<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Key Frame Extraction in 3D Video by Rate-Distortion Optimization
2
Key frame extraction in video sequences: a vantage points approach
3
Key frame extraction of online video based on optimized frame difference
4
Key frame extraction using Faber-Shauder wavelet
5
Key frame extraction using inter-shot information
6
Key frame extraction using MPEG-7 motion descriptors
7
Key frame number assignment measuring content variations
8
Key frame quantisation error reduction in distributed video coding
9
Key frame selection based on Jensen-Rényi divergence
10
Key Frame Selection Based on KL-Divergence
11
Key frame selection by macroblock type and motion vector analysis
12
Key frame selection by motion analysis
13
Key frame selection to represent a video
14
Key frame-based video super-resolution using bi-directional overlapped block motion compensation and trained dictionary
15
Key Frames Extraction Algorithm Based on GA
16
Key frames hysteresis-seeking based on motion change points for RGB-D video
17
Key frames selection into panoramic mosaics
18
Key frames-based video super-resolution using adaptive overlapped block motion compensation
19
Key function of normal basis multipliers in GR(2n)
20
Key functional blocks of optical transport networks
21
Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models
22
Key generation and license authentication using physical unclonable functions
23
Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits
24
Key Generation for Multi-Secret Steganography
25
Key Generation for Secure Inter-satellite Communication
26
Key generation for static visual watermarking by machine learning
27
Key generation in two-way relay wireless channels
28
Key Generation Over Wiretap Models With Non-Causal Side Information
29
Key generation research of RSA public cryptosystem and Matlab implement
30
Key generation through two-way relay channels under active attacks
31
Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent
32
Key generation with a Byzantine helper
33
Key Generation: Foundations and a New Quantum Approach
34
Key GHG emission reduction strategies of climate leader companies
35
Key Graphs and Secret Sharing Be Used in Network Multicast Security
36
Key Grids: A Protocol Family for Assigning Symmetric Keys
37
Key hot-carrier degradation model calibration and verification issues for accurate AC circuit-level reliability simulation
38
Key human resource issues in IS in the 1990s
39
Key ICT solutions for realizing smart grid
40
Key impediments to dft-focused test and how to overcome them
41
Key improvements of the MEMS switch lifetime thanks to a dielectric-free design and contact reliability investigations in hot/cold switching operations
42
Key independent watermark detection
43
Key indicators for maintenance performance measurement: The aircraft galley and associated equipment manufacturer case study
44
Key indicators for monitoring of audiovisual quality
45
Key indicators of SWOT analysis between Bumiputera and Non-bumiputera Industrialized Building System (IBS) contractors in Selangor
46
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks
47
Key infection: smart trust for smart dust
48
Key influence factors of containership registration in Taiwan-application of consistent fuzzy preference relation
49
Key Information Systems Management Issues in China and USA: A Comparative Perspective
50
Key Infrastructure for the Digital Revolution and the Global Knowledge Economy
51
Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing
52
Key initiatives in process improvement for newly formed power distribution company
53
Key Insertion and Splay Tree Encryption Algorithm for Secure Data Outsourcing in Cloud
54
Key integration technologies for nanoscale FRAMs
55
Key Integration Technologies for Nanoscale FRAMs
56
Key Intelligence Topics (KITs) and Key Intelligence Questions (KIQs) in safety signal intelligence
57
Key interactions [design of experiments]
58
Key interpersonal communication skills for wheelchairs
59
Key interventions in improving the throughput rate of Industrial Engineering undergraduates: a case study at the University of Johannesburg
60
Key inventors: implications for human resource management in R&D
61
Key inventors: implications for human resource management in R&D
62
Key issues
63
Key issues [metering security issues]
64
Key issues and cost estimates for the fabrication of CuInSe2 (CIS) PV modules by the two-stage process
65
Key issues and countermeasures in the streaming media information services
66
Key Issues and Prospects for Optically Assisted Magnetic Recording
67
Key issues and techniques for characterizing time-dependent device-to-device variation of SRAM
68
Key Issues Concerning the Simultaneous Development of Technical and Linguistic Competences in a Single E-module
69
Key Issues for integration of Renewable Energy and Distributed Generation into Thailand power grid
70
Key issues for planning and implementing organizational transitions
71
Key issues for the efficiency improvement of silicon basis stacked solar cells
72
Key Issues for the Quality Assessment of Mobile Commerce Services
73
Key issues for the unplanned transfer of VLSI technology
74
Key issues in achieving data quality and consistency in data warehousing among large organisations in Australia
75
Key Issues in Building Web-Based Services
76
Key issues in computing optical properties of natural polyphenols
77
Key issues in conducting sentiment analysis on Arabic social media text
78
Key issues in design of NLTLs
79
Key issues in design of nonlinear transmission lines
80
Key issues in designing capacitance tomography sensors
81
Key Issues in Designing High-Speed Hardware for Electrical Capacitance Tomography System
82
Key issues in developing a standard [software metrics]
83
Key issues in diagnostics for burning plasma experiments
84
Key issues in diagnostics for burning plasma experiments
85
Key Issues in EA-Implementation: Case Study of Two Finnish Government Agencies
86
Key Issues in Expansion of Mobile Data Communications in China
87
Key issues in integrated resource planning for electric utilities
88
Key issues in life cycle assessment of electric vehicles — Findings in the International Energy Agency (IEA) on Hybrid and Electric Vehicles (HEV)
89
Key issues in managing the product development process in very small manufacturing companies
90
Key issues in managing the product development process in very small manufacturing companies
91
Key issues in manufacturing enterprise integration - the Singapore perspective
92
Key Issues in Mapping Technologies for Disaster Management
93
Key issues in new product development controllability improvement-lessons learned from European high-tech industries
94
Key issues in next-generation Web-based education
95
Key issues in secure, error resilient compressive sensing of multimedia content
96
Key issues in service systems resilience
97
Key Issues in Setting Priorities for New Energy Technology Research and Development
98
Key issues in studying parallel manipulators
99
Key Issues in Sustainable Use of Agricultural Water Resources in the Upper Reaches of Minjiang
100
Key issues in the design of a fault-tolerant core avionics computer based on the mesh architecture
101
Key Issues in the Design of Magnetic Tape for Linear Systems of High Track Density
102
Key issues in the design of magnetic tapes for linear systems of high track density
103
Key issues in the dynamic control of lightweight robots for space and terrestrial applications
104
Key Issues in the Optimization of Runtime Processes for Dynamic Provisioning of Ubiquitous Services
105
Key issues in video summarization and its application
106
Key issues influencing spectral efficiency in wireless communications
107
Key issues involved in implementing road pricing schemes in cities
108
Key Issues of a Software Focused Supply Chain
109
Key issues of accounting information quality management an Australian case study
110
Key Issues of Clamping Diodes in DCM Phase-Shift Full-Bridge Converter
111
Key Issues of FPGA Implementation of Neural Networks
112
Key issues of future network management
113
Key Issues Of Long-Term Talent Development Plan In Henan coal industry
114
Key issues of resource management in distributed multimedia computer systems
115
Key Issues of RFID Reader Network System
116
Key Issues of Security and Integrity in Third Party Association Rule Mining
117
Key issues of security in space-based information network review
118
Key Issues of the healthcare technology management in life cycle: Results of a brainstorming
119
Key Issues of Wide-Area Tracking System for Multi-user Augmented Reality Adventure Game
120
Key issues of wind capacity integration in congested areas of the Taiwan power system
121
Key Issues Pertaining to Aging, Maintenance and Reliability of Electricity Infrastructure
122
Key issues regarding Domotic applications
123
Key Issues Surrounding Faculty Development of Expertise In Instructional Design
124
Key issues towards beyond LTE-Advanced systems with cognitive radio
125
Key Issues With Printed Flexible Thin Film Transistors and Their Application in Disposable RF Sensors
126
Key IT Management Issues in Canadian Hospitals: A Delphi Study
127
Key items to be addressed prior to the implementation of a GIS, including a detailed review of quality assurance considerations. [geographic IS]
128
Key laser technologies for next generation x-ray sources
129
Key leadership factors towards business process improvement: a managerial focus
130
Key Learning from Quanta ICT Low resistance Failure Issue
131
Key learnings from IAS electrical safety workshops
132
Key learnings from the electronic commerce journey at Kodak
133
Key learnings from the IAS Electrical Safety Workshops
134
Key length estimation of zero-bit watermarking schemes
135
Key lessons from the scalable communications core: a reconfigurable wireless baseband
136
Key lessons in achieving widespread inspection use
137
Key lessons in the efficient archive of small files to the CCLRC MSS using SRB
138
Key links forecast with dynamic weight algorithm for RAW in optical networks
139
Key management and access control for large dynamic multicast group
140
Key Management and Distribution for Authenticating Group Communication
141
Key management and distribution for secure multimedia multicast
142
Key Management and Mutual Authentication for Multiple Field Records Smart Cards
143
Key Management and Secure Routing in Heterogeneous Sensor Networks
144
Key management approaches to offer data confidentiality for secure multicast
145
Key Management Based on Elliptic Curve Paillier Scheme in Ad Hoc Networks
146
Key management engine techniques for sensitive or classified equipment initialization
147
Key management for 3G MBMS security
148
Key management for a large-scale wireless sensor network
149
Key management for advanced power distribution system using EPON
150
Key Management for Cloud Data Storage: Methods and Comparisons
151
Key management for decentralized computer network services
152
Key Management for Encrypted Data Storage in Distributed Systems
153
Key Management for Feeder Automation Systems with Centralized Mode
154
Key management for heterogeneous ad hoc wireless networks
155
Key Management for Large Ad Hoc Networks
156
Key management for large scale end-to-end encryption
157
Key Management for Lightweight Ad-hoc Routing Authentication
158
Key Management for Multiple Multicast Groups in Wireless Networks
159
Key management for restricted multicast using broadcast encryption
160
Key management for secure lnternet multicast using Boolean function minimization techniques
161
Key management for secure multicast communication using secret sharing-based revocation scheme
162
Key management for secure multicast communication: A survey
163
Key management for secure multicast group communication in mobile networks
164
Key management for simultaneous join/leave in secure multicast
165
Key Management for Static Wireless Sensor Networks With Node Adding
166
Key management for substations: Symmetric keys, public keys or no keys?
167
Key management for the MANET: A survey
168
Key Management for UMTS MBMS
169
Key Management for Wireless Sensor Networks Using Trusted Neighbors
170
Key management in distributed online social networks
171
Key management in Identity Based Encryption schemes
172
Key management in multi-distributor based DRM system with mobile clients using IBE
173
Key Management in Open DRM Platforms
174
Key management in the handover. Application to third generation mobile systems
175
Key management in vehicular ad-hoc networks
176
Key Management in Web of Trust for Mobile Ad Hoc Networks
177
Key Management in WiMax
178
Key management in wireless ad hoc networks: collusion analysis and prevention
179
Key management in wireless sensor networks with inter-network sensor roaming
180
Key Management Integrated with Intrusion Detection in Wireless Sensor Networks
181
Key management issues in wireless sensor networks: current proposals and future developments
182
Key management mechanism in ALTO/SDN based CDNi architecture
183
Key Management Mechanisms in Wireless Sensor Networks
184
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks
185
Key management requirements for Positive Train Control communications security
186
Key management requirements for PTC operations
187
Key Management Scheme Applicable to Various Topologies of Sensor Networks
188
Key management scheme based on (t, n) threshold cryptosystem
189
Key management scheme based on certificateless cryptography for satellite networks
190
Key management scheme based on identity and dual cluster heads for WSN
191
Key Management Scheme Based on Secret Sharing for Wireless Sensor Network
192
Key Management Scheme Based on Threshold for Heterogeneous Wireless Networks
193
Key Management Scheme based on Traditional Symmetrical Cryptogram System
194
Key management scheme for bottleneck Steiner tree based Cloud Computing
195
Key management scheme for multi-layer secure group communication
196
Key management scheme for multiple simultaneous secure group communication
197
Key management scheme for providing the confidentiality in mobile multicast
198
Key Management Scheme for Query Based Routing in Sensor Networks
199
Key Management Scheme for Routing in Clustered Heterogeneous Sensor Networks
200
Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration
201
Key Management Scheme in WSN Based on Property of Circle
202
Key Management Scheme of Wireless Sensor Networks Based on Polynomial and Ring-Tree Network Topology
203
Key management scheme using secret sharing for multi-device based DRM
204
Key Management Scheme with Bionic Optimization
205
Key management schemes for secure group communication in wireless networks - A survey
206
Key management schemes in Wireless Sensor Networks: A survey
207
Key management solutions in the smart grid environment
208
Key Management Standards Hit the Fast Track
209
Key Management System of IC Card based on information security
210
Key management technique for heterogeneous wireless sensor networks
211
Key management technique for WSNs
212
Key Management Using Biometrics
213
Key Management Using K-Dimensional Trees
214
Key management with minimized secret storage employing an erasure channel approach
215
Key mechanisms for wireless sensor networks
216
Key members
217
Key Members of MTT-S Compiled July 2009 [Microwave Musings]
218
Key Message Algorithm: a communication optimization algorithm in cluster-based parallel computing
219
Key Microstructural Features of MOD YBa2Cu3O7−∂ Films on Textured Nickel Substrates
220
Key Microwave-Photonics Technologies for Next-Generation Cloud-Based Radio Access Networks
221
Key module design of a battery-less TPMS on chip
222
Key motion spotting in continuous motion sequences using motion sensing devices
223
Key network approach reveals new insight into Alzheimer´s disease
224
Key node selection for containing infectious disease spread using particle swarm optimization
225
Key nodes and corridors identifying method for large-scale evacuation network based on information centrality
226
Key nodes based spectrum sensing for cognitive radio
227
Key Nodes Discovery in Large-Scale Logistics Network Based on MapReduce
228
Key nodes evaluation with multi-criteria in complex networks based on AHP analysis
229
Key nodes mining in transport networks based in PageRank algorithm
230
Key nonlinear measurement events
231
Key note - "what I wish I knew when I was 20"
232
Key note address details
233
Key note address details [program schedule]
234
Key note address title: Internet of Things (IoT)
235
Key note lecture - Microprocessors evolution
236
Key note lecture and tutorials [3 abstracts]
237
Key note lecture multidisciplinary in cryptology and information security
238
Key Note Speaker
239
Key note speech 1: Predicting the overall value of decisions relating to software
240
Key notes
241
Key notes and guest sessions - IESM2015
242
Key Objects Based Profile for a Content-Based Video Information Retrieval and Streaming System Using Viewpoint Invariant Regions
243
Key observation selection for effective video synopsis
244
Key of packaged granary grain quantity recognition —Grain bags image processing
245
Key optoelectronic components for optical networks
246
Key outcomes from life cycle assessment of vehicles, a state of the art literature review
247
Key paradigms of emerging imaging sensor technologies
248
Key Parameter Oriented Performance Meta-Model of Avionics System
249
Key parameters for contention resolution in multi-fiber Optical Burst/Packet Switching nodes
250
Key parameters for fast Ni dissolution during electromigration of Sn0.7Cu solder joint
251
Key parameters for high-quality vacuum casting
252
Key parameters for modeling information diffusion in populations
253
Key parameters for precise lateral displacement estimation in ultrasound elastography
254
Key Parameters in Identifying Cost of Spam 2.0
255
Key parameters influence on wavelet based OFDM systems
256
Key parameters of BiMOS ESD protection device for UTBB FDSOI advanced technology
257
Key participants in combating terrorism
258
Key Parts of Sugar Cane Harvester Conceptual Design Method and Analysis
259
Key performance assessment of fuel cell based distributed energy generation system in resilient micro energy grid
260
Key performance indicators (KPIs) for evaluation of energy conservation in buildings
261
Key performance indicators evaluation for LTE networks implementation
262
Key performance indicators for an improved grid
263
Key Performance Indicators for energy efficient asset management in a factory automation testbed
264
Key performance indicators for operational quality in the oil and gas industry a case study approach
265
Key performance indicators for sustainable manufacturing evaluation in automotive companies
266
Key performance indicators for the evaluation of balanced lines
267
Key Performance Indicators used in ERP performance measurement applications
268
Key Performance Indices to Monitor Bidding Behaviors in Electricity Market
269
Key performance issues in Surface Collaborative Decision Making
270
Key performance issues in surface collaborative decision making
271
Key performance study of micro-quartz gyro for measurement-while-drilling
272
Key Picture Error Concealment Using Residual Motion-Copy in Scalable Video Coding
273
Key player based optimal deployment of sink nodes in wireless sensor network
274
Key Player Identification: A Note on Weighted Connectivity Games and the Shapley Value
275
Key Point Detecting and Matching for Microscopic Images of MEMS Components Based on Template Method
276
Key Point Detection and High Speed Image Registration Using BLoG
277
Key Point Detection by Max Pooling for Tracking
278
Key point for the future challenges of the SmartGrids: The architecture of the Smart T-Station
279
Key point reduction in SIFT descriptor used by subtractive clustering
280
Key points analysis on product structure design
281
Key points based segmentation of lips
282
Key points for adoption of business process reengineering into former communist countries
283
Key points in enacting provincial soil erosion and water loss crisis emergency response plan
284
Key points of Multimedia teaching of General Technology
285
Key points recognition of pulse wave based on wavelet transform
286
Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure
287
Key power semiconductor device concepts for the next decade
288
Key power semiconductor devices and development trends
289
Key power semiconductor devices and development trends
290
Key Practice Areas of Lean Manufacturing
291
Key Pre-Distribution and the Average Distance in Wireless Sensor Networks
292
Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix
293
Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks
294
Key pre-distribution based secure backbone formation in wireless sensor networks
295
Key pre-distribution in wireless sensor networks using multivariate polynomials
296
Key Pre-distribution Scheme for Little Storage Space and Strong Security Strength in Large-Scale Wireless Sensor Network
297
Key predistribution scheme using keyed-hash chain and multipath key reinforcement for wireless sensor networks
298
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks
299
Key Pre-Distribution Schemes for Large-Scale Wireless Sensor Networks Using Hexagon Partition
300
Key predistribution schemes for sensor networks using lines,points over a finite geometry
301
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks
302
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks
303
Key Principles for the provision of high quality telecommunication services 4G mobile users at speeds up to 300 Km/H
304
Key privacy and anonymous protocols
305
Key Privacy in McEliece Public Key Cryptosystem
306
Key Problems and Thorny Issues in Multidimensional Visualization
307
Key problems of Polish electric power system reliability
308
Key problems of reliability and power quality in Polish electric power system under restructuring
309
Key Problems on Network-on-Chip
310
Key Problems Research For E-commerce Databases Integration System
311
Key process and difficulty analysis of pipe sections prefabrication of immersed tunnel and research on the solving measures
312
Key Process Areas in Systems Integration
313
Key process development on 300mm wafer for 2.5D/3D integration
314
Key process extraction model based on FAHP and quality house in manufacturing process
315
Key Process steps for high reliable SiOCH low-k dielectrics for the sub 45nm technology nodes
316
Key process technology for high density 64M FeRAM and beyond
317
Key processes in the bow shock region
318
Key properties and design issues for an opto-electronic oscillator
319
Key properties in PbSrSe thin films and PbSe/PbSrSe quantum wells for mid-infrared optoelectronic applications
320
Key quality dimensions from the customer’s point of view: a case study in two Portuguese hotels
321
Key randomization using a power analysis resistant deterministic random bit generator
322
Key rate of quantum key distribution with hashed two-way classical communication
323
Key rate of the B92 quantum key distribution protocol with finite qubits
324
Key recommendation for key agreement in public safety mesh networks
325
Key reconciliation in quantum key distribution
326
Key recovery and confidentiality oops, where did I put that key?
327
Key Recovery Attack on a Knapsack Public Key Cryptosystem
328
Key recovery attack on ANSI retail MAC
329
Key recovery attack on ANSI X9.19 retail MAC
330
Key recovery in IPSec for improving robustness
331
Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds
332
Key Recycling in Authentication
333
Key re-dissemination for maintaining detection power in sensor networks
334
Key reduction of McEliece´s cryptosystem using list decoding
335
Key re-establishment protocols in hierarchical wireless sensor networks
336
Key Refreshing in Identity-Based Cryptography and its Applications in MANETs
337
Key refreshment management for conditional access system in DTV broadcasting
338
Key regulatory elements in Electric Power industry: Russia vs. European Union
339
Key renewal scheme for clustering routing protocols in wireless sensor networks
340
Key renewal scheme with sensor authentication under clustered wireless sensor networks
341
Key Replicating Attack on an Identity-Based Three-Party Authenticated Key Agreement Protocol
342
Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
343
Key requirements for CAVE simulations
344
Key requirements of micro fuel cell system for portable electronics
345
Key requirements of packet transport network based on MPLS-TP
346
Key requirements of packet transport network based on MPLS-TP
347
Key research challenges in network management
348
Key Research Issues for Privacy Protection and Preservation in Cloud Computing
349
Key Research Issues for Reconfigurable Network-on-Chip
350
Key research journals embrace self-censorship
351
Key research problems in NoC design: a holistic perspective
352
Key Result Employee (KRE) Retention: "Entrapping the Mammoth"
353
Key results in ITER safety analysis
354
Key retrieval for decryption of a random-phase multiplexing data storage system
355
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
356
Key risk factors affecting electrical safety in hazardous (classified) locations
357
Key risk factors for Polish State Fire Service: A Data Mining Competition at Knowledge Pit
358
Key Role of Non Equilibrium Spin Density in Determining Spin Torque
359
Key Role of the Lakes in Runoff Supplement in the Mid-lower Reaches of the Yangtze River During Typical Drought Years
360
Key role of value-oriented requirements to develop real-time database systems
361
Key roles of green technology for access network systems
362
Key Roles of Information Granulation and Fuzzy Logic in Human Reasoning, Concept Formulation and Computing with Words
363
Key Roles of Session State: Not against REST Architectural Style
364
Key scientific issues of present day disaster management scenario
365
Key search and adaptation based on association rules for backward secrecy
366
Key security measures for personal data protection in IT systems
367
Key selection criteria for third party logistics in the IC manufacturing industry
368
Key sessions
369
Key set management in networked building automation systems using multiple key servers
370
Key shape recognition algorithm based on genetic neural network
371
Key Sharing in Hierarchical Wireless Sensor Networks
372
Key sharing scheme based on one weighted threshold secret sharing
373
Key Sharing Technique to Preserve Integrity and Confidentiality
374
Key skill study of impregnated cathode unit applied in multiple beam klystron
375
Key slide-segments annotation for presentation videos
376
Key snooping technology causes controversy
377
Key Software Engineering Concepts for Project Success: The Use of "Boot Camp" to Establish Successful Software Projects
378
Key Solution to Coalmine Ventilation Network Graphics CAD
379
Key Space of Cryptosystem Based on Chebyshev Polynomials over Finite Field
380
Key speakers
381
Key specifications and implementation of WCDMA receiver
382
Key splitting for random key distribution schemes
383
Key Standards for BT’s 21st Century Network
384
Key states approach in the analysis of traffic-control strategies in a trunked mobile system
385
Key strength with encryption and dynamic location of mobile phone
386
Key Stroke Profiling for Data Loss Prevention
387
Key structure and process for pulsed power switch SiC RSD
388
Key sub 1nm EOT CMOS enabler by comprehensive PMOS design
389
Key success factors affecting choice in an emergent technology base
390
Key Success Factors for Korea´s Broadband
391
Key success factors for late adopters of inter-organisational systems: a non-technical perspective from Irish organisations
392
Key success factors for managing offshore outsourcing of software production using the ICT-supported unified process model: A case experience from Finland, India, Nepal and Russia
393
Key success factors for open innovation intermediaries for SMEs: A case study of iTAP in Thailand
394
Key success factors for technological entrepreneurs´ R&D projects
395
Key success factors in 3G services adoption: a consumer perspective
396
Key success factors in the emerging landscape of mobile music services
397
Key success factors of a regional software process improvement programme
398
Key success factors of electronic commerce Web sites
399
Key success factors realizing the European offshore wind success story
400
Key success factors to promote knowledge co-creation in technology development organizations
401
Key Successful Factors on Information Identifying and Assessing of Enterprise Risk Management
402
Key system for security
403
Key system issues in real-time radar management
404
Key Technical Challenges for the Electric Power Industry and Climate Change
405
Key technical considerations when using Ethernet solutions in existing ATM and frame relay networks
406
Key technique analysis of data fusion with infrared sensor in defense system
407
Key Technique Analysis of the Management Information System for Provincial Mineral Resources Based on ArcGIS
408
Key Technique of Assembly System in an Augmented Reality Environment
409
Key technique of floods prevention information system based on GIS
410
Key Technique of Gas Sucking of "Three-Soft" Coal Bed and Its Application
411
Key technique of video index based on scenario segmentation and content indexing
412
Key technique research of image retrieval based on combination feature
413
Key Technique Study of Channel Evaluation in Adaptive Frequency Hopping Systems
414
Key techniques about the process integration for product design
415
Key Techniques Analysis on Surface Restructuring Based on Diffraction Grating Projection Photography
416
Key techniques and development trend of guidance and control for hypersonic vehicle
417
Key Techniques and Methods for Imaging Iris in Focus
418
Key techniques for actualizing smart antenna hardware
419
Key Techniques for Designing Free Piston Stirling Engine
420
Key techniques for multi-satellite integrated navigation system modeling and controlling
421
Key techniques in adaptive polarization mode dispersion compensation: sampling and feedback control
422
Key techniques in green communication
423
Key Techniques in Robocup Middle-Sized Soccer Research
424
Key Techniques in Smart Substation
425
Key techniques of Doppler Delay Mapping Receiver for GPS remote sensing
426
Key Techniques of Eye Gaze Tracking Based on Pupil Corneal Reflection
427
Key techniques of haptic related computation in virtual liver surgery
428
Key techniques of High Efficiency Video Coding standard and its extension
429
Key Techniques of Interoperable DRM on Linux Platform
430
Key Techniques of Multicast Communication for Network on Chip
431
Key Techniques of Surface Crack Extension Simulation by Finite Element Method
432
Key Techniques on Design of Laser High-speed Video System for Recording Metal Transfer in Arc Welding
433
Key techniques research in computer-aided hepatic lesion diagnosis system based on multi-phase CT images
434
Key Techniques Research on a New Vehicular Speech Recognition System
435
Key technniques of distributed geospatial information operations
436
Key technological research of fingerprint collection and identification based on OMAP5912
437
Key technologies analysis of small scale non-grid-connected wind turbines: A review
438
Key Technologies Analysis of Three Sides Chinese Chess Computer Game
439
Key technologies analysis of ZigBee network layer
440
Key Technologies and Applications of Internet of Things
441
Key technologies and applications of present and future satellite communications
442
Key Technologies and New Developments of Next Generation Video Coding Standard HEVC
443
Key Technologies and Optimization for Dynamic Migration of Virtual Machines in Cloud Computing
444
Key technologies and research development of CMOS image sensors
445
Key technologies and test method of Remote Terminal in intelligent distribution automation system
446
Key technologies based on injection locked lasers for millimeter waveband radio over fiber access networks
447
Key technologies for 10 Gb/s optical fiber transmission systems
448
Key technologies for 500-MHz VLSI system ULTIMATE
449
Key technologies for a coherent optical trunk line system
450
Key Technologies for an Integrated Power Generation System of Wind, Photovoltaic and Energy Storage Unit
451
Key technologies for AUV "URASHIMA"
452
Key Technologies for Building Universal Platform for 2D/3D Medical Image Registration
453
Key technologies for developing a 420 kV 50 kA GCB interrupter unit
454
Key Technologies for Developing a 420 kV 50 kA GCB Interrupter Unit
455
Key technologies for elastic optical networks
456
Key technologies for future IC manufacturing: a view from Europe
457
Key technologies for future motor drives
458
Key Technologies for Green Data Center
459
Key Technologies for Healthcare Sensor-Net Services - The Next Technology Frontier Towards Realworld IT -
460
Key technologies for high-speed digital coherent optical communications
461
Key technologies for IMT-advanced mobile communication systems
462
Key technologies for intelligent and safer cars - From motion estimation to predictive collision avoidance
463
Key technologies for microgrids-a review
464
Key technologies for next-generation terrestrial digital television standard DVB-T2
465
Key technologies for novel wavelength-selective photodetectors
466
Key technologies for passive double star system
467
Key technologies for renewable energy integration — A full scale demonstration at Hainan Island
468
Key Technologies for Security Enhancing of Payment Gateway
469
Key Technologies for Solid State Lighting
470
Key technologies for solid state lighting
471
Key technologies for SON in next generation radio access networks
472
Key technologies for system-integration in the automotive and Industrial Applications
473
Key technologies for terabit/second WDM systems with high spectral efficiency of over 1 bit/s/Hz
474
Key technologies for the next generation wireless communications
475
Key technologies for wireless networking in the next decade
476
Key technologies in cloud computing
477
Key technologies in development of a telecare robotic system
478
Key technologies in SCDMA wireless access
479
Key Technologies in Semi-physical Periscope Scene Simulation System
480
Key technologies in the integrated circuit design for the construction of a wireless healthcare system
481
Key technologies of 3D surface inspection for complex workpiece using OMP60 probe
482
Key technologies of 3DVR digital information platform for shearer
483
Key Technologies of a Terahertz Source Based on Free Electron Lasers
484
Key technologies of aerial photogrammetric drift angle automatic adjust-and-control system
485
Key Technologies of ARINC664 Bus Testing
486
Key Technologies of ASP Based Collaborative Design
487
Key technologies of coordination and optimization dispatching for UHV AC&DC transmission network
488
Key technologies of crane training simulator
489
Key technologies of digital-current-controlled Bidirectional DC-DC converter in the hybrid electric vehicle
490
Key technologies of ethernet based on visible light FSO communication
491
Key technologies of fireproofing and insulation system for polyurethane foam and moulding board with glazed-hollow-bead
492
Key technologies of Geomagnetic Aided Inertial Navigation System
493
Key technologies of GE-PON burst-mode receivers and future PON systems
494
Key technologies of green building design and their software simulation
495
Key technologies of junction boxes for Chinese experimental ocean observatory networks
496
Key technologies of large and medium power electromechanical energy conversion under extreme operating conditions
497
Key technologies of Mainstream Software Sharing Platform for Oil & Gas Exploration and Development
498
Key Technologies of Manufacturing Information System Management Supporting Networked Manufacturing
499
Key technologies of medical monitoring system of smart home
500
Key technologies of micro-manipulation system oriented complex task
501
Key technologies of network traffic measurement
502
Key Technologies of Passive Wireless Sensor Networks Based on Surface Acoustic Wave Resonators
503
Key technologies of pre-processing and post-processing methods for embedded automatic speech recognition systems
504
Key Technologies of the Dual-mode Electronic Commerce
505
Key technologies of the new concept safety system for vehicle automatic anti-collision
506
Key Technologies of the Virtual Driving Platform Based on EON
507
Key technologies of three-terminal DC transmission system based on modular multilevel converter
508
Key technologies of UAV calibration flight
509
Key Technologies of WDM-PON for Future Converged Optical Broadband Access Networks [Invited]
510
Key technologies of WLAN accessing 3GPP PS based services
511
Key technologies on rapid web publication of spatial data
512
Key technologies on YAG laser engraving ceramic anilox roll
513
Key technologies overview on mobile Internet access and mobility support
514
Key technologies research of network information filtering based on Improved Genetic Algorithms
515
Key Technologies Research on Credible E-Commerce Platform of Professional Market
516
Key technologies research on outage plan optimization in distribution grid
517
Key Technologies Researched on VP and GLS for Virtual CNC Machine System
518
Key technologies to expand optical networking capabilities
519
Key Technology Analysis and Application Research of Accounting Informationization under Cloud Environment
520
Key technology analysis for active compressor stabilization control of aero-engine
521
Key technology analysis of implementing lean production
522
Key technology analysis of sub-millimetre wave seeker
523
Key technology and engineering application of online virtual measurement of distribution network
524
Key technology and solution to improve throughput in wireless mesh networks
525
Key Technology and System Design in Mobile Supply Chain Management
526
Key technology design of 6 GSPS high-speed digital storage oscilloscope
527
Key technology development and future prospect for high-voltage Light-Emitting Diodes
528
Key technology discussion of automatic monitoring about the weather modification operation
529
Key technology for high density rewritable DVD (DVD-RAM)
530
Key technology for multi-gigabit optical transmission systems
531
Key technology for smart grid dispatching aided decision
532
Key Technology in Detecting and Eliminating Isomerism Fibre in Cotton
533
Key technology in embedded control system of jacquard knitting
534
Key Technology in Three-Dimensional Modeling for Cultural Heritages
535
Key Technology of Dynamic Visual Image Modeling Basing on Mobile Robot Self-Organizing Network
536
Key Technology of Intelligent and On-demand Data Service in Multi- Space Agency
537
Key Technology of Magnetostrictive Fuel Sensor
538
Key Technology of Micro Navigation System for Automobile Based on ARM-Linux Platform
539
Key Technology of Network Integration for Urban Rail Transit System
540
Key technology of network monitoring and early warning system for wharf mooring
541
Key Technology of Online Auditing Data Stream Processing
542
Key Technology of Semi-autonomous Control Based on Plan Recognition for Intelligent Wheelchair
543
Key Technology of Single-Cylinder Air-Cooled Diesel
544
Key technology of the Arc Scanning System research
545
Key technology of water environmental data sharing platform — With the sample of Liao River Basin in China
546
Key technology on off-turning degree in resonant grounding power network
547
Key technology research and application of live working technology on EHV/UHV transmission lines in China
548
Key Technology Research for the Production Monitoring and Control System of the Coning, Drawing and Twisting Workshop
549
Key technology research of BLDCM for high performance driving system
550
Key technology research of CHINA Advanced Metering Infrastructure
551
Key technology research on adaptation layer of android platform
552
Key Technology Research on Data Conversion between B-Rep Based CAD and VR Model
553
Key Technology Research on Dynamic Web Service Composition Based on Semantic Web
554
Key technology research on fault detection and diagnosis for broken-wing small unmanned aerial vehicle
555
Key Technology Research on Intelligent CAPP System Based on PDM
556
Key Technology Research on the Flexible Welding Line for Multi-model Automobile
557
Key Technology Research on the Reproduction of Flight Level Path in Approach and Landing Phase
558
Key Technology Research on User Identity Resolution across Multi-social Media
559
Key Technology Study on 3D Simulation Roaming System for Large-Scale Outdoor Scene
560
Key technology to 5G network
561
Key technology with large-scale three-dimensional terrain management
562
Key terrain in cyberspace: Seeking the high ground
563
Key to a successful cell library development: design methodology
564
Key to authors
565
Key to authors
566
Key to authors
567
Key to authors
568
Key to authors
569
Key to authors
570
Key to authors
571
Key to authors
572
Key to authors
573
Key to authors
574
Key to authors
575
Key to authors
576
Key to authors
577
Key to authors
578
Key to authors
579
Key to authors
580
Key to authors and presiders
581
Key to authors and presiders
582
Key to authors and presiders
583
Key to authors and presiders
584
Key to authors and presiders
585
Key to authors and presiders
586
Key to authors and presiders
587
Key to authors and presiders
588
Key to authors and presiders
589
Key to authors and presiders
590
Key to authors and presiders
591
Key to authors and presiders
592
Key to authors and presiders
593
Key to authors and presiders
594
Key to authors and presiders
595
Key to authors and presiders
596
Key to authors and presiders
597
Key to authors and presiders
598
Key to authors and presiders
599
Key to authors and presiders
600
Key to authors and presiders
601
Key to authors and presiders
602
Key to authors and presiders
603
Key to authors and presiders
604
Key to authors and presiders
605
Key to authors and presiders [index]
606
Key to Presenters
607
Key to Presenters
608
Key to Presenters
609
Key to presenters
610
Key to presenters
611
Key to presenters
612
Key to presenters
613
Key to presenters [author index]
614
Key to presenters [author index]
615
Key to productivity is investment in managers
616
Key to saving Midtown USA, mass transit and electric vehicles
617
Key to survival---one robot per IProdE member
618
Key to the success of asynchronous transfer mode: an application programming interface
619
Key Topics in Cloud Computing Security: A Systematic Literature Review
620
Key topological parameters for the wavelength-routed optical network design
621
Key Tradeoffs in SAW Transducer Design and Component Specification
622
Key Transfer Protocol Based on Secret Sharing Using Initiator
623
Key Transport and Entity Authentication Based On Two-Dimensional Construction Method
624
Key trees and the security of interval multicast
625
Key trends in the semiconductor industry
626
Key Update Assistant for resource-constrained networks
627
Key Update Mechanism for Network Storage of Encrypted Data
628
Key Update Mechanism in PKI: Study and a New Approach
629
Key Updating for Leakage Resiliency With Application to AES Modes of Operation
630
Key usage patterns for apache Hadoop in the enterprise
631
Key value ordering heuristic for solving algorithm based on the AC-4 algorithm
632
Key variable identification using discriminant analysis
633
Key variable identification using nonlinear variable weighting
634
Key view selection in distributed multiview coding
635
Key West-Havana submarine telephone cable system
636
Key West-Havana Submarine Telephone Cable System
637
Key winning factors in deploying personal communications networks
638
Key word index
639
Key word index
640
Key word index
641
Key word index
642
Key Word Index
643
Key word index
644
Key word index
645
Key word index
646
Key word index
647
Key word index
648
Key word index
649
Key word index
650
Key words about encryption, MAC and HDTV
651
Key.net: A system and method for accessing offline lock system by the Internet- made key using barcode technology
652
Keya Banerjee Magical Realism
653
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
654
Key-Based Coded Permutation ciphers with improved error performance and security in wireless channels
655
Key-based melody segmentation for popular songs
656
Key-Based Problem Decomposition for Relational Constraint Satisfaction Problems
657
Keyboard acoustic emanations
658
Keyboard and mouse interaction based mood measurement using artificial neural networks
659
Keyboard arrangements
660
Keyboard control method for virtual reality micro-robotic cell injection training
661
Keyboard encoding of facial expressions
662
Keyboard encryption
663
Keyboard layout mismatch error detection and correction system utility
664
Keyboard maestro
665
Keyboard market ripe for Cherry
666
Keyboard music transcription by computer
667
Keyboard of Automatic Teller in Braille Code
668
Keyboard optimization using genetic techniques
669
Keyboard or keylogger?: A security analysis of third-party keyboards on Android
670
Keyboard Security: A Technological Review
671
Keyboard-Behavior-Based Authentication
672
Keyboard-controlled signing semantroid
673
Keyboardless visual programming using voice, handwriting, and gesture
674
Keyboards redux: fast mobile text entry
675
KeyBunch: A Novel Approach to Key Management
676
Keychain-Based Signatures for Securing BGP
677
Key-Compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols
678
Key-Dependent Compressed Domain Audio Hashing
679
Key-dependent Message Security under Active Attacks--BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
680
Keyed axis single-polarisation all-fibre DFB laser
681
Keyed logic BIST for Trojan detection in SoC
682
Keyed pilot SSB - An alternative system for VHF mobile radio
683
Keyed Scalable Minutiae Coding
684
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks
685
Key-exchange authentication using shared secrets
686
Keyfacts Passcards: O-Level and CSE Electronics
687
Keyflow: a prototype for evolving SDN toward core network fabrics
688
Keyframe and inlier selection for visual SLAM
689
Keyframe animation and motion capture for creating animation: a survey and perception from industry people
690
Keyframe Animation from Video
691
Key-frame based video fingerprinting by NMF
692
Keyframe Based Video Object Deformation
693
Keyframe compression and decompression for time series data based on the continuous hidden Markov model
694
Keyframe detection for appearance-based visual SLAM
695
Key-Frame Extraction Algorithm Based on Entropy
696
Key-frame extraction and key-frame rate determination using human attention modeling
697
Key-frame extraction and video summarization using QR-Decomposition
698
Key-frame extraction based on clustering
699
Keyframe extraction based on kmeas results to adjacent DC images similarity
700
Key-frame extraction for Object-based Video Segmentation
701
Key-frame extraction for video captured by smart phones
702
Key-frame extraction of wildlife video based on semantic context modeling
703
Keyframe extraction using AdaBoost
704
Key-frame extraction using dominant-set clustering
705
Key-Frame Extraction Using Kernel-Based Locality Preserving Learning
706
Keyframe Extraction Using Local Visual Semantics in the Form of a Region Thesaurus
707
Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering
708
Keyframe Reduction Techniques for Motion Capture Data
709
Key-Frame Redundancy Transmitting Algorithm for Streaming Media Transmission
710
Keyframe selection for motion capture using motion activity analysis
711
Key-frame selection in WCE video based on shot detection
712
Keyframe-based bi-directional 2-D mesh representation for video object tracking and manipulation
713
Keyframe-based modeling and tracking of multiple 3D objects
714
Keyframe-based real-time camera tracking
715
Keyframe-based user interfaces for digital video
716
Keyframe-Based Video Summary Using Visual Attention Clues
717
Keyframe-Guided Automatic Non-linear Video Editing
718
Keyframes detection and analysis in vocal folds recordings using hierarchical motion techniques and texture information
719
Keyframing to Fame
720
Key-free safe based on palmprint recognition
721
KeyGraph and WordNet hypernyms for topic detection
722
KeyGraph: automatic indexing by co-occurrence graph based on building construction metaphor
723
KeyGraph-based BBS for Online Chance Discovery
724
KeyGraph-Based Social Network Generation for Mobile Context Sharing
725
Keyhole and multi-keyhole MIMO channels: Modeling and simulation
726
Keyhole coherent diffraction imaging of an extended transparent sample using curved multilayer mirrors
727
Keyhole diffusion tensor imaging - a fast spin-echo based DTI technique
728
Keyhole Effect in Dual-Hop MIMO AF Relay Transmission with Space-Time Block Codes
729
Keyhole Effect in MIMO Wireless Channels: Measurements and Theory
730
Keyhole Effects in MIMO Wireless Channels - Measurements and Theory
731
Keyhole Estimation of an MIMO-OFDM Train-to-Wayside Communication System on Subway Tunnels
732
Keyholes, correlations and capacities of multi-element transmit and receive antennas
733
Keyholes, correlations, and capacities of multielement transmit and receive antennas
734
Key-Hopping Based Communications
735
Keying material based key pre-distribution scheme
736
Key-Insulated Group Signature Scheme with Selective Revocation
737
Key-Insulated Group Signature Scheme with Verifier-Local Revocation
738
Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption
739
Key-key-value stores for efficiently processing graph data in the cloud
740
KeyLabel algorithms for keyword search in large graphs
741
Key-layered normal distributions transform for point cloud registration
742
KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks
743
Keyless Authentication in a Noisy Model
744
Keyless car entry through face recognition using FPGA
745
Keyless entry system with radio card transponder [automobiles]
746
Keyless Jam Resistance
747
Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption
748
Keyloggers
749
Keylogging-Resistant Visual Authentication Protocols
750
Key-Management Infrastructure for Protecting Stored Data
751
Key-management scheme based on identity and cluster layer in wireless sensor network
752
KeyMenu: a keyboard based hierarchical menu
753
KeyMG
754
Key-Node-Separated Graph Clustering and Layouts for Human Relationship Graph Visualization
755
Keynote
756
Keynote
757
Keynote
758
Keynote
759
Keynote
760
Keynote
761
Keynote
762
Keynote
763
Keynote
764
Keynote
765
Keynote
766
Keynote
767
Keynote
768
Keynote
769
Keynote
770
Keynote
771
Keynote
772
Keynote
773
Keynote
774
Keynote
775
Keynote
776
Keynote
777
Keynote
778
Keynote
779
Keynote
780
Keynote
781
Keynote
782
Keynote
783
Keynote
784
Keynote
785
Keynote
786
Keynote
787
Keynote
788
Keynote
789
Keynote
790
Keynote
791
Keynote
792
Keynote
793
Keynote
794
Keynote
795
Keynote
796
Keynote
797
Keynote
798
Keynote
799
Keynote
800
Keynote
801
Keynote - Automotive Communication: Communication Requirements for Automotive Systems
802
Keynote - Crossing the chasm: guiding digital network technology into the consumer world
803
Keynote - intelligent technology for community-centric systems
804
Keynote - SRA - Strategic Rail Authority
805
Keynote - The connected home
806
Keynote - Title to be advised
807
Keynote - Wireless Communication: WLANs as Part of Future Wireless Communication Systems
808
Keynote & invited speaker´s biography
809
Keynote & invited speaker´s biography
810
Keynote & invited speaker´s biography
811
Keynote & invited speaker´s biography
812
Keynote & invited speaker´s biography [7 biographies]
813
Keynote / plenary session
814
Keynote : Management of technology
815
Keynote : Management of technology
816
Keynote : Wireless sensor networks powered by ambient energy harvesting
817
Keynote : Wireless sensor networks powered by ambient energy harvesting
818
Keynote [2 abstracts]
819
Keynote [2014 IEEE 7th International Conference on Service-Oriented Computing and Applications. Proceedings]
820
Keynote [Bill Neugent biography]
821
Keynote [Road User Charging]
822
Keynote 02 (ICSIMA) talk title 25 November 2014
823
Keynote 1
824
Keynote 1
825
Keynote 1
826
Keynote 1
827
Keynote 1
828
Keynote 1
829
Keynote 1
830
Keynote 1
831
Keynote 1
832
Keynote 1
833
Keynote 1
834
Keynote 1
835
Keynote 1
836
Keynote 1
837
Keynote 1
838
Keynote 1
839
Keynote 1
840
Keynote 1
841
Keynote 1
842
Keynote 1
843
Keynote 1
844
Keynote 1
845
Keynote 1
846
Keynote 1
847
Keynote 1
848
Keynote 1 - Algorithmic Methods for Sponsored Search Advertising
849
Keynote 1 - From data to information to flow
850
Keynote 1 - Strong Programming Model for Strong Weak Mobility: The ProActive Parallel Suite
851
Keynote 1 — It´s about time
852
Keynote 1 — Moore´s law, programmable logic and reconfigurable systems
853
Keynote 1 — Peter Chochrane
854
Keynote 1 — The once and future FPGA: The confluence of configurable processing and reconfigurable technology
855
Keynote 1 — VLSI 2.0: R&D Post Moore
856
Keynote 1 NoCs: It is about the memory and the programming model
857
Keynote 1. PHY LAYER and standardization
858
Keynote 1. Smart Networked Systems and Societies: What Will the Future Look Like?
859
Keynote 1: "Merger mania"
860
Keynote 1: "Recent developments in audio technology"
861
Keynote 1: Air Interfaces for Future-Generation Cellular Wireless Systems
862
Keynote 1: Big Data and Resource Sharing: A speech corpus and a Virtual Laboratory for facilitating human communication science research
863
Keynote 1: Big Data Can Open New Era of Healthcare by Sungyoung Lee
864
Keynote 1: Challenges of Virtualized System: Performance Point of View by Hai Jin
865
Keynote 1: Computer Go Game and Competition by Yeh-Ching Chung
866
Keynote 1: Converged Internet and Broadcast media delivery
867
Keynote 1: Developmental Robotics for Embodied Language Learning by Angelo Cangelosi
868
Keynote 1: Extending Persistent Meta-Modeling Systems to Handle Behavioral Semantics
869
Keynote 1: Food for the World - GeoComputation Meeting the Challenge
870
Keynote 1: grid computing: opportunities for bioinformatics research
871
Keynote 1: High Energy Physics: Present and future
872
Keynote 1: Intelligent Decision Support for Intelligence Data Analysis by Qiang Shen
873
Keynote 1: Intelligent Network Operations and Management — It´s about the data
874
Keynote 1: Is GaN a Game Changing Device ?
875
Keynote 1: Key trends in enterprise uptake of cloud computing
876
Keynote 1: LGTM - Software Sensing and Bug Smelling
877
Keynote 1: Miniaturization of ultra-wideband antennas
878
Keynote 1: Mobile cloud and crowd computing and sensing
879
Keynote 1: Nanoelectronics Challenges for the 21st Century
880
Keynote 1: Pairing Based Cryptography - Theory, Implementations and Applications
881
Keynote 1: The golden age of pervasive computing
882
Keynote 1: The Role of Functional Memories in Parallel Information Processing with Localized and Distributed Systems
883
Keynote 1: Using Clouds for Science
884
Keynote 1: Visualization for Software Analytics by Margaret-Anne (Peggy) Storey
885
Keynote 1: Wireless controlled and managed from the cloud
886
Keynote 2
887
Keynote 2
888
Keynote 2
889
Keynote 2
890
Keynote 2
891
Keynote 2
892
Keynote 2
893
Keynote 2
894
Keynote 2
895
Keynote 2
896
Keynote 2
897
Keynote 2
898
Keynote 2
899
Keynote 2
900
Keynote 2
901
Keynote 2
902
Keynote 2
903
Keynote 2
904
Keynote 2
905
Keynote 2
906
Keynote 2
907
Keynote 2
908
Keynote 2
909
Keynote 2 - Network Coding: A Revolution in the Making?
910
Keynote 2 - Unleashing Shared-Experience Communications in a Mobile World
911
Keynote 2 — “Reconfigurable Computing and Trust: Foundational technologies to enable trusted reconfigurable platforms”
912
Keynote 2 — Ioannis Tomkos
913
Keynote 2 — Past, current, and future of faster, cheaper, better
914
Keynote 2 — SpaceCube — A family of reconfigurable hybrid on-board science data processors
915
Keynote 2 ? Towards datacenter computing with FPGAs
916
Keynote 2 NoC´s at the center of chip architecture: Urgent needs (today) and what they must become (future)
917
Keynote 2. A Transformative Internet?
918
Keynote 2. ODFM-based high-speed narrowband PLC approved for Smart Metering and Smart Grids
919
Keynote 2: "Computing for big-data: Beyond CMOS and beyond Von-Neumann"
920
Keynote 2: A Bridge Over Troubled Water - Synergies between Model Transformation and Software Maintenance Techniques
921
Keynote 2: A Cloud-Based System for Facilitating Collaborative and Micro Learning in Mobile MOOC Learning by Jun Shen
922
Keynote 2: BlackBerry Success and Growth: Asia Pacific
923
Keynote 2: Cloud Platforms: Concepts, Definitions, Architectures, and Open Issues
924
Keynote 2: Deep Semimicron CMOS Technology- The Challenges for Semiconductor IDM
925
Keynote 2: Digital Identity Protection - Concepts and Issues
926
Keynote 2: Exascale computing and the democratisation of HPC
927
Keynote 2: Information-centric networking: Overview, current state and key challenges
928
Keynote 2: Intelligent Pattern Recognition and Applications
929
Keynote 2: Massive-Scale Parallel Network Simulations, Past, Present and Future by George Riley
930
Keynote 2: Microwave antennas for medical applications
931
Keynote 2: Optimization in Deterministic and Stochastic Graphical Models by Thomas Schiex
932
Keynote 2: Pains and Challenges in the Mobile Internet Evolution
933
Keynote 2: Perceptual and structural analysis of pronunciation diversity of World Englishes
934
Keynote 2: Pervasive communication and interaction to make the built environment better and more sustainable
935
Keynote 2: Smart-Sensing using Smart-Sensors
936
Keynote 2: The Intercloud: Cloud Interoperability at Internet Scale
937
Keynote 2: Time-Frequency Signal Representations by Martin J. Bastiaans
938
Keynote 2: TOSA concept: A full electric large capacity urban bus system
939
Keynote 2: using randomized techniques to build scalable intrusion-tolerant overlay networks
940
Keynote 2: Visualization and Human Vision: A Tale of Two Systems by Ronald A. Rensink
941
Keynote 2: Wireless Communication, Multimedia and Web Technologies for Museums by Jürgen Sieck
942
Keynote 3
943
Keynote 3
944
Keynote 3
945
Keynote 3
946
Keynote 3
947
Keynote 3
948
Keynote 3
949
Keynote 3 - Distributed Pattern Matching
950
Keynote 3 — Deep Medhi
951
Keynote 3 — Extreme scale challenges: Can reconfigurable computing come to the rescue?
952
Keynote 3 — The past and future of FPGA soft processors
953
Keynote 3 (Banquet Talk) Digital space
954
Keynote 3. PLC applications in Latin America utilities: The Smart Grid approach
955
Keynote 3. System and software assurance — Rationalizing governance, engineering practice, and engineering economics
956
Keynote 3: "Ensuring robustness in today´s IoT era"
957
Keynote 3: Computing with Membranes: An Overview
958
Keynote 3: Distributed processing in wireless ad hoc and sensor networks
959
Keynote 3: DLP Technology: Extreme Versatility
960
Keynote 3: HYDROS project: From flying boat to energy efficiency
961
Keynote 3: Interplay between Machine Learning and Artificial Intelligence by Yixin Chen
962
Keynote 3: Learner Analytics in E-Learning: Fuzzy Logic, Affective, Cognitive, and Decision by Maria Virvou
963
Keynote 3: Sensor Networks for Environmental Monitoring
964
Keynote 3: Topological Analysis of Network Attack Vulnerability
965
Keynote 3: Towards sustainability: Harnessing computing and communications for a better future
966
Keynote 3: Tutorial: An Overview of IEEE in General and IEEE Region 8 (Europe, Middle East, and Africa) in Particular by Martin Bastiaans
967
Keynote 3: Weighted transducers in speech and language processing
968
Keynote 4
969
Keynote 4
970
Keynote 4
971
Keynote 4 — Latif Ladid
972
Keynote 4. Next generation home networks: ITU-T G.hn and the HomeGrid forum
973
Keynote 4: can parallel software catch up with parallel hardware? Trends in automatic parallelization
974
Keynote 4: Communications standards: IEEE standards association and “ComSoc” perspectives
975
Keynote 4: Delivering 10x Design Improvements
976
Keynote 4: ITER: Fusion challenge and technologies
977
Keynote 5 — Josef Wozniak
978
Keynote 5. Research and customized solutions on any-wire IP-networks for multiple infrastructures
979
Keynote 5: Exploiting social metrics in content distribution
980
Keynote 5: Future Research Directions in Electronic Design Automation
981
Keynote 6: Future Analog Design and Upcoming Challenges in Nanometer CMOS
982
Keynote 7: Dr. Yervant Zorian
983
Keynote abstract
984
Keynote abstract
985
Keynote abstract
986
Keynote Abstract
987
Keynote Abstract - On the Use of Quantitative Models for Open-World Software
988
Keynote Abstract - The Effectiveness of CSP Model Checking
989
Keynote Abstract 1
990
Keynote Abstract 2
991
Keynote Abstract: Alessandro Cremonesi
992
Keynote abstract: From smart cities to smart communities: The case of children´s independent mobility
993
Keynote Abstract: Rich Goldman
994
Keynote abstract: Subspace search for community detection and community outlier mining in attributed graphs
995
Keynote Abstract: Thomas Williams
996
Keynote Abstracts
997
Keynote abstracts
998
Keynote abstracts
999
Keynote Abstracts
1000
Keynote Abstracts
بازگشت