
764
Access Specifiers Model for Data Security in Object Oriented Databases
765
Access strategies for D-TASI over mobile radio channels
766
Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed
767
Access strategy and dynamic downlink resource allocation for femtocell networks
768
Access Strategy for Hybrid Underlay-Overlay Cognitive Radios With Energy Harvesting
769
Access Structures for Angular Similarity Queries
770
Access structures for fuzzy spatial queries
771
Access Structures of Elliptic Secret Sharing Schemes
772
Access Support Tree and TextArray: a data structure for XML document storage and retrieval
773
Access system in restricted areas based on programmable logic controller and GSM modem
774
Access system requirement for high track per inch hard disk drives
775
Access the IEE Reference Library today
776
Access the IEEE Computer Society Digital Library [advertisement]
777
Access the IEEE Computer Society Digital Library [advertisement]
778
Access the Most Effective Online Learning Resources Available
779
Access Time Analysis for IEEE P1687
780
Access time and energy tradeoffs for caches in high frequency microprocessors
781
Access Time and Power Dissipation of a Model 256-Bit Single Flux Quantum RAM
782
Access time minimization in IEEE 1687 networks
783
Access time minimization of a moving coil actuator with volumetric, magnetic and current constraints
784
Access time optimization of SRAM memory with statistical yield constraint
785
Access to 20 evenly distributed wavelengths over 100 nm using only a single current tuning in a four-electrode monolithic semiconductor laser
786
Access to a network channel: a survey into the unfairness problem
787
Access to affordances, development of situation models, and identification of procedural text problems
788
Access to an Automated Security System Using Gesture-Based Passwords
789
Access to an instructional control laboratory experiment through the World Wide Web
790
Access to an X.500 directory service via ADSI screen phones
791
Access to bandwidth
792
Access to cable TV systems offering broadband service in the United States
793
Access to CAMAC from VxWorks and UNIX in DART
794
Access to CNL Videoserver educational content using mobile device
795
Access to computers: is there a gender gap?
796
Access to Digital Libraries from low speed Disconnected Environments
797
Access to DIII-D data located in multiple files and multiple locations
798
Access to eHealth language-based services for multinational patients
799
Access to Electricity: Making the Expansion Worldwide [Guest Editorial]
800
Access to electronic information by people with disabilities
801
Access to Government Information
802
Access to heterogeneous directory services
803
Access to homebanking services a Portuguese perspective
804
Access to indexed hierarchical databases using a relational query language
805
Access to industrial process periphery via Java for process control (JFPC)
806
Access to information and use of IT as a dimension of preparedness for hospital practice among Malaysian housemen
807
Access to Information in a World Without Borders: Transborder Data Flows in the Asia Pacific Region
808
Access to information processing tools: an exploratory study
809
Access to IP multimedia subsystem of UMTS via PacketCable network
810
Access to journal article copies through NTIS
811
Access to learning materials using different interaction devices: A comparative study based on eye tracking and subjective perception of students
812
Access to Legal Services: Organizing Better Self-help Systems
813
Access to library resources through portable devices: A pre-design prototype for creating library websites
814
Access to maintenance working documents in a mill environment. A case history
815
Access to microsystem technology: the CMP services solution
816
Access to mobile learning for novice programmers via social networking sites
817
Access to process data with OPC-DA using IEC61499 Service Interface Function Blocks
818
Access to prosthetic devices in developing countries: Pathways and challenges
819
Access to real-time data from the TAO array of moored buoys via Unix/X-Windows or the World Wide Web and Mosaic
820
Access to Space for Technology Validation Missions: A Practical Guide
821
Access to space for technology validation missions: exploring possibilities of suborbital flight
822
Access to streams in multiprocessor systems
823
Access to the DARIAH Bit Preservation Service for Humanities Research Data
824
Access to the home: ADSL
825
Access to the Spatial Data in the Web-Oriented GIS
826
Access To Vectors In Multi-module Memories
827
Access traffic characterization in data networks
828
Access Traffic characterization in Data Networks
829
Access traffic control implementations for frame relay
830
Access Transistor Design and Optimization for 65/45nm High Performance SOI eDRAM
831
Access Transmission Network Upgrade in a Nationwide Mobile Network Modernization Project for Edge Deployment
832
Access transmission network upgrade in a nationwide mobile network modernization project for EDGE deployment
833
Access transport network for agent communication services
834
Access transport network for IPTV video distribution
835
Access transport network system for multimedia communication services
836
Access Versus Bandwidth in Codes for Storage
837
Access vs. bandwidth in codes for storage
838
Access, Awareness and Use of Internet Self-Help Websites for Depression in University Students
839
Access, Visualization, and Interoperability of Air Quality Remote Sensing Data Sets via the Giovanni Online Tool
840
ACCESS: advanced cosmic-ray composition experiment for the space station
841
ACCESS: an agent-based membrane for the rapid deployment of context sensitive services
842
ACcESS: Australia´s contribution to the iSERVO Institute´s development
843
ACCESS: Smart scheduling for asymmetric cache CMPs
844
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems
845
Access-averse framework for computing low-rank matrix approximations
846
Access-Aware In-memory Data Cache Middleware for Relational Databases
847
Access-Aware Memory Thermal Management
848
Access-chip Early Reliability Estimation
849
Access-control disciplines for multi-access communication channels: Reservation and TDMA schemes
850
Access-control language for multidomain environments
851
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis
852
Access-controlled resource discovery for pervasive networks
853
Access-controlled video/voice over IP in Hadoop system with BPNN intelligent adaptation
854
Access-efficient Balanced Bloom Filters
855
Access-Efficient QoS-Aware Data Replication to Maximize User Satisfaction in Cloud Computing Environments
856
Access-eGov-personal assistant of public services
857
Accessibility Advances Could Portend New Mass Technologies
858
Accessibility analysis and evaluation of Bangladesh government websites
859
Accessibility Analysis for Automatic Inspection Using Bounding Volume Hierarchies
860
Accessibility analysis for CMM inspection planning by means of haptic device and STL representation
861
Accessibility Analysis for CMM Inspection Planning Using Haptic Device
862
Accessibility analysis for controlled quantum systems under continuous quantum measurement
863
Accessibility analysis for planning of dimensional inspection with coordinate measuring machines
864
Accessibility analysis for the automatic inspection of mechanical parts by coordinate measuring machines
865
Accessibility analysis in 5-axis machining of sculptured surfaces
866
Accessibility analysis of urban emergency shelters: Comparing gravity model and space syntax
867
Accessibility Analysis of Urban Parks Based on GIS
868
Accessibility analysis on data flow graph: an approach to design for testability
869
Accessibility analysis using computer graphics hardware
870
Accessibility and Collaboration among Semi-literate and Illiterate Groups
871
Accessibility and Controllability of Flexible Robotic Manipulators
872
Accessibility and feedback linearization of discrete-time systems
873
Accessibility and Mobile Learning Standardization
874
Accessibility and scalability in collaborative eCommerce environments
875
Accessibility and Supporting Technologies in M-Learning Standardization
876
Accessibility and Usability of Educational Gaming Environments for Disabled Students
877
Accessibility and Usability of Virtual Learning Environmemts
878
Accessibility as an Indicator of Jordanian E-Government Website Quality
879
Accessibility assessment of MOOC platforms in Spanish: UNED COMA, COLMENIA and Miriada X
880
Accessibility Assessment of Urban Green Space: A Quantitative Perspective
881
Accessibility between neutral networks in indirect genotype-phenotype mappings
882
Accessibility evaluation improvement using Case Based Reasoning
883
Accessibility evaluation of websites using screen reader
884
Accessibility evaluation using WCAG 2.0 guidelines webometrics based assessment criteria (case study: Sebelas Maret University)
885
Accessibility for the blind: An automated audio/tactile description of pictures in digital documents
886
Accessibility guidelines for a distance education platform
887
Accessibility guidelines for victim information registration and retrieval systems
888
Accessibility Implementation Planning for Large Governmental Websites: a Case Study
889
Accessibility in development of free software projects
890
Accessibility in Digital Television: Designing remote controls
891
Accessibility in digital television: designing remote controls
892
Accessibility in engineering courses - academic and computer
893
Accessibility in virtual knowledge spaces for mathematics and natural sciences
894
Accessibility Lie algebra of switched bilinear systems
895
Accessibility of iMHere Smartphone Apps for Self-Care
896
Accessibility of Ion-Ion Hybrid Resonance
897
Accessibility of nano-crossbar arrays of resistive switching devices
898
Accessibility of nonlinear time-delay systems
899
Accessibility of non-trivial remote controlled models and toys
900
Accessibility of Norwegian Municipalities Websites: A Decision Support Tool
901
Accessibility of switched linear systems
902
Accessibility of Switched Linear Systems
903
Accessibility of zero-input limit cycles
904
Accessibility properties of controlled Lotka-Volterra systems
905
Accessibility requirements for blind and visually impaired in a regional context: An exploratory study
906
Accessibility Services and Interactive Digital Television: An Opportunity to Reduce the Digital Gap
907
Accessibility solutions for visually impaired users of Web discussion boards
908
Accessibility Stable Analysis Pattern (Stable Pattern for Model Based Software Reuse)
909
Accessibility support for persons with disabilities by total conversation service mobility management in Next Generation Networks
910
Accessibility system for deaf Arab students
911
Accessibility through a hybrid educational system: a case study
912
Accessibility Transformation Gateway
913
Accessibility under multirate control for nilpotent lie algebra
914
Accessibility under sampling
915
Accessibility verification of WWW documents by an automatic guideline verification tool
916
Accessibility: a new approach to path planning among moving obstacles
917
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems
918
Accessible aerial autonomy
919
Accessible and Inclusive Mobility for All with Individual Travel Assistance -- Aim4It
920
Accessible and secure? Design constraints on image and sound based passwords
921
Accessible approach to wideband matching
922
Accessible blended learning for non-native speakers using MOOCs
923
Accessible capacity of high-mobility secondary users
924
Accessible Capacity of Secondary Users
925
Accessible capacity of secondary users over the Gaussian interference channel
926
Accessible chats for computer supported collaborative learning environments in mobile devices: Doctoral consortium paper
927
Accessible computing for sustainable and inclusive development
928
Accessible courseware for kids with hearing impaired (‘MudahKiu’): A preliminary analysis
929
Accessible Digital Resource Centers for Visually Impaired People
930
Accessible display design to control home area networks
931
Accessible display design to control home area networks
932
Accessible educational digital book on tablets for people with visual impairment
933
Accessible e-learning approach for handicaps: A proposed interaction technique for arm muscle disorders, Parkinson and hand tremors
934
Accessible formal verification for safety-critical hardware design
935
Accessible Game Culture Using Inclusive Game Design - Participating in a Visual Culture That You Cannot See
936
Accessible interfaces for robot assistants
937
Accessible light bullets
938
Accessible Multimodal Web Pages with Sign Language Translations for Deaf and Hard of Hearing Users
939
Accessible Network Information Environment Design from the Perspective of Visual Disability
940
Accessible numerical information: Cookery recipes as a special case
941
Accessible Optical Wireless Pedestrian-Support Systems for Individuals with Visual Impairment
942
Accessible schematics content descriptors using image processing techniques for blind students learning
943
Accessible section detection for visual guidance
944
Accessible targets for motion impaired users with Hidden Click Zone technique
945
Accessible technology for interactive systems: a new approach to spoken language research
946
Accessible telehealth — Leveraging consumer-level technologies and social networking functionalities for senior care
947
Accessible Tuning Range Of Direct Intensity Modulated Three-section DBR Lasers
948
Accessible tuning range of direct intensity modulated three-section DBR lasers in WDM applications
949
Accessible TV based on the W3C MMI Architecture
950
Accessible Ultrasonic Positioning
951
Accessible, customizable, high-performance IEEE 802.11p vehicular communication solution
952
Accessible-states-based sliding mode control of a variable speed drive system
953
Accessible-states-based sliding mode control of a variable speed drive system
954
Accessing a multi-terabyte seismological archive using a metadata portal
955
Accessing Accurate Documents by Mining Auxiliary Document Information
956
Accessing adhesive induced risk for BGAs in temperature cycling
957
Accessing advanced computational resources in Africa through Cloud Computing
958
Accessing AHB bus using WISHBONE master in SoC design
959
Accessing ampli-tonotopic organization of rat auditory cortex by microstimulation of cochlear nucleus
960
Accessing and Disclosing Protected Resources: A User-Centric View
961
Accessing and Distributing Streaming Events on DHT-Based Systems
962
Accessing and extending the utility of United States forest inventory data
963
Accessing and Processing Sensing Data
964
Accessing and steering the elastic OLAP cloud
965
Accessing and visualizing scientific spatiotemporal data
966
Accessing Audiovisual Heritage: A Roadmap for Collaborative Innovation
967
Accessing bank finance in relation to human capital, gender and race among SMMEs in a developing economy
968
Accessing biodiversity resources in computational environments from workflow applications
969
Accessing corporate memory in networked organisations
970
Accessing cortical tonotopic organization by microstimulation of cochlear nucleus
971
Accessing Cultural Artifacts through Digital Companions: The Effects on Children´s Engagement
972
Accessing Deep Web Using Automatic Query Translation Technique
973
Accessing devices using a Web service
974
Accessing dynamic web page in users language
975
Accessing Earth system science data and applications through high-bandwidth networks
976
Accessing educational videos — A personalized approach
977
Accessing E-Infrastructures Using Cdac Scientific Cloud (Csc) Services
978
Accessing Embedded DfT Instruments with IEEE P1687
979
Accessing Emotion Patterns from Affective Interactions Using Electrodermal Activity
980
Accessing Experimental Telecommunications Services
981
Accessing External Knowledge: Intention of Knowledge Exchange in Virtual Community of Practice
982
Accessing External Technological Knowledge for Technological Development: When Technological Knowledge Distance Meets Slack Resources
983
Accessing files in an Internet: the Jade file system
984
Accessing flexibility of electric vehicles for smart grid integration
985
Accessing forbidden transitions: Magnetic dipoles and electric quadrupoles for nano-optics
986
Accessing government statistical information
987
Accessing graphic information: challenges of tomorrow [power system AM/FM]
988
Accessing hardware performance counters in order to measure the influence of cache on the performance of integer sorting
989
Accessing heterogeneous data through homogenization and integration mediators
990
Accessing information on demand at any location. Mobile information access
991
Accessing interactive examples with adaptive navigation support
992
Accessing Knowledge with a Game -- A Meta-analysis of Prediction Markets
993
Accessing KNX networks via BACnet/WS
994
Accessing learning objects within the multi-modal description framework
995
Accessing Libraries of Media Art through Metadata
996
Accessing linked open data
997
Accessing Manufacturing Yield for Gamma Wafer Sawing Processes in COG Packaging
998
Accessing MEDLINE/PubMed with Handheld Devices: Developments and New Search Portals
999
Accessing Minimal-Impact Personal Audio Archives
1000
Accessing movies´ emotional information