<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Detecting collaboration from behavior
2
Detecting Collaborative Fields Using Social Networks
3
Detecting collaborative insider attacks in information systems
4
Detecting Collaborative Patterns in Programs
5
Detecting collision-free paths by observing walking people
6
Detecting collisions in an unstructured environment through path anticipation
7
Detecting colluding blackhole and greyhole attack in Delay Tolerant Networks
8
Detecting collusive cheating in online shopping systems through characteristics of social networks
9
Detecting Collusive Shill Bidding
10
Detecting co-located mobile users
11
Detecting color edges in the visible human dataset
12
Detecting Common Interest Kernels in Large Social Networks
13
Detecting common mode failures in N-version software using weakest precondition analysis
14
Detecting commonly occupied regions in video sequences
15
Detecting communication anomalies in tactical networks via graph learning
16
Detecting communities around seed nodes in complex networks
17
Detecting Communities from Bipartite Networks Based on Bipartite Modularities
18
Detecting Communities in Large Networks by Iterative Local Expansion
19
Detecting Communities in Massive Networks Based on Local Community Attractive Force Optimization
20
Detecting communities in networks by merging cliques
21
Detecting Communities in Science Blogs
22
Detecting communities in social networks by techniques of clustering and analysis of communications
23
Detecting communities in social networks using unnormalized spectral clustering incorporated with Bisecting K-means
24
Detecting Communities in Sparse MANETs
25
Detecting communities in time-evolving proximity networks
26
Detecting communities in topical semantic networks
27
Detecting Communities of Methods Using Dynamic Analysis Data
28
Detecting communities using bibliographic metrics
29
Detecting Communities Using Social Ties
30
Detecting Community Kernels in Large Social Networks
31
Detecting community structure based on edge betweenness
32
Detecting community structure based on traffic at node in networks
33
Detecting community structure in complex networks based on K-means clustering and data field theory
34
Detecting community structure in trust relationship networks
35
Detecting Community Structure in Weighted Email Network
36
Detecting community structure in weighted social networks based on shared neighbors
37
Detecting community structure of complex networks by affinity propagation
38
Detecting Community Structure of Complex Networks by Simulated Annealing with Optimal Prediction
39
Detecting community structure of networks using evolutionary coordination games
40
Detecting complex events in user-generated video using concept classifiers
41
Detecting complexity abnormalities in dyslexia measuring approximate entropy of electroencephalographic signals
42
Detecting composite events in active database systems using Petri nets
43
Detecting Composite JPEG Images in Transform Domain
44
Detecting Compromised Nodes in Wireless Sensor Networks
45
Detecting compromised routers via packet forwarding behavior
46
Detecting Compromised VM via Application-Aware Anomaly Detection
47
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
48
Detecting computer code plagiarism in higher education
49
Detecting Computer Generated Images for Image Spam Filtering
50
Detecting computer-induced errors in remote-sensing JPEG compression algorithms
51
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept
52
Detecting concept drift in fully distributed environments
53
Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions
54
Detecting Concurrency Errors in Client-Side Java Script Web Applications
55
Detecting Concurrency-Related Problematic Activity Arrangement in WS-BPEL Programs
56
Detecting concussion impairment with radar using gait analysis techniques
57
Detecting condenser faults in commercial refrigeration systems
58
Detecting Conflict Policy Rules with Concept Lattice
59
Detecting conflicts in a role-based delegation model
60
Detecting Conflicts in ABAC Policies with Rule-Reduction and Binary-Search Techniques
61
Detecting Conflicts of Interest
62
Detecting conjunctive channel predicates in a distributed programming environment
63
Detecting constituent sequences by means of HP pattern-based grammars to synthesize proteins: Inferring sequence-structure-function relationship
64
Detecting constructions of nonlinear integral systems from input-output data: an application of neural networks
65
Detecting Contaminants in Smart Buildings by Exploiting Temporal and Spatial Correlation
66
Detecting contextual anomalies of crowd motion in surveillance video
67
Detecting continual anomalies in monitoring data stream based on sampling GPR algorithm
68
Detecting Contour Saliences using Tensor Scale
69
Detecting contrast agents in ultrasound image sequences for tumor diagnosis
70
Detecting contrast enhancement based image forgeries by parallel approach
71
Detecting Controlled Signals in the Human Brain by Near Infrared Spectroscopy
72
Detecting controller malfunctions in electromagnetic environments. I. Modeling and estimation of nominal system function
73
Detecting controller malfunctions in electromagnetic environments. II. Design and analysis of the detector
74
Detecting convoys in networks of short-ranged sensors
75
Detecting coordinated attacks in tactical wireless networks using cooperative signature-based detectors
76
Detecting Coordinated Distributed Multiple Attacks
77
Detecting Copy-Move Forgery Using Non-negative Matrix Factorization
78
Detecting copy-paste forgeries using transform-invariant features
79
Detecting core protein complexes based on link patterns
80
Detecting corner points from digital curves
81
Detecting Corner Using Fuzzy Similarity Matrix
82
Detecting corners using improved SUSAN + CSS for mammary gland blood oxygen images
83
Detecting corners using the `patchy´ Hough transform
84
Detecting coronal holes for solar activity modeling
85
Detecting Corporate Social Media Crises on Facebook Using Social Set Analysis
86
Detecting Correlation Violations and Data Races by Inferring Non-deterministic Reads
87
Detecting correlative light and electron microscopic labels by electron spectroscopic imaging
88
Detecting corresponding segments across images using synchronizable pulse-coupled neural networks
89
Detecting corrupted intra macroblocks in H.263 video
90
Detecting corrupted pages in M replicated large files
91
Detecting cortical activations from fMRI data using a recursive STAP algorithm
92
Detecting cortical activities from fMRI data using the STAP algorithm
93
Detecting cortical cerebral microinfarcts in 7.0 T MR images
94
Detecting Cortical Surface Regions in Structural MR Data
95
Detecting Co-Salient Objects in Large Image Sets
96
Detecting counterfeit products using supply chain event mining
97
Detecting counterfeit-money using RFID-enabled mobile devices
98
Detecting coupled excitons by photoluminescence excitation in bi-layer quantum dots
99
Detecting Coverage Boundary Nodes in Wireless Sensor Networks
100
Detecting coverage holes in wireless sensor networks
101
Detecting Covert Channels in Computer Networks Based on Chaos Theory
102
Detecting covert channels within VoIP
103
Detecting covert communication on Android
104
Detecting covert dubious actors using cross domain associations
105
Detecting covert timing channels using non-parametric statistical approaches
106
Detecting Cracks of Preserved Egg Based on Polarized Light
107
Detecting cracks on a concrete surface using histogram of oriented gradients
108
Detecting Credential Abuse in the Grid Using Bayesian Networks
109
Detecting credit card fraud by ANN and logistic regression
110
Detecting Credit Card Fraud Using Periodic Features
111
Detecting Criminal Networks Using Social Similarity
112
Detecting criminal networks: SNA models are compared to proprietary models
113
Detecting Criminal Relationships through SOM Visual Analytics
114
Detecting critical cardiac events with 12 lead ECG data
115
Detecting Critical Links for Keeping Shortest Distance from Clients to Servers during Failures
116
Detecting Critical Nodes for Efficient Network Vulnerability Management
117
Detecting critical nodes for MANET intrusion detection systems
118
Detecting Critical Nodes in Interdependent Power Networks for Vulnerability Assessment
119
Detecting critical protected links to keep connectivity to servers against link failures
120
Detecting crop irrigation status in orchard canopies with airborne and ASTER thermal imagery
121
Detecting cross site scripting vulnerabilities introduced by HTML5
122
Detecting cross-browser issues in web applications
123
Detecting Cross-Fades in Interlaced Video With 3:2 Film Cadence
124
Detecting Cross-Language Dependencies Generically
125
Detecting Cross-Site Scripting Vulnerability Using Concolic Testing
126
Detecting Crowdedness Spot in City Transportation
127
Detecting Cruising Flagged Taxis´ Passenger-Refusal Behaviors Using Traffic Data and Crowdsourcing
128
Detecting cultural features in urban SAR images for wireless applications
129
Detecting Cumulated Anomaly by a Dubiety Degree based detection Model
130
Detecting Curved Symmetric Parts Using a Deformable Disc Model
131
Detecting Curved Underground Tunnels using Partial Radon Transforms
132
Detecting Curves with Unknown Endpoints and Arbitrary Topology Using Minimal Paths
133
Detecting Curvilinear Features Using Structure Tensors
134
Detecting cuts and dissolves through linear regression analysis
135
Detecting cuts in sensor networks
136
Detecting cyber intrusions in SCADA networks using multi-agent collaboration
137
Detecting cylinders in 3D range data using model selection criteria
138
Detecting daily routines of older adults using sensor time series clustering
139
Detecting damaged buildings caused by earthquake using local gradient orientation entropy statistics method
140
Detecting damages in outdoor non-ceramic insulators using near field microwave non-destructive testing
141
Detecting dance motion structure through music analysis
142
Detecting dance motion structure using body components and turning motions
143
Detecting data and schema changes in scientific documents
144
Detecting data exfiltration by integrating information across layers
145
Detecting Data Hazards in Multi-Processor System-on-Chips on FPGA
146
Detecting Data Inconsistency Failure of Composite Web Services Through Parametric Stateful Aspect
147
Detecting data races from sequential traces
148
Detecting Data Races on Framework-Based Applications
149
Detecting data races on weak memory systems
150
Detecting Data Semantic: A Data Leakage Prevention Approach
151
Detecting data store access conflict in Simulink by solving Boolean satisfiability problems
152
Detecting data visualization preferences using games
153
Detecting DDoS Attack Based on Empirical Mode Decomposition
154
Detecting DDOS attack based on network self-similarity
155
Detecting DDOS Attack Based on One-Way Connection Density
156
Detecting DDoS attacks at the source using multiscaling analysis
157
Detecting DDoS Attacks by Analyzing Client Response Patterns
158
Detecting DDoS attacks using conditional entropy
159
Detecting DDoS attacks with passive measurement based heuristics
160
Detecting dead statements for concurrent programs
161
Detecting deadlock and multiple termination in BPMN model using process automata
162
Detecting deadlock in programs with data-centric synchronization
163
Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source
164
Detecting deadlocks in distributed systems
165
Detecting dealer cheating in secret sharing systems
166
Detecting deception in interrogation settings
167
Detecting deception in Online Social Networks
168
Detecting deception in secondary screening interviews using linguistic analysis
169
Detecting deception in testimony
170
Detecting deceptive reviews using lexical and syntactic features
171
Detecting deep seismic reflectors aboard the R/V atlantis II
172
Detecting defaulters for consumed electric energy with neural network clustering
173
Detecting defects in adhesion between a metal hemisphere and a polymer base
174
Detecting Defects in Golden Surfaces of Flexible Printed Circuits Using Optimal Gabor Filters
175
Detecting defects in outdoor non-ceramic insulators using near-field microwave non-destructive testing
176
Detecting defects in photovoltaic modules with the help of experimental verification and synchronized thermography
177
Detecting defects in repeatedly patterned image with spatially different level of noise
178
Detecting defects in texture
179
Detecting Defects of Leather Material on the Base of Radiometric Method in MM-Wave Band
180
Detecting defects of vacuum nanoelectron devices and IC based on penetrate insulating layer non-destructive endoscopy method in SEM
181
Detecting defects on citrus surface based on circularity threshold segmentation
182
Detecting defects on planar circuits by using non-contacting magnetic probe
183
Detecting deformable objects with flexible shape priors
184
Detecting degeneration: Monitoring cognitive health in independent elders
185
Detecting delaminated stator winding insulation using the ramped high-voltage DC test method
186
Detecting delay faults using power supply transient signal analysis
187
Detecting delay flaws by very-low-voltage testing
188
Detecting deletions in ASR output
189
Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks
190
Detecting denial of service attacks using emergent self-organizing maps
191
Detecting denial of service attacks using support vector machines
192
Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network
193
Detecting denial-of-service attacks through feature cross-correlation
194
Detecting denial-of-service attacks with incomplete audit data
195
Detecting dense foreground stripes in Arabic handwriting for accurate baseline positioning
196
Detecting dense subgraphs in complex networks based on edge density coefficient
197
Detecting Dependences and Interactions in Feature-Oriented Design
198
Detecting dependencies in Enterprise JavaBeans with SQuAVisiT
199
Detecting Depolarized Targets Using a New Geometrical Perturbation Filter
200
Detecting depolarizing targets with satellite data: A new geometrical perturbation filter
201
Detecting depression from facial actions and vocal prosody
202
Detecting Depression Severity from Vocal Prosody
203
Detecting depression using multimodal approach of emotion recognition
204
Detecting depression: A comparison between spontaneous and read speech
205
Detecting Design Errors in Composite Events for Event Triggered Real-Time Systems Using Timed Automata
206
Detecting design flaws in control systems using optimisation methods
207
Detecting design flaws via metrics in object-oriented systems
208
Detecting Design Patterns Using Source Code of Before Applying Design Patterns
209
Detecting Determinism in EEG Signals using Principal Component Analysis and Surrogate Data Testing
210
Detecting determinism in speech phonemes
211
Detecting determinism in time series: the method of surrogate data
212
Detecting developing volcanic unrest
213
Detecting Deviants over Data Streams
214
Detecting deviations in visual path following for indoor environments
215
Detecting DGA malware using NetFlow
216
Detecting Diabetes Mellitus and Nonproliferative Diabetic Retinopathy Using Tongue Color, Texture, and Geometry Features
217
Detecting Differences Between Contrast Groups
218
Detecting different joint equilibria with an evolutionary approach
219
Detecting different sub-types of acute myelogenous leukemia using dictionary learning and sparse representation
220
Detecting differentially aberrant genomic regions in multi-sample array CGH experiments using nearest-neighbor multivariate test
221
Detecting Differentially Coexpressed Genes from Labeled Expression Data: A Brief Review
222
Detecting differentially methylated mRNA from MeRIP-Seq with likelihood ratio test
223
Detecting digital forgeries using of a lighting direction
224
Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact
225
Detecting digital image forgeries through inconsistent motion blur
226
Detecting Digital Image Forgeries Through Weighted Local Entropy
227
Detecting digital tampering by blur estimation
228
Detecting dim moving point targets using transformation of pixel statistics
229
Detecting dim point target in image data using adaptive prediction filter
230
Detecting dim point target in infrared image sequences using probalilistic neural network
231
Detecting Direction of Movement Using Pyroelectric Infrared Sensors
232
Detecting Directionality in Random Fields Using the Monogenic Signal
233
Detecting discontinuities for surface reconstruction
234
Detecting Discontinuities in Large Scale Systems
235
Detecting Discontinuous and Occluded Boundaries from Point Clouds of Building Interiors
236
Detecting discriminative functional MRI activation patterns using space filling curves
237
Detecting discussion scenes in instructional videos
238
Detecting Disease Associated Genes and Gene-Gene Interactions with Penalized AUC Maximization
239
Detecting diseased images by segmentation and classification based on semi - supervised learning
240
Detecting Display Energy Hotspots in Android Apps
241
Detecting disruptive routers: a distributed network monitoring approach
242
Detecting disruptive routers: a distributed network monitoring approach
243
Detecting distance between injected microspheres and target tumor via 3D reconstruction of tissue sections
244
Detecting distributed computer network attacks: A multi-dimensional wavelet approach
245
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
246
Detecting distributed denial-of-service attack traffic by statistical test
247
Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically
248
Detecting Distributed Scans Using High-Performance Query-Driven Visualization
249
Detecting distributed signature-based intrusion: The case of multi-path routing attacks
250
Detecting distributed software components that will not cause emergent behavior in asynchronous communication style
251
Detecting DNA by field effect transistor arrays
252
Detecting DNA-binding domain from sequence and secondary structure Information Using Kernel-based Technique
253
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
254
Detecting doctored images using camera response normality and consistency
255
Detecting Document Genre for Personalization of Information Retrieval
256
Detecting Dominant Motion Flows in Unstructured/Structured Crowd Scenes
257
Detecting Dominant Motions in Dense Crowds
258
Detecting dominant points on online scripts with a simple approach
259
Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System
260
Detecting DoS and DDoS Attacks Using Chi-Square
261
Detecting DoS attacks in WSN based on clustering technique
262
Detecting DoS Attacks on Notification Services
263
Detecting DoS attacks on SIP systems
264
Detecting DoS attacks using packet size distribution
265
Detecting double compressed AMR audio using deep learning
266
Detecting double compressed JPEG images
267
Detecting Double Compressed JPEG Images by Using Moment Features of Mode Based DCT Histograms
268
Detecting Double Faults on Term and Literal in Boolean Expressions
269
Detecting Double JPEG Compression With the Same Quantization Matrix
270
Detecting doubly compressed images based on quantization noise model and image restoration
271
Detecting doubly compressed JPEG images by using Mode Based First Digit Features
272
Detecting drivable space in traffic scene understanding
273
Detecting driveable floor regions
274
Detecting Driver Distraction Using Smartphones
275
Detecting driver drowsiness and distraction via FFT
276
Detecting driver drowsiness using computer vision techniques
277
Detecting Driver Drowsiness Using Wireless Wearables
278
Detecting Driver Drowsiness: A survey of system designs and technology.
279
Detecting driver fatigue based on nonlinear speech processing and fuzzy SVM
280
Detecting Driver Fatigue based on the Driver´s Response Pattern and the Front View Environment of an Automobile
281
Detecting driver inattention by rough iconic classification
282
Detecting driver inattention in the absence of driver monitoring sensors
283
Detecting Driver Sleepiness Using Optimized Nonlinear Combinations of Sleepiness Indicators
284
Detecting Driver Use of Mobile Phone Based on In-Car Camera
285
Detecting Driver Yawning in Successive Images
286
Detecting driving drowsiness using EEG, EOG and driving quality signals
287
Detecting drops on lens in wireless multimedia sensor network nodes
288
Detecting drowsiness while driving by measuring eye movement - a pilot study
289
Detecting drowsiness while driving using wavelet transform
290
Detecting drug targets with minimum side effects in metabolic networks
291
Detecting Duplicate Biological Entities Using Markov Random Field-Based Edit Distance
292
Detecting Duplicate Bug Report Using Character N-Gram-Based Features
293
Detecting duplicate bug reports with software engineering domain knowledge
294
Detecting duplicate video based on camera transitional behavior
295
Detecting Duplicated Frames by Mapping Frames to 3D Skeletons
296
Detecting Duplicates in Complex XML Data
297
Detecting Duplicates in Geoinformatics: from Intervals and Fuzzy Numbers to General Multi-D Uncertainty
298
Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays
299
Detecting duplicates with shallow and parser-based methods
300
Detecting Duplications in Sequence Diagrams Based on Suffix Trees
301
Detecting dynamic and genetic effects on brain structure using high-dimensional cortical pattern matching
302
Detecting Dynamic and Static Geo-social Communities
303
Detecting dynamic behavior in compressed fingerprint videos: distortion
304
Detecting dynamic communities in opportunistic networks
305
Detecting dynamic load altering attacks: A data-driven time-frequency analysis
306
Detecting Dynamic Objects with Multi-view Background Subtraction
307
Detecting dynamic topics in social network using citation based anomaly detection
308
Detecting dynamical signals using singular spectrum analysis
309
Detecting Dynamics in Cricetulus Barabensis Populations
310
Detecting E and H fields with microstrip transmission lines
311
Detecting E.coli-O157 with fiber optic biosensor
312
Detecting earthquake damage levels using adaptive boosting
313
Detecting ECG characteristic points by novel hybrid wavelet transforms: an evaluation of clinical SCP-ECG database
314
Detecting ECG Validity Based on Wavelet
315
Detecting echoes of different spectral characteristics in absorbing media by variable moving bandwidth SSP minimization
316
Detecting edge of medical image using statistical theory
317
Detecting edge segments
318
Detecting edges in an image using powers-of-two coefficients
319
Detecting Edges in an Image with the Help of Fuzzy Parameters
320
Detecting edges in colour images using dichromatic differences
321
Detecting Edges in Noisy Multimedia Environments
322
Detecting edges of reflections from a single image via convex optimization
323
Detecting edges using an analog electrooptic device
324
Detecting edges using density value
325
Detecting EEG bursts after hypoxic-ischemic injury using energy operators
326
Detecting EEG evoked responses for target image search with mixed effect models
327
Detecting effective categories of medical incident reports for patient safety management
328
Detecting Effective Connectivity in Human Brain using Granger Causality
329
Detecting electrical stimulation of cortical mapping from recorded awake surgery sounds
330
Detecting Electroencephalography Variations Due to Sleep Disordered Breathing Events
331
Detecting electromagnetic cloaks using backward-propagating waves
332
Detecting electronic circuit elements on a digitized image using a modified genetic algorithm
333
Detecting electronic watermarks in digital video
334
Detecting electroporation by assessing the time constants in the exponential response of human skin to voltage controlled impulse electrical stimulation
335
Detecting elementary particles using hybrid pixel detectors at the lhc and beyond
336
Detecting Emergence in Social Networks
337
Detecting emergency situations by monitoring drivers´ states from EEG
338
Detecting emergent behavior in autonomous distributed systems with many components of the same type
339
Detecting emergent behavior in distributed systems using an ontology based methodology
340
Detecting Emergent Conflicts through Web Mining and Visualization
341
Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks
342
Detecting emerging research fronts in regenerative medicine by citation network analysis of scientific publications
343
Detecting emerging topics and trends via predictive analysis of ‘meme’ dynamics
344
Detecting emotion from short messages on Nepal earthquake
345
Detecting emotion from voice using selective Bayesian pairwise classifiers
346
Detecting emotion model in e-learning system
347
Detecting emotional expression of music with feature selection approach
348
Detecting emotional stress during typing task with time pressure
349
Detecting emotional stress from facial expressions for driving safety
350
Detecting Emotions and Dangerous Actions for Better Human-System Team Working
351
Detecting encrypted botnet traffic
352
Detecting encrypted botnet traffic
353
Detecting Encrypted Interactive Stepping-Stone Connections
354
Detecting encrypted metamorphic viruses by hidden Markov Models
355
Detecting Encrypted Stepping-Stone Connections
356
Detecting endocardial boundaries by texture in two-dimensional echocardiography
357
Detecting energy leaks in Android app with POEM
358
Detecting Energy-Efficient Central Nodes for Cooperative Caching in Wireless Sensor Networks
359
Detecting Engagement in HRI: An Exploration of Social and Task-Based Context
360
Detecting environmental disasters in digital news archives
361
Detecting Epileptic Activities from resting fMRI Time-course by using PCA algorithm
362
Detecting Epileptic Seizures Using Electroencephalogram: A New and Optimized Method for Seizure Classification Using Hybrid Extreme Learning Machine
363
Detecting epileptic seizures using wearable sensors
364
Detecting epistasis in the presence of linkage disequilibrium: A focused comparison
365
Detecting equivalent mutants and the feasible path problem
366
Detecting Erosion Events in Earth Dam and Levee Passive Seismic Data with Clustering
367
Detecting errors in a polynomial basis multiplier using multiple parity bits for both inputs
368
Detecting errors in Chinese spoken dialog system using ngram and dependency parsing
369
Detecting errors in digital communications with CRC codes implemented with FPGA
370
Detecting errors in the ATLAS TDAQ system: A neural networks and support vector machines approach
371
Detecting errors using multi-cycle invariance information
372
Detecting ESD events using a loop antenna
373
Detecting event-related motor activity using functional near-infrared spectroscopy
374
Detecting events from continuous media by intermodal collaboration and knowledge use
375
Detecting events in crowded scenes using tracklet plots
376
Detecting Events in Narrative Essays
377
Detecting events in the dynamics of ego-centered measurements of the internet topology
378
Detecting evoked potentials with SVD- and ICA-based statistical models
379
Detecting evolution incompatibilities by analyzing Java binaries
380
Detecting Exercise Induced Stress using the Photoplethysmogram
381
Detecting exitory stuck-at faults in semimodular asynchronous circuits
382
Detecting exoplanets with extreme adaptive optics and a single-mode fibre fed spectrograph
383
Detecting expectation-based spatio-temporal clusters formed during opportunistic sensing
384
Detecting experimental noises in protein-protein interactions with iterative sampling and model-based clustering
385
Detecting exploit code execution in loadable kernel modules
386
Detecting expressway traffic incident by traffic flow and robust statistics
387
Detecting External Disturbances on the Camera Lens in Wireless Multimedia Sensor Networks
388
Detecting external measurement disturbances based on statistical analysis for smart sensors
389
Detecting Eye Fixations by Projection Clustering
390
Detecting eye movement direction from stimulated Electro-oculogram by intelligent algorithms
391
Detecting eye movements in EEG for controlling devices
392
Detecting eye position and gaze from a single camera and 2 light sources
393
Detecting Eye-Direction Using Afterimage and Ocular Movement
394
Detecting eyes in digital images
395
Detecting face region in binary image
396
Detecting face-looking images
397
Detecting faces and recognizing facial features using color segmentation and 2DPCA in the normalized RG space
398
Detecting Faces from Color Video by Using Paired Wavelet Features
399
Detecting faces in images: a survey
400
Detecting facial actions and their temporal segments in nearly frontal-view face image sequences
401
Detecting facial expressions from EEG signals and head movement for controlling mouse curser
402
Detecting facial expressions from face images using a genetic algorithm
403
Detecting fade regions in uncompressed video sequences
404
Detecting failed processes using fault signatures
405
Detecting failure of antenna array elements using machine learning optimization
406
Detecting failure precursors in BGA solder joints
407
Detecting failures of the glucose sensor-insulin pump system: Improved overnight safety monitoring for Type-1 diabetes
408
Detecting Faint Compact Sources Using Local Features and a Boosting Approach
409
Detecting fall events based on motion history and shape change on a multi-camera network
410
Detecting Fall Incidents of the Elderly Based on Human-Ground Contact Areas
411
Detecting Fall Risk Factors for Toddlers
412
Detecting falls at homes using a network of low-resolution cameras
413
Detecting falls by analyzing angular momentum
414
Detecting false benign in breast cancer diagnosis
415
Detecting False Data Injection Attacks in AC State Estimation
416
Detecting False Data Injection Attacks on Power Grid by Sparse Optimization
417
Detecting false data injection in smart grid in-network aggregation
418
Detecting false timing paths: experiments on PowerPCTM microprocessors
419
Detecting false vessel recognitions in retinal fundus analysis
420
Detecting Falsified Timestamps in Evidence Graph via Attack Graph
421
Detecting Fatigue From Voice Using Speech Recognition
422
Detecting fault during power swing for a series compensated line
423
Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective
424
Detecting Fault Modules Applying Feature Selection to Classifiers
425
Detecting fault type and fault location in power transmission lines by extreme learning machines
426
Detecting faults from encoded information
427
Detecting Faults in Doubly Fed Induction Generator by Rotor Side Transient Current Measurement
428
Detecting faults in Doubly fed induction generator by rotor side transient current measurement
429
Detecting faults in dynamic and bounded stochastic distributions: an observer based technique
430
Detecting faults in fermentation processes
431
Detecting faults in fermentation processes, with an example using analytical redundancy
432
Detecting faults in four symmetric key block ciphers
433
Detecting faults in information poor systems using neurofuzzy models
434
Detecting faults in inverter-fed induction motors during startup transient conditions
435
Detecting faults in MV network using GPRS
436
Detecting faults in nonlinear dynamic systems using static neuro-fuzzy models
437
Detecting faults in rotating machines
438
Detecting faults in rotors of PM drives
439
Detecting faults in structures using time-frequency techniques
440
Detecting faults in technical indicator computations for financial market analysis
441
Detecting faults in the peripheral circuits and an evaluation of SRAM tests
442
Detecting faulty and malicious vehicles using rule-based communications data mining
443
Detecting Faulty Percepts in a Context-Aware Ubiquitous System
444
Detecting faulty wireless sensor nodes through Stochastic classification
445
Detecting feature duplication in natural language specifications when evolving software product lines
446
Detecting feature interactions at specification stage
447
Detecting Feature Interactions in Home Appliance Networks
448
Detecting feature interactions in telecommunication services with a SAT solver
449
Detecting Feature Interactions in Web Services with Timed Automata
450
Detecting Features using Random Sample Theory
451
Detecting femur fractures by texture analysis of trabeculae
452
Detecting fence-sittings among categories of web services
453
Detecting FET Stuck-Open Faults in CMOS Latches And Flip-Flops
454
Detecting fetal movements using non-invasive accelerometers: A preliminary analysis
455
Detecting fiber cuts in a WDM ring with optical protection switching: simulation and experiment
456
Detecting Figure-Panel Labels in Medical Journal Articles Using MRF
457
Detecting film-screen artifacts in mammography using a model-based approach
458
Detecting filopodia with wavelets
459
Detecting finger movement through classification of electromyography signals for use in control of robots
460
Detecting fingerprint alterations by orientation field and minutiae orientation analysis
461
Detecting fingerprint distortion from a single image
462
Detecting Fingertip Robust Scale-Invariant and Rotation Invariant with Stereo Camera
463
Detecting fish in underwater video using the EM algorithm
464
Detecting fixed amplitude signals in a fuzzy Gaussian environment
465
Detecting flash artifacts in fundus imagery
466
Detecting flat wheels with a fiber-optic sensor
467
Detecting flaws and intruders with visual data analysis
468
Detecting flaws in buried pipes under rough surface using the natural frequency technique
469
Detecting flaws in steel tube or bar with a rotating coil in a magnetic saturating field
470
Detecting Flood Attacks through New Density-Pattern Based Approach
471
Detecting Flooding Attack in Delay Tolerant Networks by Piggybacking Encounter Records
472
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks
473
Detecting Flooding-Based DDoS Attacks
474
Detecting floodplain inundation frequency using MODIS time-series imagery
475
Detecting floods accurately in SAR images without the interference of the reference image
476
Detecting floods using an object based change detection approach
477
Detecting Flow Anomalies in Distributed Systems
478
Detecting Flu Transmission by Social Sensor in China
479
Detecting for the aerial small target in infrared image based on the correlation coefficients of nonsubsampled contourlet transform
480
Detecting foreground disambiguation of depth images using fuzzy logic
481
Detecting forensically relevant information from PE executables
482
Detecting forest degradation in Kochi, Japan: combining in situ field measurements with remote sensing techniques
483
Detecting forest trails occluded by dense canopies using ALSM data
484
Detecting Forged Acknowledgements in MANETs
485
Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions
486
Detecting fractures in artificial heart valves
487
Detecting Fractures in Classifier Performance
488
Detecting fractures in thin-wire structures
489
Detecting frame duplication based on spatial and temporal analyses
490
Detecting fraud in demand response programs
491
Detecting Fraud in Financial Reports
492
Detecting Fraud on Websites
493
Detecting Frauds in Restaurant Reviews
494
Detecting free carriers in organic photovoltaic systems: Time-resolved microwave conductivity
495
Detecting freezing-of-gait during unscripted and unconstrained activity
496
Detecting Frequency for Transient Signal Based on Wavelet Transform
497
Detecting function patterns with interval Hough transform
498
Detecting function purity in JavaScript
499
Detecting functional coupling between electromyogram and local field potentials in dystonia using discrete wavelet transform and coherence estimation
500
Detecting Functional Dependence Program Invariants Based on Data Mining
501
Detecting Functional Modules from Protein Interaction Networks
502
Detecting functional modules in dynamic protein-protein interaction networks using Markov Clustering and Firefly Algorithm
503
Detecting future social unrest in unprocessed Twitter data: “Emerging phenomena and big data”
504
Detecting Gaps between ERP Software and Organizational Needs: A Semantic Similarity Based Approach
505
Detecting gas leaks electronically
506
Detecting gate-oxide shorts and delay defects in CMOS IC´s
507
Detecting Gathering Incident of Video Surveillance Based on Plane Geometry
508
Detecting Gaussian signals in the presence of interferers using the coprime sensor arrays with the min processor
509
Detecting gene interactions within a Bayesian Network framework using external knowledge
510
Detecting gene-gene interactions using support vector machines with L1 penalty
511
Detecting General Opinions from Customer Surveys
512
Detecting General Problem Structures with Inductive Linkage Identification
513
Detecting generic low-level features in images
514
Detecting Generic Visual Eventswith Temporal Cues
515
Detecting genetic risk factors for Alzheimer´s disease in whole genome sequence data via Lasso screening
516
Detecting Geographic Community in Mobile Social Network
517
Detecting geographic hotspots of human-induced land degradation in Vietnam and characterization of their social-ecological types
518
Detecting geological defects of the tunnels based on integrated geophysical techniques
519
Detecting geo-spatial weather clusters using dynamic heuristic subspaces
520
Detecting gestures in medieval images
521
Detecting global motion patterns in complex videos
522
Detecting global outliers from large distributed databases
523
Detecting global spatial-temporal events: saccadic suppression
524
Detecting global stride locality in value streams
525
Detecting good quality frames in videos captured by a wearable camera for blind navigation
526
Detecting GPS information leakage in Android applications
527
Detecting Gradients in Text Images Using the Hough Transform
528
Detecting granger causality in the corticostriatal learning and rewards network using MEG
529
Detecting greedy behavior by linear regression and watchdog in vehicular ad hoc networks
530
Detecting Greedy Behaviors by Linear Regression in Wireless Ad Hoc Networks
531
Detecting grey matter changes in preclinical phase of Alzheimer´s disease by voxel-based morphometric and textural features: A preliminary study
532
Detecting ground conductivity anomalies from the pattern characteristics of VHF antennas
533
Detecting ground deformation with Permanent scatterer of Suzhou region
534
Detecting Group Activities With Multi-Camera Context
535
Detecting group interactions by online association of trajectory data
536
Detecting Group Interest-Level in Meetings
537
Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space
538
Detecting groups of co-changing files in CVS repositories
539
Detecting halftone dots for offset print quality assessment using soft computing
540
Detecting Hand-Ball Events in Video Sequences
541
Detecting hand-palm orientation and hand shapes for sign language gesture recognition using 3D images
542
Detecting hands, fingers and blobs for multi-touch display applications
543
Detecting hard faults with combined approximate forward/backward symbolic techniques
544
Detecting Hardware Trojan through heuristic partition and activity driven test pattern generation
545
Detecting hardware Trojans in unspecified functionality using mutation testing
546
Detecting Hardware Trojans using backside optical imaging of embedded watermarks
547
Detecting harmful gases using fluctuation-enhanced sensing with Taguchi sensors
548
Detecting harmful overcurrents in PV arrays at shadow condition through binary coding method
549
Detecting Hazardous Vehicles and Disseminating Their Behavior in Urban Areas
550
Detecting head pose from stereo image sequence for active face recognition
551
Detecting heap smashing attacks through fault containment wrappers
552
Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand
553
Detecting heart wall boundaries by tracking features in an echocardiogram sequence
554
Detecting heat sources from 3D thermal model of indoor environment
555
Detecting Heavy Change in the Heavy Hitter distribution of network traffic
556
Detecting heavy ions and protons in space: single-events monitor
557
Detecting heavy metals in solution using electronic-tongue 3 REDOX water quality sensors
558
Detecting heavy-hitters in a P2P network
559
Detecting hedges scope based on phrase structures and dependency structures
560
Detecting height from constrained motion
561
Detecting Hidden and Exposed Terminal Problems in Densely Deployed Wireless Networks
562
Detecting hidden cliques from noisy observations
563
Detecting hidden communities in online auction networks
564
Detecting hidden fissures in rails
565
Detecting Hidden Friendship in Online Social Network
566
Detecting Hidden Information from a Spread Spectrum Watermarked Signal by Genetic Algorithm
567
Detecting hidden messages using higher-order statistical models
568
Detecting Hidden Messages Using Image Power Spectrum
569
Detecting Hidden Objects on Human Body Using Active Millimeter Wave Sensor
570
Detecting hidden objects: Security imaging using millimetre-waves and terahertz
571
Detecting hidden periodicity of time-series generated by nonlinear processes in magneto-plasma
572
Detecting hidden propagation structure and its application to analyzing phishing
573
Detecting Hidden Terminal Problems in Densely Deployed Wireless Networks
574
Detecting hiding malicious website using network traffic mining approach
575
Detecting hierarchical community structures in social networks using integer linear programming
576
Detecting hierarchical structure in networks
577
Detecting high concentration hydrogen with nanoporous palladium supported by anodic aluminum oxides
578
Detecting High Dynamics Signals From Open-Loop Radio Science Investigations
579
Detecting high incidence by using variable scan radius
580
Detecting High Level Dialog Structure Without Lexical Information
581
Detecting high level features for mobile robot localization
582
Detecting High-Contrast Seismic Anomalies Using Cross-Borehole Probing
583
Detecting highlights and notes on printed text
584
Detecting highlights in sports videos: Cricket as a test case
585
Detecting Highly Overlapping Communities with Model-Based Overlapping Seed Expansion
586
Detecting highly overlapping community structure based on Maximal Clique Networks
587
Detecting high-resistance connection asymmetries in inverter fed AC drive systems
588
Detecting high-risk regions for pressure ulcer risk assessment
589
Detecting historic wetlands using radar data: A review
590
Detecting Hoaxes, Frauds, and Deception in Writing Style Online
591
Detecting home services independently on service storages under semantic home network environment
592
Detecting homogeneity in protein sequence clusters for automatic functional annotation and noise detection
593
Detecting honeypots and other suspicious environments
594
Detecting hostile accesses through incremental subspace clustering
595
Detecting hot topics in technology news streams
596
Detecting Household Activity Patterns from Smart Meter Data
597
Detecting HTTP Botnet with Clustering Network Traffic
598
Detecting HTTP Tunnels with Statistical Mechanisms
599
Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM
600
Detecting hubs and quasi cliques in scale-free networks
601
Detecting Human Action as the Spatio-Temporal Tube of Maximum Mutual Information
602
Detecting Human Action in Active Video
603
Detecting human activities in retail surveillance using hierarchical finite state machine
604
Detecting Human Activity Profiles with Dirichlet Enhanced Inhomogeneous Poisson Processes
605
Detecting human and judging their pose in video
606
Detecting human behavior emotional cues in Natural Interaction
607
Detecting Human Behavior Models From Multimodal Observation in a Smart Home
608
Detecting Human Blockage and Device Movement in mmWave Communication System
609
Detecting human driver´s physiological stress and emotions using sophisticated one-person cockpit vehicle simulator
610
Detecting human emotion via speech recognition by using speech spectrogram
611
Detecting human face and recognizing facial expressions using potential net
612
Detecting human face from monocular image sequences by genetic algorithms
613
Detecting human face in color images
614
Detecting human faces in color images
615
Detecting human faces in color images
616
Detecting human falls with 3-axis accelerometer and depth sensor
617
Detecting Human Head Conductivity Distribution by Means of a RSM- MREIT Algorithm
618
Detecting Human Head Conductivity Distribution Using One Component Magnetic Flux Density
619
Detecting Human in Still Images by Learning Multi-Scale Mid-Level Features
620
Detecting human motion with support vector machines
621
Detecting Human Pulse in P-SPICE Model Using Lock-In Amplifier
622
Detecting Humans in Dense Crowds Using Locally-Consistent Scale Prior and Global Occlusion Reasoning
623
Detecting humans in videos by combining heterogeneous detectors
624
Detecting humans under occlusion using variational mean field method
625
Detecting hunts in wildlife videos
626
Detecting hybridization of DNA by highly sensitive evanescent field etched core fiber Bragg grating sensors
627
Detecting hyper-/hypothyroidism from tongue color spectrum
628
Detecting hyperventilation through efficient ARMA modeling of ECoG data of epileptic patients
629
Detecting I/O and Internal Feedback Bridging Faults
630
Detecting IDDQ defective CMOS circuits by depowering
631
Detecting ice motion with repeat-pass ENVISAT ASAR interferometry over Nunataks region in Grove Mountain, East Antarctic - the preliminary result
632
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
633
Detecting identity-spoof attack based on BP network in cognitive radio network
634
Detecting Idiopathic toe-walking gait pattern from normal gait pattern using heel accelerometry data and Support Vector Machines
635
Detecting illegal file sharing in Peer-to-Peer networks using fuzzy queries
636
Detecting illegal pickups of intercity buses from their GPS traces
637
Detecting Illegally-Copied Apps on Android Devices
638
Detecting Illumination in Images
639
Detecting image communities
640
Detecting image forgery using linear constraints based on shading and shadows
641
Detecting Image Forgery Using Perspective Constraints
642
Detecting Image Forgery Using XOR and Determinant of Pixels for Image Forensics
643
Detecting image points of diverse imbalance
644
Detecting image points of general imbalance
645
Detecting image region duplication using SIFT features
646
Detecting Image Spam Based on Cross Entropy
647
Detecting Image Spam Based on K-Labels Propagation Model
648
Detecting image splicing in the wild (WEB)
649
Detecting Image Splicing using Geometry Invariants and Camera Characteristics Consistency
650
Detecting image symmetry based on phase information
651
Detecting Image Tampering Using Feature Fusion
652
Detecting IMD Sweet Spots in LDMOS Devices through an Accurate Nonlinear Characterization
653
Detecting immature precursor cells in pathological images of bone marrow based on morphology
654
Detecting Impacts of Proton Beams on the LHC Collimators with Vibration and Sound Measurements
655
Detecting impedance and data aquisition for conventional partial discharge measuring systems
656
Detecting implicit collaboration patterns
657
Detecting implicit exceptions of service-oriented application based on context
658
Detecting Implied Scenarios from Execution Traces
659
Detecting Impolite Crawler by Using Time Series Analysis
660
Detecting Imprudence of ´Reliable´ Sellers in Online Auction Sites
661
Detecting impurities in uranium
662
Detecting impurities that lead to electrical cables outages using laser sensing
663
Detecting in vivo changes of electrical properties of Cerebral Spinal Fluid using microwave signals from small coil antennas - numerical simulation
664
Detecting Incipient Faults via Numerical Modeling and Statistical Change Detection
665
Detecting incipient sensor faults in flight control systems
666
Detecting incipient stator winding conductor faults in inverter fed machines
667
Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics
668
Detecting Incompatibilities Concealed in Duplicated Software Libraries
669
Detecting incompleteness in access control policies using data classification schemes
670
Detecting inconsistencies between software architecture views
671
Detecting inconsistencies in distributed data
672
Detecting Inconsistencies in JavaScript MVC Applications
673
Detecting inconsistencies in multi-platform mobile apps
674
Detecting inconsistencies in wrappers: A case study
675
Detecting Inconsistent Values Caused by Interaction Faults Using Automatically Located Implicit Redundancies
676
Detecting Incorrect Rules Automatically in Equivalent Transformation Programs
677
Detecting independent motion: the statistics of temporal continuity
678
Detecting independently moving objects and their interactions in georeferenced airborne video
679
Detecting indexical signs in film audio for scene interpretation
680
Detecting indicated object from head-mounted omnidirectional images by pointing gesture
681
Detecting indirect coupling
682
Detecting individual in crowd with moving feature´s structure consistency
683
Detecting Industrial Control Malware Using Automated PLC Code Analytics
684
Detecting inefficient API usage
685
Detecting infeasible branches based on code patterns
686
Detecting infection onset with behavior-based policies
687
Detecting infectious and biological contaminants aboard aircraft - Is it feasible?
688
Detecting Infectious and Biological Contaminants on Aircraft - Is it Feasible?
689
Detecting infinite zeros in polynomial matrices
690
Detecting influence of digital image contrast modification in subjective opinion
691
Detecting Influential Observations in Generalized DEA Model
692
Detecting Influential Spreaders in Complex, Dynamic Networks
693
Detecting influential users using spread of communications
694
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
695
Detecting Information Leakage Based on Subtracting Matrix
696
Detecting information under and from shadow in panchromatic Ikonos images of the city of Sherbrooke
697
Detecting information-hiding in WAV audios
698
Detecting Informative Web Page Blocks for Efficient Information Extraction Using Visual Block Segmentation
699
Detecting infrared with plastics
700
Detecting injection attacks in linear time invariant systems
701
Detecting insects and other dark line features using isotropic masks
702
Detecting inshore ships in satellite images
703
Detecting Insider Attacks Using Non-negative Matrix Factorization
704
Detecting Insider Theft of Trade Secrets
705
Detecting insider threats by monitoring system call activity
706
Detecting Insider Threats: A Trust-Aware Framework
707
Detecting instability in concavity trees
708
Detecting Instability Potentials in Regularization for Fast Affine Projection Algorithms
709
Detecting instrument for DC partial discharge within storage capacitor
710
Detecting Instrument Malfunctions in Control Systems
711
Detecting Insufficient Access Control in Web Applications
712
Detecting insulation condition changes of inverter Fed AC machines based on two current sensors and indirect phase step excitation
713
Detecting integrity attacks on control systems using a moving target approach
714
Detecting integrity attacks on control systems using robust physical watermarking
715
Detecting Integrity Attacks on SCADA Systems
716
Detecting intelligent agent behavior with environment abstraction in complex air combat systems
717
Detecting intelligent malware on dynamic Android analysis environments
718
Detecting intended human objects in human-captured videos
719
Detecting Intent of Web Queries Using Questions and Answers in CQA Corpus
720
Detecting intention to grasp during reaching movements from EEG
721
Detecting Interaction Coupling from Task Interaction Histories
722
Detecting inter-annual variations of vegetation growth based on satellite-sensed vegetation index data from 1983 to 1999
723
Detecting Inter-Component Configuration Errors in Proactive: A Relation-Aware Method
724
Detecting interesting exceptions from medical test data with visual summarization
725
Detecting Interlaced or Progressive Source of Video
726
Detecting interleaved sequences and groups in camera streams for human behavior sensing
727
Detecting interleaving
728
Detecting intermittent steering activity: Development of a phase-detection algorithm
729
Detecting intermittent test failures with the aid of environmental stress screening
730
Detecting internal defect of non-ceramic insulators using a novel micromachined electric field sensor
731
Detecting Internet Applications using Neural Networks
732
Detecting Internet worms at early stage
733
Detecting interpretable and accurate scale-invariant keypoints
734
Detecting interturn short circuits in rotor windings
735
Detecting intra-enterprise scanning worms based on address resolution
736
Detecting intra-operative awareness using facial electromyographic monitoring
737
Detecting intra-word faults in word-oriented memories
738
Detecting Intrinsic Loops Underlying Data Manifold
739
Detecting Intruders Using a Long Connection Chain to Connect to a Host
740
Detecting intrusion faults in remotely controlled systems
741
Detecting intrusions specified in a software specification language
742
Detecting Intrusions through System Call Sequence and Argument Analysis
743
Detecting intrusions using system calls: alternative data models
744
Detecting intrusions within RFID systems through non-monotonic reasoning cleaning
745
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps
746
Detecting Invalid Samples in Hand Geometry Verification through Geometric Measurements
747
Detecting invasive plant species using hyperspectral satellite imagery
748
Detecting Invasive Species via Hyperspectral Imagery using Sequential Projection Pursuits
749
Detecting inverse responses in chemical reaction processes with fuzzy qualitative simulation
750
Detecting ionospheric gradients for GBAS using a null space monitor
751
Detecting IP covert timing channels by correlating packet timing with memory content
752
Detecting IP prefix hijacking using data reduction-based and Binary Search Algorithm
753
Detecting Iris Lacunae Based on Gaussian Filter
754
Detecting irony and sarcasm in microblogs: The role of expressive signals and ensemble classifiers
755
Detecting irregular camera events in time-multiplexed videos
756
Detecting Irregular Curvilinear Structures in Gray Scale and Color Imagery Using Multi-directional Oriented Flux
757
Detecting Irregularities by Image Contour Based on Fuzzy Neural Network
758
Detecting irregularities in cyclic motion
759
Detecting irregularities in images and in video
760
Detecting irregularities in regular patterns
761
Detecting jamming attacks in Ubiquitous Sensor Networks
762
Detecting job interference in large distributed multi-agent systems — A formal approach
763
Detecting junctions using properties of the Laplacian of Gaussian detector
764
Detecting junk mails by implementing statistical theory
765
Detecting kangaroos in the wild: the first step towards automated animal surveillance
766
Detecting k-Balanced Trusted Cliques in Signed Social Networks
767
Detecting Kernel Vulnerabilities During the Development Phase
768
Detecting kernel-level rootkits through binary analysis
769
Detecting Kernel-Level Rootkits Using Data Structure Invariants
770
Detecting key individuals in terrorist network based on FANP model
771
Detecting Key Players in Criminal Networks Using Dynalink
772
Detecting Key Players in Terrorist Networks
773
Detecting keywords in Persian conversational telephony speech using a discriminative English keyword spotter
774
Detecting kinetic occlusion
775
Detecting KIRAKIRA Japanese names focusing on usage of Kanji characters
776
Detecting knee hyperextension using goniometric inclinometer sensing with vibrotactile feedback
777
Detecting Knowledge Activities of Industrial Cluster
778
Detecting labor using graph theory on connectivity matrices of uterine EMG
779
Detecting land cover change by evaluating the internal covariance matrix of the Extended Kalman Filter
780
Detecting land cover change using a sliding window temporal autocorrelation approach
781
Detecting Land Cover Change Using an Extended Kalman Filter on MODIS NDVI Time-Series Data
782
Detecting land cover changes based on their trajectories in the spectral space
783
Detecting land cover characteristics along with changing scales based on remotely sensed data
784
Detecting land-cover modifications from multi-resolution satellite image time series
785
Detecting landmines with ground-penetrating radar using feature-based rules, order statistics, and adaptive whitening
786
Detecting lane markers in complex urban environments
787
Detecting lapses in visual awareness from the EEG power spectrum with a neural network
788
Detecting laser beam reflectance modulated by electronic device operation with a simple setup
789
Detecting laser induced thermal activity in tissue-a Doppler ultrasound approach
790
Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree
791
Detecting latent cross-platform API violations
792
Detecting latent sector faults in modern SCSI disks
793
Detecting Latent Variables of Interest in Geo-Localized Environments Using an Aerial Robot
794
Detecting laterality and nasality in speech with the use of a multi-channel recorder
795
Detecting laterization of haemodynamic response during executive motor task and motor imagery with fNIRS
796
Detecting latitudinal variations in phenology over the northeast asia based on remote sensing vegetation index
797
Detecting Leaders in Behavioral Networks
798
Detecting leadership and cohesion in spoken interactions
799
Detecting leaks and sensor biases by recursive identification with forgetting factors
800
Detecting left ventricular endocardial and epicardial boundaries by digital two-dimensional echocardiography
801
Detecting left ventricular impaired relaxation using MR imaging
802
Detecting lesions in a mammogram
803
Detecting license plate based on top-hat transform and wavelet transform
804
Detecting license plate using texture and color information
805
Detecting Life and Biology-Related Parameters on Mars
806
Detecting Life Events in Feeds from Twitter
807
Detecting Light Outages After Severe Storms Using the S-NPP/VIIRS Day/Night Band Radiances
808
Detecting linear block codes in noise using the GLRT
809
Detecting linear features in weld seam images based on beamlet transform
810
Detecting linear motion of an object in a sequence of monocular underwater images
811
Detecting Link Communities Based on Local Approach
812
Detecting Link Communities in Massive Networks
813
Detecting link failures in complex network processes using remote monitoring
814
Detecting Link Spam Using Temporal Information
815
Detecting load conditions in human walking using expectation maximization and neural networks
816
Detecting load failures using the induction motor as a transducer
817
Detecting load unbalance and shaft misalignment using stator current in inverter-driven induction motors
818
Detecting local clusters in the data on disease vectors influenced by linear features
819
Detecting Local Events by Analyzing Spatiotemporal Locality of Tweets
820
Detecting local events using global sensing
821
Detecting local features in complex images: A combination of Hough transform and moment-based approximations
822
Detecting local semantic concepts in environmental sounds using Markov model based clustering
823
Detecting Localized Interspersed Motifs in Genomic Sequences
824
Detecting Localized Interspersed Motifs in Genomic Sequences
825
Detecting Location-Based Enumerating Bursts in Georeferenced Micro-Posts
826
Detecting logo-removal forgery by inconsistencies of blur
827
Detecting loose stator wedges in large motors
828
Detecting Loss of Diversity for an Efficient Termination of EAs
829
Detecting loss of earth for embedded generation
830
Detecting low frequency oscillations of the Pacific Ocean by the ocean upper layer temperature data
831
Detecting low intensity nuclei on propidium iodide stained digital slides
832
Detecting low-contrast defect regions on glasses using highly robust model-fitting estimator
833
Detecting low-intensity magnetic fields with a magnetostrictive fiber optic sensor
834
Detecting Low-Power Primary Signals via Distributed Sensing to Support Opportunistic Spectrum Access
835
Detecting Low-Power RF Signals Using a Multimode Optoelectronic Oscillator and Integrated Optical Filter
836
Detecting low-quality crowdtesting workers
837
Detecting low-rate periodic events in Internet traffic using renewal theory
838
Detecting low-voltage arc fault based on lifting multiwavelet
839
Detecting LSB matching by characterizing the amplitude of histogram
840
Detecting LSB steganography based on dynamic masks
841
Detecting LSB steganography in color, and gray-scale images
842
Detecting M2M traffic in mobile cellular networks
843
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
844
Detecting MAC Layer Collision Abnormalities in CSMA/CA Wireless Networks
845
Detecting Macro-patterns in the European Mediasphere
846
Detecting Main Body Size in Document Images
847
Detecting major disease in public hospital using ensemble techniques
848
Detecting Major Phenological Stages of Rice Using MODIS-EVI Data and Symlet11 Wavelet in Northeast China
849
Detecting Major Segmentation Errors for a Tracked Person Using Colour Feature Analysis
850
Detecting Malicious Activities Using Backward Propagation of Trustworthiness over Heterogeneous Social Graph
851
Detecting malicious ADS-B broadcasts using wide area multilateration
852
Detecting malicious ADS-B broadcasts using wide area multilateration
853
Detecting malicious ADS-B transmitters using a low-bandwidth sensor network
854
Detecting malicious Android applications from runtime behavior
855
Detecting malicious beacon nodes for secure localization in distributed wireless networks
856
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
857
Detecting malicious behavior in a vehicular DTN for public transportation
858
Detecting Malicious Behavior in Cooperative Diversity
859
Detecting Malicious Behavior Using Critical API-Calling Graph Matching
860
Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information
861
Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks
862
Detecting malicious executable file via graph comparison using support vector machine
863
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces
864
Detecting malicious groups of agents
865
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
866
Detecting malicious HTTP redirections using trees of user browsing activity
867
Detecting malicious inclusions in secure hardware: Challenges and solutions
868
Detecting Malicious Inputs of Web Application Parameters Using Character Class Sequences
869
Detecting malicious JavaScript code in Mozilla
870
Detecting Malicious Javascript in PDF through Document Instrumentation
871
Detecting malicious landing pages in Malware Distribution Networks
872
Detecting Malicious Logic Through Structural Checking
873
Detecting Malicious Manipulation in Grid Environments
874
Detecting malicious manipulation of synchrophasor data
875
Detecting malicious modifications of data in third-party intellectual property cores
876
Detecting malicious nodes in MANET using rateless codes for maximum content distribution
877
Detecting malicious nodes in RSS-based localization
878
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
879
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
880
Detecting Malicious Packet Losses
881
Detecting malicious peers in a reputation-based peer-to-peer system
882
Detecting Malicious Peers in Overlay Multicast Streaming
883
Detecting Malicious Queries from Search Engine Traffic
884
Detecting malicious rootkit web pages in high-interaction client honeypots
885
Detecting malicious tweets in trending topics using clustering and classification
886
Detecting Malicious Websites by Learning IP Address Features
887
Detecting Malicious Witness Reports in Multi-agent Systems
888
Detecting malware and evaluating risk of app using Android permission-API system
889
Detecting Malware and Rootkit via Memory Forensics
890
Detecting Malware for Android Platform: An SVM-Based Approach
891
Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic
892
Detecting malware variants via function-call graph similarity
893
Detecting malware with similarity to Android applications
894
Detecting mammography of breast microcalcification with SOL-based self-organization neural network
895
Detecting Mango Fruits by Using Randomized Hough Transform and Backpropagation Neural Network
896
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
897
Detecting Man-in-the-Middle Attacks by Precise Timing
898
Detecting Manipulation in Cup and Round Robin Sports Competitions
899
Detecting man-made features in SAR imagery
900
Detecting man-made noise by using its wideband characteristic
901
Detecting Man-made Objects In Low Resolution Sar Using Fractal Texture Discriminators
902
Detecting Man-Made Structures and Changes in Satellite Imagery With a Content-Based Information Retrieval System Built on Self-Organizing Maps
903
Detecting Marine Oil Spill Pollution Based on Borda Count Method of Ocean Water Surface Image
904
Detecting Markers in Blurred and Defocused Images
905
Detecting Masqueraders Using High Frequency Commands as Signatures
906
Detecting masquerading attack in software and in hardware
907
Detecting Masquerading Users in a Document Management System
908
Detecting mass and its region in mammograms using mean shift segmentation and Iris Filter
909
Detecting masses in digital mammograms based on texture analysis and neural classifier
910
Detecting matrices for random CDMA systems
911
Detecting matrix multiplication faults in many-core systems
912
Detecting maximal directional changes in spatial fMRI response using canonical correlation analysis
913
Detecting Mean Changes in Data Streams
914
Detecting mechanical problems by examining variable speed drive signals
915
Detecting Mechanoluminescence From ZnS:Mn Powder Using a High Speed Camera
916
Detecting Media Format Support of the Media Renderer with Microsoft DirectShow
917
Detecting melanoma in dermoscopy images using scale adaptive local binary patterns
918
Detecting membrane lipid microdomains by two-photon fluorescence microscopy
919
Detecting memory faults in the presence of bit line coupling in SRAM devices
920
Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis
921
Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards
922
Detecting mental EEG properties using detrended fluctuation analysis
923
Detecting mental states of alertness with genetic algorithm variable selection
924
Detecting merging and splitting using origin analysis
925
Detecting metadata bugs on the fly
926
Detecting metamorphic malware by using behavior-based aggregated signature
927
Detecting method for drivers´ drowsiness applicable to individual features
928
Detecting method of music to match the user’s mood in prefrontal cortex EEG activity using the GA
929
Detecting Method of Parallelism from Nested Loops with Loop Carried Data Dependences
930
Detecting Method of Quantitative Colloidal Gold Test Strip Concentration Based on the DSP Image Processing
931
Detecting Method of Weak Sine Signal with Initial Phase
932
Detecting Method on Illegal Use Using PCA under HER Environment
933
Detecting Methods of Harmonic in Power System Based on Wavelet Transform
934
Detecting methods of reactive power and harmonic current in electrified railway systems
935
Detecting microcalcification clusters in digital mammograms using combination of wavelet and neural network
936
Detecting Microcalcifications in Digital Mammograms using Wavelet Domain Hidden Markov Tree Model
937
Detecting micro-calcifications in mammograms by using an intelligent computer-aided detection algorithm
938
Detecting micro-particles of explosives at ten meters using selective stimulated Raman scattering
939
Detecting microscopic defects in aged thermoplastic using thermoelastic technique
940
Detecting microtubules in high noise Cryo-EM micrograph
941
Detecting mild cognitive loss with continuous monitoring of medication adherence
942
Detecting mild traumatic brain injury using dynamic low level context
943
Detecting minute faults by laser
944
Detecting mirror-symmetry of a volumetric shape from its single 2D image
945
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets
946
Detecting Misbehavior in Online Video Chat Services
947
Detecting misbehavior node in Wifi networks by co-ordinated sampling of network monitoring
948
Detecting misbehavior nodes and trust levels in manets
949
Detecting misbehavior routing and attacks in disruption tolerant network using itrm
950
Detecting misbehaviour in WiFi using multi-layer metric data fusion
951
Detecting Mismapping in Cross-Directional Control Systems
952
Detecting misrecognitions and out-of-vocabulary words
953
Detecting misreporting attacks to the proportional fair scheduler
954
Detecting missing signals in multichannel recordings by using higher order statistics
955
Detecting Misused Keys in Wireless Sensor Networks
956
Detecting MITM Based on Challenge Request Protocol
957
Detecting mitochondria in intracellular images with nonstationary indicator kriging
958
Detecting MMN in Infants EEG with Singular Value Decomposition
959
Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code
960
Detecting mode hopping in semiconductor lasers by monitoring intensity noise
961
Detecting model inconsistency through operation-based model construction
962
Detecting model-plant mismatch without external excitation
963
Detecting modes in fed-batch fermented process. Application to Escherichia Coli Cultivation
964
Detecting Modularity "Smells" in Dependencies Injected with Java Annotations
965
Detecting Modularity Flaws of Evolving Code: What the History Can Reveal?
966
Detecting moldy Bread using an E-nose and the KNN classifier
967
Detecting molecules using a surface impedance imaging technique
968
Detecting more independent loops across hierarchical structures
969
Detecting Motion Artifact ECG Noise During Sleeping by Means of a Tri-axis Accelerometer
970
Detecting motion from noisy scenes using Genetic Programming
971
Detecting motion in out-of-register pictures
972
Detecting motion intention in stroke survivors using autonomic nervous system responses
973
Detecting motion object by spatio-temporal entropy
974
Detecting motion on center manifolds from a time series-an example
975
Detecting Motion Patterns in Dynamic Crowd Scenes
976
Detecting Motion Patterns via Direction Maps with Application to Surveillance
977
Detecting Motion Regions in the Presence of a Strong Parallax from a Moving Camera by Multiview Geometric Constraints
978
Detecting Motion through Dynamic Refraction
979
Detecting motion using the Structure-Texture Image Decomposition and Space-Time Interest Points
980
Detecting motor bearing faults
981
Detecting move operations in versioning information
982
Detecting movement intent from scalp EEG in a novel upper limb robotic rehabilitation system for stroke
983
Detecting Movement of Beacons in Location-Tracking Wireless Sensor Networks
984
Detecting movement type by route segmentation and classification
985
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks
986
Detecting moving humans using color and infrared video
987
Detecting Moving Object Using Background Subtraction Algorithm in FPGA
988
Detecting Moving Objects by Ant Colony System in a MAP-MRF Framework
989
Detecting moving objects from a moving platform
990
Detecting moving objects from dynamic background with shadow removal
991
Detecting moving objects from omnidirectional dynamic images based on adaptive background subtraction
992
Detecting moving objects from slowly moving viewpoint for automotive rear view camera systems
993
Detecting moving objects in airborne forward looking infra-red sequences
994
Detecting Moving Objects Using a Camera on a Moving Platform
995
Detecting moving objects using the rigidity constraint
996
Detecting moving objects, ghosts, and shadows in video streams
997
Detecting Moving Shadows in Video Sequences Using Region Level Evaluation for Vision-Based Vehicle Detection
998
Detecting moving shadows: algorithms and evaluation
999
Detecting moving spheres in 3D point clouds via the 3D velocity Hough Transform
1000
Detecting moving target based on reflectivity displacement method and wavelet transform
بازگشت