<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Detailed losses Analysis of High-Frequency Planar Power Transformer
2
Detailed Lumped-Model Analysis of Transistor Ionizing Radiation Effects
3
Detailed map for Port of Cannes and meeting point for the boat
4
Detailed mapping of the interstrip response in double sided silicon strip detectors in front and back injection by means of IR laser irradiation
5
Detailed mapping of the local IM and FM responses of DFB lasers
6
Detailed Matching Analysis of Sub-50 nm-MOS-Transistors
7
Detailed measurement and simulation of FeNdB permanent magnet used for magnetic spring
8
Detailed measurement of scattering by a spheroidal particle having varying proportions of ice and water
9
Detailed measurements of gastric electrical activity and their implications on inverse solutions
10
Detailed measurements of slow magnetization processes in tape-wound cores
11
Detailed measurements of the degree of phase conjugation by SBS
12
Detailed measurements of the response of an rf SQUID in the regime LI
c
< Φ
0
/2π
13
Detailed Measurements on Electron Dose Distributions in Radiation Processing
14
Detailed measurements showing the influence of the forward propagating wave and end reflections on the performance of relativistic backward wave oscillators
15
Detailed model and investigation of gain saturation and carrier spatial hole burning for a semiconductor optical amplifier with gain clamping by a vertical laser field
16
Detailed modeling and calibration of a Time-of-Flight camera
17
Detailed Modeling and Evaluation of a Scalable Multilevel Checkpointing System
18
Detailed modeling and experimental investigation of 40 Gb/s multi-span transmission systems in standard SMF for NRZ and RZ modulation
19
Detailed modeling and numerical analysis of photoreceptor cells exposed to electromagnetic fields
20
Detailed modeling and numerical analysis of photoreceptor cells exposed to electromagnetic fields
21
Detailed modeling and reliability analysis of fault-tolerant processor arrays
22
Detailed modeling and response of demand response enabled appliances
23
Detailed modeling and simulation of +500kV HVDC transmission system using PSCAD/EMTDC
24
Detailed modeling and simulation of adjustable speed generator in Matlab/Simulink environment
25
Detailed modeling for large scale wind power installations - a real project case study
26
Detailed modeling of an actual static VAr compensator for electromagnetic transient studies
27
Detailed modeling of China-Russia Heihe back-to-back HVDC project using PSCAD/EMTDC
28
Detailed modeling of CIGRE HVDC benchmark system using PSCAD/EMTDC and PSB/SIMULINK
29
Detailed modeling of eddy current effects for transformer transients
30
Detailed modeling of fault-tolerant processor arrays
31
Detailed modeling of inversion-layer solar cells
32
Detailed modeling of KALIF beam-target experiments
33
Detailed modeling of large interconnected AC/DC systems using a real-time digital simulator
34
Detailed Modeling of MAC Throughput and Ranges for Mobile WiMAX
35
Detailed Modeling of Motor System of Plug-In Hybrid Vehicle: Study of Detailed Modeling of Inverter and Boost Converter Losses
36
Detailed modeling of nonlinear distortion in bipolar transistors
37
Detailed modeling of proposed liner-on-plasma fusion experiments
38
Detailed modeling of source/drain parasitics and their impact on MOSFETs scaling
39
Detailed modeling of static VAr compensators using the electromagnetic transients program (EMTP)
40
Detailed modeling of static VAr compensators using the electromagnetic transients program (EMTP)
41
Detailed modeling of sub-100-nm MOSFETs based on Schrödinger DD per subband and experiments and evaluation of the performance gap to ballistic transport
42
Detailed modeling of superconducting magnetic energy storage (SMES) system
43
Detailed modeling of telecom AC-DC backup generation power systems using voltage-behind-reactance synchronous machine model
44
Detailed modeling of the Limpaecher-design resonant power converter
45
Detailed modeling of wind power plants incorporating variable-speed Synchronous Generator
46
Detailed modelling and experimental characterisation of an ultra-fast optoelectronic clock recovery circuit
47
Detailed modelling and simulation of UPFC using EMTP
48
Detailed modelling of overhead line for the elecromagnetic transients studies
49
Detailed modelling of pixellated CdZnTe detectors for an accurate performance characterization of a multi-modality imaging system
50
Detailed modelling of thermal units from a price-taker´s perspective
51
Detailed modelling, simulation and benchmarking of the voltage error detector circuit in the static excitation system of Manitoba Hydro´s Long Spruce G. S. using PSCAD/EMTDC
52
Detailed Monte Carlo investigation of a proton computed tomography system
53
Detailed morphological analysis of mandarin sustained steady vowels
54
Detailed noise statistics for an optically preamplified direct detection receiver
55
Detailed numerical investigation of a DC sputter magnetron
56
Detailed numerical modeling of a novel infrared single photon detector for λ ≫ 1 μm
57
Detailed object observation by autonomous underwater vehicle with localization involving uncertainty of magnetic bearings
58
Detailed observation of dependence of few-cycle laser pulse driven high-order harmonics spectrum on carrier-envelope phase
59
Detailed observation of modulation instability on THz NovoFEL
60
Detailed observation of small leak current in flash memories with thin tunnel oxides
61
Detailed observation of small leak current in flash memories with thin tunnel oxides
62
Detailed observations of lightning flashes and processes associated with terrestrial gamma ray flashes
63
Detailed OFDM modeling in network simulation of mobile ad hoc networks
64
Detailed operation simulation based planning alternative evaluation of power system with large-scale wind power
65
Detailed optical and electrical characterisation of green — Orange InGaN/GaN LEDs grown by MOVPE
66
Detailed optical characterization of a near diffraction limited xenon fluoride laser
67
Detailed package failure analysis on short failures after high temperature storage
68
Detailed parallel simulation of a biological neuronal network
69
Detailed Particle and Power Fluxes Into ITER Castellated Divertor Gaps During ELMs
70
Detailed pattern computations of the UHF antennas on the spacecraft of the EXOMARS mission
71
Detailed performance analysis of the proposed QEYSSAT quantum receiver satellite
72
Detailed performance characteristics of hybrid InP-InGaAsP APD´s
73
Detailed photoemission modeling using the 3D finite-element PIC code MICHELLE
74
Detailed physical simulation of program disturb mechanisms in Sub-50 nm NAND flash memory strings
75
Detailed placement accounting for technology constraints
76
Detailed Placement for Enhanced Control of Resist and Etch CDs
77
Detailed placement for improved depth of focus and CD control
78
Detailed placement for leakage reduction using systematic through-pitch variation
79
Detailed placement with net length constraints
80
Detailed polarization properties comparison for three completely different species of highly birefringent fibers
81
Detailed power converter design for a 30kW s starter/generator used in aircraft
82
Detailed power distribution network planning based on the description of load characteristics
83
Detailed program
84
Detailed program
85
Detailed Program
86
Detailed Program
87
Detailed program
88
Detailed program
89
Detailed Program
90
Detailed program booklet
91
Detailed program listing
92
Detailed program listing
93
Detailed program with paper abstracts
94
Detailed Questions Hit the Cloud
95
Detailed radiation fault modeling of the Remote Exploration and Experimentation (REE) first generation testbed architecture
96
Detailed radio imaging of buildings at 2.4 GHz
97
Detailed real-time simulation and performance analysis of UPFC using Electromagnetic Transients Program (EMTP)
98
Detailed Real-Time Software Platform Modeling
99
Detailed real-time transient model of the “Sen” transformer
100
Detailed Real-Time Transient Modelof the “Sen” Transformer
101
Detailed reconstruction of 3D plant root shape
102
Detailed regions based medical image contrast enhancement
103
Detailed representation of irregular LDPC code ensembles and density evolution
104
Detailed representation of substations in power system state estimation
105
Detailed reproduction of three-dimensional crown shape and foliage distribution of trees in an urban area using high-resolution airborne LiDAR
106
Detailed requirements for robots in autism therapy
107
Detailed Routing Algorithms for Advanced Technology Nodes
108
Detailed routing for Spacer-Is-Metal type Self-Aligned Double/Quadruple Patterning Lithography
109
Detailed routing in a hierachical CPLD
110
Detailed routing of multi-terminal nets in FPGAs
111
Detailed routing with integrated static timing analysis applying simulated annealing
112
Detailed schedule
113
Detailed self-consistent modelling of the lateral optical fields in an N-substrate InP/InGaAsP constricted-mesa laser diode for microwave modulation applications
114
Detailed simulation for semiconductor manufacturing
115
Detailed Simulation of Large-Scale Wireless Networks
116
Detailed simulation of SVC transient performance using PSCAD
117
Detailed Simulation of the CYGNUS Rod Pinch Radiographic Source
118
Detailed simulation of the Cygnus rod pinch radiographic source
119
Detailed Simulation Study of a Reverse Embedded-SiGe Strained-Silicon MOSFET
120
Detailed slip dynamics for nonholonomic mobile robotic system
121
Detailed Solution Curves and Bifurcation Boundaries of the Forced van der Pol Oscillator
122
Detailed spectra of high power broadband microwave radiation from interactions of relativistic electron beams with weakly magnetized plasmas
123
Detailed spectral analysis of 2D photonic crystal structures embedded into ridge waveguides
124
Detailed spectral simulations in support of PBFA-Z dynamic hohlraum Z-pinch experiments
125
Detailed stability map and bistability investigation for injection-locked Fabry-Perot semiconductor lasers
126
Detailed structural characterisation of semiconductors with X-ray scattering
127
Detailed structural characterisation of the savanna flux site at Skukuza, South Africa
128
Detailed structural evaluation of the TPX toroidal field magnet nose region
129
Detailed structure of harmonic signals in modulation spectroscopy and resulting precision improvement in non-intrusive laser based sensors
130
Detailed studies and control of intensity-related dynamics of femtosecond frequency combs from mode-locked Ti:sapphire lasers
131
Detailed studies of cw stimulated Brillouin scattering in single mode and multimode optical fibers
132
Detailed studies of power-weighted intra-channel nonlinear model
133
Detailed studies of the ATLAS pixel detectors
134
Detailed studies of the ATLAS pixel detectors
135
Detailed studies of the effect of electron beam optics on the gain characteristics of a rectangular grating backwards wave amplifier
136
Detailed studies on the beam transfer line from linac to Low Energy Booster synchrotron for the SSC
137
Detailed study of a 5 V/1 V, four stage switched capacitor converter suitable for integration
138
Detailed study of a 5V/1V, four stage switched capacitor converter suitable for integration
139
Detailed study of AlAs-oxidized apertures in VCSEL cavities for optimized modal performance
140
Detailed Study of Amorphous Silicon Ultraviolet Sensor With Chromium Silicide Window Layer
141
Detailed Study of Differently Grown InN Wavers as Strong THz Surface Emitters Excited at 800 nm and 1060 nm
142
Detailed study of fast transient relaxation of Vt instability in HKMG nFETs
143
Detailed study of IP/ reconfigurable optical networks
144
Detailed study of modal gain in a multimode EDFA supporting LP
01
and LP
11
mode group amplification
145
Detailed study of temporal variations of EEG by improved MEM spectral analysis with high resolution power
146
Detailed study of the hysteresis loops for annealed amorphous alloy wires having vanishing magnetostriction
147
Detailed study of the impact of the Vulcan OPCPA pre-amplifier on contrast
148
Detailed study of the magnetic circuit in a longitudinal flux permanent-magnet synchronous linear generator
149
Detailed study of the rotor asymmetry effects of induction machine under different supply conditions
150
Detailed study of the time estimation in level-crossing analog-to-digital converters
151
Detailed study of thermal lensing in Nd:YVO/sub 4/ under intense diode end-pumping
152
Detailed study on anodic bonding process between glass and SiN
x
deposited silicon substrate and its application on wafer-level AFM probe array integration
153
Detailed Study on Pulse-Sprayed Conformal Phosphor Configurations for LEDs
154
Detailed table of content
155
Detailed Table of contents
156
Detailed technical program
157
Detailed technical program schedule
158
Detailed technical program schedule
159
Detailed TEM analysis of solid-HDDR Nd
16
Fe
76
B
8
magnetic materials
160
Detailed Theoretical and Experimental Characterization of 10 Gb/s Clock Recovery Using a Q-Switched Self-Pulsating Laser
161
Detailed theoretical and experimental investigation of high-gain erbium-doped fiber amplifier
162
Detailed Theoretical and Experimental Study on Single Passband, Photonic Microwave FIR Filter Using Digital Micromirror Device and Continuous-Wave Supercontinuum
163
Detailed theoretical investigation and comparison of the cascadability of conventional and gain-clamped SOA gates in multiwavelength optical networks
164
Detailed theoretical investigation of the input power dynamic range for gain-clamped semiconductor optical amplifier gates at 10 Gb/s
165
Detailed Theoretical Investigation on Enhanced Nondegenerate Four-Wave Mixing in Passive Mode-Locked Semiconductor Lasers
166
Detailed theory of the negative conductance of bulk negative mobility amplifiers, in the limit of zero ion density
167
Detailed thermal modeling of high powered LEDs
168
Detailed thermal modelling of a tubular linear machine for marine renewable generation
169
Detailed thermal transfer through an innovative wall section
170
Detailed time-resolved spectral analysis of ultra-fast four-wave mixing in silicon nanowires
171
Detailed transfer matrix method based dynamic model for multisection widely-tunable GCSR lasers
172
Detailed transfer matrix method-based dynamic model for multisection widely tunable GCSR lasers
173
Detailed Vegetation Mapping From Meis-II Digital Data
174
Detailed WCDMA Mobile Network Planning by using Static Simulations
175
Detailed-contour insensitive features for automated analysis of breast masses in mammograms
176
Detailed-routability of FPGAs with extremal switch-block structures
177
Detailed-routability-driven analytical placement for mixed-size designs with technology and region constraints
178
Detailed-Routing Algorithms for Dense Pin Clusters in Integrated Circuits
179
Detailed-Routing-Driven analytical standard-cell placement
180
Detail-Enhanced Exposure Fusion
181
Detail-enhanced fusion of differently exposed images
182
Detail-Enhanced Multimodal Medical Image Fusion
183
Detailing a useful position calibration for microphone arrays
184
Detailing and deriving system requirements
185
Detailled characterisation of SOI n-FinFETs at very low temperature
186
Detail-perservation adaptive vector median filter
187
Detail-preserving approach for impulse noise removal from images
188
Detail-preserving axial deformation using curve pairs
189
Detail-preserving change detection from amplitude SAR images
190
Detail-preserving compressive sensing recovery based on cartoon texture image decomposition
191
Detail-Preserving Contrast Reduction for Still Cameras
192
Detail-Preserving Controllable Deformation from Sparse Examples
193
Detail-preserving despeckling under multiscale anisotropic diffusion in medical ultrasound images
194
Detail-preserving edge enhancing filters
195
Detail-preserving filter for noisy images
196
Detail-preserving Filtering of Respiratory Sinus Arrhythmia in Anaesthesia
197
Detail-preserving impulse noise removal of images using modified dynamic programming
198
Detail-preserving morphological filters in noise suppression
199
Detail-preserving nonlinear filters for image enhancement
200
Detail-preserving ranked-order based filters for image processing
201
Detail-preserving restoration of impulse noise corrupted images by a switching median filter controlled by a neuro-fuzzy network
202
Detail-preserving sculpting deformation
203
Detail-preserving segmentation of polarimetric SAR imagery
204
Detail-Preserving Smoothing Classifier Based on Conditional Random Fields for High Spatial Resolution Remote Sensing Imagery
205
Detail-preserving tone mapping for low dynamic range displays with adaptive gamma correction
206
Detail-preserving variational design of B-spline curves and surfaces
207
Detail-preserving variational surface design with multiresolution constraints
208
Details about conference ICECS record number
209
Details about the I
2
MTC Venue [Society News]
210
Details detection in television signals
211
Details In The Design Of Ghz Microprocessors
212
Details of formalized relations in feature models using OCL
213
Details of HPM Generation in Atmospheric Air Using the Laser and Klystron Terminology
214
Details of Outage Probability Calculations
215
Details of plans to make site diversity measurements using STENTOR
216
Details of simulated annealing algorithm to estimate parameters of multiple current dipoles using biomagnetic data
217
Details of the ´Ring Collapse´ on Schottky Electron Emitters
218
Details of the Cryogenic System for the Cornell Superconducting R.f. Beam Tests
219
Details of the initial part of the tungsten ion linac for particle track membranes production
220
Details of the Magnetization Reversal in Patterned Exchange-Biased and Unbiased Thin Films
221
Details of the plasma spreading process in thyristors
222
Details of the plasma-spreading process in thyristors
223
Details on the equivalence of the modified FBLP method and TLS-FBLP method
224
Details on the implementation of a conventional StatCom’s control
225
Details preservation inspired blind quality metric of tone mapping methods
226
Details, tactics, and strategy
227
Detaining online upstream scheduling in WDM/TDMA EPONs
228
Detarmination of patellar T EMG response with the Deep Tendon Reflex grading and tapping force
229
Detction of Buried Objects by Microwave Means
230
DE-TDQL: An adaptive memetic algorithm
231
DETE: connectionist/symbolic model of visual and verbal association
232
Detección de líneas en imágenes con ruido en un entorno de medición de alta precisión
233
Detección de señales codificadas con correlación generalizada cruzada en UWB-LPS
234
Detección y diagnóstico de problemas de desmagnetización y desbalance mecánico en máquinas síncronas de imanes permanentes
235
Detección y Seguimiento Facial en Niños Autistas con Bajo Nivel de Funcionamiento: Face detection and face tracking in autistics children with low functioning
236
Detect & Describe: Deep Learning of Bank Stress in the News
237
Detect abnormal SCADA data using state estimation residuals
238
Detect abnormalities in mammograms by local contrast thresholding and rule-based classification
239
Detect Adverse Drug Reactions for Drug Alendronate
240
Detect Adverse drug reactions for drug Aspirin
241
Detect Adverse Drug Reactions for Drug Atorvastatin
242
Detect adverse drug reactions for drug Pioglitazone
243
Detect Adverse Drug Reactions for Drug Simvastatin
244
Detect adverse drug reactions for the drug Pravastatin
245
Detect and analyze Large-scale BGP events by bi-clustering Update Visibility Matrix
246
Detect and autofocus the moving target by its range walk in time domain
247
Detect and Avoid (DAA) for UWB: Implementation Issues and Challenges
248
Detect and Avoid (DAA) Mechanisms for UWB Interference Mitigation
249
Detect and Avoid (DAA) Techniques - Enabler for Worldwide Ultrawideband Regulations
250
Detect and avoid for Unmanned Aircraft Systems in the total system approach
251
Detect and Avoid for UWB-WiMedia: Performance bounds of signal sensing
252
Detect and avoid mechanism for ultra wide-band WiMedia: Experimental evaluation of detection capabilities
253
Detect and Avoid Procedure for UWB Interference Mitigation on Narrowband Systems
254
Detect and avoid: an ultra-wideband/WiMAX coexistence mechanism [Topics in Radio Communications]
255
Detect and classify faults using neural nets
256
Detect and forward based two-way relay systems with maximum-ratio transceivers
257
Detect and identify blocker tags in tree-based RFID systems
258
Detect and separate localization text in various complicated-colour image
259
Detect and track the dynamic deformation human body with the active shape model modified by motion vectors
260
Detect Android Malware Variants Using Component Based Topology Graph
261
Detect Black Germ in Wheat Using Machine Vision
262
Detect Black Germ in Wheat Using Machine Vision
263
Detect community structure from the Enron Email Corpus Based on Link Mining
264
Detect determinism of spontaneous EEG with a multi-channel reconstruction method
265
Detect Events on Noisy Textual Datasets
266
Detect Fast-Flux Domains Through Response Time Differences
267
Detect functionally equivalent code fragments via k-nearest neighbor algorithm
268
Detect GGO Nodule Based on Dot Filter
269
Detect HTTP Specification Attacks Using Ontology
270
Detect image spam with content base information retrieval
271
Detect inflated follower numbers in OSN using star sampling
272
Detect Information-Hiding Type and Length in JPEG Images by Using Neuro-fuzzy Inference Systems
273
Detect irregularly shaped spatio-temporal clusters for decision support
274
Detect LSB Steganography with Bit Plane Randomness Tests
275
Detect multi-hop stepping-stone pairs with clock skew
276
Detect of optic disc center based on Gaussian vessel detector and tangent information transform
277
Detect phase shifter module of array antenna using the sun
278
Detect phishing by checking content consistency
279
Detect piecewise linear contrast enhancement and estimate parameters using spectral analysis of image histogram
280
Detect Polymorphic Worms Based on Semantic Signature and Data-Mining
281
Detect quasi-circular vegetation community patches using images of different spatial resolutions
282
Detect Rare Events via MICE Algorithm with Optimal Threshold
283
Detect Related Bugs from Source Code Using Bug Information
284
Detect saliency to understand a photo
285
Detect short run of TWA event with time-domain algorithm
286
Detect Similar Mobile Applications with Transfer Learning
287
Detect spreading code for multi-user detector in TD-SCDMA downlink
288
Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming
289
Detect taxonomy-specific pathway associations with environmental factors using metagenomic data
290
Detect the Different Isoforms Using GeneChip Human Exon 1.0 ST Arrays
291
Detect the different structures of vegetation patches using circular hough transform at Gudong oil field
292
Detect the dots
293
Detect the possible spokesperson with an omni-directional camera, in a robot-human communication system
294
Detect the rail track flaw by estimating the camera shaking
295
Detect the reflection amplification attack based on UDP protocol
296
Detect topological horseshoes in the simplest memristor-based chaotic circuit for chaos verification
297
Detect Visual Spoofing in Unicode-Based Text
298
Detect VR noise coupling sources through near field scanning
299
Detect What You Can: Detecting and Representing Objects Using Holistic Models and Body Parts
300
Detect Zero by Using Symmetric Homomorphic Encryption
301
DETECT97 simulation studies of light output in a full field-of-view small gamma camera
302
Detectability analysis for resistive open faults with dynamic supply voltage scaling awareness
303
Detectability analysis of detection and estimation of structured action from cluttered data
304
Detectability analysis of small delays due to resistive opens considering process variations
305
Detectability and annoyance of artifacts in watermarked digital videos
306
Detectability and Annoyance of Synthetic Blockiness, Blurriness, Noisiness, and Ringing in Video Sequences
307
Detectability and Annoyance of Synthetic Blocky, Blurry, Noisy, and Ringing Artifacts
308
Detectability and annoyance of synthetic blurring and ringing in video sequences
309
Detectability and appraisal thresholds of split pulse signals for the MemoPatch™ device, an electronic skin patch intended to deliver tactile medication reminder signals (study TS-104)
310
Detectability And Characterization Limits Of Fluorescent Objects In Turbid Media
311
Detectability and Discriminability of Targets on a Remote Projection Plan-Position Indicator
312
Detectability and observer design for linear descriptor systems
313
Detectability and Output Feedback Stabilizability of Nonlinear Networked Control Systems
314
Detectability and Output Feedback Stabilizability of Nonlinear Networked Control Systems
315
Detectability and Perceptual Consequences of Delayed Feedback in a Vibrotactile Texture Display
316
Detectability and Stabilizability of Discrete-Time Switched Linear Systems
317
Detectability bounds for spread-spectrum communications
318
Detectability by Electromagnetic Sounding Systems
319
Detectability comparisons of image reconstruction algorithms using the Channelized Hotelling Observer with bootstrap resampled data
320
Detectability conditions for interconnection open defects
321
Detectability in games of pursuit evasion with antagonizing players
322
Detectability index describes the information conveyed by sonographic images
323
Detectability limits for a dual head coincidence imaging system
324
Detectability Loss Due to "Greatest Of" Selection in a Cell-Averaging CFAR
325
Detectability models for multiple access low-probability-of-intercept networks
326
Detectability of air targets using bistatic radar based on GPS L5 signals
327
Detectability of brain structure abnormalities related to autism through MRI-derived measures from multiple scanners
328
Detectability of Burst-Like Signals
329
Detectability of cage rotor induction machine stator fault using current analysis
330
Detectability of Chaotic Direct-Sequence Spread-Spectrum Signals
331
Detectability of chaotic waveforms
332
Detectability of CMOS stuck-open faults using random and pseudorandom test sequences
333
Detectability of decadal variations of the surface electric potential generated by zonal oscillating flows in Earth´s core
334
Detectability of Deep Packet Inspection in Common Provider/Consumer Relations
335
Detectability of directional amplitude-modulated noise signals in an isotropic noise background of unknown power level (Corresp.)
336
Detectability of Discrete Event Systems
337
Detectability of discrete event systems with dynamic event observation
338
Detectability of distributed consensus-based observer networks: An elementary analysis and extensions
339
Detectability of internal bridging faults in scan chains
340
Detectability of low-level broad-band signals using adaptive matched-field processing with vertical aperture arrays
341
Detectability of Markov jump linear systems, the LQ problem and the coupled Riccati equations
342
Detectability of multiple link failures in multi-agent systems under the agreement protocol
343
Detectability Of Ocean Waves By The Synthetic Aperture Raoar On Ers-1
344
Detectability of packet communications using variants of the X.25 protocol
345
Detectability of perfusion defect in gated dynamic cardiac SPECT images
346
Detectability of perfusion defect in gated dynamic reconstruction images using temporal B-splines
347
Detectability of Radio Frequency Interference due to Spread Spectrum Communication Signals using the Kurtosis Algorithm
348
Detectability of signals in Laplace noise
349
Detectability of Spread-Spectrum Signals
350
Detectability of spurious signals with limited propagation in combinational circuits
351
Detectability of the epicardial breakthrough phenomenon from body surface potential maps by a linear predictive algorithm
352
Detectability of the Two-Dimensional Detector for Time Resolved Emission Measurement
353
Detectability performance properties of learning-based nonlinear fault diagnosis
354
Detectability Prediction for Increased Scene Awareness
355
Detectability prediction in dynamic scenes for enhanced environment perception
356
Detectability through measurements under impulse differential inclusions
357
Detectability under impulse differential inclusions
358
Detectability, uniqueness, and reliability of eigen windows for stable verification of partially occluded objects
359
Detectability-quality trade-off in JPEG counter-forensics
360
Detectable and Indicative Forward Active Network Congestion Control Algorithm
361
Detectable perturbations: a paradigm for technology-specific multi-fault test generation
362
Detect-and-Activate-the-Heater Protection Technique for YBCO Coils
363
Detect-and-forward in two-hop relay channels: a metrics-based analysis
364
Detect-and-Forward Relaying Aided Cooperative Spatial Modulation for Wireless Networks
365
DETECT-dual energy transmission estimation CT-for improved attenuation correction in SPECT and PET
366
DETECT-dual energy transmission estimation CT-for improved attenuation correction in SPECT and PET
367
Detected contrast and dynamic range measurements of CdZnTe semiconductors for flat-panel digital radiography
368
Detectibility of radiothermal signatures in sea surface microwave radiometer sensing at a change of a condition of atmospheric stratification
369
Detecting "missing mass" candidates with the superheated superconducting detector
370
Detecting “dipole ring” separatrices with zebra palettes
371
Detecting 3D facial Action Units via registration
372
Detecting 3D flow
373
Detecting 3D geometric boundaries of indoor scenes under varying lighting
374
Detecting 3-D Mirror Symmetry in a 2-D Camera Image for 3-D Shape Recovery
375
Detecting 3-D motion field from range image sequences
376
Detecting 3-D rotational motion and extracting target information from the principal component analysis of scatterer range histories
377
Detecting 3-D rotational motion and extracting target information from the principal component analysis of scatterer range histories
378
Detecting 3-D, turbulent separation regions using unsteady, computerized thermographic technique
379
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength
380
Detecting a certain kind of emergent behavior in multi agent systems applied on mase methodology
381
Detecting a change point using statistical sensitivity analysis based on the influence function
382
Detecting a cracked rotor with HHT-based time-frequency representation
383
Detecting a dipole source by MEG/EEG and generalized likelihood ratio tests
384
Detecting a gazing region by visual direction and stereo cameras
385
Detecting a hidden periodic signal when its period is unknown
386
Detecting a human body direction using a feature selection method
387
Detecting a large number of objects in real-time using apache storm
388
Detecting a malicious insider in the cloud environment using sequential rule mining
389
Detecting a network failure
390
Detecting a step pattern of change in multitemporal SAR images
391
Detecting a target location using a mobile robot with range only measurement
392
Detecting a targeted voice style in an audiobook using voice quality features
393
Detecting a Time-Varying Behavior in Frequency Response Function Measurements
394
Detecting a transient signal by bispectral analysis
395
Detecting a transient signal by integrated polyspectrum
396
Detecting a Weak Sine Wave and Measuring Its Parameters
397
Detecting Abandoned Coal Mine Entries by Underground High Resolution Resistivity Method
398
Detecting abandoned objects in crowded scenes of surveillance videos using adaptive dual background model
399
Detecting Abandoned Objects With a Moving Camera
400
Detecting abandoned packages in a multi-camera video surveillance system
401
Detecting aberrant signal transduction pathways from high-throughput data using GIST algorithm
402
Detecting abnormal activities from multi-sensor surveillance systems
403
Detecting abnormal activities in video surveillance with multi-models
404
Detecting abnormal behaviors in surveillance videos based on fuzzy clustering and multiple Auto-Encoders
405
Detecting Abnormal Changes in E-mail Traffic Using Hierarchical Fuzzy Systems
406
Detecting abnormal data for ontology based information integration
407
Detecting abnormal fish trajectories using clustered and labeled data
408
Detecting abnormal gait
409
Detecting Abnormal Machine Characteristics in Cloud Infrastructures
410
Detecting abnormal motion of pedestrian in video
411
Detecting abnormal ozone levels using PCA-based GLR hypothesis testing
412
Detecting abnormal patterns in WCE images
413
Detecting abnormal regions in colonoscopic images by patch-based classifier ensemble
414
Detecting Abnormal Semantic Web Data Using Semantic Dependency
415
Detecting abnormal state of elderly for service robot with H-FCM
416
Detecting abnormalities on mammograms by bilateral comparison
417
Detecting abrupt changes based on dynamic analysis of similarity for rotating machinery fault prognosis
418
Detecting abrupt changes in ARMA signals
419
Detecting action units on 3D faces
420
Detecting actionable items in meetings by convolutional deep structured semantic models
421
Detecting activations in unipolar epicardial electrograms recorded during ventricular fibrillation
422
Detecting active channels in an asynchronous DS-CDMA multiuser receiver
423
Detecting activities
424
Detecting activities of daily living in first-person camera views
425
Detecting activity from deep brain areas with magnetoencephalographic arrays
426
Detecting activity-based communities using dynamic membership propagation
427
Detecting adaptive inverse models in the central nervous system
428
Detecting ADHD children using symbolic dynamic of nonlinear features of EEG
429
Detecting ADHD children using symbolic dynamic of nonlinear features of EEG
430
Detecting Ads in Video Streams Using Acoustic and Visual Cues
431
Detecting adult image using multiple features
432
Detecting adverse drug effects using link classification on twitter data
433
Detecting Adverse Drug Events Using Concept Hierarchies of Clinical Codes
434
Detecting adverse drug events with multiple representations of clinical measurements
435
Detecting Adverse Drug Reactions Using Inpatient Medication Orders and Laboratory Tests Data
436
Detecting Advertisement Module Network Behavior with Graph Modeling
437
Detecting aerosols and vapors with Fourier-transform infrared spectrometers
438
Detecting affective covert user states with passive brain-computer interfaces
439
Detecting affective states in virtual rehabilitation
440
Detecting Aggregate Bursts from Scaled Bins within the Context of Privacy
441
Detecting aging by-products of SF
6
using quadrupole mass spectrometry
442
Detecting Aircraft in Low-Resolution Multispectral Images: Specification of Relevant IR Wavelength Bands
443
Detecting aircraft with a low resolution infrared sensor
444
Detecting Aircraft With a Low-Resolution Infrared Sensor
445
Detecting airport surface movement events using ground surveillance
446
Detecting algorithm based Gabor in microscopic image
447
Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis
448
Detecting alpha radiation by scintillation in porous materials
449
Detecting alterations in cell ultrastructure with optical imaging
450
Detecting Altered Fingerprints
451
Detecting Alzheimer Disease in Magnetic Resonance Brain Images Using Gabor Wavelets
452
Detecting Ambiguities in 3D Polygons with Self-Intersecting Projections
453
Detecting ambiguities in regression using TSK models
454
Detecting Ambiguity in Localization Problems Using Depth Sensors
455
Detecting Ambiguous Author Names in Crowdsourced Scholarly Data
456
Detecting an Abnormal Traffic on Healthcare Network
457
Detecting an abrupt change of finite duration
458
Detecting an imposter in telephone speech
459
Detecting an Optimal Scale Parameter in Object-Oriented Classification
460
Detecting anaglyph images with channel alignment features
461
Detecting and adapting to drifting concepts
462
Detecting and Aligning Faces by Image Retrieval
463
Detecting and analysis of coast changes of Xiamen Island by RS & GIS
464
Detecting and analyzing non-linear effects in respiratory impedance measurements
465
Detecting and analyzing relationships among anomalies
466
Detecting and Analyzing State Inconsistencies in Multi-task Software
467
Detecting and Analyzing VM-exits
468
Detecting and Analyzing Wafer Bump Voids with X-Ray Inspection
469
Detecting and Analyzing Zero-Day Attacks Using Honeypots
470
Detecting and Assessing Conserved Stems for Accurate Structural Alignment of RNA Sequences
471
Detecting and assessing the land subsidence in coal mining area using PALSAR data based on D-InSAR technique
472
Detecting and assessment of snow lines change with climate warming based on MODIS data in the Nianqingtanglha of Tibet plateau
473
Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm
474
Detecting and Avoiding Step Voltage Hazards
475
Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol
476
Detecting and avoiding wormhole attacks in wireless ad hoc networks
477
Detecting and Blocking Malicious Traffic Caused by IRC Protocol Based Botnets
478
Detecting and categorizing kernel-level rootkits to aid future detection
479
Detecting and characterising returns in a pulsed ladar system
480
Detecting and characterizing semantic inconsistencies in ported code
481
Detecting and classifying blurred image regions
482
Detecting and classifying flaws within insulating materials using ultrasound
483
Detecting and classifying life-threatening ECG ventricular arrythmias using wavelet decomposition
484
Detecting and classifying low probability of intercept radar [Book Review]
485
Detecting and Classifying Low Probability of Intercept Radar [Book Review]
486
Detecting and classifying patterns of requirements clarifications
487
Detecting and classifying scars, marks, and tattoos found in the wild
488
Detecting and Classifying Umblic Points from Polynomial Fitting Point Cloud
489
Detecting and classifying video shot boundaries in MPEG compressed sequences
490
Detecting and classifying vine varieties from very high resolution multispectral data
491
Detecting and close-loop control methods for selective-harmonic-compensation active power filter
492
Detecting and Clustering Similar Results of Search Engine by Exploiting Web Page´s Contents
493
Detecting and coding region of interests in bi-level images for data reduction in Wireless Visual Sensor Network
494
Detecting and comparing the onset of self-paced and cue-based finger movements from EEG signals
495
Detecting and composing near-identical HDR images without exposure information
496
Detecting and compressing dissolve regions in video sequences with a DVI multimedia image compression algorithm
497
Detecting And Compressing Dissolve Regions In Video Sequences With A DVI Multimedia Image Compression Algorithm
498
Detecting and Controlling Cheating in Online Poker
499
Detecting and Correcting Data Corruption in Stencil Applications through Multivariate Interpolation
500
Detecting and correcting failed segmentations of radiological images using a knowledge-based approach
501
Detecting and correcting multiple bursts for binary cyclic codes (Corresp.)
502
Detecting and Correcting the Index of DAE by the Combinatorial Relaxation Algorithm
503
Detecting and Correlating Video-Based Event Patterns: An Ontology Driven Approach
504
Detecting and Counteracting Statistical Attacks in Cooperative Spectrum Sensing
505
Detecting and countering system intrusions using software wrappers
506
Detecting and counting people in surveillance applications
507
Detecting and dealing with hovering maneuvers in vision-aided inertial navigation systems
508
Detecting and debugging insecure information flows
509
Detecting and defeating advanced man-in-the-middle attacks against TLS
510
Detecting and defending against malicious attacks in the iTrust information retrieval network
511
Detecting and Defending against Sybil Attacks in Social Networks: An Overview
512
Detecting and defending against Web-server fingerprinting
513
Detecting and Defending against Worm Attacks Using Bot-honeynet
514
Detecting and Describing Historical Periods in a Large Corpora
515
Detecting and describing non-trivial outliers using Bayesian networks
516
Detecting and diagnosing application misbehaviors in ‘on-demand’ virtual computing infrastructures
517
Detecting and diagnosing navigational mistakes
518
Detecting and diagnosing open defects
519
Detecting and diagnosing saturation faults
520
Detecting and displaying novel computer attacks with Macroscope
521
Detecting and Disposing Abnormal Signal Outliers with Masking Effect by Using Data Accumulated Generating Operation
522
Detecting and Downscaling Wet Areas on Boreal Landscapes
523
Detecting and Eliminating Black Hole in AODV Routing
524
Detecting and eliminating chromatic aberration in digital images
525
Detecting and Eliminating Potential Violations of Sequential Consistency for Concurrent C/C++ Programs
526
Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN - a multi-agent sourcing Methodology
527
Detecting and estimating biochemical dispersion of a moving source in a semi-infinite medium
528
Detecting and estimating parameter jumps using ladder algorithms and likelihood ratio tests
529
Detecting and estimating structure regularity of soft tissue organs from ultrasound images
530
Detecting and estimating the fundamental of harmonics series when the number of harmonics is unknown
531
Detecting and evaluating the signals of wirelessly interrogational passive SAW resonator sensors
532
Detecting and Exploiting Symmetry in Discrete-State Markov Models
533
Detecting and Exploiting Symmetry in Discrete-state Markov Models
534
Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut
535
Detecting and extracting vibration disturb in IMU testing in field
536
Detecting and Filling Double Text in Korean Signboard Images
537
Detecting and filtering instant messaging spam - a global and personalized approach
538
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method
539
Detecting and grouping words in topographic maps by means of perceptual concepts
540
Detecting and identifying aqueous solutions of hydrocarbons with a gold nanoparticle chemiresistor sensor array
541
Detecting and identifying malware: a new signal processing goal
542
Detecting and identifying spurious signals generated in radar receivers
543
Detecting and identifying system changes in the cloud via discovery by example
544
Detecting and Identifying Two Stationary-Human-Targets: A Technique Based on Bioradar
545
Detecting and Interpreting Variable Interactions in Observational Ornithology Data
546
Detecting and investigating the source code changes using logical rules
547
Detecting and isolating inconsistently behaving agents using an intelligent control loop
548
Detecting and Isolating Malicious Routers
549
Detecting and isolating plant-wide oscillations via slow feature analysis
550
Detecting and isolating sensor and actuator faults in solution copolymerization of MMA and VAc process
551
Detecting and labeling folk literature in spoken cultural heritage archives using structural and prosodic features
552
Detecting and labeling representative nodes for network-based semi-supervised learning
553
Detecting and Localizing 3D Object Classes using Viewpoint Invariant Reference Frames
554
Detecting and localizing edges composed of steps, peaks and roofs
555
Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks
556
Detecting and localizing large-scale router failures using active probes
557
Detecting and Localizing Wireless Spoofing Attacks
558
Detecting and locating cell phone signals from avalanche victims using unmanned aerial vehicles
559
Detecting and locating crosswalks using a camera phone
560
Detecting and Locating Dielectric Objects Buried Under a Rough Interface
561
Detecting and locating electrical shorts using group testing
562
Detecting and locating faults in VLSI implementations of the Advanced Encryption Standard
563
Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection
564
Detecting and locating human eyes in face images based on progressive thresholding
565
Detecting and Locating Interturn Short Circuits on Turbine-Generator Rotors
566
Detecting and locating key words in continuous speech using linear predictive coding
567
Detecting and locating MV failure before it occurs. Experience with live line partial discharge detection on underground paper insulated 11 kV cables in London
568
Detecting and locating mv failure before it occurs. experience with live line partial discharge on underground paper insulated 11KV cables in london
569
Detecting and locating partially specified keywords in scanned images using hidden Markov models
570
Detecting and Locating Text in Video Based on ICA Algorithm
571
Detecting and locating the stator turn-to-turn faults in a closed-loop multiplemotor drive system
572
Detecting and locating turn to turn Fault on layer winding of distribution transformer
573
Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path
574
Detecting and managing change in spatial data-land use and infrastructure change analysis and detection
575
Detecting and managing the electrical island created in the aftermath of Hurricane Gustav using Phasor Measurement Units (PMUs)
576
Detecting and Manipulating Compressed Alternate Data Streams in a Forensics Investigation
577
Detecting and mapping crime hot spots based on improved attribute oriented induce clustering
578
Detecting and mapping flotant using synthetic aperture radar data
579
Detecting and mapping offshore navigation hazards using synthetic aperture radar data
580
Detecting and mapping thematic changes in transient networks
581
Detecting and masking transient failures in computers used for coal mining operations
582
Detecting and matching repeated patterns for automatic geo-tagging in urban environments
583
Detecting and measuring asymmetric links in an IP network
584
Detecting and measuring interconnection reflectance in fiber optic cable assemblies with a video microscope
585
Detecting and measuring single viruses and nanoparticles with an optical microresonator
586
Detecting and Minimizing Bad Posture Using Postuino among Engineering Students
587
Detecting and minimizing potential impacts from valve hall fires
588
Detecting and Mitigating Abnormal Events in Large Scale Networks: Budget Constrained Placement on Smart Grids
589
Detecting and Mitigating DoS Attacks in Wireless Networks without Affecting the Normal Behaving Nodes
590
Detecting and mitigating driver distraction with motion capture technology: Distracted driving warning system
591
Detecting and Mitigating HX-DoS Attacks against Cloud Web Services
592
Detecting And Mitigating Rod Drive Control System Degradation In Westinghouse PWR´s
593
Detecting and mitigating rod drive control system degradation in Westinghouse PWRs
594
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories
595
Detecting and mitigating security anomalies
596
Detecting and Mixing at FIR/Submillimeter Wavelengths with Submicron Size Schottky Barrier Diodes
597
Detecting and modeling doors with mobile robots
598
Detecting and modeling local text reuse
599
Detecting and modelling users´ beliefs about Unix
600
Detecting and monitoring 2001 coral reef bleaching events in Ryukyu Islands, Japan using satellite bleaching HotSpot remote sensing technique
601
Detecting and monitoring landslide phenomena with TerraSAR-X persistent scatterers data: The Gimigliano case study in Calabria Region (Italy)
602
Detecting and monitoring time-related abnormal events using a wireless sensor network and mobile robot
603
Detecting and Naming Actors in Movies Using Generative Appearance Models
604
Detecting and ordering salient regions for efficient browsing
605
Detecting and Overcoming Blackhole Attack in AODV Protocol
606
Detecting and overcoming blackhole attack in mobile Adhoc Network
607
Detecting and parsing architecture at city scale from range data
608
Detecting and Partitioning Data Objects in Complex Web Pages
609
Detecting and positioning overtaking vehicles using 1D optical flow
610
Detecting and Positioning the Insulation Failure of Pulsed Magnets
611
Detecting and predicting arc flash events at low operational loads
612
Detecting and predicting of abnormal behavior using hierarchical Markov model in smart home network
613
Detecting and preventing DDoS attacks in botnets by the help of self triggered black holes
614
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web
615
Detecting and Preventing Forward Head Posture with Wireless Inertial Body Sensor Networks
616
Detecting and Preventing IP-spoofed DDoS Attacks by Encrypted Marking Based Detection and Filtering (EMDAF)
617
Detecting and preventing measurement errors
618
Detecting and Preventing Online Identity Deception in Social Networking Services
619
Detecting and preventing peer-to-peer connections by Linux iptables
620
Detecting and processing objects using radio waves and opto-electrical methods
621
Detecting and Processing of Output Signals in Transfusion Speed Monitor Adapted to Numerous Kinds of Liquids
622
Detecting and profiling sedentary young men using machine learning algorithms
623
Detecting and Quantifying Biomarkers of Risk for Colorectal Cancer Using Quantum Dots and Novel Image Analysis Algorithms
624
Detecting and quantifying different types of self-admitted technical Debt
625
Detecting and Quantifying the Nonlinear and Time-Variant Effects in FRF Measurements Using Periodic Excitations
626
Detecting and quantifying T-wave alternans using the correlation method and comparison with the FFT-based method
627
Detecting and quantifying unusual interactions by correlating salient motion
628
Detecting and Reacting against Distributed Denial of Service Attacks
629
Detecting and Reacting to Changes in Sensing Units: The Active Classifier Case
630
Detecting and reading text in natural scenes
631
Detecting and recognizing centerlines as parabolic sections of the steerable filter response
632
Detecting and recognizing chemical targets in untrained backgrounds with temperature programmed sensors
633
Detecting and recognizing moving pedestrians in video
634
Detecting and recognizing numerical strings in Farsi document images
635
Detecting and reconstructing an unknown convolutional code by counting collisions
636
Detecting and reconstructing curve welding seam using structured light stereovision
637
Detecting and recovering prefix hijacking using multi-agent inter-AS diagnostic system
638
Detecting and Rectifying Anomalies in Body Sensor Networks
639
Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks
640
Detecting and reducing redundancy in alarm networks
641
Detecting and reducing the denial of Service attacks in WLANs
642
Detecting and rejecting foreign bodies
643
Detecting and Repairing Inconsistencies across Heterogeneous Models
644
Detecting and repairing network partition in wireless sensor networks
645
Detecting and representing relevant Web deltas in WHOWEDA
646
Detecting and representing relevant Web deltas using Web join
647
Detecting and resolving constraint conflicts in role-based access control
648
Detecting and resolving email feature interactions through constraints
649
Detecting and Resolving Firewall Policy Anomalies
650
Detecting and resolving inconsistencies in firewalls
651
Detecting and Resolving Inconsistencies in Ontologies Using Contradiction Derivations
652
Detecting and resolving mismatches between pairs of services
653
Detecting and resolving packet filter conflicts
654
Detecting and resolving the interaction between telephone features: terminating call screening and call forwarding by colored Petri-nets
655
Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding
656
Detecting and retrieving texts from electronic marquees in natural scenes
657
Detecting and revocation the compromised node in zone - based wireless sensor network using a two stage approach
658
Detecting and Segmenting Motions by Matching Flows
659
Detecting and segmenting objects for mobile manipulation
660
Detecting and segmenting sound sources by using microphone array
661
Detecting and Segmenting Text from Natural Scenes with 2-Stage Classification
662
Detecting and Simulating of Harmonic Currents in Power System
663
Detecting and sketching the common
664
Detecting and Solving Block Problems in Stream Media Transmission
665
Detecting and Solving Links Overlap to Make Structured P2P Network Topology-Aware
666
Detecting and solving template ambiguities in motion segmentation
667
Detecting and spotting bombs using wireless sensors and expert systems
668
Detecting and supporting known item queries in online public access catalogs
669
Detecting and temporarily recovering lost packets in Ad-hoc network by using Bypass routing
670
Detecting and tolerating data corruptions due to device driver defects
671
Detecting and Tracing Copyright Infringements in P2P Networks
672
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype
673
Detecting and tracing leaked private phone number data in Android smartphones
674
Detecting and tracing plagiarized documents by reconstruction plagiarism-evolution tree
675
Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network
676
Detecting and tracking abrupt changes in wireless multipath channels
677
Detecting and tracking all moving objects in wide-area aerial video
678
Detecting and tracking body parts of multiple people
679
Detecting and Tracking Community Dynamics in Evolutionary Networks
680
Detecting and tracking dynamic clusters of spatial events
681
Detecting and tracking eyes by using their physiological properties, dynamics, and appearance
682
Detecting and Tracking Eyes Through Dynamic Terrain Feature Matching
683
Detecting and tracking female breasts using neural network in real-time
684
Detecting and tracking gait asymmetries with wearable accelerometers
685
Detecting and tracking human face and eye using an space-varying sensor and an active vision head
686
Detecting and tracking human faces in videos
687
Detecting and Tracking Level Sets of Scalar Fields using a Robotic Sensor Network
688
Detecting and tracking moving object using an active camera
689
Detecting and tracking moving objects for video surveillance
690
Detecting and tracking moving objects from a mobile platform using a laser range scanner
691
Detecting and tracking moving objects in real time images via active camera
692
Detecting and Tracking Moving Objects in Sequences of Color Images
693
Detecting and tracking multiple fluorescence spot in noisy DXT image sequence
694
Detecting and tracking of 3D face pose for human-robot interaction
695
Detecting and tracking of a moving point target in space-based background with low signal to noise ratio
696
Detecting and tracking of ASD using new block flow in ultrasound (a novel approach)
697
Detecting and tracking of host people on a slave mobile robot for service-related tasks
698
Detecting and tracking of multiple moving objects for intelligent video surveillance systems
699
Detecting and tracking of multiple targets in IR image sequences in heavy background
700
Detecting and tracking of small moving target in avian radar images
701
Detecting and tracking of small moving target under the background of sea level
702
Detecting and tracking people by mobile robot using structured light range sensor
703
Detecting and Tracking People in a Homogeneous Environment Using Skin Color Model
704
Detecting and tracking people using an RGB-D camera via multiple detector fusion
705
Detecting and Tracking Separating Objects Using Direct Monopulse Measurements
706
Detecting and tracking small scale eddies in the black sea and the Baltic Sea using high-resolution Radarsat-2 and TerraSAR-X imagery (DTeddie)
707
Detecting and Tracking Spatio-temporal Clusters with Adaptive History Filtering
708
Detecting and Tracking Volunteers in Expo Videos
709
Detecting and using critical paths at runtime in message driven parallel programs
710
Detecting and Validating Sybil Groups in the Wild
711
Detecting and visualizing cartilage thickness without a shape model
712
Detecting and Visualizing Emerging Trends and Transient Patterns in Fuel Cell Scientific Literature
713
Detecting and visualizing inter-worksheet smells in spreadsheets
714
Detecting and visualizing local bifurcations in 2D time-dependent vector fields
715
Detecting and Visualizing Profile Correlation in Subspace
716
Detecting and visualizing refactorings from software archives
717
Detecting and Visualizing the Dispute Structure of the Replying Comments in the Internet Forum Sites
718
Detecting and visualizing web design patterns
719
Detecting and warning system for fireworks warehouse based on wireless sensor networks
720
Detecting AND-parallelism in logic programs without literal ordering
721
Detecting anisotropic scattering with hidden Markov models
722
Detecting Anomalies by Benford´s Law
723
Detecting Anomalies Efficiently in SDN Using Adaptive Mechanism
724
Detecting anomalies for high performance computing resilience
725
Detecting Anomalies from a Multitarget Tracking Output
726
Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles
727
Detecting anomalies in cellular networks using an ensemble method
728
Detecting anomalies in cluster-based parallel programs using a wavelet based approach
729
Detecting anomalies in constructed complex systems
730
Detecting anomalies in DNS protocol traces via Passive Testing and Process Mining
731
Detecting Anomalies in Graphs
732
Detecting anomalies in high-performance parallel programs
733
Detecting anomalies in humanoid joint trajectories
734
Detecting anomalies in IaaS environments through virtual machine host system call analysis
735
Detecting anomalies in network traffic using Entropy and Mahalanobis distance
736
Detecting anomalies in network traffic using the method of remaining elements
737
Detecting anomalies in Online Social Networks using graph metrics
738
Detecting anomalies in spatiotemporal data using genetic algorithms with fuzzy community membership
739
Detecting anomalies in symbolic sequence dataset
740
Detecting Anomalies in Time-Varying Networks Using Tensor Decomposition
741
Detecting anomalies in unmanned vehicles using the Mahalanobis distance
742
Detecting anomalies in WLAN using discrimination algorithm
743
Detecting anomalies to improve classification performance in opportunistic sensor networks
744
Detecting Anomalies Using End-to-End Path Measurements
745
Detecting anomalous activities by fusion of accelerometer and passive infrared sensor
746
Detecting anomalous and unknown intrusions against programs
747
Detecting anomalous behavior in microcontrollers using unintentional radio frequency emissions
748
Detecting anomalous behavior: optimization of network traffic parameters via an evolution strategy
749
Detecting anomalous energy consumptions in distributed manufacturing systems
750
Detecting Anomalous Events in Ubiquitous Sensor Environments using Bayesian Networks and Nonparametric Regression
751
Detecting anomalous human interactions using laser range-finders
752
Detecting Anomalous Insiders in Collaborative Information Systems
753
Detecting anomalous latent classes in a batch of network traffic flows
754
Detecting Anomalous Load Data
755
Detecting Anomalous Load Data
756
Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security
757
Detecting anomalous network hosts by means of PCA
758
Detecting anomalous network traffic in organizational private networks
759
Detecting anomalous structures by convolutional sparse models
760
Detecting Anomalous User Behaviors in Workflow-Driven Web Applications
761
Detecting Anomalous Web Browsing via Diffusion Wavelets
762
Detecting anomaly and failure in Web applications
763
Detecting Anomaly in Videos from Trajectory Similarity Analysis
764
Detecting Anomaly Node Behavior in Wireless Sensor Networks
765
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop
766
Detecting Anomaly Traffic using Flow Data in the real VoIP network
767
Detecting anomaly using the scene modeling based on time delayed statistical data
768
Detecting anthrax in the mail via coherent Raman microspectroscopy
769
Detecting Antibodies Secreted by Trapped Cells Using Extraordinary Optical Transmission
770
Detecting antifragile decisions and models lessons from a conceptual analysis model of Service Life Extension of aging vehicles
771
Detecting Antipatterns in Android Apps
772
Detecting Aphid Density of Winter Wheat Leaf Using Hyperspectral Measurements
773
Detecting API usage obstacles: A study of iOS and Android developer questions
774
Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach
775
Detecting application update attack on mobile devices through network featur
776
Detecting application-level failures in component-based Internet services
777
Detecting appropriate replication approach considering client and server parameters in mobile environment
778
Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis
779
Detecting Arabic handwritten word baseline using Voronoi Diagram
780
Detecting Arbitrary Stable Properties Using Efficient Snapshots
781
Detecting architectural mismatches in process algebraic descriptions of software systems
782
Detecting architecturally-relevant code smells in evolving software systems
783
Detecting architecture instabilities with concern traces: An exploratory study
784
Detecting arcing downed-wires using fault current flicker and half-cycle asymmetry
785
Detecting Arcing Events in Semiconductor Manufacturing Equipment
786
Detecting arcing events in semiconductor manufacturing equipment
787
Detecting Arithmetic of Passenger´s Location Based on Image Processing
788
Detecting Arrivals in Room Impulse Responses With Dynamic Time Warping
789
Detecting Artifact Anomalies in Temporal Structured Workflow as Reusable Assets
790
Detecting artifacts on SNP chips
791
Detecting arytenoid cartilage misplacement through acoustic and electroglottographic jitter analysis
792
Detecting AS hijacking in one administrative domain
793
Detecting assembly actions by scene observation
794
Detecting asset value dislocations in multi-agent models of market microstructure
795
Detecting Associations in Large Dataset on MapReduce
796
Detecting asymmetries in balance control with system identification: first experimental results from above knee amputees
797
Detecting Atomicity Errors in Message Passing Programs
798
Detecting Atomicity Races in ARINC 653 Applications
799
Detecting atomic-set serializability violations in multithreaded programs through active randomized testing
800
Detecting atrial fibrillation using spatial precision
801
Detecting attacks against data in web applications
802
Detecting attacks in QoS-OLSR protocol
803
Detecting Attacks in Routers Using Sketches
804
Detecting Attacks on Java Cards by Fingerprinting Applets
805
Detecting attacks on networks
806
Detecting attacks that exploit application-logic errors through application-level auditing
807
Detecting Attempts at Humor in Multiparty Meetings
808
Detecting attractive locations and tourists´ dynamics using geo-referenced images
809
Detecting attractors in production systems by using system dynamics and neural networks
810
Detecting auditory cortex: A comparison of SPM and WSPM
811
Detecting auditory information in concentration based on eye movement
812
Detecting authentication misuse attacks against SIP entities
813
Detecting authority bids in online discussions
814
Detecting Automatically and Compression Algorithm for Infrared Image Based on Region of Interest
815
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
816
Detecting automobiles and people for semantic video retrieval
817
Detecting automobiles on real street environment for Advanced Driver Assistance Systems by its projected shadow
818
Detecting Automotive Exhaust Gas Based on Fuzzy Inference System
819
Detecting Avocados to Zucchinis: What Have We Done, and Where Are We Going?
820
Detecting backdoor using stepping stone detection approach
821
Detecting background setting for dynamic scene
822
Detecting bad smells in source code using change history information
823
Detecting Bad Smells with Weight Based Distance Metrics Theory
824
Detecting Bad SNPs from Illumina BeadChips Using Jeffreys Distance
825
Detecting bandlimited audio in broadcast television shows
826
Detecting Bandwidth DDoS Attack with Control Charts
827
Detecting B-cell lymphomas dysregulation modules based on molecular interaction network
828
Detecting bearing defects under high noise levels: A classifier fusion approach
829
Detecting beetle infestations in pine forests using MODIS NDVI time-series data
830
Detecting Behavioral Microsleeps from EEG Power Spectra
831
Detecting Behavioral Microsleeps using EEG and LSTM Recurrent Neural Networks
832
Detecting Behavioral Variations in System Resources of Large Data Centers
833
Detecting behaviours within HLA distributed simulations with added analysis components
834
Detecting BGP anomalies with wavelet
835
Detecting BGP instability using Recurrence Quantification Analysis (RQA)
836
Detecting BGP Misconfiguration for BGP/MPLS VPNs
837
Detecting bids for eye contact using a wearable camera
838
Detecting Bifurcation Types and Characterizing Stability in DC–DC Switching Converters by Duplicate Symbolic Sequence and Weight Complexity
839
Detecting bifurcation types in DC-DC switching converters by duplicate symbolic sequence
840
Detecting Bilateral Symmetry in Perspective
841
Detecting binocular half-occlusions: empirical comparisons of five approaches
842
Detecting binocular half-occlusions: empirical comparisons of four approaches
843
Detecting Bioelectric Muscle Activity Corrupted by Superimposed Magnetic Resonance Field
844
Detecting Bistatically Reflected GPS Signals from Low Earth Orbit Over Land Surfaces
845
Detecting black hole attack in wireless ad hoc networks based on learning automata
846
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs
847
Detecting blackhole and greyhole attacks in vehicular Delay Tolerant Networks
848
Detecting Blackhole and Volcano Patterns in Directed Networks
849
Detecting black-hole attack in mobile ad hoc networks
850
Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording
851
Detecting blackhole attacks on DSR-based mobile ad hoc networks
852
Detecting blockage in process connections of differential pressure transmitters
853
Detecting blog groups using vector space models for link structures
854
Detecting Blood Clots using Neural Networks
855
Detecting bogus BGP route information: Going beyond prefix hijacking
856
Detecting book return patterns from library circulation data
857
Detecting Boolean Functions for Proving Unsatisfiability
858
Detecting border intrusion using wireless sensor network and artificial neural network
859
Detecting bot-infected machines based on analyzing the similar periodic DNS queries
860
Detecting Botnets in Computer Networks Using Multi-agent Technology
861
Detecting Botnets Using Command and Control Traffic
862
Detecting Botnets with Tight Command and Control
863
Detecting Bots Based on Keylogging Activities
864
Detecting bottlenecks in parallel DAG-based data flow programs
865
Detecting bottlenecks on-the-fly in OLSR based MANETs
866
Detecting boundaries in a vector field
867
Detecting Brain Activity Variation of Rat During Anesthesia by Spectral Entropy
868
Detecting brain shift during deep brain stimulation surgery using intra-operative data and functional atlases: A preliminary study
869
Detecting brain tumor in Magnetic Resonance Images using Hidden Markov Random Fields and Threshold techniques
870
Detecting branching structures using local Gaussian models
871
Detecting breakdown in ultra-thin dielectrics using a fast voltage ramp
872
Detecting breast cancer from infrared images by asymmetry analysis
873
Detecting breast cancer using microwave imaging and stochastic optimization
874
Detecting breath ammonia for non-invasive diagnostic based on low-cost organic diode with vertical nanojunctions
875
Detecting Bridging and Stuck-At Faults at Input and Output Pins of Standard Digital Components
876
Detecting bridging faults in dynamic CMOS circuits
877
Detecting bridging faults with stuck-at test sets
878
Detecting bridging nodes in network using spectral fuzzy clustering
879
Detecting Broken Mappings for Deep Web Integration
880
Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N)
881
Detecting broken reciprocating compressor valves in the pV diagram
882
Detecting broken rotor bars with zero-setting protection
883
Detecting Broken Rotor Bars With Zero-Setting Protection
884
Detecting building changes using epipolar constraint from aerial images taken at different positions
885
Detecting building damage caused by the 2011 Tohoku earthquake tsunami using TerraSAR-X data
886
Detecting Building-Level Changes of a City Using Street Images and a 2D City Map
887
Detecting buildings in aerial images using shape descriptors
888
Detecting Buildings in Historical Photographs Using Bag-of-Keypoints
889
Detecting buried objects by fusing dual-band infrared images
890
Detecting buried objects with subwavelength resolution using a near-field antenna-array probe
891
Detecting buried objects with subwavelength resolution using a near-field antenna-array probe
892
Detecting buried voids in copper interconnect
893
Detecting burst-mode optical label or payload generated by OCSS technique using conventional receivers
894
Detecting bursts in P2P based semi-autonomous underwater acoustic sensor networks
895
Detecting bursty events in collaborative tagging systems
896
Detecting buzz from time-sequenced document streams
897
Detecting C source code clones in college students´ homework
898
Detecting Campaign Promoters on Twitter Using Markov Random Fields
899
Detecting cancer quickly and accurately
900
Detecting cancerous tissues in human body by means of fiber fluorescent spectroscopy
901
Detecting Canopy Water Status Using Shortwave Infrared Reflectance Data From Polar Orbiting and Geostationary Platforms
902
Detecting capability evaluate of spider detection techniques
903
Detecting cardiac pathologies from annotated auscultations
904
Detecting Carried Objects from Sequences of Walking Pedestrians
905
Detecting Cars in UAV Images With a Catalog-Based Approach
906
Detecting cartoons: a case study in automatic video-genre classification
907
Detecting Cartoons: Automatic Video Genre Classification
908
Detecting causal interdependence in simulated neural signals based on pairwise and multivariate analysis
909
Detecting cavitation signals based on Ultrasonic acoustic emissions technology
910
Detecting cell assembly interaction patterns via Bayesian based change-point detection and graph inference model
911
Detecting cells in DIC microscope images using a high level Bayesian model and template matching
912
Detecting cellular events in brain cortex using time-lapse microscopy
913
Detecting cerebral microbleeds in 7.0 T MR images using the radial symmetry transform
914
Detecting cervical microstructure via ultrasound and optical microscopy
915
Detecting cervical softness with shear wave speed estimation
916
Detecting Chaff Perturbation on Stepping-Stone Connection
917
Detecting Chains of Vulnerabilities in Industrial Networks
918
Detecting Change Areas in Mexico Between 2005 and 2010 Using 250 m MODIS Images
919
Detecting change in a time-series (Corresp.)
920
Detecting Change in Data Stream: Using Sampling Technique
921
Detecting change in dynamic fitness landscapes
922
Detecting change in equatorial regions of Brazil using medium resolution satellite imagery
923
Detecting Change in Program Behavior for Adaptive Optimization
924
Detecting changed areas in images from different view points
925
Detecting changes during pregnancy with Raman spectroscopy
926
Detecting changes in 3-D shape using self-consistency
927
Detecting Changes in 3D Structure of a Scene from Multi-view Images Captured by a Vehicle-Mounted Camera
928
Detecting changes in a dynamic environment for updating its maps by using a mobile robot
929
Detecting changes in a semi-structured business process through spectral graph analysis
930
Detecting changes in aerial views of man-made structures
931
Detecting changes in content and posting time distributions in social media
932
Detecting changes in context using time series analysis of social network
933
Detecting Changes in DNA Copy Number: Reviewing signal processing techniques
934
Detecting Changes in Grey Level Sequences by ML Isotonic Regression
935
Detecting changes in high resolution remote sensing images using superpixels
936
Detecting Changes in Hyperspectral Imagery Using a Model-Based Approach
937
Detecting changes in motion characteristics during sports training
938
Detecting changes in multilayered orthoimages with spatiotemporal texture blocks
939
Detecting Changes in Multispectral Satellite Images using Time Dependent Angle Vegetation Indices
940
Detecting changes in persistent scatterers
941
Detecting changes in polarimetric SAR data with content-based image retrieval
942
Detecting changes in respiratory patterns in high frequency chest compression therapy by single-channel blind source separation
943
Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling
944
Detecting changes in the condition of process instruments
945
Detecting changes in the condition of process instruments
946
Detecting changes in the human heartbeat with on-body radar
947
Detecting changes in the Hurst parameter
948
Detecting Changes in User-Centered Music Query Streams
949
Detecting changes in XML documents
950
Detecting Changes of Affects by Accelerated Plethysmogram
951
Detecting changes of buildings from aerial images using shadow and shading model
952
Detecting changes of opinion from customer reviews
953
Detecting changes of the insulation state of variable speed drive systems based on inverter-built-in current sensors
954
Detecting changes of transportation-mode by using classification data
955
Detecting Changes over Time in a Knowledge Sharing Community
956
Detecting changing trajectory of urban heat island using Gaussian model in Beijing, China
957
Detecting chaotic behavior in HRV signals in a human cardiac transplant recipient
958
Detecting chaotic signals with nonlinear models
959
Detecting Characteristic Curves on Point Sets
960
Detecting Characteristics of Electron Tubes
961
Detecting characteristics of SF
6
decomposed gas sensor for insulation diagnosis on gas insulated switchgears
962
Detecting characteristics of various type antennas on partial discharge electromagnetic wave radiating through insulating spacer in gas insulated switchgear
963
Detecting Cheaters
964
Detecting cheaters for multiplayer games: theory, design and implementation[1]
965
Detecting cheering events in sports games
966
Detecting child speaker based on auditory feature vectors for VTL estimation
967
Detecting China’s Urban Expansion Over the Past Three Decades Using Nighttime Light Data
968
Detecting Circles on Ego Network Based on Structure
969
Detecting citrus fruits with shadow within tree canopy by a fusing method
970
Detecting citrus tree water status by integrating hyperspectral remote sensing and physiological data in a water flow-storage model
971
Detecting Class-Independent Linear Relationships within an Arbitrary Set of Features
972
Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks
973
Detecting Climate Change in Multivariate Time Series Data by Novel Clustering and Cluster Tracing Techniques
974
Detecting Clones Across Microsoft .NET Programming Languages
975
Detecting Clones in Android Applications through Analyzing User Interfaces
976
Detecting Clones in Business Applications
977
Detecting clones in wireless sensor networks using constrained random walk
978
Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division
979
Detecting Clones, Copying and Reuse on the Web
980
Detecting cloning attack in Social Networks using classification and clustering techniques
981
Detecting clouds and cloud shadows in multispectral satellite images for tropical areas
982
Detecting clustering in binary sequences
983
Detecting clustering in streams
984
Detecting Clusters and Outliers for Multi-dimensional Data
985
Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data
986
Detecting CNV-like variation when remembering and generating continuous motion
987
Detecting Coarse - Grain Parallelism Using an Interprocedural Parallelizing Compiler
988
Detecting Coarticulation in Sign Language using Conditional Random Fields
989
Detecting Coastal and Shoreline Change in North Branch of Yangtze River Based on Remote Sensing
990
Detecting Coastlines from Aerial Images
991
Detecting Code Alteration by Creating a Temporary Memory Bottleneck
992
Detecting Code Injection Attacks in Internet Explorer
993
Detecting Code Smells in Software Product Lines -- An Exploratory Study
994
Detecting code smells in spreadsheet formulas
995
Detecting code theft via a static instruction trace birthmark for Java methods
996
Detecting Coevolution of Functionally Related Proteins for Automated Protein Annotation
997
Detecting cognitive activity related hemodynamic signal for brain computer interface using functional near infrared spectroscopy
998
Detecting Cognitive States from fMRI Images by Machine Learning and Multivariate Classification
999
Detecting cognitive stress from keyboard and mouse dynamics during mental arithmetic
1000
Detecting coherent local patterns from time series gene expression data by a temporal biclustering method