<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Exploiting spatial diversity in multiagent reinforcement learning based spectrum sensing
2
Exploiting spatial diversity in rate adaptive WLANs with relay infrastructure
3
Exploiting spatial domain and wavelet domain cumulants for fusion of SAR and optical images
4
Exploiting spatial indexes for semijoin-based join processing in distributed spatial databases
5
Exploiting Spatial Information in Datasets to Enable Fault Tolerant Sparse Matrix Solvers
6
Exploiting spatial information in semi-supervised hyperspectral image segmentation
7
Exploiting Spatial Interference Alignment and Opportunistic Scheduling in the Downlink of Interference-Limited Systems
8
Exploiting spatial locality in data caches using spatial footprints
9
Exploiting Spatial Locality to Improve Disk Efficiency in Virtualized Environments
10
Exploiting spatial locality to improve peer-to-peer system performance
11
Exploiting spatial parallelism in Ethernet-based cluster interconnects
12
Exploiting Spatial Redundancy in Pixel Domain Wyner-Ziv Video Coding
13
Exploiting Spatial Redundancy of Image Sensor for Motion Robust rPPG
14
Exploiting spatial regularity in irregular iterative applications
15
Exploiting spatial reuse gain through joint mode selection and resource allocation for underlay device-to-device communications
16
Exploiting Spatial Separations in CDMA Systems With Correlation Constrained Sets of Hadamard Matrices
17
Exploiting Spatial Smoothness in HPC Applications to Detect Silent Data Corruption
18
Exploiting spatial smoothness to recover undecoded coefficients for transform domain distributed video coding
19
Exploiting spatial sparsity for estimating channels of hybrid MIMO systems in millimeter wave communications
20
Exploiting spatial spectrum holes in multiuser MIMO systems
21
Exploiting Spatial Statistics of Primary and Secondary Users towards Improved Cognitive Radio Networks
22
Exploiting Spatial Uncertainty to Reduce Forward Computation Cost in Optimistic Simulations
23
Exploiting Spatial, Frequency, and Multiuser Diversity in 3GPP LTE Cellular Networks
24
Exploiting spatiality, motility and interactivity: a relationship-centric Flash retrieval model
25
Exploiting spatiotemporal and device contexts for energy-efficient mobile embedded systems
26
Exploiting spatio-temporal correlation for rate-efficient transmit beamforming
27
Exploiting spatio-temporal information for view recognition in cardiac echo videos
28
Exploiting Spatio-Temporal Scene Structure for Wide-Area Activity Analysis in Unconstrained Environments
29
Exploiting Spatio-temporal Tradeoffs for Energy-Aware MapReduce in the Cloud
30
Exploiting Spatio-Temporal Tradeoffs for Energy-Aware MapReduce in the Cloud
31
Exploiting speaker segmentations for automatic role detection. An application to broadcast news documents
32
Exploiting spectral and space information in classification of high resolution urban satellites images using Haralick features and SVM
33
Exploiting spectral and spatial information for classifying hyperspectral data in urban areas
34
Exploiting spectral and spatial information in hyperspectral urban data with high resolution
35
Exploiting spectral leakage for spectrogram frequency super-resolution
36
Exploiting Spectral Regrowth for Channel Identification
37
Exploiting Spectral Reuse in Resource Allocation, Scheduling, and Routing for IEEE 802.16 Mesh Networks
38
Exploiting Spectral Reuse in Routing, Resource Allocation, and Scheduling for IEEE 802.16 Mesh Networks
39
Exploiting spectral-spatial proximity for classification of hyperspectral data on manifolds
40
Exploiting Spectrum Heterogeneity in Dynamic Spectrum Market
41
Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks
42
Exploiting Speculative Thread-Level Parallelism Based on Transactional Memory
43
Exploiting speech production information for automatic speech and speaker modeling and recognition - possibilities and new opportunities
44
Exploiting speech source information for vowel landmark detection for low resource language
45
Exploiting speech/gesture co-occurrence for improving continuous gesture recognition in weather narration
46
Exploiting spike-based dynamics in a silicon cochlea for speaker identification
47
Exploiting Spin Echo Decay in the Detection of Nuclear Quadrupole Resonance Signals
48
Exploiting SPM-aware Scheduling on EPIC architectures for high-performance real-time systems
49
Exploiting SPMD Horizontal Locality
50
Exploiting SSD parallelism to accelerate application launch on SSDs
51
Exploiting stabilizers and parallelism in state space generation with the symmetry method
52
Exploiting stable and discriminative iris weight map for iris recognition under less constrained environment
53
Exploiting stable features for iris recognition of defocused images
54
Exploiting Staleness for Approximating Loads on CMPs
55
Exploiting state encoding for invariant generation in induction-based property checking
56
Exploiting state equivalence on the fly while applying code motion and speculation
57
Exploiting state obfuscation to detect hardware trojans in NoC network interfaces
58
Exploiting state of the art WDM-PON technologies for building efficient FTTC networks
59
Exploiting State-of-the-Art x86 Architectures in Scientific Computing
60
Exploiting static and dynamic locality of timing errors in robust L1 cache design
61
Exploiting statically schedulable regions in dataflow programs
62
Exploiting statistical and outdated CSI in multiuser downlink transmission
63
Exploiting statistical and outdated CSI in multiuser downlink transmission
64
Exploiting statistical and semantic information for document clustering: An evaluation on feature selection
65
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery
66
Exploiting statistical information for implementation of instruction scratchpad memory in embedded system
67
Exploiting statistical interference models for distributed resource allocation in cognitive femtocells
68
Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment
69
Exploiting STI stress for performance
70
Exploiting Stick and Slip in Nanofluidics
71
Exploiting stochastic delay variability on FPGAs with adaptive partial rerouting
72
Exploiting stochastic process algebra achievements for generalized stochastic Petri nets
73
Exploiting Stochastic Resonance to Enhance the Performance of Digital Bang-Bang PLLs
74
Exploiting Storage Class Memory to reduce energy consumption in mobile multimedia devices
75
Exploiting story-level context to improve video search
76
Exploiting strain-hardening of tissue to increase contrast in elasticity imaging
77
Exploiting Stream Request Locality to Improve Query Throughput of a Data Integration System
78
Exploiting streams in instruction and data address trace compression
79
Exploiting Stroke Orientation for CRF Based Binarization of Historical Documents
80
Exploiting structural complexity for robust and rapid hyperspectral imaging
81
Exploiting structural constraints for accurate image registration
82
Exploiting structural duplication for lifetime reliability enhancement
83
Exploiting structural redundancy of SIMD accelerators for their built-in self-testing/diagnosis and reconfiguration
84
Exploiting structural relationships in audio music signals using Markov Logic Networks
85
Exploiting structure for intelligent Web search
86
Exploiting structure in a projective algorithm for solving strict linear matrix inequalities
87
Exploiting structure in an AIG based QBF solver
88
Exploiting structure in fast aerial image computation for integrated circuit patterns
89
Exploiting structure in positioning of nonsymmetric signals
90
Exploiting structure in sum of squares programs
91
Exploiting structure in symmetry detection for CNF
92
Exploiting structure in two-armed manipulation tasks for humanoid robots
93
Exploiting Structure in Wavelet-Based Bayesian Compressive Sensing
94
Exploiting structure of spatio-temporal correlation for detection in Wireless Sensor Networks
95
Exploiting structure periodicity and symmetry in capacitance calculations for three dimensional multiconductor systems
96
Exploiting Structure Recurrence in XML Processing
97
Exploiting Structured Linked Data in Enterprise Knowledge Management Systems: An Idea Management Case Study
98
Exploiting Structured Sparsity for Image Deblurring
99
Exploiting structured sparsity in Bayesian experimental design
100
Exploiting Structures Of Nonlinear parametric perturbations For Robust Stability
101
Exploiting STT-NV technology for reconfigurable, high performance, low power, and low temperature functional unit design
102
Exploiting Student-Project Allocation Matching for Spectrum Sharing in LTE-Unlicensed
103
Exploiting subarrays inside a bank to improve phase change memory performance
104
Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks
105
Exploiting subcarrier correlation for blind channel estimation in block preceded OFDM systems
106
Exploiting subclass information in one-class support vector machine for video summarization
107
Exploiting subclass information in Support Vector Machines
108
Exploiting Sub-threshold and above-threshold characteristics in a silver-enhanced gold nanoparticle based biochip
109
Exploiting super peers for large-scale peer-to-peer Wi-Fi roaming
110
Exploiting superpages in a nonvolatile memory file system
111
Exploiting Surface, Content and Relevance Features for Learning-Based Extractive Summarization
112
Exploiting surrogate constraint analysis for fixing variables in both bounds for multidimensional knapsack problems
113
Exploiting suspected redundancy without proving it
114
Exploiting SWCNT structural variability towards the development of a photovoltaic device
115
Exploiting switching transients for broken rotor bar detection in inverter-fed induction machines at all operating conditions
116
Exploiting symbolic dynamics in chaos coded communications with maximum a posteriori algorithm
117
Exploiting symbolic techniques for partial scan flip flop selection
118
Exploiting Symbolic Techniques in Automated Synthesis of Distributed Programs with Large State Space
119
Exploiting symbolic techniques within genetic algorithms for power optimization
120
Exploiting symmetries and extrusions for grasping household objects
121
Exploiting symmetries for low-cost comparison of file copies
122
Exploiting Symmetries to Speed Up SAT-Based Boolean Matching for Logic Synthesis of FPGAs
123
Exploiting symmetries to test programs
124
Exploiting symmetry for partitioning models in parallel discrete event simulation
125
Exploiting symmetry for the distributed control of spatially interconnected systems
126
Exploiting symmetry in channel shortening equalizers
127
Exploiting symmetry in computing polyhedral bounds on network coding rate regions
128
Exploiting symmetry in SAT-based boolean matching for heterogeneous FPGA technology mapping
129
Exploiting symmetry in the extraction of electrical packaging parameters
130
Exploiting symmetry in the synthesis of supervisors for discrete event systems
131
Exploiting symmetry in the synthesis of supervisors for discrete event systems
132
Exploiting Symmetry in Transmission Lines for Transmission Switching
133
Exploiting symmetry in two-dimensional clustering-based discriminant analysis for face recognition
134
Exploiting symmetry of discrete-event systems with parallel components by relabeling
135
Exploiting symmetry when verifying transistor-level circuits by symbolic trajectory evaluation
136
Exploiting symmetry when verifying transistor-level circuits by symbolic trajectory evaluation: a summary
137
Exploiting Synchronicity for Immediate Feedback in Self-Stabilizing PIF Algorithms
138
Exploiting Synchronization Properties of Correlated Electron Devices in a Non-Boolean Computing Fabric for Template Matching
139
Exploiting synchronous placement for asynchronous circuits onto commercial FPGAs
140
Exploiting synchrony spectra and deep neural networks for noise-robust automatic speech recognition
141
Exploiting Synergies between Static Analysis and Model-Based Testing
142
Exploiting synergies of multiple crossovers: initial studies
143
Exploiting syntactic and semantic information in coarse chinese question classification
144
Exploiting Syntactic and Shallow Semantic Kernels to Improve Random Walks for Complex Question Answering
145
Exploiting syntactic, semantic and lexical regularities in language modeling via directed Markov random fields
146
Exploiting System Knowledge to Improve ECOC Reject Rules
147
Exploiting systemic biological modeling for trigger based adaptation in networked intelligent multi-agent systems
148
Exploiting system-level parallelism in the application development on a reconfigurable computer
149
Exploiting Tag Relations to Improve Search in Collaborative Tagging Systems
150
Exploiting Tag-based Path Diversity in the DLG-Kautz network
151
Exploiting Tags and Social Profiles to Improve Focused Crawling
152
Exploiting tags for concept extraction and information integration
153
Exploiting task and data parallelism in parallel Hough and Radon transforms
154
Exploiting Task Intervals for Whole Body Robot Control
155
Exploiting Task Order Information for Optimizing Sequentially Consistent Java Programs
156
Exploiting task redundancy in industrial manipulators during drilling operations
157
Exploiting task regularities to transform between reference frames in robot teams
158
Exploiting Task-Parallelism on GPU Clusters via OmpSs and rCUDA Virtualization
159
Exploiting TCP Vegas´ algorithm to improve real-time multimedia applications
160
Exploiting telecommunications to deliver real time transport information
161
Exploiting temperature dependency in the detection of NQR signals
162
Exploiting temperature dependency in the detection of NQR signals [land mine detection applications]
163
Exploiting Template Metaprogramming to customize an object-oriented operating system
164
Exploiting Temporal and Inter-concept Co-occurrence Structure to Detect High-Level Features in Broadcast Videos
165
Exploiting Temporal and Social Factors for B2B Marketing Campaign Recommendations
166
Exploiting temporal and spatial coherence in hierarchical visibility algorithms
167
Exploiting temporal and spatial constraints on distributed shared objects
168
Exploiting temporal and spatial correlation in wireless sensor networks
169
Exploiting temporal change of pitch in formant estimation
170
Exploiting Temporal Channel Correlation in Opportunistic SD-OFDMA
171
Exploiting temporal coherence in final gathering for dynamic scenes
172
Exploiting temporal coherence in scene analysis for autonomous navigation
173
Exploiting temporal coherence in speech for data-driven feature extraction
174
Exploiting temporal complex network metrics in mobile malware containment
175
Exploiting temporal correlation in shape coding
176
Exploiting Temporal Correlation of Sparse Signals in Wireless Sensor Networks
177
Exploiting Temporal Correlation of Speech for Error Robust and Bandwidth Flexible Distributed Speech Recognition
178
Exploiting temporal decoupling to accelerate trace-driven NoC emulation
179
Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks
180
Exploiting Temporal Geometry for Moving Camera Background Subtraction
181
Exploiting temporal idleness to reduce leakage power in programmable architectures
182
Exploiting temporal independence in distributed preemptive circuit simulation
183
Exploiting temporal loads for low latency and high bandwidth memory
184
Exploiting temporal locality in network traffic using commodity multi-cores
185
Exploiting temporal redundancy for efficient data transmission over wireless sensor networks
186
Exploiting Temporal Redundancy of Visual Structures for Video Compression
187
Exploiting Temporal Statistics for Events Analysis and Understanding
188
Exploiting temporal uncertainty in parallel and distributed simulations
189
Exploiting temporal uncertainty in process-oriented distributed simulations
190
Exploiting temporal uncertainty in the distributed simulation of time Petri nets
191
Exploiting temporal uncertainty in time warp simulations
192
Exploiting temporal-jitter to counteract DPA attacks in variable-latency pipelines
193
Exploiting ten years of MERIS data over land surfaces
194
Exploiting Term Relations for Semantic Hierarchy Construction
195
Exploiting test resource optimization in data path synthesis for BIST
196
Exploiting test technology in the field test environment
197
Exploiting text content in image search by semi-supervised learning techniques
198
Exploiting text generation techniques in the provision of help
199
Exploiting Text Mining Techniques for Contextual Recommendations
200
Exploiting text mining techniques in the analysis of execution traces
201
Exploiting Text-Related Features for Content-based Image Retrieval
202
Exploiting textual descriptions and dependency graph for searching mathematical expressions in scientific papers
203
Exploiting the “doddington zoo” effect in biometric fusion
204
Exploiting the 1/f structure of neural signals for the design of integrated neural amplifiers
205
Exploiting the 60 GHz band for local wireless multimedia access: prospects and future directions
206
Exploiting the advantages of object oriented programming in the implementation of a database design environment
207
Exploiting the advantages of object-based DSM in a heterogeneous cluster environment
208
Exploiting the ambiguity domain for non-stationary biomedical signal classification
209
Exploiting the Analogy Between Traces and Signal Processing
210
Exploiting the anomaly detection for high dimensional data using descriptive approach of data mining
211
Exploiting the Area X Performance Trade-off with Code Compression
212
Exploiting the Associated Information to Locate Mobile Users in Ubiquitous Computing Environment
213
Exploiting the attenuation of fiber-optic passive taps to create large high-capacity LANs and MANs
214
Exploiting the background debugging mode in a fault injection system
215
Exploiting the Bandwidth-Distance Relationship in Underwater Acoustic Networks
216
Exploiting the baseband phase structure of the voiced speech for speech enhancement
217
Exploiting the behavior of ready instructions for power benefits in a dynamically scheduled embedded processor
218
Exploiting the Benefits of an Electronic Identity Card in an Interactive Television Environment
219
Exploiting the benefits of multiple-path network in DSM systems: architectural alternatives and performance evaluation
220
Exploiting the benefits of virtual concatenation in optical transport networks
221
Exploiting the Body of MOS Devices for High Performance Analog Design
222
Exploiting the brownian bridge technique to improve longstaff-schwartz american option pricing on FPGA systems
223
Exploiting the cache capacity of a single-chip multi-core processor with execution migration
224
Exploiting the cancer and diabetes metabolic connection for therapeutic purposes
225
Exploiting the cannibalistic traits of Reed-Solomon codes
226
Exploiting the capabilities of communications co-processors
227
Exploiting the Capacity of Multichannel Multiradio Wireless Mesh Networks
228
Exploiting the Capture Effect for Collision Detection and Recovery
229
Exploiting the capture effect opportunistically in MANETs
230
Exploiting the capture effect to improve WLAN throughput
231
Exploiting the channel division multiple access for MBOFDM over 802.15.3a model
232
Exploiting the character of memory accesses to achieve lower power consumption of the data TLB
233
Exploiting the characteristics of paraffin as a substrate for UHF RFID and antenna applications
234
Exploiting the cloning capability of Mobile Agents for cost-effective data fusion in wireless sensor networks
235
Exploiting the cognitive synergy between different media modalities in multimodal information retrieval
236
Exploiting the common structure of some edge linking algorithms: an experimental study
237
Exploiting the common-mode signal in xDSL
238
Exploiting the Concept of Activity for Dynamic Reconfiguration of Distributed Simulation
239
Exploiting the concept of conditional, transversal Lyapunov exponents for study of synchronization of chaotic circuits
240
Exploiting the concept of traffic shaping to improve distributed systems under node dynamics
241
Exploiting the Congestion Control Behavior of the Transmission Control Protocol
242
Exploiting the convex-concave penalty for tracking: A novel dynamic reweighted sparse Bayesian learning algorithm
243
Exploiting the Correspondence between Micro Patterns and Class Names
244
Exploiting the Cramér-Rao bound for optimised sampling and quantisation of FRI signals
245
Exploiting the CRC-CCITT code on the binary erasure channel
246
Exploiting the cross-correlation of RGB-channels for robust watermarking of color images
247
Exploiting the cyclic prefix for beamforming in OFDM receivers
248
Exploiting the DASH Framework to Promote a Dynamic Transport Selection for Video Streaming over LTE Networks
249
Exploiting the data parallelism of subset equational languages
250
Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing
251
Exploiting the data-rate potential of MIMO channels: multi-stratum space-time coding
252
Exploiting the debug interface to support on-line test of control flow errors
253
Exploiting the deep learning paradigm for recognizing human actions
254
Exploiting the Deep-Link Commentsphere to Support Non-Linear Video Access
255
Exploiting the dependencies in information fusion
256
Exploiting the dependency of the doppler spectrum on the position and insonation direction of an intra-vascular doppler wire to estimate volumetric flow
257
Exploiting the development of robotic hands
258
Exploiting the Direct Link in Full-Duplex Amplify-and-Forward Relaying Networks
259
Exploiting the directional features in MPEG-2 for H.264 intra transcoding
260
Exploiting the Diversity Gain of Transmitter I/Q Imbalance in Single-Antenna OFDM Systems
261
Exploiting the Doppler effect in GPS to monitor signal integrity and to detect spoofing
262
Exploiting the Dual Nature of Sensitivity Labels
263
Exploiting the dynamics of a robotic manipulator for control of UAVs
264
Exploiting the early diffusive part of the pulse in object detection in random media
265
Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design
266
Exploiting the Effects of Human Hands on the Radiation Characteristics for the Implementation of Self-adaptive Feed Circuit of Offset-fed Slot Antennas in Parallel for the Reception of Digital Terrestrial TV Broadcasting
267
Exploiting the elevation dimension of MIMO system for boosting handset capacity
268
Exploiting the Essential Assumptions of Analogy-Based Effort Estimation
269
Exploiting the existence of temporal heart-rate patterns for the detection of trauma-induced hemorrhage
270
Exploiting the Fine Grain SSD Internal Parallelism for OLTP and Scientific Workloads
271
Exploiting the finite-alphabet property for cooperative relays
272
Exploiting the FIWARE cloud platform to develop a remote patient monitoring system
273
Exploiting the flexibility of MAC layer in WiMAX networks for improved data and VoIP traffic
274
Exploiting the Focus of the Document for Enhanced Entities´ Sentiment Relevance Detection
275
Exploiting the forecast channels for power allocation in High-Speed Railway communications
276
Exploiting the forgiving nature of applications for scalable parallel execution
277
Exploiting the full potential of multi-AP diversity in centralized WLANs through back-pressure scheduling
278
Exploiting the full potential of Two-Bit Transform based motion estimation
279
Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic Topic Modeling
280
Exploiting the functional training approach in Radial Basis Function networks
281
Exploiting the generic view assumption to estimate scene parameters
282
Exploiting the Geometry of Gene Expression Patterns for Unsupervised Learning
283
Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure
284
Exploiting the graph description of indoor layout for ray persistency modeling in moving channel
285
Exploiting the harmonic structure for speech enhancement
286
Exploiting the height of vehicles in vehicular communication
287
Exploiting the high-frequency performance of low-voltage low-power SC filters
288
Exploiting the Human Factor in a WSN-Based System for Ambient Intelligence
289
Exploiting the Human–Machine Gap in Image Recognition for Designing CAPTCHAs
290
Exploiting the imperfect knowledge of reference nodes positions in range based positioning systems
291
Exploiting the implications of choices in set partitioning
292
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations
293
Exploiting the Information at the Loop Closure in SLAM
294
Exploiting the Information Web
295
Exploiting the inherent parallelisms of back-propagation neural networks to design a systolic array
296
Exploiting the initial and the final conditions for the alternating minimization algorithm
297
Exploiting the Institution
298
Exploiting the Inter-cluster Record Reuse for Stream Processors
299
Exploiting the Interference Diversity Gain in Frequency Domain: The UMTS LTE Scenario
300
Exploiting the Internet of Things for Systems Engineering: Breaking Down the Barriers between Siloed Engineering Teams
301
Exploiting the Interplay between Memory and Flash Storage in Embedded Sensor Devices
302
Exploiting the Intranet
303
Exploiting the joint distribution of amplitude and monopulse ratio for chi-square fluctuating targets for target DOA estimation
304
Exploiting the JPEG compression scheme for image retrieval
305
Exploiting the large dimensions of space-time systems
306
Exploiting the link between action and perception: Minimally assisted robotic training of the kinesthetic sense
307
Exploiting the locality of data structures in multithreaded architecture
308
Exploiting the locality of memory references to reduce the address bus energy
309
Exploiting the loss-frequency relationship using RF communication in Underwater communication networks
310
Exploiting the MAC layer flexibility of WiMAX to systematically enhance TCP performance
311
Exploiting the Manhattan-world assumption for extrinsic self-calibration of multi-modal sensor networks
312
Exploiting the map metaphor in a tool for software evolution
313
Exploiting the multilevel parallelism and the problem structure in the numerical solution of stiff ODEs
314
Exploiting the Multi-Path Diversity and Multi-User Cooperation to Detect OFDM Signals for Cognitive Radio in Low SNR with Noise Uncertainty
315
Exploiting the multiplicative nature of fluoroscopic image stochastic noise to enhance calcium imaging recording quality
316
Exploiting the nature of extrinsic information in iterative decoding
317
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments
318
Exploiting the on-chip inductance in high-speed clock distribution networks
319
Exploiting the Operating Point in Sensing-Based Opportunistic Spectrum Access Scenarios
320
Exploiting the optical bandwidth in WDM passive optical networks for local access
321
Exploiting the Optical Quadratic Nonlinearity of Zinc-Blende Semiconductors for Guided-Wave Terahertz Generation: A Material Comparison
322
Exploiting the Order Book for Mass Customized Manufacturing Control Systems With Capacity Limitations
323
Exploiting the overlap of security and fault-tolerance
324
Exploiting the parallel divide-and-conquer method to solve the symmetric tridiagonal eigenproblem
325
Exploiting the parallelism available in loops
326
Exploiting the parallelism of heterogeneous systems using dataflow graphs on top of OpenCL
327
Exploiting the parallelism of large-scale application-layer networks by adaptive GPU-based simulation
328
Exploiting the Path Propagation Time Differences in Multipath Transmission with FEC
329
Exploiting the Path Propagation Time Differences in Multipath Transmission with FEC
330
Exploiting the Performance of 32 bit Floating Point Arithmetic in Obtaining 64 bit Accuracy (Revisiting Iterative Refinement for Linear Systems)
331
Exploiting the periodic beacon transmissions in channel link quality periodicity
332
Exploiting the Personal Computer in the Research Laboratory
333
Exploiting the Phantom-Mode Signal in DSL Applications
334
Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks]
335
Exploiting the pilot pattern orthogonality of OFDMA signals for the estimation of base stations number of antennas
336
Exploiting the polarimetric information for the detection of ship targets in non-homogeneous SAR images
337
Exploiting the potential of auditory preprocessing for robust speech recognition by locally recurrent neural networks
338
Exploiting the power of DAB
339
Exploiting the power of genetic algorithm in optimization of distribution networks
340
Exploiting the Power of GPUs for Multi-gigabit Wireless Baseband Processing
341
Exploiting the Power of Multiplicity: A Holistic Survey of Network-Layer Multipath
342
Exploiting the Power of Stereo Confidences
343
Exploiting the predictability of TCP´s steady-state behavior to speed up network simulation
344
Exploiting the preferred domain of FDD massive MIMO systems with uniform planar arrays
345
Exploiting the process capability of position geometric tolerance according GD&T ASME Y14.5M
346
Exploiting the process capability of profile tolerance according GD&T ASME-Y14.5M
347
Exploiting the Properties of Query Workload and File Name Distributions to Improve P2P Synopsis-Based Searches
348
Exploiting the quantum structure of optical solitons
349
Exploiting the Radial Distribution Structure in Developing a Fast and Flexible Radial Power Flow for Unbalanced Three-Phase Networks
350
Exploiting the reconfigurability of the PAnDA architecture to overcome physical substrate variations
351
Exploiting the redundancy for humanoid robots to dynamically step over a large obstacle
352
Exploiting the relationship between IA networks and finite domain CSPs
353
Exploiting the relativistic formulation of maxwell´s equations to introduce moving grids into finite difference time domain solvers
354
Exploiting the relativistic formulation of Maxwell´s equations to introduce moving grids into finite difference time domain solvers
355
Exploiting the residual redundancy in motion estimation vectors to improve the quality of compressed video transmitted over noisy channels
356
Exploiting the routing flexibility for energy/performance aware mapping of regular NoC architectures
357
Exploiting the Saturation Effect in Automatic Random Testing of Android Applications
358
Exploiting the Search Computing paradigm in e-government
359
Exploiting the selfish gene algorithm for evolving cellular automata
360
Exploiting the Selfish Gene algorithm for evolving hardware cellular automata
361
Exploiting the Self-Organizing Map for Medical Image Segmentation
362
Exploiting the Self-Similarity in ERP Images by Nonlocal Means for Single-Trial Denoising
363
Exploiting the Semantic Web for Interactive Relationship Discovery in Technology Enhanced Learning
364
Exploiting the Semantic Web for unsupervised spoken language understanding
365
Exploiting the separability of linear and nonlinear parameters in radial basis function networks
366
Exploiting the shift property of structured LDPC codes for reduced-complexity sliced message passing based decoder design
367
Exploiting the Skin Effect Using Radio Frequency Communication in Underwater Communication
368
Exploiting the Small-World Effect for Resource Finding in P2P Grids/Clouds
369
Exploiting the SoC capability of high performance FPGAs - a video case study
370
Exploiting the Social Tagging Network for Web Clustering
371
Exploiting the solution structure knowledge to speed up non-learning planner
372
Exploiting the sources of parallelism in logic programs
373
Exploiting the spatial domain for high bit rate indoor communications
374
Exploiting the Spatial Information Provided by Channel Statistics and SNR Feedback
375
Exploiting the special structure of conflict and compatibility graphs in high-level synthesis
376
Exploiting the special structure of conflict and compatibility graphs in high-level synthesis
377
Exploiting the statechart in interactive learning systems authoring
378
Exploiting the statistical characteristic of the speech signals for an improved neural learning in a MLP neural network
379
Exploiting the structure of OSTBC´s to improve the robustness of worst-case optimization based linear multi-user MIMO receivers
380
Exploiting the structure of space-time codes
381
Exploiting the SVM constraints in NMF with application in eating and drinking activity recognition
382
Exploiting the symbiotic aspects of process and operational data for optimizing business processes
383
Exploiting the Symmetrical Characteristic of Faces to Classify Face Images
384
Exploiting the symmetry of the magnetic particle imaging system matrix
385
Exploiting the symmetry on the Jacobi method on a mesh of processors
386
Exploiting the Synergetic Relationship between Automobiles and Wireless Communications
387
Exploiting the synergies between Robotics and software engineering: A project-based laboratory
388
Exploiting the synergies of circular simplex turbo block coding and wavelet packet modulation
389
Exploiting the synergy between automated-test-generation and programming-by-contract
390
Exploiting the temporal coherence of motion for linking partial spatiotemporal trajectories
391
Exploiting the temporal dimension in QoS-aware multicast routing
392
Exploiting the temporal structure of MPEG video for the reduction of bandwidth requirements
393
Exploiting the third dimension in power electronics packaging
394
Exploiting the Thread-Level Parallelism for BGP on Multi-core
395
Exploiting the time-reversal operator for adaptive optics, selective focusing and scattering pattern analysis
396
Exploiting the Timing Channel to Increase Energy Efficiency in Wireless Networks
397
Exploiting the Tolerance of Massive MIMO to Incomplete CSI for Low-Complexity Transmission
398
Exploiting the topology property of social network for rumor detection
399
Exploiting the transient response of a Pirani gauge sensor for beyond atmospheric pressure measurement
400
Exploiting the transients of adaptation for RoQ attacks on Internet resources
401
Exploiting the Trifocal Tensor in Dynamic Pose Estimation for Visual Control
402
Exploiting the TTL Rule in Unstructured Peer-to-Peer Networks
403
Exploiting the UEP property of polar codes to reduce image distortions induced by transmission errors
404
Exploiting the uFLIP benchmark for analyzing SSDs performance
405
Exploiting the unexploited of coded caching for wireless content distribution
406
Exploiting the unicast functionality of the on-demand multicast routing protocol
407
Exploiting the unique intensity gradient of an orbital-angular-momentum beam for accurate receiver alignment monitoring in a free-space communication link
408
Exploiting the Use of DC SCOPF Approximation to Improve Iterative AC SCOPF Algorithms
409
Exploiting the use of information to improve coverage performance of robotic sensor networks
410
Exploiting the use of mobile technologies for chronic patients home distance monitoring
411
Exploiting the use of noncausal finite time interval data in iterative learning control law design
412
Exploiting the use of unmanned aerial vehicles to provide resilience in wireless sensor networks
413
Exploiting the use of VHDL specifications in the AGENDA high-level synthesis environment
414
Exploiting the Values of Shared Services
415
Exploiting the Versatility of Constraint Programming over Finite Domains to Integrate Product Line Models
416
Exploiting the virtue of redundancy
417
Exploiting the wireless RF fading for human activity recognition
418
Exploiting the wisdom of the crowd: localized, distributed information-centric VANETs [Topics in Automotive Networking]
419
Exploiting the x86 Architecture to Derive Virtual Machine State Information
420
Exploiting thermal energy storage to reduce data center capital and operating expenses
421
Exploiting thermal-area tradeoffs in high-level synthesis through resources number selection
422
Exploiting Thread-Level Parallelism in Functional Self-Testing of CMT Processors
423
Exploiting tightly-coupled cores
424
Exploiting time and frequency diversity by iterative decoding in OFDM-CDMA systems
425
Exploiting time and frequency diversity in IEEE 802.15.4 industrial networks for enhanced reliability and throughput
426
Exploiting time and frequency information for Delay/Doppler altimetry
427
Exploiting time and frequency masking in consistent sinusoidal analysis-synthesis
428
Exploiting time coherence in opportunistic beamforming for slow fading channels
429
Exploiting time diversity in spatially correlated channels for OFDM systems
430
Exploiting Time Diversity to Improve Block Spread OFDM in a Multipath Environment
431
Exploiting time of charge to achieve collision-free communications in WRSN
432
Exploiting time resolution in nanometre CMOS data converters
433
Exploiting Timed Automata based Fuzzy Controllers for voltage regulation in Smart Grids
434
Exploiting Timed Automata-based Fuzzy Controllers and data mining to detect computer network intrusions
435
Exploiting timed Petri net properties for distributed simulation partitioning
436
Exploiting timed transition relations in sequential cycle-based simulation of embedded systems
437
Exploiting Time-Domain Approach for Extremely High Q -Factor Measurement
438
Exploiting time-to-wavelength conversion for all-optical label processing
439
Exploiting timing channel in intra-body sensor networks
440
Exploiting T-junctions for depth segregation in single images
441
Exploiting TLM and Object Introspection for System-Level Simulation
442
Exploiting TLS Parallelism at Multiple Loop-Nest Levels
443
Exploiting Topic Thread Structures in a News Video Archive for the Semi-Automatic Generation of Video Summaries
444
Exploiting topography of neural maps: a case study on investment strategies for emerging markets
445
Exploiting topology and behavioral attributes for effective routing in mobile networks
446
Exploiting Total Order Multicast in Weakly Consistent Transactional Caches
447
Exploiting Traceability Uncertainty between Architectural Models and Code
448
Exploiting Tracking Area List for Improving Signaling Overhead in LTE
449
Exploiting Tractable Fuzzy and Crisp Reasoning in Ontology Applications
450
Exploiting traditional gameplay characteristics to enhance digital board games
451
Exploiting traffic dynamics in Power-Aware Logical Topology Design
452
Exploiting Traffic Sampling Techniques to Optimize Energy Efficiency in Mobile Peer Networks
453
Exploiting Traffic Scene Disparity Statistics for Stereo Vision
454
Exploiting traffic scheduling mechanisms to reduce transmission cost on mobile devices
455
Exploiting Trajectory-Based Coverage for Geocast in Vehicular Networks
456
Exploiting transaction semantics in multidatabase systems
457
Exploiting transfer learning for personalized view invariant gesture recognition
458
Exploiting Transitivity of Correlation for Fast Template Matching
459
Exploiting transmission spatial diversity in frequency selective systems with feedback channel
460
Exploiting transmitter I/Q imbalance for estimating the number of active users
461
Exploiting transparent remote memory access for non-contiguous- and one-sided-communication
462
Exploiting transponder performance in optical OFDM networks
463
Exploiting transport-block constraints in LTE improves downlink performance
464
Exploiting triangulated surface extraction using tetrahedral decomposition
465
Exploiting trivial and redundant computation
466
Exploiting trunked radio to support ITS network expansion and redundancy
467
Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks
468
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data
469
Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids
470
Exploiting Turkish Wikipedia as a semantic resource for text classification
471
Exploiting TV white spaces in Europe: The COGEU approach
472
Exploiting Twitter for Border Security-Related Intelligence Gathering
473
Exploiting two-case delivery for fast protected messaging
474
Exploiting Two-Wavelength Switching Capability of Silicon Photonic Microrings
475
Exploiting typical clinical imaging constraints for 3D outer bone surface segmentation
476
Exploiting typical DSP data access patterns and asynchrony for a low power multiported register bank
477
Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
478
Exploiting UEP in QAM-based BICM: interleaver and code design
479
Exploiting Ultrasonic Reflections for Improving Accuracy of Indoor Location Tracking
480
Exploiting UML and acceleo for developing Semantic Web Services
481
Exploiting UML Semantic Variation Points to Generate Explicit Component Interconnections in Complex Systems
482
Exploiting UML to model military organisation and military behaviour
483
Exploiting unbalanced thread scheduling for energy and performance on a CMP of SMT processors
484
Exploiting Uncertainties for Binaural Speech Recognition
485
Exploiting uncertainty in random sample consensus
486
Exploiting uncertainty in regression forests for accurate camera relocalization
487
Exploiting ungrounded tactile haptic displays for mobile robotic teleoperation
488
Exploiting unicast vs. multicast delivery tradeoffs to improve the latency performance for IPTV channel change
489
Exploiting Unique Characteristics of Mobile Backend Services to Recommend Right Ones
490
Exploiting unique polarisation characteristics at 60 GHz for fast beamforming high throughput MIMO WLAN systems
491
Exploiting uniqueness in query optimization
492
Exploiting university research [R&D management]
493
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
494
Exploiting Unknown Dynamics in Communications Amongst Coexisting Wireless Body Area Networks
495
Exploiting Unlabeled Ages for Aging Pattern Analysis on a Large Database
496
Exploiting unlabeled data for improving accuracy of predictive data mining
497
Exploiting Unlabeled Data to Enhance Ensemble Diversity
498
Exploiting Unsupervised and Supervised Constraints for Subspace Clustering
499
Exploiting Unsupervised Learning in Publish Subscribe System Design
500
Exploiting un-transcribed foreign data for speech recognition in well-resourced languages
501
Exploiting Untrustworthy Agents in Team Formation
502
Exploiting unused periodic time for aperiodic service using the extended priority exchange algorithm
503
Exploiting Unused Spare Columns to Improve Memory ECC
504
Exploiting upper and lower bounds in top-down query optimization
505
Exploiting use of a new performance metric for construction of robust and efficient wireless backbone network
506
Exploiting user and network context for intelligent radio network access
507
Exploiting user behaviour for context-aware power management
508
Exploiting user context information for energy management in enterprise femtocell networks
509
Exploiting user delay-tolerance to save energy in cellular network: An analytical approach
510
Exploiting User Demand Diversity in Heterogeneous Wireless Networks
511
Exploiting User Feedback for Expert Finding in Community Question Answering
512
Exploiting user feedback for language model adaptation in meeting recognition
513
Exploiting User Interest in Data-Driven Cloud-Based Mobile Optimization
514
Exploiting user labels with generalized distance transforms random field level sets
515
Exploiting user mobility for wireless content delivery
516
Exploiting user movement direction and hidden access point for smartphone localization
517
Exploiting user movement for position detection
518
Exploiting user movement patterns to enhance energy efficiency in wireless networks
519
Exploiting User Patience for Scaling Resource Capacity in Cloud Services
520
Exploiting user profiles to support differentiated services in next-generation wireless networks
521
Exploiting user profiles to support Differentiated Services in next-generation wireless networks
522
Exploiting User Tags to Build a Semantic Cultural Heritage Portal
523
Exploiting user´s social network: A novel method to recommend most attractive and targeted service
524
Exploiting user-group relationships for increasing concurrency in software engineering environments
525
Exploiting Users´ Personal and Public Information for Personal Photo Annotation
526
Exploiting V2G to optimize residential energy consumption with electrical vehicle (dis)charging
527
Exploiting VAA-Generated Data to Identify Policy Dimensions: The Case of England
528
Exploiting value locality for secure-energy aware communication
529
Exploiting value locality in physical register files
530
Exploiting value statistics for similar continuing tasks
531
Exploiting vanishing polynomials for equivalence verification of fixed-size arithmetic datapaths
532
Exploiting Variable Cycle Transmission for Energy-Efficient On-Chip Interconnect Design
533
Exploiting Variable length Teager Energy Operator in melcepstral features for person recognition from humming
534
Exploiting variable physical damping in rapid movement tasks
535
Exploiting variable-width features in large vocabulary speech recognition
536
Exploiting various information for knowledge element relation recognition
537
Exploiting Vector Map Properties for GIS Data Copyright Protection
538
Exploiting vector parallelism in software pipelined loops
539
Exploiting vehicle motion information in monocular SLAM
540
Exploiting vehicular communications for reducing CO2 emissions in urban environments
541
Exploiting vertical diversity in vehicular channel environments
542
Exploiting Vertical Handoffs in Next Generation Radio Resource Management
543
Exploiting Vertical Lines in Vision-Based Navigation for Mobile Robot Platforms
544
Exploiting Very-Wide Vector Processing for Scientific Applications
545
Exploiting VHDL-RTL features to reduce the complexity of power estimation in combinational circuits
546
Exploiting Videotext _Events_ for Improved Videotext Detection
547
Exploiting Virtual Addressing for Increasing Reliability
548
Exploiting Virtual Coordinates for Improved Routing Performance in Sensor Networks
549
Exploiting virtual experiments for the solution of inverse scattering problem
550
Exploiting virtual objects´ attributes and avatar´s behavior in DVEs partitioning
551
Exploiting virtual reality as a conceptual model for CSCW
552
Exploiting virtual reality for network management
553
Exploiting virtualization for delivering cloud-based IPTV services
554
Exploiting visual constraints in robot motion planning
555
Exploiting visual constraints in the synthesis of uncertainty-tolerant motion plans
556
Exploiting visual constraints in the synthesis of uncertainty-tolerant motion plans. I. The directional backprojection
557
Exploiting visual constraints in the synthesis of uncertainty-tolerant motion plans. II. The nondirectional backprojection
558
Exploiting Visual Cues in Non-Scripted Lecture Videos for Multi-modal Action Recognition
559
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines
560
Exploiting visual reranking to improve pseudo-relevance feedback for spoken-content-based video retrieval
561
Exploiting Visual-Audio-Textual Characteristics for Automatic TV Commercial Block Detection and Segmentation
562
Exploiting VLIW schedule slacks for dynamic and leakage energy reduction
563
Exploiting Voicing Cues for Contrast Enhanced Frequency Shaping of Speech for Impaired Listeners
564
Exploiting voltage support of voltage-source HVDC
565
Exploiting voting strategies in partially replicated IEC 61499 applications
566
Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
567
Exploiting Walsh-based attributes to stereo vision
568
Exploiting wavefront parallelism on large-scale shared-memory multiprocessors
569
Exploiting Wavelet-Domain Dependencies in Compressed Sensing
570
Exploiting wavelet-domain intra-scale and inter-scale dependencies in Bayesian compressive sensing with context modeling
571
Exploiting Wearable Goniometer Technology for Motion Sensing Gloves
572
Exploiting weather forecasts for sizing photovoltaic energy bids
573
Exploiting web 2.0 technologies in promoting learning activities: E-learning — Web 2 platform
574
Exploiting Web Browsing Activities for User Needs Identification
575
Exploiting Web Conferencing to Support Collaborative Learning
576
Exploiting web features in Chinese relation extraction
577
Exploiting web images for event recognition in consumer videos: A multiple source domain adaptation approach
578
Exploiting Web Images for Semantic Video Indexing Via Robust Sample-Specific Loss
579
Exploiting web service techniques for composing simulation models
580
Exploiting Web Service Usage Context to Facilitate Services Organization
581
Exploiting Web Technologies for Grid Architecture
582
Exploiting Webpage Characteristics for Energy-Efficient Mobile Web Browsing
583
Exploiting Webspace organization for accelerating Web prefetching
584
Exploiting Wikipedia for Directional Inferential Text Similarity
585
Exploiting wikipedia for discovering prerequisite relationships among learning objects
586
Exploiting Wikipedia in query understanding systems
587
Exploiting wireless broadcast advantage as a network-wide cache
588
Exploiting wireless broadcast in spatially correlated sensor networks
589
Exploiting wireless channel State information for throughput maximization
590
Exploiting wireless channel state information for throughput maximization
591
Exploiting Wireless Communication in Vehicle Density Estimation
592
Exploiting wireless communication technologies in vehicular transportation networks
593
Exploiting wireless communication technologies in vehicular transportation networks
594
Exploiting wireless connectivity for robustness in WOBAN
595
Exploiting Wiring Resources on Interconnection Network: Increasing Path Diversity
596
Exploiting word meaning for negation identification in electronic health records
597
Exploiting word-level features for emotion prediction
598
Exploiting Workload Parallelism for Performance and Power Optimization in Blue Gene
599
Exploiting write semantics in implementing partially replicated causal objects
600
Exploiting WSN for Audio Surveillance Applications: The VoWSN Approach
601
Exploiting WSRF and WSRF.NET for Remote Job Execution in Grid Environments
602
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management
603
Exploiting X-correlation in output compression via superset X-canceling
604
Exploiting XML Documents to Watermark JPEG Images
605
Exploiting XML Schema for Interpreting XML Documents as RDF
606
Exploiting zero forcing beamforming and TV white space band for multiuser MIMO cognitive cooperative radio networks
607
Exploiting Zero-Crossing for the Analysis of FM Modulated Analog/RF Signals Using Digital ATE
608
Exploiting ZigBee in Reducing WiFi Power Consumption for Mobile Devices
609
Exploitng Program Concurrency in Computing Systems
610
Exploiture and design of the on-line contribution and search system in the editorial department
611
Explor@Graph Scenarios Editor - Designing a Collaborative Task
612
Explor@Graph the Representation Power of Adaptive Conceptual Graphs
613
EXPLORA 2005 concept & systems DEMO for littoral reconnaissance (MCM, REA, harbor protection) and R&T activities
614
Explora: A visualisation tool for metric analysis of software corpora
615
Explorability of noisy scalar fields
616
Explorability: inferences at the interface
617
Explorable Code Slides
618
Explorable images for visualizing volume data
619
Explorable Volumetric Depth Images from Raycasting
620
exploRase: Exploratory Data Analysis of Systems Biology Data
621
Exploration algorithm for multiple robots
622
Exploration Algorithms by Multiple Robots in Challenged Communication Environment
623
Exploration and analysis of fade depth scaling
624
Exploration and analysis of the evolution of strategies for Mancala variants
625
Exploration and Analysis of the Relations between China and Foreign Countries Based on Knowledge Flows of Patent Citation
626
Exploration and Analysis of Undocumented Processes Using Heterogeneous and Unstructured Business Data
627
Exploration and assessment of memory architectures for densely-deployed embedded sensor networks
628
Exploration and comparison of different 4G technologies implementations: A survey
629
Exploration and Customization of FPGA-Based Soft Processors
630
Exploration and design of embedded systems including neural algorithms
631
Exploration and development of the safety system in explosive risk industrial processes
632
Exploration and dynamic shape estimation by a robotic probe
633
Exploration and enhancement of P1619-based crypto-cores for efficient performance
634
Exploration and evaluation of PLX floating-point instructions and implementations for 3D graphics
635
Exploration and Example for Mathematical Application Issues in U.S. Mathematics Textbooks
636
Exploration and Exploitation in Adaptive Trust-Based Decision Making in Dynamic Environments
637
Exploration and exploitation in engineering design: Examining the effects of prior knowledge on creativity and ideation
638
Exploration and Exploitation of Reference Frames in Distributed Video Coding
639
Exploration and implementation of a highly efficient processor element for multimedia and signal processing domains
640
Exploration and implementation of a next generation Telepresence System
641
Exploration and improvement of Ostu threshold segmentation algorithm
642
Exploration and innovation of management pattern of the central plains economic region based on Complex Adaptive System
643
Exploration and innovation of the construction for automobile structure
644
Exploration and innovation of the construction for transportation public elective courses at universities
645
Exploration and Innovation on Bachelor Graduation Thesis Teaching Method in Research University
646
Exploration and investigation of potential precursors to unintentional islanding in grid-interfaced solar photo voltaic systems
647
Exploration and laboratory developments continue in conquest of space
648
Exploration and manipulation of virtual environments using a combined hand and finger force feedback system
649
Exploration and map-building under uncertainty with multiple heterogeneous robots
650
Exploration and mapping for unstructured robot teams
651
Exploration and mapping of an unknown flight envelope
652
Exploration and mapping of catacombs with mobile robots
653
Exploration and Mapping Using the VFM Motion Planner
654
Exploration and model building in mobile robot domains
655
Exploration and navigation in corridor environment based on Omni-View sequence
656
Exploration and observation planning for 3D indoor mapping
657
Exploration and Optimization of 3-D Integrated DRAM Subsystems
658
Exploration and optimization of heterogeneous interconnect fabric of 3D tree-based FPGA
659
Exploration and performance evaluation of a compressed sensing based IR-UWB receiver
660
Exploration and practice in teaching of digital logic course
661
Exploration and Practice of CDIO Educational Idea in Teaching Reform of Computer Foundation
662
Exploration and Practice of Compilation of Application-Oriented Textbook for Undergraduate in Innovative Education
663
Exploration and practice of computer courses and practice teaching model
664
Exploration and practice of computer speciality cultivation for ordinary university
665
Exploration and Practice of Constructing Computer Curricula in New Media Art
666
Exploration and practice of constructing creative engineering laboratory on software development
667
Exploration and practice of contest-oriented innovation training for engineering undergraduates
668
Exploration and practice of data structure for ordinary university
669
Exploration and practice of engineering graduate entrepreneurial ability training system: Take Harbin Institute of Technology as an example
670
Exploration and practice of IT operation and maintenance in digital campus
671
Exploration and practice of practice teaching system based on communication engineering
672
Exploration and practice of software engineering core curriculum construction
673
Exploration and practice of specialized laboratory construction and innovative talents cultivation
674
Exploration and practice of strengthening comprehensive ability for engineering students
675
Exploration and Practice of Teaching Mode of Experimental Course Based on Blended Learning
676
Exploration and Practice of the Computer Innovation Education in Mining Engineering
677
Exploration and practice of the manifold innovative experimental model
678
Exploration and practice of the model for developing applied computer undergraduates based on CDIO
679
Exploration and practice of the school-enterprise cooperation of the software service outsourcing talent training — An example of Xi´an University of Arts and Science
680
Exploration and practice of the smart distribution network by the Yangjiaping Power Supply Bureau
681
Exploration and practice of training mode of outstanding software engineers
682
Exploration and practice of training practical IT professionals by the cooperation of the university and enterprises
683
Exploration and practice on case-driven research-based teaching model
684
Exploration and practice on college new digital campus construction-design and application of “campus e-card-through”
685
Exploration and practice on higher mathematics teaching reform under the condition of modern information technology
686
Exploration and Practice on Teaching Java as Introductory Language for Non-CSE Major Students
687
Exploration and practice on teaching reform of “principle and application of Single-Chip Microprocessor”
688
Exploration and Practice on the Employment-Oriented IT Professional Innovative Pedagogical Models
689
Exploration and Practice on the IT Engineering Education Teaching Quality Management and Assurance System of Private Universities Based on ABET
690
Exploration and Practice on the Teaching Methods of MIS Course
691
Exploration and Practice the Experimental Video Frequency Teaching Material under the New Media Environment
692
Exploration and prevention of photo resist burning in a high current ion implanter
693
Exploration and research about teaching methods of software engineering
694
Exploration and research applications on new material of superabsorbent resin
695
Exploration and research of automatic control system based on time inverse
696
Exploration and research of Service-oriented Architecture Model in the course of enterprise´s network service registration
697
Exploration and research of vehicle SOS system based on wireless technology
698
Exploration and research on teaching of basic computer course in higher vocational college
699
Exploration and research on the construction of course group of Signal and Information Processing
700
Exploration and research on the education method of college students´ information literacy
701
Exploration and research on the implementation of a virtual private network technology in the new generation of IP protocol
702
Exploration and research on web programming course in higher vocational college
703
Exploration and resource drilling of seafloor massive sulfide (SMS) deposits in the Bismarck Sea, Papua New Guinea
704
Exploration and search-by-similarity in CBIR
705
Exploration and Study of Computer-Aided Higher Mathematics Teaching Practice
706
Exploration and suitability of numerous routing protocol in VANET
707
Exploration and Surveillance in Multi-robots Networks
708
Exploration and synthesis of dynamic data sets in telecom network applications
709
Exploration and thinking of information-based learning models of normal university students from the perspective of E-Learning2.0
710
Exploration and thinking on establishing and perfecting Chinese e-commerce credit service system
711
Exploration and topological map building in unknown environments
712
Exploration and verification analysis of a Linear Reluctance Accelerator
713
Exploration and verification of factors in the Front-end stage of the ERP Implementation Process: Evidence from case study and survey research
714
Exploration and Visualization of Segmentation Uncertainty using Shape and Appearance Prior Information
715
Exploration assessment in a petroleum frontier area offshore the Amazon River mouth using RADARSAT-1 images
716
Exploration Assessment of the Service Distance Based on Geographical Information Systems and Space Syntax Analysis on the Urban Public Facility
717
Exploration driven by local potential distortions
718
Exploration environment for 3D heterogeneous tree-based FPGA architectures (3D HT-FPGA)
719
Exploration for a hydrothermal sulfide deposit in a submarine caldera, Izu-Ogasawara arc
720
Exploration for human factors in the design of coal-mine safety and rescue devices
721
Exploration for novel uses of air muscles as hydraulic muscles for underwater actuator
722
Exploration for Regional B2C E-Commerce Mode Based on Supply Chain Management
723
Exploration for the application of Pro/E in engineering graphics teaching
724
Exploration for the Calibration of Passive Intermodulation Analyzer
725
Exploration framework for Run-time Resource Management of embedded multi-core platforms
726
Exploration games played on a DDR pad can constitute beneficial physical exercise
727
Exploration geophysics, parallel computing and reality
728
Exploration harnesses: tool-supported interactive discovery of commercial component properties
729
Exploration in a boundary environment with unknown obstacles using Reaction-Diffusion equation on a graph
730
Exploration in Collaborative and Group Learning of Physical Experiments
731
Exploration in commercial websites on the association rules base on the consumers´ behavior
732
Exploration in developing modern distant education base in digital video broadcast cable network
733
Exploration in Innovation about Computer Teaching Based on Cultivation Mode for Applied Talents
734
Exploration in innovative education of computer information management major
735
Exploration in Massively Collaborative Problem Solving
736
Exploration in mathematical basic courses of higher school under mathematics cultural perspective
737
Exploration in Openness of Laboratories of Electronic Information Training Base of Beijing Union University to Students
738
Exploration in structured space of robot movements for autonomous augmentation of action knowledge
739
Exploration in the South Atlantic Bight: discovery of new resources with pharmaceutical potential
740
Exploration into China´s Agricultural Products Logistics Development under the Supply Chain Management
741
Exploration into reflective teaching of middle school English teachers in the ethnic and remote regions of Guangxi in China
742
Exploration learning system in mathematical education
743
Exploration Life Support Overview and Benefits
744
Exploration Methodology for 3D Memory Redundancy Architectures under Redundancy Constraints
745
Exploration of kc-cycle transient fault-secured datapath and loop unrolling factor for control data flow graphs during high-level synthesis
746
Exploration of 1/f noise origin using time measurements
747
Exploration of 2D Cellular Automata as Binary Sequence Generators
748
Exploration of 2D EDA tool impact on the 3D MPSoC architectures performance
749
Exploration of 4D MRI Blood Flow using Stylistic Visualization
750
Exploration of 85th percentile operating speed model on horizontal and vertical alignments: A case study for two lane rural highways
751
Exploration of a Category Theory-Based Object-Oriented Database for Surface Texture Information Management
752
Exploration of a digital audio processing platform using a compositional system level performance estimation framework
753
Exploration of a distributed approach for simulating spectrum sensing in cognitive radio
754
Exploration of a double-tapered disc-loaded circular waveguide for a wideband gyro-TWT
755
Exploration of a free-space optical communications system for sounding rocket sub-payloads
756
Exploration of a Heterogeneous Concentrated-Sparse On-Chip Interconnect for Energy Efficient Multicore Architecture
757
Exploration of a Minimum Tardiness Dispatching Priority for a Flexible Manufacturing System - a Combined Simulation / Optimization Approach
758
Exploration of a new approach for designing online English language learning materials: A case study in supporting the academic reading of international masters degree students in a British university
759
Exploration of a new magnetization-gradient-related magnetooptical effect
760
Exploration of a new magnetization-gradient-related magnetooptical effect
761
Exploration of a new, efficient approach to modeling and simulation of interconnects
762
Exploration of a realization pattern of system based on Hibernate
763
Exploration of a reconfigurable 2D mesh network-on-chip architecture and a topology reconfiguration algorithm
764
Exploration of a stylistic motion space through realtime synthesis
765
Exploration of a switching loop snubber for parasitic ringing suppression
766
Exploration of ability development of engineering and computational thinking skills in software engineering majors
767
Exploration of abnormal skin tissue (Marfan syndrome) with 2D high resolution elastography
768
Exploration of adaptive beaconing for efficient intervehicle safety communication
769
Exploration of adaptive filters for target tracking in the presence of model uncertainty
770
Exploration of adaptive gait patterns with a reconfigurable linkage mechanism
771
Exploration of advanced preamplifier circuit and system issues
772
Exploration of aging induced evolution of solder joints using nanoindentation and microdiffraction
773
Exploration of Alternative Interaction Techniques for Robotic Systems
774
Exploration of an adaptive NoC architecture on FPGA dedicated to multi and hysperspectral algorithm for art authentication
775
Exploration of an Error Prevention Model for COSMIC Functional Size Measurement Method
776
Exploration of an incremental suite of microscopic models for acoustic event monitoring using a robotic sensor network
777
Exploration of an indoor-environment by an autonomous mobile robot
778
Exploration of an unknown environment with a differential drive disc robot
779
Exploration of analog pre-processing architectures for coarse low power motion detection
780
Exploration of analytical solutions of nonlinear oscillatory systems via the decomposition method
781
Exploration of Analyzing Emotion Strength in Speech Signal
782
Exploration of application of Continuous Wavelet Transform to power quality analysis
783
Exploration of applying statistical process control strategies to simulated annealing optimization techniques
784
Exploration of area and performance optimized datapath design using realistic cost metrics
785
Exploration of Asynchronous Online Teaching with a Network Analysis of Class Interaction
786
Exploration of Autism Expert Systems
787
Exploration of autism using artificial intelligence techniques
788
Exploration of automatic optimization for CUDA programming
789
Exploration of Autonomous Error-Tolerant (AET) Celluar Networks in System-on-a Package (SoP) for Future Nanoscle Electronic Systems
790
Exploration of azimuth estimation algorithms in radio systems of short-range navigation
791
Exploration of beam fault scenarios for the Spallation Neutron Source target
792
Exploration of Bifurcation and Chaos in Buck Converter Supplied From a Rectifier
793
Exploration of binary & ternary photosensitive thin film silver selenides: Prediction, preparation, and characterization
794
Exploration of bit reoptimization schemes in transform-based speech coding
795
Exploration of brain activations by passive hand movements and subject´s intention based on Kawahira method using 3T-fMRI
796
Exploration of brain function through behavior, neural activity observation, and optogenetic manipulation
797
Exploration of Breast Tumors Utilizing Noninvasive Near-Field Microwave Imaging
798
Exploration of Building Harmonious Relationships on Partnering Pattern
799
Exploration of candidates ground sites over Algeria to EO satellite vicarious flight calibration purposes
800
Exploration of capacity gains by inter-cell interference coordination based on user distribution
801
Exploration of carboxyl functionalized eugenol for preventing metastasis of pancreatic cancer
802
Exploration of cardiac valvular hemodynamics by heart sound analysis of hypertensive cardiac disease background patients
803
Exploration of C-band σ0 dependence on azimuth angle over Antarctic Sea and glacial ice
804
Exploration of CDIO engineering education mode for BEEE
805
Exploration of Cellular Relationships from Characteristically Expressed Genes by Partial Canonical Correlation Analysis
806
Exploration of Centralized Car2X-Systems over LTE
807
Exploration of cerebral activation using hemodynamic modality separation method in high-density multichannel fNIRS
808
Exploration of Chemical Space by Molecular Morphing
809
Exploration of Chinese Website Accessibility Evaluation Model
810
Exploration of class specific ABWE for robust children´s ASR under mismatched condition
811
Exploration of classification using NBTree for predicting students´ performance
812
Exploration of Cloud Computing Adoption for E-Learning in Higher Education
813
Exploration of cloud computing technologies for geographic information services
814
Exploration of cognitive space TT&C SYSTEM
815
Exploration of Collective Pattern to Improve Location Prediction of Mobile Phone Users
816
Exploration of communication process using Business Microscope®
817
Exploration of computer-principle virtual laboratory
818
Exploration of conflict situations in deterministic cancellation parser
819
Exploration of contextual constraints for character pre-classification
820
Exploration of cryptographic ASIP designs for wireless sensor nodes
821
Exploration of cultivating mode for research-oriented graduates major in computer science
822
Exploration of Cultural Influences on Business and IT Alignment
823
Exploration of Curriculum Structures and Educational Models of Database Applications
824
Exploration of customer life cycle management and service applications
825
Exploration of Deadbeat Control for DC-DC Converters as Hybrid Systems
826
Exploration of Deep Belief Networks for Vowel-like regions detection
827
Exploration of Dependencies among Sections in a Supermarket Using a Tree-Structured Undirected Graphical Model
828
Exploration of design space for parallel programs
829
Exploration of Destination Competitiveness Framework -- City as a Destination
830
Exploration of device-circuit interactions in FinFET-based memories for sub-15nm technologies using a mixed mode quantum simulation framework: Atoms to systems
831
Exploration of Different Constraints and Query Methods with Kernel-based Semi-supervised Clustering
832
Exploration of different implementation styles for graphene-based reconfigurable gates
833
Exploration of different parameter selection in fuzzy control applications on microcontroller
834
Exploration of digital latch design using ballistic deflection transistors — Modeling and simulation
835
Exploration of dimensionality reduction for text visualization
836
Exploration of distant retrograde orbits for communication and observation satellites
837
Exploration of Distributed Shared Memory Architectures for NoC-based Multiprocessors
838
Exploration of Dual Organization in Internal Management of NGO
839
Exploration of Dynamic Management Technology of Scientific Literature Retrieval Experiment Teaching: Information System Construction Based on Experiment Process
840
Exploration of EDM Assisted CNT in Micro Machining Using Statistical Approach
841
Exploration of education for sustainable development of art university students
842
Exploration of education reform based on 32-bit assembly language programming
843
Exploration of efficacy of gland morphology and architectural features in prostate cancer gleason grading
844
Exploration of Efficient Many-Core Processor for Dual-Polarization and Sympathetic Plucked String Model
845
Exploration of efficient testing methodology for effective spectrum sharing
846
Exploration of Electrical and Novel Optical Chip-to-Chip Interconnects
847
Exploration of electromagnetically induced absorption with circular polarised lasers in a degenerate two-level system
848
Exploration of electron-beam writing strategies and resist development effects
849
Exploration of embedded memories in SoCs using SystemC-based functional performance models
850
Exploration of energy efficient acceleration concepts for the ROHCv2 in LTE handsets
851
Exploration of energy requirements at the output of an LNA from a thermodynamic perspective
852
Exploration of energy-delay tradeoffs in digital circuit design
853
Exploration of epitaxial quantum dots within wide band gap metamorphic host materials for intermediate band solar cells
854
Exploration of Event-Evoked Oscillatory Activities during a Cognitive Task
855
Exploration of experimental teaching in the Access Database Application Technology Courses
856
Exploration of Factors Affecting the Advancement of Collaborative eBusiness in the Enterprises: Research Efforts Examination
857
Exploration of factors limiting biomass estimation by polarimetric radar in tropical forests
858
Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection
859
Exploration of Finance and Economic College Computer Undergraduate Curriculum System Reconstruction
860
Exploration of Five-Star Hotel´s HRM in China
861
Exploration of flexible package based on 3D printing technology
862
Exploration of fluorescence properties of gold nanoclusters at the single-molecule levels
863
Exploration of FPGA-based dense block matching for motion estimation and stereo vision on a single chip
864
Exploration of Full HD Media Decoding on a Software Defined Radio Baseband Processor
865
Exploration of Full HD Media Decoding on SDR Baseband Processor
866
Exploration of full-text databases with self-organizing maps
867
Exploration of functional relationships
868
Exploration of fuzzy system in decision making—relationship of fuzzy error logic decomposition word Tf and connotative antithesis +nhdl
869
Exploration of GaTe for gamma detection
870
Exploration of generalized circuit switching optical network-on-chip architecture
871
Exploration of Generalized Residual Prediction in scalable HEVC
872
Exploration of genomic, proteomic, and histopathological image data integration methods for clinical prediction
873
Exploration of geological structures with GPR from helicopter and on the ground in the Letzlinger Heide (Germany)
874
Exploration of GFP frame delineation architectures for network processing
875
Exploration of global surface geometry from local information
876
Exploration of GPGPU register file architecture using domain-wall-shift-write based racetrack memory
877
Exploration of hardware sharing for image encoders
878
Exploration of hardware/software design space through a codesign of robot arm controller
879
Exploration of Heterogeneous FPGAs for Mapping Linear Projection Designs
880
Exploration of heterogeneous reconfigurable architectures
881
Exploration of heuristic rules for green home design decision support system
882
Exploration of high-dimensional nuclei data
883
Exploration of High-Dimensional Nuclei Data
884
Exploration of Higher Education Indicators and Universities´ Characteristics in Japan
885
Exploration of high-level prosodic patterns for continuous mandarin speech
886
Exploration of Highly Accurate Path Prediction Mechanism Using Detailed Path History
887
Exploration of High-Qualified Talents Recruiting Program Under the Strategy of Reinforcing the Nation with Talents
888
Exploration of human factors issues within a future separation assurance concept
889
Exploration of icy crust on Europa satellite by means of radiometer
890
Exploration of Image Search Results Quality Assessment
891
Exploration of Imaging Method of Degenerate Articular Cartilage Based on EPIC Micro-CT
892
Exploration of innovative radar sensing schemes for subsurface object detection
893
Exploration of instantaneous amplitude and frequency features for epileptic seizure prediction
894
Exploration of integrated photonic lanterns fabricated by femtosecond laser inscription
895
Exploration of intelligent techniques for image filtering
896
Exploration of intention expression for robots
897
Exploration of interactions detectable by wearable IMU sensors
898
Exploration of intergranular exchange in perpendicular recording using a micromagnetic read/write model
899
Exploration of IPv6 Network Construction on Campus
900
Exploration of key operational issues for the midterm NAS
901
Exploration of laboratory opening work in CDIO education reform
902
Exploration of Lattice Reduction Aided Soft-Output MIMO Detection on a DLP/ILP Baseband Processor
903
Exploration of learning in an associative magnetic processor
904
Exploration of leukemia gene regulatory networks using a systems biology approach
905
Exploration of linear discriminant analysis for transform coding in distributed image classification
906
Exploration of Link Structure and Community-Based Node Roles in Network Analysis
907
Exploration of Lloyd mirror rotation effect and radar look down angle
908
Exploration of local and central processing for a wireless camera based sensor node
909
Exploration of Location-Based Services Adoption
910
Exploration of Lossy Compression for Application-Level Checkpoint/Restart
911
Exploration of Low Power Adders for a SIMD Data Path
912
Exploration of low-carbon transport policies
913
Exploration of Low-Cost Configurable S-Box Designs for AES Applications
914
Exploration of lower limb body schema integration with respect to body-proximal robotics
915
Exploration of Magnetic RAM Based Memory Hierarchy for Multicore Architecture
916
Exploration of magnetic suspension technology used for spacecraft micro-vibration isolation
917
Exploration of magnetoelectric thin-film sensors using superlattice composition spreads
918
Exploration of main framework of post-emergency rotor angel control and its realisation in real power system
919
Exploration of Management Information System: Pemetreating Business Way
920
Exploration of Marxist humanism
921
Exploration of mean-field approximation for feedforward networks
922
Exploration of melt-electrospinning based on the novel device
923
Exploration of memory-aware dynamic voltage scheduling for soft real-time applications
924
Exploration of MFCC based ABWE for robust children´s speech recognition under mismatched condition
925
Exploration of Migration and Replacement Policies for Dynamic NUCA over Tiled CMPs
926
Exploration of misperceptions in hypergames
927
Exploration of Mono Lake with an ROV: a prototype experiment for the MAPS AUV program
928
Exploration of Moodle-Based Collaborative Learning for the Deaf
929
Exploration of MPSoC monitoring and management systems
930
Exploration of multifrontal method with GPU in power flow computation
931
Exploration of Multi-Objective Particle Swarm Optimization on the design of UWB antennas
932
Exploration of multiple ICEs for embedded microprocessor cores in an SoC chip
933
Exploration of multiple roots for a polynomial system
934
Exploration of Multitemporal COSMO-SkyMed Data via Interactive Tree-Structured MRF Segmentation
935
Exploration of Multi-thread Processing on XILKERNEL for FPGA Based Embedded Systems
936
Exploration of Nakagami fading in ultra-wideband wireless channels
937
Exploration of Network Alternatives for Middleware-centric Embedded System Design
938
Exploration of Network Security Information Hid in Web Pages Based on Immunology
939
Exploration of Networks using overview+detail with Constraint-based cooperative layout
940
Exploration of new algorithms for airborne collision detection and avoidance to meet NextGen capabilities
941
Exploration of new ideas for the development of small and medium foreign trade enterprises
942
Exploration of noise robustness and sensitivity of bulk current sensors for soft error detection
943
Exploration of non-destructive testing of anchorage quality of metal anchored bar system with ultrasonic guided wave
944
Exploration of noninvasive mapping of brain pH with 31P magnetic resonance spectroscopy
945
Exploration of Non-volatile Memory Management in the OS Kernel
946
Exploration of novel contrast agents for functional imaging using microwave tomography
947
Exploration of novel gap material: electric and magnetic properties of NiFe/NiO/NiFe
948
Exploration of n-type oxides by high throughput screening
949
Exploration of on-chip switched-capacitor DC-DC converter for multicore processors using a distributed power delivery network
950
Exploration of operational scenarios of the SPIDER accelerator
951
Exploration of optical and electronic parameters of lithium thiogallate (LiGaS2)
952
Exploration Of Optical Propagation In A Nonlinear Dispersive Medium Based On An Incommensurate Spectral Formalism
953
Exploration of optical pulse propagation through the cubically nonlinear media
954
Exploration of Optimal Many-Core Models for Efficient Image Segmentation
955
Exploration of optimal multi-cycle transient fault secured datapath during high level synthesis based on user area-delay budget
956
Exploration of Pareto Frontier Using a Fuzzy Controlled Hybrid Line Search
957
Exploration of path space using sensor network geometry
958
Exploration of PLAD aluminum implants for work function adjustment
959
Exploration of polygonal environments using range data
960
Exploration of polymer conformational similarities in polymer-carbon nanotube interfaces
961
Exploration of polynomial multiplication algorithms for homomorphic encryption schemes
962
Exploration of power amplifier performance using a digital demodulation loadpull measurement procedure
963
Exploration of Power Device Reliability Using Compact Device Models and Fast Electrothermal Simulation
964
Exploration of Power Device Reliability using Compact Device Models and Fast Electro-Thermal Simulation
965
Exploration of Power Optimal Implementation Technique of 128-PT FFT/IFFT for WPAN using Pseudo-Parallel Datapath Structure
966
Exploration of power reduction and performance enhancement in LEON3 processor with ESL reprogrammable eFPGA in processor pipeline and as a co-processor
967
Exploration of Practical HEVC/H.265 Sample Adaptive Offset Encoding Policies
968
Exploration of printing-friendly RFID antenna designs on paper substrates
969
Exploration of product Value - Characteristic relationship: Partial least squares path modeling for product design and development
970
Exploration of programming practice project curriculum construction
971
Exploration of project-based teaching content reforms on programming practice course
972
Exploration of proton-electron cooperative-interacting systems with transition metal atoms
973
Exploration of Public Education Resource sharing and Cloud Services
974
Exploration of public facilities design in aging society
975
Exploration of purpose for multi-method simulation in the context of social phenomena representation
976
Exploration of Quantitative Scoring Metrics to Compare Systems Biology Modeling Approaches
977
Exploration of radiated electromagnetic immunity of integrated circuits up to 40 GHz
978
Exploration of rank order coding with spiking neural networks for speech recognition
979
Exploration of rare earth materials for future interpoly dielectric replacement in Flash memory devices
980
Exploration of real-time satellite measurements to advance hurricane intensity prediction in the northern Gulf of Mexico
981
Exploration of reconfigurable architectures: an empirical approach
982
Exploration of relations between many-body field theory and the nonlinear brain dynamics that underlies cognitive behavior
983
Exploration of Relations between Symbolic and Conexionist Techniques of Computational Intelligence
984
Exploration of reusing the pre-recorded training data set to improve the supervised classifier for EEG-based motor-imagery brain computer interfaces
985
Exploration of reverse-based modular skills training system
986
Exploration of ring oscillator design space for temperature measurements on FPGAs
987
Exploration of RNA editing and design of robust genetic algorithms
988
Exploration of robotic system design in improving the patient experience in physical therapy sessions at the UVA Children´s Hospital
989
Exploration of robust features for multiclass emotion classification
990
Exploration of Robust Features of Trust Across Multiple Social Networks
991
Exploration of ruled-based and probabilistic localization algorithms for wall-following robot
992
Exploration of sample quantiles and mean speed distributions
993
Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
994
Exploration of Second-Order Effects in High-Performance Continuous-Time \\Sigma \\Delta Modulators Using Discrete-Time Models
995
Exploration of security parameters to evaluate SaaS
996
Exploration of self-healing circuits for timing resilient design using emerging memristor devices
997
Exploration of self-produced vacuum ultraviolet radiation from dielectric surface flashover at atmospheric pressure
998
Exploration of Shape Variation Using Localized Components Analysis
999
Exploration of Short Reads Genome Mapping in Hardware
1000
Exploration of SiGe/Si heterostructure interface in SiGe-channel MOSFETs
بازگشت