<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Making discriminative common vectors applicable to face recognition with one training image per person
2
Making distance-learning work at the Veterans Benefits Administration
3
Making distortions comprehensible
4
Making distributed applications manageable through instrumentation
5
Making distributed rate control using Lyapunov drifts a reality in wireless sensor networks
6
Making distributed shared memory simple, yet efficient
7
Making distributed transactions resilient to intermittent network connections
8
Making DNA self-assembly error-proof: Attaining small growth error rates through embedded information redundancy
9
Making documents work: challenges for document understanding
10
Making domain-specific hardware synthesis tools cost-efficient
11
Making Doubly Rotated Quartz Plates
12
Making DRAM Refresh Predictable
13
Making driver modeling attractive
14
Making DTNs robust against spoofing attacks with localized countermeasures
15
Making eBooks accessible to blind Braille readers
16
Making E-business pay: eight key drivers for operational success
17
Making e-business work
18
Making eclipse attacks computationally infeasible in large-scale DHTs
19
Making Eco-Smart City in the future
20
Making EDI work in a multinational company
21
Making educational games that work in the classroom: A new approach for integrating STEM simulations
22
Making EEG output on human simulator
23
Making effective satellite network integration to terrestrial PSTN
24
Making effective use of CASE tools in automotive systems development
25
Making effective use of consultancy support [for quality control]
26
Making efficient logging a common practice in software development
27
Making e-government happen everyday co-development of services, citizenship and technology
28
Making EJS applications at the OSP digital library available from Moodle
29
Making e-learning work for the corporate engineering environment
30
Making Electric Things Happen
31
Making electricity
32
Making Electricity Personal: The Key to Effective Industry Communications
33
Making electronic information accessible to everyone
34
Making Embedded Software Development More Efficient with SOA
35
Making Engineering Education "Active"
36
Making engineers smart-and savvy [Education]
37
Making environments as canvases - Ubiquitous Display, from 2D to 3D -
38
Making Ethical Engineering Management Decisions in a Competitive Environment
39
Making Ethical Engineering-Management Decisions in a Competitive Environment (Part 1 of 2) [Ethically Speaking]
40
Making ethical engineering-management decisions in a competitive environment (part 2 of 2)
41
Making Ethics Easier
42
Making Every E-Vote Count
43
Making every microaneurysm count: A hybrid approach to monitor progression of diabetic retinopathy
44
Making Every Student a Winner: The WinWin Approach in Software Engineering Education
45
Making evolving design to perfection of high frequency inverter for induction heating applications: design of experiment approach
46
Making examinations ‘More Enjoyable’
47
Making excellence a habit: an introduction to BSI and standards
48
Making exceptions on exception handling
49
Making Expert Knowledge Explicit to Facilitate Tool Support for Integrating Complex Information Systems in the ATM Domain
50
Making Explicit the Moodle Instructional Design Language
51
Making faces [rapid prototyping techniques for reconstructive facial surgery]
52
Making failure the mother of success
53
Making Farnborough´s research pay
54
Making fast buffer insertion even faster via approximation techniques
55
Making fault data and non-SCADA data accessible for predictive analysis in data historians
56
Making FDT development more efficient
57
Making feasible walking motion of humanoid robots from human motion capture data
58
Making feature selection for human motion recognition more interactive through the use of taxonomies
59
Making FF Faster in ADL Domains
60
Making Figures for Class Materials Using KETpic Based on Symbolic Thinking
61
Making findbugs more powerful
62
Making flexible learning more flexible
63
Making flexible resistors out of conductive polymer fabrics
64
Making fly-by-light a reality
65
Making formal methods practical
66
Making formal methods work
67
Making formal software specification easy
68
Making Fourier-envelope simulation robust
69
Making fridge cabinets in an automated press line
70
Making Friends in Life and Online: Equivalence, Micro-Correlation and Value in Spatial and Transpatial Social Networks
71
Making Full Use of Education Games´ Role in Promoting Learning
72
Making full use of spatial-temporal interest points: An AdaBoost approach for action recognition
73
Making functional similarity count for more reliable effort prediction models
74
Making GaAs integrated circuits
75
Making G-AP relevant
76
Making garbage collection dependable through a run-time monitor
77
Making Garbage Collection Wear Conscious for Flash SSD
78
Making genome expression data meaningful: prediction and discovery of classes of cancer through a connectionist learning approach
79
Making Gentle the Life of the World
80
Making good choices of non-redundant n-gramwords
81
Making Good Codes for Classical-Quantum Channel Coding via Quantum Hypothesis Testing
82
Making good features track better
83
Making Graphical Information Visible in Real Shadows on Interactive Tabletops
84
Making greed work in networks: a game-theoretic analysis of switch service disciplines
85
Making Groupware Social: The Case of a Cooperative Platform for Surgeons
86
Making GRP mouldings the mass production way
87
Making GUI Testing Practical: Bridging the Gaps
88
Making handwritten archives documents accessible to public with a generic system of document image analysis
89
Making Hard Fun in Crowdsourced Model Checking -- Balancing Crowd Engagement and Efficiency to Maximize Output in Proof by Games
90
Making hard problems harder
91
Making Hardware Soft in Intelligent Systems
92
Making HCloud service trustworthy with TPM-based extesion
93
Making Health Care More Accessible to Rural Communities in Waslala, Nicaragua Using Low-Cost Telecommunications
94
Making Health Care Universally Accessible: The Emergence of Telemedicine as a Core Necessity [Student´s Corner]
95
Making High-Speed OQ Switches with QoS Guarantees Practical
96
Making HIRF Certification Economical
97
Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data
98
Making history alive and interactive: Designing an iPhone App to present the Summer War of Osaka byōbu
99
Making History Happen: Spatiotemporal Data Visualization for Historians
100
Making history: an emergent system for the systematic accrual of transcriptions of historic manuscripts
101
Making history: New directions in computer historiography [Think Piece]
102
Making history: The IEEE History Center
103
Making home automation communications secure
104
Making home DVD: dell´s movie studio bundle
105
Making home energy usage transparent for households using smart meters
106
Making HPM practical
107
Making HRI accessible to everyone through online videos: A proposal for a μMOOC in human robot interaction
108
Making Human Connectome Faster: GPU Acceleration of Brain Network Analysis
109
Making hydraulic manipulators cleaner and safer: From oil to demineralized water hydraulics
110
Making ICT accessible for the deaf
111
Making IEEE 802.11 wireless access programmable
112
Making image quality assessment robust
113
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
114
Making in the 21st Century [Guest editor´s introduction]
115
Making in-class competitions desirable for marginalized groups
116
Making indoor maps with portable accelerometer and magnetometer
117
Making industry fit: the conceptualization of a generic ´fit´ manufacturing strategy for industry
118
Making inexpensive micron-level measurements
119
Making inferences with small numbers of training sets
120
Making innovation happen: The role of standards and openness in an innovation-friendly ecosystem
121
Making Innovation Work for Tomorrow [Welcome Letter]
122
Making integrated electronics technology work
123
Making intelligence smarter
124
Making inter-domain routing power-aware?
125
Making inter-flow network coding possible for unicast routing in VANETs
126
Making internal processes external for constructive collaboration
127
Making IP traffic engineering robust to intra- and inter-AS transient link failures
128
Making IT a Positive Force in Environmental Change
129
Making It All Compute [My First Job]
130
Making It All Compute: Busting Cultural Barriers from Egypt to the United States
131
Making It all Up: Getting in on the Act to Improvise Creative Requirements
132
Making IT all work together enabling new business models in the web of everything
133
Making It All Work: The Engineering Graduate of the Future, a UK Perspective
134
Making it big
135
Making IT Green
136
Making it Hard to Lie: Cultural Determinants of Media Choice for Deception
137
Making it harder to unlock an LSIB: Honeytraps and misdirection in a P1687 network
138
Making IT outsourcing work for smaller enterprises
139
Making it Personal: How Personalization Affects Trust Over Time
140
Making It Real: Development and integration of in situ simulation operating rooms into the real operating room environment.
141
Making it together, locally: A making community learning ecology in the Southwest USA
142
Making it under duress
143
Making it work
144
Making It, Big Time-Is It Really Tougher for Women?
145
Making ITS communication technology acquisition decisions under uncertainty
146
Making Java work for microcontroller applications
147
Making Java/sup TM/ math libraries by translating Fortran
148
Making Java-enabled mobile phone as ubiquitous terminal by lightweight FIPA compliant agent platform
149
Making JavaScript Better by Making It Even Slower
150
Making Knowledge a Commodity: Increased Corporate Influence on Universities
151
Making knowledge discovery services scalable on clouds for big data mining
152
Making knowledge visible through intranet knowledge maps: concepts, elements, cases
153
Making large crystals
154
Making Large Music Collections Accessible using Enhanced Metadata and Lightweight Visualizations
155
Making Large Scale Deployment of RCP Practical for Real Networks
156
Making larger crystals
157
Making lasers pay the Eminox way
158
Making Lean Smart by Using System-of-Systems´ Approach
159
Making Learning Parallel Processing Interesting
160
Making learning ubiquitous with Mobile Translator using optical character recognition (OCR)
161
Making life easier-network design and management tools
162
Making light work - optical-fibre systems in the British Telecom network
163
Making light work harder
164
Making light work of energy bills
165
Making Linear Equations Accessible for Visually Impaired Students Using 3D Printing
166
Making lockless synchronization fast: performance implications of memory reclamation
167
Making logistic regression a core data mining tool with TR-IRLS
168
Making LRU friendly to weak locality workloads: a novel replacement algorithm to improve buffer cache performance
169
Making LSI Circuits: A Comparison of Processing Techniques
170
Making luck happen [from the Editor]
171
Making Machines Understand Us in Reverberant Rooms: Robustness Against Reverberation for Automatic Speech Recognition
172
Making maintenance contracts perform
173
Making Managerial Appraisal Effective
174
Making MANET Energy Efficient
175
Making Manufacturing Work For You
176
Making Many People Happy: Greedy Solutions for Content Distribution
177
Making mapreduce scheduling effective in erasure-coded storage clusters
178
Making markets: how firms can design and profit from online auctions and exchanges [Book Review]
179
Making markets: how firms can design and profit from online auctions and exchanges [Book Review]
180
Making mash-ups
181
Making Match Tradeoff System Based on Multi-agent in Mobile E-Commerce
182
Making Mathematics Meaningful
183
Making maximal measurements of ultrashort pulses with minimal effort
184
Making maximum use of legacy code: Transavia Internet booking engine
185
Making meaningful models for mere mortals
186
Making Medical Computation Affordable with VLSI
187
Making Medical Devices Accessible: A Drug-Resistant Malaria Detection System
188
Making medical treatments resilient to technological disruptions in telemedicine systems
189
Making meetings work - Mishandled meetings can be tedious and, at worst, an utter waste of time. Patrick Forsyth sets the agenda for making a success of those round-table situations.
190
Making Memory Transparent: Design of a Novice Programming Environment for C
191
Making memristors a reality: Advances in physical understanding and device integration
192
Making mental models manifest
193
Making mergers more effective through technology management
194
Making metals by computer
195
Making meta-object protocols practical for operating systems
196
Making Metaphors that Matter
197
Making microchips: policy, globalization, and economic restructuring in the semiconductor industry [Reviews]
198
Making microgrids work
199
Making Micrologic: The Development of the Planar IC at Fairchild Semiconductor, 1957–1963
200
Making migration easy: a key requirement for systems beyond 3G
201
Making miniaturisation pay dividends
202
Making minimal solvers fast
203
Making mistakes
204
Making MLSD decisions by thresholding the matched filter output
205
Making MLSD-decisions on some individual symbols thresholding the matched filter output
206
Making mobile agents communicate: a flexible approach
207
Making mobile code both safe and efficient
208
Making Mobile Health work: An alternative look at Mobile Health business models
209
Making mobile IP more efficient
210
Making Mobile Requirements Engineering Tools Usable and Useful
211
Making Mobile Users´ Devices Aware of the Surrounding Physical Environment: An Approach Based on Cognitive Heuristics
212
Making mobility transparent to the applications
213
Making money from digital today
214
Making money through quality
215
Making money with money: Your savings program may include several kinds of investment to provide the right combination of security, return, and liquidity
216
Making more out of open-source tools
217
Making movies of molecules with femtosecond electron wavepackets
218
Making MPLS VPNs manageable through the adoption of SDN
219
Making muJava more accessible
220
Making Multiagent System Designs Reusable: A Model-Driven Approach
221
Making multicast parallel packet switch practical
222
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
223
Making multimedia meeting records more meaningful
224
Making multi-port broadband structural HF antennas out of naval superstructures
225
Making multiuser MIMO work for LTE
226
Making music pay [digital music distribution]
227
Making music with DSP
228
Making music with MATLAB: an electronic music synthesis course for engineering students
229
Making NASA earth observing system satellite data accessible to the K-12 and citizen scientist communities
230
Making network interfaces less peripheral
231
Making networked research and development pay - Outsourcing offshore is synonymous with cutting costs, but organisations are forgetting that they´re doing it to be competitive
232
Making networked robots connectivity-aware
233
Making new connections at −20°C
234
Making new connections at −20°C [advertisement]
235
Making New Friends [president´s perspectives]
236
Making new history from old standards
237
Making new stuff work
238
Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs
239
Making nondeterminism unambiguous
240
Making nonlinear interference rejection work in QPSK-SS receivers
241
Making non-volatile nanomagnet logic non-volatile
242
Making Normal Coordinates Coincide with the Meshes of an Electrical Network
243
Making Object Oriented Efficient for Embedded System Applications
244
Making of a virtual world of Heijokyo from historical knowledge
245
Making of an ‘all reason’ electric Vehicle
246
Making of color chart for grape "Shine Muscat" for quality evaluation
247
Making of DAISY Talking book on mobile phone: A concept and architecture
248
Making of free viewpoint 3D images using one camera
249
Making of Hampi — An attempt to bridge culture and technology aspects
250
Making of Intelligent Processing System of Experiment Data in Physics Experiment
251
Making of the Intelligent Calculation System for Physical Parameters of Oceanic Internal Waves
252
Making of the Intelligent System for the Parameters Statistics in Oceanic Internal Wave Based on the Obtaining Data Method from Dragging Target
253
Making of the NSTX facility
254
Making of the simulation system for the force of the current-carrying circular coil in non-uniform magnetic field
255
Making of Who Cares? HD Stereoscopic Free Viewpoint Video
256
Making offloading decisions resistant to network unavailability for mobile cloud collaboration
257
Making OLSR Aware of Resources
258
Making On-Demand Multicast Routing Protocol Aware of Energy in Wireless Sensor Networks
259
Making on-demand routing protocols based on destination sequence numbers robust
260
Making one object look like another: controlling appearance using a projector-camera system
261
Making on-line cultural heritage visible for educational proposes
262
Making Ontologies Talk: Knowledge Interoperability in the Semantic Web
263
Making optical MEMS sensors more compact using organic light sources and detectors
264
Making optimal design decisions for next generation dispensing tools
265
Making optimal use of the asymmetric interference channel
266
Making orthogonal transitions with climbing mini-whegs™
267
Making Our Society Even Better
268
Making overlay cognitive radios practical
269
Making Overlay Networks more Robust to Massive Failures
270
Making P2P Downloading Dependable by Exploiting Social Networks
271
Making Packet Erasures to Improve Quality of FEC-Protected Video
272
Making parallel packet switches practical
273
Making parallel processing on clusters efficient, transparent and easy for programmers
274
Making ParaView Easier for the Customer: A Guide to Implementers
275
Making PARMILA easy to use - really easy to use!
276
Making partnership with a leading company to teach information technology systems
277
Making Patch Based Descriptors More Distinguishable and Robust for Image Copy Retrieval
278
Making pattern queries bounded in big graphs
279
Making Peace with Communications Networks: Modern and Future Network Communication for Plants and Substations
280
Making peace with communications networks: What power engineers need to know about modern and future network communication for plants and substations
281
Making peace with your multimedia
282
Making Peer-to-Peer Anonymous Routing Resilient to Failures
283
Making Performance Analysis and Tuning Part of the Software Development Cycle
284
Making Petri nets adaptive: a critical review
285
Making Photovoltaic Power Competitive with Grid Power
286
Making Place: Designing and Building an Engaging, Interactive and Pedagogical Historical World
287
Making planar antennas out of solar cells
288
Making planned paths look more human-like in humanoid robot manipulation planning
289
Making plans for nuclear
290
Making plastics recycling from electronic equipment a commercial reality
291
Making pointer-based data structures cache conscious
292
Making Pointers Safe in System Programming Languages
293
Making policy readable
294
Making power adapters smarter and greener
295
Making Power Africa funds sustainable with tangible benefits
296
Making practical use of IPv6 anycasting: mobile IPv6 based approach
297
Making Practical Use of Quality Attribute Information
298
Making precise at-speed timing measurements via boundary-scan
299
Making precision measurements of zener diode voltages
300
Making predictive analog/RF alternate test strategy independent of training set size
301
Making Pretense Visible and Graspable: An augmented reality approach to promote pretend play
302
Making privatization constitutional
303
Making probabilistic methods real, relevant, and interesting using MATLAB
304
Making process improvement personal
305
Making Process-based Environments Viable
306
Making processes from best practice frameworks actionable
307
Making production control less of an afterthought
308
Making products usable: closing the gap between what products can do and what users know how to do with them
309
Making Program Logics Intelligible
310
Making Program Refactoring Safer
311
Making program refactoring safer
312
Making Programming Accessible and Exciting
313
Making programming accessible to the blinds
314
Making programming more conversational
315
Making Programs to Perceive Time Flow
316
Making progress and Wanting More: One-year near-surface current measurements from a surface mooring in the Gulf Stream and other thoughts about long-term surface moorings
317
Making progress: Barriers to success in end-user developers´ physical prototyping
318
Making Progressive Transmission Adaptive
319
Making Prony analysis more accurate using multiple signals
320
Making Proportional Bandwidth Guarantees in IEEE 802.11e Enhanced Distributed Channel Access
321
Making public displays interactive everywhere
322
Making public transportation schedule information consumable for improved decision making
323
Making PVS do what you want
324
Making QC more palatable
325
Making QoS aware multicast scalable in terms of link state advertisement
326
Making Quality Attributes First Class Entities
327
Making RAD work for your project
328
Making radiation sensors smart enough for computers
329
Making Radio Frequency Identification Visible--A Watchdog Tag
330
Making real games virtual: Tracking board game pieces
331
Making real-time ethernet a reality
332
Making reassignment adjustable: The Levenberg-Marquardt approach
333
Making recognisable faces
334
Making recommendations based on profitability analysis in a hybrid system
335
Making Recommendations Using Location-Based Skyline Queries
336
Making Reference Vectors for Speaker Identification Using the Combination of Dp-Matching and Lvq Clustering Technique
337
Making register file resistant to power analysis attacks
338
Making Regular Eyeglasses Smart
339
Making reliable memories in an unreliable world (invited)
340
Making renewable energy SMART using Internet of Things (IOT)
341
Making repeatable RF and microwave VNA Measurements from R&D to at platform for weapon systems
342
Making Requirements Measurable
343
Making Research Data Available in Australia
344
Making research data findable in digital libraries: A layered model for user-oriented indexing of survey data
345
Making Research Internships Work
346
Making Research More Relevant While Not Diminishing Its Rigor
347
Making research partnerships work
348
Making research usable: improving access to research results
349
Making resonance a common case: A high-performance implementation of collective I/O on parallel file systems
350
Making resource decisions for software projects
351
Making retransmission delays in wireless links friendlier to TCP
352
Making reuse cost-effective
353
Making reuse pay: the SIDPERS-3 RAPID Center
354
Making Reuse Work
355
Making reuse work at Hewlett-Packard
356
Making RFIDs unique - radio frequency certificates of authenticity
357
Making RISC respectable-the Motorola 88000
358
Making robots emotion-sensitive - preliminary experiments and results
359
Making robust ALARP decisions for in-service systems
360
Making Room for the Boom
361
Making rotors automatically
362
Making Routing Robust to Changing Traffic Demands: Algorithms and Evaluation
363
Making Safety Personal [Electrical Safety]
364
Making Satellite Precipitation Data Work for the Developing World
365
Making science in the Grid world: using glideins to maximize scientific output
366
Making scientific applications as Web services
367
Making scientific computations reproducible
368
Making screws as axial load and temperature probes using integrated ultrasonic transducer
369
Making Search Efficient on Gnutella-Like P2P Systems
370
Making secure TCP connections resistant to server failures
371
Making security measurable and manageable
372
Making self-disassembling objects with multiple components in the Robot Pebbles system
373
Making Sense from Snowden: What´s Significant in the NSA Surveillance Revelations
374
Making sense of a complex world [chaotic events modeling]
375
Making sense of accessibility in IT design - usable accessibility vs. accessible usability
376
Making sense of accounts
377
Making sense of agentic objects and teleoperation: In-the-moment and reflective perspectives
378
Making sense of an Electronic Document - Visualization Strategies for Concept Presentation
379
Making sense of clusters through qualitative spatial reasoning
380
Making sense of computer-mediated communication (CMC): conversations as genres, CMC systems as genre ecologies
381
Making sense of corrupt input: contextual interpretation in LOQUI
382
Making sense of customer tickets in cellular networks
383
Making sense of daily life data: From commonalities to anomalies: VAST 2014 Mini Challenge #2
384
Making sense of emergent narratives: An architecture supporting player-triggered narrative processes
385
Making sense of ethics in engineering education: A discursive examination of students´ perceptions of work and ethics on multidisciplinary project teams
386
Making sense of experiment design
387
Making Sense of Geometric Data
388
Making sense of healthcare benefits
389
Making sense of meaning: Leveraging social processes to understand media semantics
390
Making sense of measurement for small organizations
391
Making Sense of Media Synchronicity in Humanitarian Crises
392
Making sense of multiple technologies
393
Making sense of online code snippets
394
Making sense of personal data in clinical settings
395
Making Sense of Product Requirements
396
Making sense of purpose, direction and innovation: An embedded design led innovation case study in the Australian mining industry
397
Making sense of recursion patterns
398
Making sense of remote condition monitoring for operations and incident management
399
Making Sense of Requirements, Sooner
400
Making sense of scientific information on WorldWideWeb: WWW-TED (Thesaurus Evolutif et Dynamique)
401
Making Sense of Sensemaking 1: Alternative Perspectives
402
Making Sense of Sensemaking 2: A Macrocognitive Model
403
Making Sense of Sensor Data
404
Making Sense of Sensor Data
405
Making sense of sensor data in practical wireless sensor network designs
406
Making Sense of Software Development and Personality Types
407
Making sense of space-based Earth image data: the KidSat data system
408
Making sense of step-by-step procedures
409
Making Sense of Stories: the development of a new mobile computer game
410
Making sense of teaching methods in computing education
411
Making Sense of Technology: A Triple Contextual Perspective of GPS Use in the Taxi Industry
412
Making sense of the biological complexity through the platform-driven unification of the analytical and visualization tasks
413
Making sense of the business case
414
Making sense of the IT/IS industry to enable better business enablement and competitiveness: A case-study of the Western Cape in South Africa
415
Making sense of the moon illusion
416
Making sense of the organisation´s knowledge: does systematisation of the knowledge base have a positive or negative effect on organizational culture
417
Making sense of the robot revolution
418
Making sense of thermoelectrics for processor thermal management and energy harvesting
419
Making Sense of Trajectory Data in Indoor Spaces
420
Making sense of trajectory data: A partition-and-summarization approach
421
Making Sense of Ubiquitous Media style
422
Making Sense of VAST Data
423
Making sense of worldwide EMC regulations
424
Making sense of worst-performing feeders
425
Making sense out of agents
426
Making Sense Out of the Potential Babble of Low Power Standards
427
Making SENSE: The SMC/XR space weather CubeSat demonstration
428
Making Sensor Networks Accessible to Undergraduates Through Activity-Based Laboratory Materials
429
Making Sensor Networks Immortal: An Energy-Renewal Approach With Wireless Power Transfer
430
Making separation architectures serve the user
431
Making Sequential Consistency Practical in Titanium
432
Making Service Granularity Right: An Assistant Approach Based on Business Process Analysis
433
Making Service Logic Explicit: Findings from Business-to-Business Case Study
434
Making service robots human-safe
435
Making shapes from modules by magnification
436
Making SharedPlans more concise and easier to reason about
437
Making silicon nitride film a viable gate dielectric
438
Making simulation more accessible in manufacturing systems through a `four phase´ approach
439
Making small high-penetration renewable energy systems work — Scottish Island experience
440
Making smaller, faster, cheaper computers
441
Making Smart Cards Truly Portable
442
Making smart choices in engineering
443
Making Smart Moves to Untangle Programs
444
Making SMI-beamforming insensitive to the sampling timing for GSM signals
445
Making snakes converge from minimal initialization
446
Making soccer kicks better: a study in particle swarm optimization and evolution strategies
447
Making Societies in Peer-to-Peer (P2P) Overlay Networks
448
Making Software Agents User-Friendly
449
Making Software Development Visible
450
Making software engineering happen in a telecommunications R&D organization
451
Making Software Engineering Research Relevant
452
Making software knowledgeable
453
Making Software Product Line Evolution Safer
454
Making software safer
455
Making software timing properties easier to inspect and verify
456
Making Software Visible, Operational, and Maintainable in a Small Project Environment
457
Making Software Work Together
458
Making Solar Cells a Reality in Every Home: Opportunities and Challenges for Photovoltaic Device Design
459
Making space & time uniformly identifiable in the Web via Media Fragments
460
Making space for more zeros
461
Making space for time: issues in space-time data representation
462
Making Space for Women
463
Making Sparse Gaussian Elimination Scalable by Static Pivoting
464
Making specific features less discriminative to improve point-based 3D object recognition
465
Making SPI happen: the IDEAL distribution of effort
466
Making Sports Safer for Kids: Using Biomechanical Devices to Prevent Injuries
467
Making Stakeholder Dialogue for Sustainability Issues Happen - Benefits, Reference Architecture and Pilot Implementation for Automated Sustainability Reporting a La Carte
468
Making standards simple
469
Making Static Online Teaching Materials Be Flexible to Learners by Reconstructing Its Hypermedia Structures Automatically
470
Making Statistics Part of Decision Making in an Engineering Organization
471
Making stereo photo cropping easy
472
Making STMs Cache Friendly with Compiler Transformations
473
Making strides with ECM
474
Making stronger identity for EU citizens
475
Making structured metals ultrabroadband transparency by surface plasmons
476
Making students more aware of the principles of FMS
477
Making Students´ Thinking Explicit: Learning What They Know about Functions
478
Making subsequence time series clustering meaningful
479
Making Successful Security Decisions: A Qualitative Evaluation
480
Making Suitable Fuel for Coal Burning Boiler from Black Liquor Using Ceramic Ultrafiltration Membrane
481
Making sure you tackle the right problem: Linking hard and soft methods in simulation practice
482
Making sustainability accountable: a valuation model for corporate performance
483
Making sweet [from the Editor´s desk]
484
Making SWIM interoperable between US and Europe
485
Making System User Interactive Tests Repeatable: When and What Should We Control?
486
Making Systems
487
Making systems engineering real: lessons learned in using current events as case studies in instructing systems engineering fundamentals
488
Making Systems Inconvenient to Stimulate Motivation of Competent Users
489
Making Tacit Requirements Explicit
490
Making Tactile Textures with Predefined Affective Properties
491
Making Tagging Systems Resistant to Tricky Spam Attacks
492
Making talking heads and speechreading with computers
493
Making talking-face authentication robust to deliberate imposture
494
Making task modeling suitable for smart environments
495
Making teachers from students: How learning environments may foster an interest in teaching
496
Making teams work-how to get the most out of teamworking
497
Making Technology Invisible in the Developing World
498
Making technology simple
499
Making technology work in World War II
500
Making Telecommuting Work
501
Making the (business) case for software reliability
502
Making the acoustic case for hysteresis control in switched reluctance machines
503
Making the best of IT - the proper use of a technical library
504
Making the Best of JPEG at Very High Compression Ratios: Rectangular Pixel Averaging for Mars PathFinder
505
Making the best of those extra transistors
506
Making the Best out of Spectral Efficiency; Studies on The Introduction of Open-Spectrum Policy
507
Making the Best Use of Cybersecurity Economic Models
508
Making the Best Use of Fifty (or More) Shades of Gray: Intelligent Contrast Optimisation for Image Segmentation in False-Colour Video
509
Making the Best Use of Landsat MSS Images for Land Use/Cover Change Analysis
510
Making the best use of solar energy
511
Making the best use of the airways: an important requirement for military communications
512
Making the best use: Understanding the differing roles of line managers and consultants is crucial t
513
Making the big decision [Perspectives on Graduate Life]
514
Making the bridge between two worlds-post-processing LASAR data into a test language
515
Making the business case for asset life extension
516
Making the Case
517
Making the case for alternative assessment: A writing-based rubric for self-reflection and improved learning
518
Making the case for applications of switched reluctance motor technology in automotive products
519
Making the case for EAP channel bindings
520
Making the Case for Electrified Transportation
521
Making the Case for MORTO: Multi Objective Regression Test Optimization
522
Making the Case for Random Access Scheduling in Wireless Multi-hop Networks
523
Making the case for safety
524
Making the circular self-test path technique effective for real circuits
525
Making the cloud energy efficient an approach to make the data centers greener
526
Making the cockpit a human friendly environment: a customer´s perspective
527
Making the Code Look Like the Design - Aspects and Other Recent Work
528
Making the Collaboration Engineering Investment Decision
529
Making the Complex Simple
530
Making the comprehension of software architecture attractive
531
Making the connection
532
Making the connection with reliability & maintenance management systems
533
Making the copyright law work
534
Making the correct mistakes
535
Making the DDA run: two-dimensional ray traversal using runs and runs of runs
536
Making the Decision to Contract for Cloud Services: Managing the Risk of an Extreme Form of IT Outsourcing
537
Making the dumb speak
538
Making the economic case for bulk energy storage in electric power systems
539
Making the electricity consumption visible (pilot project)
540
Making the equipment for determination of content of alcohol in solutions
541
Making the excavations speak: The use of a 3D model of the temple of Hercules in Celje as an interpretative tool
542
Making the Fortran-to-C transition: how painful is it really?
543
Making the Fun of Fishing Legal with Mobile Value Services
544
Making the gigabit IPsec VPN architecture secure
545
Making the grade
546
Making the grade
547
Making the Grade: The IEEE Power Engineering Society pays tribute to its members who have acheived the grade of fellow
548
Making the graduate-industry connection
549
Making the H-index more relevant: A step towards standard classes for citation classification
550
Making the information technology investment decision: a principled approach
551
Making the Internet clean, safe and reliable: Asia Pacific regional collaboration activities
552
Making the Internet go away
553
Making the interworking of MANs and ATM networks a reality
554
Making the investigation of huge data archives possible in an industrial context an intuitive way of finding non-typical patterns in a time series haystack
555
Making the invisible visible through social network analysis
556
Making the journal more useful
557
Making the kernel responsible: a new approach to detecting & preventing buffer overflows
558
Making the knowledge base systems more efficient: a method to detect inconsistent queries
559
Making the Lipschitz Classifier Practical via Semi-infinite Programming
560
Making the Long Code Shorter
561
Making The Magic Egg: A Personal Account
562
Making the mass spectrometer an efficient anesthetist´s aide
563
Making the Mid-IR nano with epitaxial plasmonic devices
564
Making the millennium [factory 2000]
565
Making the MINI at Oxford
566
Making the model of synchronous generator using the data from monitoring system
567
Making the most of a message function for nursing services
568
Making the Most of a Web Search Session
569
Making the most of context-awareness in brain-computer interfaces
570
Making the most of ecological interface design: the role of cognitive style
571
Making the most of it
572
Making the Most of IT Governance Software: Understanding Implementation Processes
573
Making the most of materials
574
Making the Most of Metrication
575
Making the most of millimetric microwaves
576
Making the Most of MIT [WIE from Around the World]
577
Making the most of production field data
578
Making the most of reconsider: an evaluation of input strategies
579
Making the most of Renewable Energy
580
Making the Most of Test Automation as a Service
581
Making the most of the self-quotient image in face recognition
582
Making the most of the win-win window - [management negotiating]
583
Making the most of two heuristics: breaking transposition ciphers with ants
584
Making the Most of Virtual Expertise in Telemedicine and Telehealth Environments
585
Making the MOST of work measurement
586
Making the MOST of work measurement
587
Making the most of your assets
588
Making the most of your undergraduate education
589
Making the most out of an ASP relationship
590
Making the most out of spectral redundancy in GSM: cheap CCI suppression
591
Making the move to SoC
592
Making the nearest neighbor meaningful for time series classification
593
Making the optimal sampling of the ocean simpler: An automatic tool for planning glider missions using forecasts downloaded from MyOcean
594
Making the PC easier to use
595
Making the Pitch: Examining Dialogue and Revisions in Entrepreneurs´ Pitch Decks
596
Making the power grid more intelligent
597
Making the probabilistic multi-hypothesis tracker the tracker of choice
598
Making the process the content: connecting engineering students to the real real world
599
Making the pyramid technique robust to query types and workloads
600
Making the Q distribution in a recirculating loop resemble a straight line distribution
601
Making the requirements of process controlled systems explicit
602
Making the reuse business work
603
Making the right (interactive) moves for knowledge-producing tasks in computer-mediated groups
604
Making the Right Decision
605
Making the Right Decision
606
Making the right moves: Guiding alpha-expansion using local primal-dual gaps
607
Making the rules [industrial computer control]
608
Making the SAT decision Based on a DNA Computation
609
Making the six sigma leap using SPC data [quality]
610
Making the software factory work: lessons from a decade of experience
611
Making the switch to SOAs
612
Making the team [project team building and leadership]
613
Making the technology-intensive class gender-neutral
614
Making the threshold algorithm access cost aware
615
Making the transition
616
Making the transition from trending to performance assessment at entergy FitzPatrick
617
Making the transition to component-based enterprise software development: Overcoming the obstacles - Patterns for success
618
Making the transition: Smoothing out the difficulties of shifting from college student to working engineer
619
Making the UCWW a reality
620
Making the Unseen Visible
621
Making the un-transactional transactional: A case study in foundry industry
622
Making the VoiceWeb smarter - integrating intelligent component technologies and VoiceXML
623
Making the Wire Frame Solid
624
Making the World a Better Place One Action at a Time
625
Making the World Wide Space happen: New challenges for the Nexus context platform
626
Making the world´s best atomic clock
627
Making Them Alive
628
Making Them Remember—Emotional Virtual Characters with Memory
629
Making themost from multiple microphones in meeting recognition
630
Making things -- and making a profit?
631
Making things happen in the business
632
Making things real in electronics laboratories
633
Making things socialize in the Internet — Does it help our lives?
634
Making Things Work: Great Achievements in Engineering
635
Making TifaMMy fit for tomorrow: Towards future shared memory systems and beyond
636
Making Time Just Another Axis in Geospatial Services
637
Making Time-of-Flight range imaging cameras applicable for human-machine-interaction by depth correction
638
Making TMN a Reality [Guest Editorial]
639
Making tools by powder compaction--HIP leads the way
640
Making Topic-Specific Report and Multimodal Presentation Automatically by Mining the Web Resources
641
Making total quality management work for the manufacturers and users of semiconductors
642
Making tracking technology accessible in a rapid prototyping environment
643
Making Trading Decisions
644
Making traffic-related decisions in FRIEND: A Cyber-Physical System for traffic flow related information aggrEgatioN and Dissemination
645
Making transformer losses part of the purchasing decision
646
Making transmission schedules immune to topology changes in multi-hop packet radio networks
647
Making transmission schedules immune to topology changes in multi-hop packet radio networks
648
Making transmission systems smart: An opportunity which should not be missed
649
Making transparent metals based on scattering cancellations
650
Making transport protocols fast
651
Making trust explicit in distributed commerce transactions
652
Making trusted attribute assertions online with the publish trust framework
653
Making TSUBAME2.0, the world´s greenest production supercomputer, even greener — Challenges to the architects
654
Making two ends meet-one member´s view of PTGEWS activities
655
Making Two-Way Satellite Relaying Feasible: A Differential Modulation Based Approach
656
Making typical silicon matter with Razor
657
Making UML activity diagrams object-oriented
658
Making unbreakable code
659
Making unit commitment decisions when electricity is traded at spot market prices
660
Making United States Integrated Ocean Observing System (U.S. IOOS) inclusive of marine biological resources
661
Making Unstructured Data SPARQL Using Semantic Indexing in Oracle Database
662
Making use of
a
priori
knowledge of vegetation spectrum in inversion for canopy structure parameters
663
Making use of a two stage multiplexing scheme in a WDM network
664
Making use of architecture throughout the software life cycle - How the build hierarchy can facilitate product line development
665
Making Use of Auditory Models for Better Mimicking of Normal Hearing Processes With Cochlear Implants: The SAM Coding Strategy
666
Making use of contradictory behavior information in qualitative reasoning
667
Making use of CORDICs and distributed arithmetic to produce a field-programmable fuzzy logic controller in an FPGA
668
Making use of damped noisy gradient in training neural network
669
Making Use of Human Visual Capability to Improve Information Security
670
Making Use of Partial Knowledge About Hidden States in HMMs: An Approach Based on Belief Functions
671
Making use of personalized web services in the study process
672
Making use of population information in evolutionary artificial neural networks
673
Making use of scenarios for validating analysis and design
674
Making use of scenarios in human factors assessment validation of Citarasa analysis system
675
Making use of the PML absorbing boundary condition in coupling and scattering FDTD computer codes
676
Making Use of User-Generated Content and Contextual Metadata Collected during Ubiquitous Learning Activities
677
Making use of what you don´t see: negative information in Markov localization
678
Making user-centred design a priority in large organisations: a case study of a usability audit
679
Making user-centred design work in software development
680
Making value-laden decisions under conflict
681
Making Values Explicit During the Design Process
682
Making Vehicles Transparent Through V2V Video Streaming
683
Making views self-maintainable for data warehousing
684
Making virtual baby alive
685
Making virtual reality more accessible
686
Making virtual reality worlds-interaction between higher education and K-12
687
Making virtual work teams successful: measuring the ´interactive demand´ of tasks and fitting it to the demands of technology, people, and structure
688
Making Visual Object Categorization More Challenging: Randomized Caltech-101 Data Set
689
Making visual SLAM consistent with geo-referenced landmarks
690
Making voice knowledge pervasive
691
Making voices from the depths sound deeper
692
Making wafers in the JIT style
693
Making waves
694
Making Waves [Power US Politics]
695
Making Waves [Product Reviews]
696
Making waves in the bath
697
Making waves useful: Improving epileptiform activity recognition using energy criteria
698
Making WAVES: On the design of architectures for low-end distributed virtual environments
699
Making way for emergency vehicles at oversaturated signals under vehicle-to-vehicle communications
700
Making Web services dependable
701
Making Web sites and technologies accessible
702
Making weirdness work: quantum information and computation
703
Making Weirdness Work: Quantum Information and Computation
704
Making Weirdness Work: Quantum Information and Computation
705
Making WiFi Work in Multi-hop Topologies: Automatic Negotiation and Allocation of Airtime
706
Making winners for both education and research: Verification and validation process improvement practice in a software engineering course
707
Making wireless networks MORAL
708
Making WOM codes decodable using short synchronous WOM codes
709
Making work better
710
Making work queue cluster-friendly for data intensive scientific applications
711
Making workstations a friendly environment for batch jobs
712
Making worst case execution time analysis for hard real-time tasks on state of the art processors feasible
713
Making Write Less Blocking for Read Accesses in Phase Change Memory
714
Making writing assessment meaningful
715
Making written information fit workers´ purposes
716
Making WSN TDMA Practical: Stealing Slots Up and Down the Tree
717
Making XML schema to support multilingual markup
718
Making Your C++ Classes Thread Safe (Book Review)
719
Making Your Meetings Count
720
Making your network airtight [Book Review]
721
Making your next catalog sparkle: getting the most from a catalog database service
722
Making your PC behave like another: Personal computers are gaining in compatibility, thanks to new emulators that make software for one kind ¿ especially IBM´s PCs ¿ run on a variety of others
723
Making your programming questions be answered quickly: A content oriented study to technical Q&A forum
724
Making your R&D future proof: The roles of corporate foresight in innovation management
725
Makings of the 4 × 4 space-time block code of choice
726
Makkah timescale generation and measurement capability
727
Mak-Messenger and Finger-Chat, communications technologies to assist in teaching of signed languages to the deaf and hearing
728
MAKO: Multi-Ontology Analytical Knowledge Organization based on topic maps
729
MALA: A Microarray Clustering and Classification Software
730
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks
731
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading
732
Malareo - Earth observation to support Malaria Control in Southern Africa
733
Malaria Cell Counting Diagnosis within Large Field of View
734
Malaria diagnosis using magnetic nanoparticles
735
Malaria environmental risk assessment in Eritrea
736
Malaria parasite detection in giemsa-stained blood cell images
737
Malaria parasite identification on thick blood film using genetic programming
738
Malaria surveillance with remote sensing and GIS in Owerri, Nigeria
739
Malaria transmission model of juvenile and adult humans
740
Malay continuous speech recognition using fast HMM match algorithm
741
Malay declarative sentence: Visualization and sentence correction
742
Malay document clustering using complete linkage clustering technique with Cosine Coefficient
743
Malay language text-independent speaker verification using NN-MLP classifier with MFCC
744
Malay Sign Language Gesture Recognition system
745
Malay speaker identification using Neural Networks
746
Malay speaker recognition system based on discrete HMM
747
Malay speech recognition in normal and noise condition
748
Malay syllable recognition based on multilayer perceptron and dynamic time warping
749
Malay Word Pronunciation Application for Pre-school Children Using Vowel Recognition
750
Malayalam morphological analysis using MBLP approach
751
Malayalam OCR: N-gram approach using SVM classifier
752
Malayalam online handwriting recognition system: A simplified fuzzy ARTMAP approach
753
Malayalam Speech Recognition system and its application for visually impaired people
754
Malayalam speech sounds and their mapping to Unicode symbols: a case study
755
Malayalam Vowel Recognition Based on Linear Predictive Coding Parameters and k-NN Algorithm
756
Malayalam word sense disambiguation
757
Malayalam Word Sense Disambiguation using Yamcha
758
Malaysia - Truly Asia
759
Malaysia car plate recognition based on RBF Neural Network and Particle Swarm Optimization
760
Malaysia commercial flight passengers´ safety (NEWS)
761
Malaysia crude oil production estimation: an application of ARIMA model
762
Malaysia IT career opportunity analysis based on classified advertisement in the New Straits Times (2000–2008)
763
Malaysia traffic sign recognition with convolutional neural network
764
Malaysia: Bioethics as a biosecurity measure for monitoring genetic engineering activities against the threat of bioterrorism
765
Malaysia: telecommunications at a crossroad
766
Malaysia´s communication content and infrastructure: The broadband demand´s forecast, strategies and policy implications
767
Malaysia´s Multimedia Super Corridor Cluster: communication linkages among stakeholders in a national system of innovation
768
Malaysia´s National Cyber Security Policy: The country´s cyber defence initiatives
769
Malaysia´s silicon valley moves forward
770
Malaysian Address Semantic: The Process of Standardization
771
Malaysian day-type load forecasting
772
Malaysian English accents identification using LPC and formant analysis
773
Malaysian enterprise risk management (MERIM) framework: Exploratory research
774
Malaysian gastronomic products: Analysis on western tourists level of consumption and experiences based on gender and age
775
Malaysian hospitality managerial knowledge: A competence model approach
776
Malaysian in-service teachers: an assessment of their IT preparedness
777
Malaysian Internet Surfing Addiction (MISA): Factors affecting the Internet use and its consequences
778
Malaysian Lifelogging over Twitter
779
Malaysian monetary transmission mechanism: Evidence from the pre- and post-Asian financial crisis periods
780
Malaysian peak daily load forecasting
781
Malaysian sexuality education (MSE) multimedia courseware approach animation
782
Malaysian Sign Language database for research
783
Malaysian SMEs Perspective on Factors Affecting ERP System Adoption
784
Malaysian students´ perception and attitude towards space science: A pilot study
785
Malaysian tourism interest forecasting using Nonlinear Auto-Regressive (NAR) model
786
Malaysian tourism interest forecasting using Nonlinear Auto-Regressive Moving Average (NARMA) model
787
Malaysian vehicle license plate recognition using double edge detection
788
Malaysian Vowel Recognition Based on Spectral Envelope Using Bandwidth Approach
789
Malaysian young voters voices: Make or break political development?
790
MalayWordNet — A novel lexical database for Malay language
791
MALB: MANET adaptive load balancing
792
MALBACO - a new Multi-Agent Load Balanced Ant Colony Optimization algorithm for MANETs
793
MALBACsim: A Multiple Annealing and Looping Based Amplification Cycles simulator
794
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot Using Reconfigurable Technology
795
Malcode mysteries revealed [computer viruses and worms]
796
Malcolm Atkinson is almost right! [Object-oriented operating system services]
797
Malcolm Chambers Timms
798
Malcolm Kennedy abstract
799
MalDetector-using permission combinations to evaluate malicious features of Android App
800
MALDI-TOF MS progress and its application in Environmental Science
801
MALDI-TOF/MS characterisation of LMW PDMS in high voltage HTV silicone rubber insulators
802
Male and female electronics engineers and electronic engineering: attitudes and influences
803
Male/female mentoring: turning potential risks into rewards
804
Male/female speech classification based on cepstral modulation ratio parameterization by Laguerre polynomials
805
MALEC: A Multiple Access Low Energy Cache
806
Maleic anhydride-terminated fluorinated polyimides with changeable refractive indices
807
Maleku: An evolutionary visual software analysis tool for providing insights into software evolution
808
MALESAbrain for problem-based learning in IT education
809
Male-silkmoth inspired routing algorithm for wireless mesh networks
810
Male-silkmoth-inspired routing algorithm for large-scale wireless mesh networks
811
Mal-EVE: Static detection model for evasive malware
812
Malevolent object detection using microwave RFID tags
813
Malfinder: Accelerated malware classification system through filtering on manycore system
814
Malfree web server response
815
Malfunction analysis of SiC-SIT DC circuit breaker in 400V-DC power supply system
816
Malfunction and Destruction Analysis of CMOS IC by Intentional High Power Microwave
817
Malfunction detection in susceptibility testing
818
Malfunction detection monitoring the power supply current
819
Malfunction Detection System for Advanced Spacecraft
820
Malfunction diagnosis of sludge deposition in standard orifice plate flowmeter
821
Malfunction in the Peterson-Gorenstein-Zierler decoder
822
Malfunction mechanism of semiconductor circuit breaker in HVDC power supply system
823
Malfunction of a dead-time compensation in PWM-converters leading to a high DC current offset
824
Malfunction of medical equipment as a result of mains borne interference
825
Malfunction operation of LVRT capability of Wind Turbines under islanding conditions
826
Malfunction suppression of semiconductor circuit breaker in high voltage DC power supply system
827
Malfunctions modeling of converters and homogeneous-chain distributed structure devices
828
Malfunctions of high impedance circuits caused by electrostatic discharges
829
M-algorithm combined equalization and decoding for mobile/personal communications
830
M-algorithm decoding of convolutional code combined with CPM
831
M-algorithm Decoding Of Cpm Trellis Codes With Narrowband Digital Filtering
832
MalHunter: Automatic generation of multiple behavioral signatures for polymorphic malware detection
833
Malibu: Interactive Cooperative Work in a Distributed Multimedia Environment
834
Malice¿or self preservation?
835
Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining
836
Malicious Advertising and Music Piracy: A New Zealand Case Study
837
Malicious and Spam Posts in Online Social Networks
838
Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?
839
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs
840
Malicious attack detection in underwater wireless sensor network
841
Malicious attacks in Mobile Device Clouds: A data driven risk assessment
842
Malicious attacks on state estimation in multi-sensor dynamic systems
843
Malicious audio source detection using audio watermarking
844
Malicious base station and detecting malicious base station signal
845
Malicious behavior in online social network
846
Malicious Behavior Patterns
847
Malicious behaviour in content-addressable peer-to-peer networks
848
Malicious BGP hijacks: Appearances can be deceiving
849
Malicious bots threaten network security
850
Malicious circuitry detection using fast timing characterization via test points
851
Malicious Circuitry Detection Using Thermal Conditioning
852
Malicious circuitry detection using transient power analysis for IC security
853
Malicious Code Detection and Acquisition Using Active Learning
854
Malicious Code Detection Architecture Inspired by Human Immune System
855
Malicious Code Detection Based on Layered Semantic Cognition
856
Malicious code detection by taint analysis
857
Malicious Code Detection for Android Using Instruction Signatures
858
Malicious code detection for open firmware
859
Malicious Code Detection Using Opcode Running Tree Representation
860
Malicious Code Detection Using Penalized Splines on OPcode Frequency
861
Malicious code detection with integrated behavior analysis
862
Malicious code forensics based on data mining
863
Malicious code hiding android APP´s distribution and hacking attacks and incident analysis
864
Malicious code hits instant messaging
865
Malicious Code Modeling and Analysis in WiFi-Based MANETs
866
Malicious code prevention in kernel mode
867
Malicious code testing in executable files
868
Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology
869
Malicious computation prevention protocol for secure multi-party computation
870
Malicious data attack on real-time electricity market
871
Malicious data attacks against dynamic state estimation in the presence of random noise
872
Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures
873
Malicious Data Attacks on the Smart Grid
874
Malicious data classification using structural information and behavioral specifications in executables
875
Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters
876
Malicious data identification in smart grid based on residual error method
877
Malicious data injection attack against power system state estimation based on orthogonal matching pursuit
878
Malicious Data Leak Prevention and Purposeful Evasion Attacks: An approach to Advanced Persistent Threat (APT) management
879
Malicious Executables Classification Based on Behavioral Factor Analysis
880
Malicious hardware: Characteristics, classification and formal models
881
Malicious Hosts Detection through Truth Powered Approach
882
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
883
Malicious hypervisor and hidden virtualization of operation systems
884
Malicious Insiders with Ties to the Internet Underground Community
885
Malicious Interfaces and Personalization´s Uninviting Future
886
Malicious JavaScript Insertion through ARP Poisoning Attacks
887
Malicious key emission via hardware Trojan against encryption system
888
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention
889
Malicious node detection for the future network security from epistemic uncertainties
890
Malicious node detection in Ad Hoc networks using timed automata
891
Malicious node detection in OppNets using hash chain technique
892
Malicious Node Detection in Wireless Sensor Networks
893
Malicious node detection in wireless sensor networks
894
Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique
895
Malicious node detection scheme based on energy potential field in wireless sensor networks
896
Malicious node detection using minimal event cycle computation method in wireless sensor networks
897
Malicious node detection via physical layer data
898
Malicious Node Traceback in Opportunistic Networks Using Merkle Trees
899
Malicious objects propagation dynamics in the network
900
Malicious objects trafficking in the network
901
Malicious odor item identification using an electronic nose based on support vector machine classification
902
Malicious packet dropping: how it might impact the TCP performance and how we can detect it
903
Malicious PDF Documents Explained
904
Malicious power allocation in wireless ad hoc networks
905
Malicious Process Conscious Operating Systems (MPCOS)
906
Malicious ramp-induced temporal data attack in power market with look-ahead dispatch
907
Malicious Shellcode Detection with Virtual Memory Snapshots
908
Malicious sniffing systems detection platform
909
Malicious Spam Emails Developments and Authorship Attribution
910
Malicious threats and novel security extensions in P2PSIP
911
Malicious traffic analysis in wireless sensor networks using advanced signal processing techniques
912
Malicious traffic detection in a private organizational network using honeynet system
913
Malicious traffic monitoring and its evaluation in VoIP infrastructure
914
Malicious URL Detection Based on Kolmogorov Complexity Estimation
915
Malicious URL filtering — A big data application
916
Malicious URL prediction based on community detection
917
Malicious User Detection in a Cognitive Radio Cooperative Sensing System
918
Malicious user suppression for cooperative spectrum sensing in cognitive radio networks using Dixon´s outlier detection method
919
Malicious users detection in collaborative spectrum sensing using statistical tests
920
Malicious Users in Unstructured Networks
921
Malicious users´ circle detection in social network based on spatio-temporal co-occurrence
922
Malicious virtual machines detection through a clustering approach
923
Malicious wave: A survey on actively tampering using electromagnetic glitch
924
Malicious web page detection based on feature classification
925
Malicious web page detection based on on-line learning algorithm
926
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
927
Malicious Webpage Detection by Semantics-Aware Reasoning
928
Malicious website detection under the exploratory attack
929
Malicious Website Detection: Effectiveness and Efficiency Issues
930
Malicious WiFi networks: A first look
931
Malicious Workers Tolerance in an Agent-Based Grid Resource Brokering System -- Preliminary Considerations
932
Malicious-Client Security in Blind Seer: A Scalable Private DBMS
933
Malicious-Proof and Fair Credit-Based Resource Allocation Techniques for DSA Systems
934
Malignancy prediction by using characteristic-based fuzzy sets: A preliminary study
935
Malignant and benign breast tissue classification performance using a scatterer structure preclassifier
936
Malignant Brain Tumors from Cellular Mobile Telephone Radiation - [Telecommunication Health & Safety]
937
Malignant melanoma detection by Bag-of-Features classification
938
Malignant nodule detection on lung CT scan images with kernel RX-algorithm
939
Malignant tissue phantom dielectric properties investigation at microwave frequencies
940
Malignant tumor and atherosclerotic plaque diagnosis using laser-induced fluorescence
941
Malignant tumor detection using linear support vector machine in breast cancer based on new optimization algorithms
942
Malignant versus benign tumor classification based on ultrasonic B-scan images of the breast
943
Malignant-benign classification of pulmonary nodules by bagging-decision trees
944
MalikCredit - A New Credit Unit for P2P Computing
945
MalikStone — A context-aware light-weight benchmark for P2P computing
946
MALIM — A new computational approach of malay morphology
947
Maliuzhinets diffraction coefficient applied to hilly terrain scenario
948
Malking Connections to Engineering During the First Two Years
949
Mallard
TM
: an educational tool for digital signal processing
950
Mallard
TM
: asynchronous learning in two engineering courses
951
Mallat algorithm of wavelet for time-varying system parametric identification
952
Mallat Fusion for Multi-Source Remote Sensing Classification
953
Mallat Wavelet Filter Coefficient Calculation
954
Mallat´s Matching Pursuit of sperm whale clicks in real-time using Daubechies 15 wavelets
955
Malleability resilient (premium) Concealed Data Aggregation
956
Malleable Access Rights to Establish and Enable Scientific Collaboration
957
Malleable coding with edit-distance cost
958
Malleable coding with fixed segment reuse
959
Malleable memory mapping: user-level control of memory bounds for effective program adaptation
960
Malleable Model Coupling with Prediction
961
Malleable neural networks in fault detection of complex systems
962
Malleable NoC: Dark silicon inspired adaptable Network-on-Chip
963
Malleable Reservation Based Bulk-Data Transfer to Recycle Spectrum Fragments in Elastic Optical Networks
964
Malleable resource sharing algorithms for cooperative resolution of problems
965
Malleable services
966
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials
967
Malleable Sorting
968
Malleable-Lab: A Tool for Evaluating Adaptive Online Schedulers on Malleable Jobs
969
MALLET - a multi-agent logic language for encoding teamwork
970
MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity
971
MALMOS: Machine Learning-Based Mobile Offloading Scheduler with Online Training
972
Malmquist index based Jing-Jin-Ji regional technical differences empirical study
973
MalmSoft: An online software for computing Total Factor Productivity using Malmquist Index
974
Malodor management in high exuding chronic wounds
975
Malondialdehyde decreased the capability of learning and spatial memory, impaired the ultra-microstructure of the hippocampal CA1 area in SD rats
976
Mal-ONE: A unified framework for fast and efficient malware detection
977
Maloperation prevention study of zero sequence direction protection to broken-line faults of parallel circuits on same tower
978
MALPHA: A relatiohal multidatabase manipulation language
979
Malphite: A convolutional neural network and ensemble learning based protein secondary structure predictor
980
MALS: multiple access scheduling based on Latin squares
981
MALsim: A functional-level parallel simulation platform for CMPs
982
Malta calling
983
Malta takes control
984
Malta visit
985
Maltesas conferences
986
Maltese Front variability from satellite observations based on automated detection
987
Maltese Front variability from satellite observations based on automated-detection
988
Maltese-cross coaxial balun-fed antenna for GPS and DCS1800 mobile communication
989
Malting technology in the development of safe and sustainable complementary composite food from cereals and legumes
990
MalTRAK: Tracking and Eliminating Unknown Malware
991
MA-LTRT: A Novel Method to Improve Network Connectivity and Power Consumption in Mobile Ad-hoc Based Cyber-Physical Systems
992
MALTS: A Tool to Simulate Lorentz Transmission Electron Microscopy From Micromagnetic Simulations
993
Maltsev + Datalog --≫ Symmetric Datalog
994
MALU-an ALU with single period multiplication
995
Malvar wavelets for thin-wire antennas and scatterers
996
Malvar wavelets with asymmetrically overlapped windows
997
Malvern 45ft radio telescope
998
Malware Analysis and attribution using Genetic Information
999
Malware analysis and classification using Artificial Neural Network
1000
Malware analysis in cloud computing: Network and system characteristics