<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Prioritization-based constrained trajectory planning for a nonlinear turbocharged air system with EGR
2
Prioritize circuit breaker and protective relay maintenance using an arc flash hazard assessment
3
Prioritize code for testing to improve code coverage of complex software
4
Prioritized 3D video distribution over IEEE 802.11e
5
Prioritized 3-D Video Transmission over Cooperative MIMO-OFDM Systems
6
Prioritized access arbitration to shared resources on integrated software systems in multicore environments
7
Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks
8
Prioritized Access in a Channel-Hopping Cognitive Network with Spectrum Sensing
9
Prioritized access in CSMA networks: a node partitioning approach
10
Prioritized ACK transfer mechanisms for PLC media control access
11
Prioritized Adaptive Modulation for MIMO-OFDM Using Pre-Ordered SIC
12
Prioritized admission control for mixed services in UMTS WCDMA networks
13
Prioritized admission strategy in a clustered video-on-demand system
14
Prioritized aggregation operators and their applications
15
Prioritized analog cooperative relaying in multiple access relay networks
16
Prioritized arbitration for input-queued switches with 100% throughput
17
Prioritized automatic material handling services in 300 mm foundry manufacturing
18
Prioritized Broadcast Contention Control in VANET
19
Prioritized Buffer Management Policy for Wireless Sensor Nodes
20
Prioritized burst segmentation and composite burst-assembly techniques for QoS support in optical burst-switched networks
21
Prioritized Centrally-Controlled Resource Allocation in Integrated Multi-RAT HetNets
22
Prioritized channel assignment in a cellular radio network
23
Prioritized channel borrowing without locking: a channel sharing strategy for cellular communications
24
Prioritized channel borrowing without locking: a channel sharing strategy for cellular communications
25
Prioritized channel control for a CDMA radio link
26
Prioritized closed-loop inverse kinematic algorithms for redundant robotic systems with velocity saturations
27
Prioritized Congestion Aware Routing Protocol in Distributed Sensor Network
28
Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation
29
Prioritized Contention Resolution Scheme for Grid Services over OBS Networks
30
Prioritized data synchronization for disruption tolerant networks
31
Prioritized data transmission in airborne camera networks for wide area surveillance and image mosaicking
32
Prioritized DCT for compression and progressive transmission of images
33
Prioritized demand assignment protocols and their evaluation
34
Prioritized demand multiplexing (PDM): a low-latency virtual channel flow control framework for prioritized traffic
35
Prioritized dispersal: a scheme for selective exploitation of redundancy in distributed systems
36
Prioritized Distributed Video Delivery With Randomized Network Coding
37
Prioritized Dominating-Set Broadcasting for Optimal Random Broadcasting
38
Prioritized dual caching algorithm for peer-to-peer content network
39
Prioritized dynamic multitraffic scheduler for downlink in LTE
40
Prioritized dynamic multitraffic scheduler for downlink in LTE
41
Prioritized Fair Round Robin Algorithm with Variable Time Quantum
42
Prioritized Flow Optimization with Generalized Routing for Scalable Multirate Multicasting
43
Prioritized Flow Optimization With Multi-Path and Network Coding Based Routing for Scalable Multirate Multicasting
44
Prioritized functional analysis of biological experiments using resampling and noise control methodologies
45
Prioritized group navigation with Formation Velocity Obstacles
46
Prioritized handoff strategies using channel borrowing-based dynamic channel assignment
47
Prioritized IEEE 802.15.4 for wireless sensor networks
48
Prioritized independent contact regions for form closure grasps
49
Prioritized inter-processor synchronization in an ITRON-MP implementation
50
Prioritized inverse kinematics using QR and cholesky decompositions
51
Prioritized Inverse Kinematics with Multiple Task Definitions
52
Prioritized Least Cost Method for Better Resource Allocation in Hypercube Based Cluster Environment
53
Prioritized LT codes
54
Prioritized Maximal Scheduling in Wireless Networks
55
Prioritized Measure-Guided Aggregation Operators
56
Prioritized medium access in ad-hoc networks with a SystemClick model of the IEEE 802.11n MAC
57
Prioritized motion planning for multiple robots
58
Prioritized motion-force control of multi-constraints for industrial manipulators
59
Prioritized multi-class adaptive framework for multimedia wireless networks
60
Prioritized multimode precoding for joint minimization of source-channel video distortions
61
Prioritized multi-objective dynamics and control of robots in human environments
62
Prioritized Multiplicative Schwarz Procedures for Solving Linear Systems
63
Prioritized multiprocessor networks: design and performance
64
Prioritized multi-task motion control of redundant robots under hard joint constraints
65
Prioritized network-based vertical handover decision in multi-access wireless networks
66
Prioritized Optimal Channel Allocation Schemes for Multi-Channel Vehicular Networks
67
Prioritized optimal control
68
Prioritized optimal control: A hierarchical differential dynamic programming approach
69
Prioritized optimal server side bandwidth allocation in a multimedia session with push and pull sources
70
Prioritized optimization for task-space control
71
Prioritized overlay multicast in mobile ad hoc environments
72
Prioritized packet fragmentation for H.264 video
73
Prioritized packetization for video with intra-refresh macroblock line
74
Prioritized parallel transmission MAC protocol and its performance in a simplified all-IP wireless WAN
75
Prioritized payload tuning mechanism for wireless body area network-based healthcare systems
76
Prioritized physical channel scheduling in wormhole networks
77
Prioritized Planning Algorithms for Trajectory Coordination of Multiple Mobile Robots
78
Prioritized prime implicant patterns puzzle for novel logic synthesis and optimization
79
Prioritized Proactive Scheme for Spectrum Handoff Decision in Cognitive Radio Networks
80
Prioritized protocols for multi-bus local area networks
81
Prioritized Quality of Service Support Medium Access Control for Real Time Flows
82
Prioritized query shedding technique for continuous queries over data streams
83
Prioritized radio resource management in WiMax networks
84
Prioritized Random Access for Accommodating M2M and H2H Communications in Cellular Networks
85
Prioritized random access for machine-to-machine communications in OFDMA based systems
86
Prioritized Random Access with dynamic access barring for RAN overload in 3GPP LTE-A networks
87
Prioritized Random MAC Optimization Via Graph-Based Analysis
88
Prioritized reference decision for efficient motion vector coding
89
Prioritized region of interest coding in JPEG2000
90
Prioritized region of interest coding in JPEG2000
91
Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks
92
Prioritized reservation type MAC protocol for broadband CDMA packet communication systems
93
Prioritized resource adaptation scheme based on performance analysis for SMOD Networked Tiled Display
94
Prioritized resource allocation for stressed networks
95
Prioritized resource allocation in wireless spectrum pooling
96
Prioritized resource assignment for mobile cellular communication systems with mixed services and platform types
97
Prioritized Resource Sharing in WiMax and WiFi Integrated Networks
98
Prioritized retransmission for error protection of video streaming over WLANs
99
Prioritized routing and burst segmentation for QoS in optical burst-switched networks
100
Prioritized scheduling for bufferless slotted WDM optical packet switch via wavelength conversion
101
Prioritized scheduling in WDM packet switching networks with limited range wavelength conversion
102
Prioritized selecting COTS vendor in cots-based software development process
103
Prioritized sensor detection via dynamic Voronoi-based navigation
104
Prioritized Sequential 3D Reconstruction in Video Sequences of Dynamic Scenes
105
Prioritized Sequential 3D Reconstruction in Video Sequences with Multiple Motions
106
Prioritized side information correction for distributed video coding
107
Prioritized SMT Architecture with IPC Control Method for Real-Time Processing
108
Prioritized soft constraint satisfaction: a qualitative method for dynamic transport selection in heterogeneous wireless environments
109
Prioritized Spectrum Sensing in Cognitive Radio Based on Spatiotemporal Statistical Fusion
110
Prioritized Spectrum Sensing Scheme Based on Semi-Markov Process
111
Prioritized state-dependent buffer-management schemes in ATM switch
112
Prioritized statistical multiplexing of PCM sources
113
Prioritized subband coding of video for packet-switched networks
114
Prioritized switching in high speed ATM switches
115
Prioritized Synchronization Under Mask for Control and Interaction of Partially Observed Event-Driven Systems
116
Prioritized Synchronization under Mask for Interaction/Control of Event-Driven Systems
117
Prioritized synchronization under mask for interaction/control of partially observed discrete event systems
118
Prioritized Test Generation Strategy for Pair-Wise Testing
119
Prioritized test-driven reverse engineering process: A case study
120
Prioritized time-constraint P2P packet scheduling using Lagrange multiplier for advertisement push/broadcast systems
121
Prioritized token-based mutual exclusion for distributed systems
122
Prioritized token-based mutual exclusion for distributed systems
123
Prioritized Traffic Information Delivery Based on Historical Data Analysis
124
Prioritized traffic recovery over GMPLS networks
125
Prioritized transmission of data partitioned H.264 video with hierarchical QAM
126
Prioritized transmission of variable bit rate MPEG video
127
Prioritized Tri-Packets Probes for Available Bandwidth Measurement
128
Prioritized usage control of different shared devices for contention avoidance in optical switching node
129
Prioritized use cases as a vehicle for software inspections
130
Prioritized Video Streaming in Wireless Mesh Networks
131
Prioritized wireless access protocols for real-time VBR traffic
132
Prioritized Wireless Transmissions Using Random Linear Codes
133
Prioritized-virtual-time CSMA: head-of-the-line priority classes without added overhead
134
Prioritizing activities on a building site project
135
Prioritizing and Enhancing Vehicular Networks Authentication Process Using DSRC Channels Diversity
136
Prioritizing and Scheduling Service Requests under Time Constraints
137
Prioritizing Architectural Concerns
138
Prioritizing Bad Links for Fast and Efficient Flooding in Wireless Sensor Networks
139
Prioritizing Checklists for the Decision Support of Quality Evaluation Based on External Multiple Characteristics of Software
140
Prioritizing Circuit Breaker and Protective Relay Maintenance Using an Arc Flash Hazard Assessment
141
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study
142
Prioritizing code clone detection results for clone management
143
Prioritizing collision avoidance and vehicle stabilization for autonomous vehicles
144
Prioritizing component compatibility tests via user preferences
145
Prioritizing connection requests in GMPLS-controlled optical networks
146
Prioritizing constraint evaluation for efficient points-to analysis
147
Prioritizing Consumers in Smart Grid: A Game Theoretic Approach
148
Prioritizing consumers in smart grid: Energy management using game theory
149
Prioritizing Correction of Static Analysis Infringements for Cost-Effective Code Sanitization
150
Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case Study
151
Prioritizing CRC cards as a simple design tool in extreme programming
152
Prioritizing critical factors of team innovation - the application of grey relational analysis
153
Prioritizing Data Processing in Wireless Sensor Networks
154
Prioritizing Default Rules Embedded in Description Logic Knowledge Base
155
Prioritizing demand response programs from reliability aspect
156
Prioritizing design requirement in fuzzy quality function deployment
157
Prioritizing disease-causing genes based on network diffusion and rank concordance
158
Prioritizing emergency control problems with fuzzy set theory
159
Prioritizing factors of organizational innovation: The application of grey relational analysis
160
Prioritizing Fuzzy Behaviors in Multi-robot Pursuit Teams
161
Prioritizing Health Promotion Plans with k-Bayesian Network Classifier
162
Prioritizing Highway Construction with a Benefits Analysis
163
Prioritizing highway tunnel risk factors with AHP method
164
Prioritizing human disease genes by multiple data integration
165
Prioritizing impacts: the second stage of life cycle assessment
166
Prioritizing improvable human resources management processes based upon the process classification framework using IPA approach
167
Prioritizing Information for Achieving QoS Control in WSN
168
Prioritizing Information Technology Service Investments under Uncertainty
169
Prioritizing interaction test suite for t-way testing
170
Prioritizing Investment in CRM Resources to Improve Performance: An Empirical Investigation
171
Prioritizing journals relevant to a topic for addressing clinicians´ information needs
172
Prioritizing JUnit test cases in absence of coverage information
173
Prioritizing lean supply chain management initiatives in healthcare service operations: A Fuzzy-AHP approach
174
Prioritizing Legal Requirements
175
Prioritizing linear equality and inequality systems: Application to local motion planning for redundant robots
176
Prioritizing local inter-domain communication in Xen
177
Prioritizing Manual Test Cases in Traditional and Rapid Release Environments
178
Prioritizing material recovery for end-of-life printed circuit boards
179
Prioritizing Molecular Signatures by Combining ACGH and Global Gene Expression Profiling
180
Prioritizing Mutation Operators Based on Importance Sampling
181
Prioritizing parallel analog re-host candidates through ATLAS source code analysis
182
Prioritizing Point-Based POMDP Solvers
183
Prioritizing power management and reducing downtime for energy conservation in data centers
184
Prioritizing predicted cis-regulatory elements for co-expressed gene sets based on Lasso regression models
185
Prioritizing privacy parameters using analytical hierarchy processing
186
Prioritizing processes for better implementation of statistical process control techniques
187
Prioritizing processes in initial implementation of statistical process control
188
Prioritizing Reactive power assignment strategy for doubly fed induction generator of Large-scale Wind Farm
189
Prioritizing reliability for underground distribution
190
Prioritizing Requirements-Based Regression Test Cases: A Goal-Driven Practice
191
Prioritizing research topics in professional communication
192
Prioritizing RFID technology factors in healthcare organizations using TOPSIS
193
Prioritizing risks based on multicriteria decision aid methodology: Development of methods applied to ALSTOM power
194
Prioritizing semi-static data streams in network-on-chips for runtime reconfigurable systems
195
Prioritizing Service Requests on Cloud with Multi-tenancy
196
Prioritizing Short-Term Investments in Distribution Networks with Uncertainty Modeled by Fuzzy Numbers
197
Prioritizing soft real-time network traffic in virtualized hosts based on Xen
198
Prioritizing software anomalies with software metrics and architecture blueprints
199
Prioritizing Software Inspection Results using Static Profiling
200
Prioritizing Software Requirements In An Industrial Setting
201
Prioritizing State-Based Aspect Tests
202
Prioritizing strategic issues using quadratic goal programming
203
Prioritizing Structurally Complex Test Pairs for Validating WS-BPEL Evolutions
204
Prioritizing students´ mobile centric information access needs: A case of postgraduate students
205
Prioritizing system-reliability prediction improvements
206
Prioritizing technical requirements in QFD by integrating the grey relational analysis method and analytic network process approach
207
Prioritizing telecommunications technologies for long-range R&D planning to the year 2006
208
Prioritizing test cases for regression testing
209
Prioritizing Test Cases for Regression Testing of Location-Based Services: Metrics, Techniques, and Case Study
210
Prioritizing test cases for resource constraint environments using historical test case performance data
211
Prioritizing tests for fault localization through ambiguity group reduction
212
Prioritizing Tests for Software Fault Localization
213
Prioritizing the Application of DFM Guidelines Based on the Detectability of Systematic Defects
214
Prioritizing the Data in the Target-Tracking Wireless Sensor Networks
215
Prioritizing the purchase of spare parts using an approximate reasoning model
216
Prioritizing transformers for condition based asset replacement
217
Prioritizing travel time reports in peer-to-peer traffic dissemination
218
Prioritizing Unit Test Creation for Test-Driven Maintenance of Legacy Systems
219
Prioritizing Use Cases to Aid Ordering of Scenarios
220
Prioritizing User-Session-Based Test Cases for Web Applications Testing
221
Prioritizing Variable-Strength Covering Array
222
Prioritizing verification via value-based correctness criticality
223
Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities
224
Prioritizing Warning Categories by Analyzing Software History
225
Prioritizing web links based on web usage and content data
226
Prioritizing write acknowledgment inside network fileservers
227
Priority access for hybrid handoff wireless systems
228
Priority Access for public safety on shared commercial LTE networks
229
Priority Access Schemes Using CSMA-CD
230
Priority access service in cellular and PCS networks
231
Priority aided scheduling of pigeons in Homing-Pigeon-Based Delay Tolerant Networks
232
Priority alarm system [for passenger railways]
233
Priority algorithm based VLSI testing technique for BIST
234
Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality
235
Priority analysis of a shared-buffer ATM switch with imbalanced bursty traffic
236
Priority Analysis of Management Method for the Workers´ Unsafe Behaviors on Mine Construction Project
237
Priority and adaptive QoS mechanism for Wireless Networked Control Systems using IEEE 802.15.4
238
Priority and admission control for assuring quality of I2V emergency services in VANETs integrated with Wireless LAN Mesh Networks
239
Priority- and Delay-Aware Medium Access for Wireless Sensor Networks in the Smart Grid
240
Priority and fair scheduling in a wireless LAN
241
Priority and Maximum Revenue based Routing and Wavelength Assignment for All-optical WDM Networks
242
Priority and relevance in belief revision
243
Priority and Segmentation algorithm for the 3-D motion estimation of two heads partly overlapped
244
Priority and significance analysis of selecting threshold values in Adaptive Unsharp Masking for infrared images
245
Priority arbiters
246
Priority Assessing Method for Aviation Multi-Project Based on Fuzzy Comprehensive Evaluation
247
Priority Assessment of Online Monitoring Investment for Power System Circuit Breakers—Part I: Qualitative-Quantitative Approach
248
Priority Assessment of Online Monitoring Investment for Power System Circuit Breakers—Part II: Determination of Optimum Number
249
Priority assessment of software requirements from multiple perspectives
250
Priority assessment of wetlands restoration in HuangHuaiHai region, China
251
Priority assignment algorithms for resolving blocking in modular control of discrete event systems
252
Priority assignment control of ATM line buffers with multiple QOS classes
253
Priority assignment for event-triggered systems using mathematical programming
254
Priority Assignment for Global Fixed Priority Pre-Emptive Scheduling in Multiprocessor Real-Time Systems
255
Priority assignment for multimedia multipoint-to-point communication
256
Priority Assignment for Multimedia Packets Scheduling in MANET
257
Priority Assignment for Real-Time Flows in WirelessHART Networks
258
Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks
259
Priority Assignment in a Network of Computers
260
Priority assignment in distributed real-time databases using optimistic concurrency control
261
Priority assignment in real-time active databases
262
Priority assignment on an avionics switched Ethernet Network (QoS AFDX)
263
Priority assignment optimization for minimization of current surge in high performance power efficient clock-gated microprocessor
264
Priority assignment using dynamic programming for a class of queueing systems
265
Priority backoff algorithm for IEEE 802.11 DCF
266
Priority bandwidth request scheme in IEEE802.16j networks
267
Priority base budgeting: a practical, zero base approach to manufacturing overheads
268
Priority based adaptive guard channel for multi-class traffic in wireless networks
269
Priority Based Adaptive Video Transmission Over Ad Hoc Networks
270
Priority based algorithm for Plume tracking Robot
271
Priority based AODV routing protocol for critical data in Wireless Body Area Network
272
Priority based approach against congestion in sensor network
273
Priority based bandwidth allocation scheme for WIMAX systems
274
Priority based channel assignment with pair-wise listen and sleep scheduling for wireless sensor networks
275
Priority based computation a study on paradigm shift on real time computation
276
Priority based congestion avoidance hybrid scheme for Wireless Sensor Network
277
Priority based congestion control for heterogeneous traffic in multipath wireless sensor networks
278
Priority based congestion control in WBAN
279
Priority based control channel access scheme for throughput improvement in VANET
280
Priority based current control design in high speed sensorless PMSM drives
281
Priority based data flow testing
282
Priority Based Dispersion-Reduced Wavelength Assignment for Optical Networks
283
Priority based distributed job scheduler for java compute servers
284
Priority Based Dynamic Rate Control for VoIP Traffic
285
Priority Based Dynamic Reconfiguration of Lightpath in WDM Networks
286
Priority Based Dynamic Resource Allocation in Cloud Computing
287
Priority based dynamic resource allocation in Cloud computing with modified waiting queue
288
Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints
289
Priority based efficient and reliable centralized connection management scheme for computer networks
290
Priority Based Energy Aware (PEA) Routing Protocol for WBANs
291
Priority based enhancement of online power-aware routing in wireless sensor network
292
Priority Based Fairness Provisioning QoS-Aware MAC Protocol
293
Priority based forced requeue to reduce worst-case latencies for bursty traffic
294
Priority Based HCCA for IEEE 802.11e
295
Priority based heuristic job scheduling algorithm for the computational grid
296
Priority Based Inter-Vehicle Communication in Vehicular Ad-Hoc Networks using IEEE 802.11e
297
Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks
298
Priority based MAC scheme for cognitive radio network: A queuing theory modelling
299
Priority based maximum consuming power control in smart homes
300
Priority based messaging for software distributed shared memory
301
Priority based multicast scheduling mechanism with the number of receivers over EPON
302
Priority based NDS data scheduling algorithm for vehicle to hotspot communication
303
Priority based optimal path routing for automated guided vehicle
304
Priority based optimization of PID controller for automatic voltage regulator system using gravitational search algorithm
305
Priority Based Overlay Multicast for Distributed Interactive Applications
306
Priority based Overlay Multicast with Filtering Mechanism for Distributed Interactive Applications
307
Priority based pheromone algorithm for image cluster
308
Priority Based Pixel Domain Wyner-Ziv video coding using key frames
309
Priority Based Power Saving Mode in WLAN
310
Priority based pricing for data traffic in WiMAX network
311
Priority based real-time communication for large scale wormhole networks
312
Priority based resource allocation and demand based pricing model in peer-to-peer clouds
313
Priority based Round-Robin service broker algorithm for Cloud-Analyst
314
Priority based routing and wavelength assignment with traffic grooming for optical networks
315
Priority based Routing Protocol in Vehicular Ad hoc Network
316
Priority based routing protocol with reliability enhancement in Vehicular Ad hoc Network
317
Priority Based Scheduling for Heterogeneous Grid Environments
318
Priority Based Scheduling of Multimedia Traffic on Real Time Linux Operating System
319
Priority Based Selection to Improve Contents Consistency for Mobile Overlay Network
320
Priority based slot allocation for media access in Wireless Sensor Networks
321
Priority based soft-handover scheme for multi-services in Intelligent Transportation Systems over WCDMA networks
322
Priority based solver for a real-time dynamic vehicle routing
323
Priority Based Transaction Scheduling Model and Concurrency Control in Grid Database
324
Priority Based USB Communication: Dual Endpoint between Smart TV and Set-Back Box
325
Priority based vector quantization of wavelet coefficients
326
Priority based wireless packet communication with admission and throughput control
327
Priority based, adaptive queuing for differentiating services in IP based networks
328
Priority Behavior Modeling of Fab for Supply Chain Management
329
Priority Belief Propagation-Based Inpainting Prediction With Tensor Voting Projected Structure in Video Compression
330
Priority capabilities in LTE supporting national security and emergency preparedness next generation network priority services
331
Priority Channel Assignment in Tandem DSI
332
Priority channel selection based on detection history database
333
Priority Checking RED for Improving QoS in IPv6
334
Priority classification based fast intra mode decision for High Efficiency Video Coding
335
Priority code selection method of the modified binary countdown scheme for VANET
336
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
337
Priority communication schemes on local area networks for multimedia traffic
338
Priority considerations for multiple goals of redundant manipulators
339
Priority control for photonic burst networks
340
Priority control in receiving e-mails by giving a separate response to each DNS query
341
Priority control in software maintenance
342
Priority control mechanism based on cell service ratio in ATM switch
343
Priority control using multi-buffer for DTN
344
Priority Cycle Time Behavior Modeling for Semiconductor Fabs
345
Priority DCT coding for image sequences
346
Priority diagnosis tree expert system of electronic devices controlling missile launch
347
Priority differentiation in cognitive radio networks
348
Priority directed test generation for functional verification using neural networks
349
Priority discarding of speech in integrated packet networks
350
Priority disciplines - a diffusion approach
351
Priority division: A high-speed shared-memory bus arbitration with bounded latency
352
Priority driven agent based retail supply chain management system
353
Priority driven channel pin assignment
354
Priority dropping in network transmission of scalable video
355
Priority enabled dynamic traffic grooming
356
Priority Enabled Transport Layer Protocol for Wireless Sensor Network
357
Priority encoding of video data over ATM
358
Priority encoding scheme for contention resolution in optical packet-switched networks
359
Priority Encoding Scheme for Solving Permutation and Constraint Problems with Genetic Algorithms and Simulated Annealing
360
Priority encoding transmission
361
Priority encoding transmission
362
Priority Encoding Transmission Based Multiple Description Video Coding over Packet Loss Network
363
Priority estimation for overhead-to-cable reconstructions regarding reliability indices
364
Priority evaluation and ranking of transmission system projects computer models and results
365
Priority evaluation for PBX firms
366
Priority evaluation of transmission lines based on vulnerability assemment
367
Priority event monitoring for interrupt-driven computer
368
Priority for discoveries: challenges of electronic publication to research norms, practices and values
369
Priority For Public Transport Using Advanced Transport Telematics
370
Priority function based power efficient rapid Design Space Exploration of scheduling and module selection in high level synthesis
371
Priority Handling Aggregation Technique (PHAT) for Wireless Sensor Networks
372
Priority Handling of Essential User Calls in an Overloaded Distributed Switching System
373
Priority handoff analysis
374
Priority image and video encoding transmission based on a discrete radon transform
375
Priority image transmission in wireless sensor networks
376
Priority inheritance and ceilings for distributed mutual exclusion
377
Priority inheritance protocols: an approach to real-time synchronization
378
Priority inheritance spin locks for multiprocessor real-time systems
379
Priority Integration for Weighted Combinatorial Testing
380
Priority interrupts of Duty Cycled communications in wireless sensor networks
381
Priority inversion and queue management for 802.11 priority WLANs
382
Priority inversion at the network adapter when scheduling messages with earliest deadline techniques
383
Priority inversion detection in Alvis models
384
Priority inversion handling in microkernel-based Real-Time Mike
385
Priority inversion in dynamic priority driven scheduling algorithms due to imperfect clock synchronization
386
Priority inversions in real-time communication
387
Priority investment components of emotional intelligence effective on marketing with AHP method
388
Priority issues of disaster robotics in Japan
389
Priority issues of infrastructure inspection and maintenance robot: A part of COCN 2012 project “disaster response robot and its operational system”
390
Priority leaky buckets with extra token pool for policing traffic in ATM networks
391
Priority Level Configuration for Signaling Service Class
392
Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks
393
Priority list method for active power cutback control in a wind farm
394
Priority list sensor scheduling using optimal pruning
395
Priority MAC based on multi-parameter for IEEE 802.15.7 VLC
396
Priority management in ATM switching nodes
397
Priority Management of Emergency Vehicles at Intersections Using Self-Organized Traffic Control
398
Priority mechanism for the DQDB network
399
Priority mechanisms for OLTP and transactional Web applications
400
Priority mechanisms in ATM networks
401
Priority mechanisms in ATM switches carrying two layer video data
402
Priority mix planning for cycle time-differentiated semiconductor manufacturing services
403
Priority Node-Based Congestion Control Algorithm for Wireless Sensor Networks
404
Priority of instructions execution and DFG mapping techniques of computer architecture with data driven computation model
405
Priority of Strategic Plans in BSC Model by Using Borda Method
406
Priority of strategic plans in BSC model by using of Group Decision Making Model
407
Priority of the french national network in microelectronics and nanotechnologies towards the attractiveness of young high-schoolers
408
Priority ordered architecture of neural networks
409
Priority ordered BP neural network and the application for speaker identification
410
Priority ordered direction basis function neural networks and the application for object recognition
411
Priority Ordering Algorithm for Scalable Video Coding Transmission over Heterogeneous Network
412
Priority oriented adaptive control of kinematically redundant manipulators
413
Priority Oriented Adaptive Polling for wireless LANs
414
Priority oriented channel access for cellular systems serving vehicular and portable radio telephones
415
Priority packet switching in multistage interconnection networks
416
Priority paging algorithms and the extension problem
417
Priority performance of ATM packet switches
418
Priority performance of banyan-based broadband-ISDN switches
419
Priority polling and dynamic time-window mechanisms in a multicycle Fieldbus
420
Priority Polling Strategy for Wireless Sensor Networks
421
Priority polling with reservation wireless access protocol for multimedia ad hoc networks
422
Priority Preemption for Real-Time Application QoS Guarantees in Cooperative Vehicular Networks
423
Priority Pricing Based Network Resources Allocation Scheme for Mobile Data Communication
424
Priority pricing in utility fair networks
425
Priority promotion scheme (PPS): three approaches to ease measurement traffic congestion
426
Priority protection of wavelet transformed video over ATM
427
Priority pyramid based bit allocation for multiview video coding
428
Priority queue schedulers with approximate sorting in output-buffered switches
429
Priority queue with two state Markov modulated arrivals
430
Priority queue with two-state Markov-modulated arrivals
431
Priority queue-based IEEE 1394 device driver for supporting real-time characteristics
432
Priority queue-based IEEE1394 device driver supporting real-time characteristics
433
Priority queueing analysis of self-similar in high-speed networks
434
Priority queueing disciplines in ATM switches carrying two layer video traffic
435
Priority queueing for the autodin store-and-forward network
436
Priority queueing in RAID disk arrays with an NVS cache
437
Priority queueing strategies and buffer allocation protocols for traffic control at an ATM integrated broadband switching system
438
Priority queueing strategies for traffic control at a multichannel ATM switching system
439
Priority queueing strategies for traffic control at an ATM integrated broadband switching system
440
Priority queueing system with fixed-length packet-train arrivals
441
Priority Queueing with Finite Buffer Size and Randomized Push-Out Mechanism
442
Priority queueing with multiple packet characteristics
443
Priority queues and sorting methods for parallel simulation
444
Priority queues with variable priority and an O(EV log V) algorithm for finding a maximal weighted matching in general graphs
445
Priority Queues: New Methodologies of Analysis
446
Priority queuing of long-range dependent traffic
447
Priority Random Linear Codes in Distributed Storage Systems
448
Priority ranking of industrial loads and application of Demand Side Management technique
449
Priority refinement for dependent tasks in large embedded real-time software
450
Priority register: Application-defined replacement orderings for ad hoc reconciliation
451
Priority resolution of modernization of power industry objects
452
Priority retransmission in AL-ARQ for MPEG streaming over WLAN
453
Priority round-robin scheduling for very large virtual environments
454
Priority rule based heuristics for project scheduling problems with multi-skilled workforce constraints
455
Priority rule strategy for managing a Personal Rapid Transit system
456
Priority Rules for Simulation vs Strategies for a Placement Algorithm
457
Priority scheduling algorithm for ATM wireless network access
458
Priority scheduling algorithm to improve short-term fairness for TCP flows in WLAN
459
Priority scheduling and buffer management for ATM traffic shaping
460
Priority Scheduling for Improving Video Delivery over Wireless Multimedia Sensor Networks
461
Priority scheduling for networked virtual environments
462
Priority scheduling for participatory Delay Tolerant Networks
463
Priority Scheduling in Digital Microfluidics-Based Biochips
464
Priority Scheduling in MapReduce Based on Queuing Theory
465
Priority scheduling in mobile ad hoc networks with improved bandwidth utilization
466
Priority scheduling in optical burst switching networks
467
Priority scheduling in switched industrial Ethernet
468
Priority Scheduling of Requests to Web Portals
469
Priority scheme for mobile data access employing reservation
470
Priority Scheme for Mobile Nodes in P2P Bit-Torrent Based Networks
471
Priority scheme for window-based video-on-demand transmission on BitTorrent-like Peer-to-Peer networks
472
Priority schemes for packet data and multi-slot operation on EDGE
473
Priority schemes for packet data and voice integration on EDGE
474
Priority SDN Controlled Integrated Wireless and Powerline Wired for Smart-Home Internet of Things
475
Priority search technique for MPEG-4 motion estimation of arbitrarily shaped video object
476
Priority Sensitive Event Detection in Hybrid Wireless Sensor Networks
477
Priority service and max-min fairness
478
Priority service and max-min fairness
479
Priority service at competitive radio channel access
480
Priority service disciplines and voice cell discarding schemes in ATM networks
481
Priority setting in complex problems
482
Priority setting in various DG technologies considering the reduction of energy subsidies using FAHP method
483
Priority Setting of Future Technology Area Based on Korean Technology Foresight Exercise
484
Priority shaping of source traffic for ATM networks
485
Priority State Machine (PriSMa): A practical tool for DES control system developers
486
Priority statistical multiplexing of mixed VBR video and CBR traffic in B-ISDN/ATM with a threshold algorithm
487
Priority Structures
488
Priority tasks for operation efficiency increase of the wireless communication networks with distributed adaptive antenna systems
489
Priority technique for optimising handover procedure in personal communication systems
490
Priority traffic in wireless PCS systems: transmission and traffic parameters trade-off
491
Priority Transmission of SIP Signaling Flows in Case of IP Link Congestion
492
Priority transmission of SIP signaling flows in case of link failure
493
Priority transmission of SIP signaling flows over IP network
494
Priority Tries for IP Address Lookup
495
Priority Users in a Multi-Channel System
496
Priority Watermarking-Based Face-Fingerprint Authentication System
497
Priority wavelet packet decomposition and representation
498
Priority Weight Intervals Derived From Intuitionistic Multiplicative Preference Relations
499
Priority weighted BA random graph model
500
Priority Weighted BA Scale-Free Random Graph model
501
Priority Weighted Fitness Model in Complex Networks
502
Priority with adoptive data migration in case of disaster using cloud computing use style
503
Priority Workflow Nets
504
Priority X-Factor Modeling for Differentiated Manufacturing Service Planning
505
Priority-aware downlink frame packing algorithm for OFDMA-based mobile wireless systems
506
Priority-aware extended eOCSA frame packing algorithm evaluation in WiMAX systems with mixed VoIP and data traffic
507
Priority-Aware Joint Packet Fragmentation and Error Protection Scheme for H.264 Video over Wireless Channels
508
Priority-aware optical shared protection coupled with mutation probability
509
Priority-aware scheduling for coexisting wireless body area networks (invited paper)
510
Priority-aware transfer of SVC encoded video over MIMO communications system
511
Priority-base retransmission scheduling for Automatic Repeat Request over wireless networks
512
Priority-Based Access for DSRC and 802.11p Vehicular Safety Communication
513
Priority-Based Access Schemes and Throughput Performance in Wireless Networks Exploiting Multibeam Antennas
514
Priority-based adaptive frequency hopping for Bluetooth in multi-piconet environments
515
Priority-based adaptive rate control for wireless sensor networks
516
Priority-based adaptive timeslot allocation scheme for wireless body area network
517
Priority-based autonomous load control in dynamic pricing environments
518
Priority-Based Balance Scheduling in Real-Time Data Warehouse
519
Priority-based bandwidth allocation in heterogeneous wireless network
520
Priority-based broadcasting of sensitive data in error-prone wireless networks
521
Priority-based cache allocation in throughput processors
522
Priority-based Call Admission Control of multiclasses in Mobile networks
523
Priority-based CDMA system with variable code reservation periods for multiclass traffic
524
Priority-based cell selection for mobile equipments in heterogeneous cloud radio access networks
525
Priority-based charging coordination of plug-in electric vehicles in smart parking lots
526
Priority-based charging coordination of plug-in electric vehicles in smart parking lots
527
Priority-based classification of spectrum access models [Accepted From Open Call]
528
Priority-Based Conflict Resolution for Hardware Transactional Memory
529
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks
530
Priority-based congestion control in MPLS-based networks
531
Priority-based congestion control in multi-path and multi-hop wireless sensor networks
532
Priority-based congestion control in wireless sensor networks
533
Priority-based congestion control mechanism for wireless sensor networks using fuzzy logic
534
Priority-based Congestion Control Protocol (PCCP) for controlling upstream congestion in Wireless Sensor Network
535
Priority-based congestion control using hierarchical trees MDC in WiMAX networks providing multicasting services
536
Priority-Based Consolidation of Parallel Workloads in the Cloud
537
Priority-based contention period allocation for directional CSMA/CA in smart home
538
Priority-based cooperative access for Cognitive Wireless Mesh Networks
539
Priority-based coordination of autonomous and legacy vehicles at intersection
540
Priority-based coverage path planning for Aerial Wireless Sensor Networks
541
Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor Networks
542
Priority-based cross-layer optimization for multihop DS-CDMA Visual Sensor Networks
543
Priority-based defragmentation scheme in spectrum-efficient optical networks
544
Priority-based delay mitigation for event-monitoring IEEE 802.15.4 LR-WPANs
545
Priority-based distributed dynamic multipath routing for LEO satellite networks
546
Priority-Based Distributed Manufacturing Process Modeling via Hierarchical Timed Color Petri Net
547
Priority-based dynamic access policies to WAN from LAN/MAN
548
Priority-based dynamic packet reservation for TDMA wireless networks
549
Priority-Based Dynamic Spectrum Management in a Smart Grid Network Environment
550
Priority-based EDF scheduling algorithm for real-time service
551
Priority-Based Energy Aware and Coverage Preserving Routing for Wireless Sensor Network
552
Priority-based energy-efficient MAC protocols for the in-car power line communication
553
Priority-Based fair Scheduling for Multimedia WiMAX Uplink Traffic
554
Priority-Based Functional Reactive Programming (P-FRP) Using Deferred Abort
555
Priority-Based Greedy Scheduling for Confident Information Coverage in Energy Harvesting Wireless Sensor Networks
556
Priority-based high-speed intelligent rule-checking
557
Priority-based high-speed switch scheduling for ATM networks
558
Priority-Based Hybrid Protocol in Wireless Sensor Networks
559
Priority-Based Hybrid Routing in Wireless Sensor Networks
560
Priority-based intersection control framework for self-driving vehicles: Agent-based model development and evaluation
561
Priority-based intersection management with kinodynamic constraints
562
Priority-based lambda scheduler
563
Priority-based low-power task scheduling for wireless sensor network
564
Priority-Based Message Scheduling for the Multi-agent System in Ubiquitous Environment
565
Priority-Based Meta-control within Hierarchical Task Network Planning
566
Priority-Based Multi-event Reporting in Hybrid Wireless Sensor Networks
567
Priority-based multiple access (PBMA) for statistical multiplexing of multiple services in wireless PCS
568
Priority-based multiplexing of IP-streams onto shared cellular links
569
Priority-Based node selection and scheduling for wireless multimedia sensor networks
570
Priority-Based Normalized Partial Distortion Search Algorithm for Fast Motion Estimation
571
Priority-based offline wavelength assignment in OBS networks
572
Priority-based optical network protection and restoration with application to DOD networks
573
Priority-based packet communication on a bus-shaped structure for FPGA-systems
574
Priority-based parameter performance optimization for EDCA
575
Priority-Based Path Growing for Linear Feature Detection
576
Priority-Based Polling Scheme under Mixed Services Policy of Exhaustive and Three-Times Gated Services
577
Priority-based QoS MAC protocol for wireless sensor networks
578
Priority-based QoS support for multiservice mobile networks
579
Priority-based R2CP for multipoint-to-point video streaming
580
Priority-based random access and resource allocation scheme for HiperLAN type2 system
581
Priority-based random access scheme for S-PCN
582
Priority-Based Rate Adaptation Using Game Theory in Vehicular Networks
583
Priority-based resource allocation for OFDMA uplink with heterogeneous traffic
584
Priority-Based Resource Allocation for RT and NRT Traffics in OFDMA Systems
585
Priority-based resource allocation scheme for visible light communication
586
Priority-based resource allocation to Guarantee Handover and Mitigate Interference for OFDMA system
587
Priority-Based Resource Scheduling in Distributed Stream Processing Systems for Big Data Applications
588
Priority-Based Ring-Hybrid WDM LANS for Avionics
589
Priority-based Routing for Solar-Powered Wireless Sensor Networks
590
Priority-based routing of unmanned combat aerial vehicles
591
Priority-based routing with strict deadlines and server flexibility under uncertainty
592
Priority-Based Scheduling for Large-Scale Distribute Systems with Energy Awareness
593
Priority-based scheduling for limited energy cognitive relaying
594
Priority-based scheduling of dynamic segment in FlexRay network
595
Priority-based scheduling of scarce resources
596
Priority-Based Scheme for File Distribution in Peer-to-Peer Networks
597
Priority-based selective H.264 SVC video streaming over erroneous multiple networks
598
Priority-based separate backoff scheme for service differentiation in IEEE 802.11 WLAN
599
Priority-Based Service Differentiation Scheme for Medium and High Rate Sensor Networks
600
Priority-Based Service-Differentiation Scheme for IEEE 802.15.4 Sensor Networks in Nonsaturation Environments
601
Priority-based smart household power control model
602
Priority-based spectrum allocation for cognitive radio networks employing NC-OFDM transmission
603
Priority-based SRAM design
604
Priority-based task allocation in auction-based applications
605
Priority-based template matching intra prediction
606
Priority-Based Time-Slot Allocation in Wireless Body Area Networks During Medical Emergency Situations: An Evolutionary Game-Theoretic Perspective
607
Priority-based tool capacity allocation in the foundry fab
608
Priority-based total and semi-total ordering broadcast protocols
609
Priority-Based Traffic Scheduling and Utility Optimization for Cognitive Radio Communication Infrastructure-Based Smart Grid
610
Priority-based variable multi-channel MAC protocols in cognitive radio wireless network: A fair channel access strategy
611
Priority-Based Vehicle-to-Infrastructure Communication (PV2I)in UMTS
612
Priority-based virtual machine load balancing in a scientific federated cloud
613
Priority-based wavelength assignment algorithm for burst switched photonic networks
614
Priority-Based Zero-Forcing in Spectrum Sharing Cognitive Systems
615
PriorityCast: Efficient and Time-Critical Decision Making in First Responder Ad-Hoc Networks
616
Priority-controlled networks in ITS
617
Priority-coupling-a semi-persistent MAC scheduling scheme for VoIP traffic on 3G LTE
618
Priority-determined multiclass handoff scheme with guaranteed mobile QoS in wireless multimedia networks
619
Priority-driven active data prefetching
620
Priority-driven coding of progressive JPEG images for transmission in real-time applications
621
Priority-driven scheduling and bandwidth allocation for MPEG-2 decoding
622
Priority-Driven Swapping-Based Scheduling of Aperiodic Real-Time Messages Over EtherCAT Networks
623
Priority-driven, preemptive I/O controllers for real-time systems
624
Priority-Ensured Medium Access in Ad Hoc Networks
625
Priority-first search decoding for convolutional tail-biting codes
626
Priority-list-based opportunistic cooperation — a general framework with cost-aware utility
627
PriorityMAC: A Priority-Enhanced MAC Protocol for Critical Traffic in Industrial Wireless Sensor and Actuator Networks
628
Priority-monotonic energy management for real-time systems with reliability requirements
629
Priority-Oriented Adaptive Control With QoS Guarantee for Wireless LANs
630
Priority-Processing for Optimized Real-Time Performance with Limited Processing Resources
631
Priority-select arbiter: An efficient round-robin arbiter
632
Prior-knowledge assisted fast 3D map building of structured environments for steel bridge maintenance
633
Prior-online iteration for image reconstruction with electrical capacitance tomography
634
Priors and constraints in Bayesian image segmentation based on finite mixtures
635
Priors and constraints in Bayesian image segmentation based on finite mixtures
636
Priors for people tracking from small training sets
637
Priors for Stereo Vision under Adverse Weather Conditions
638
Prior-updating ensemble learning for discrete HMM
639
PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology
640
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
641
PRIPES: a multiprocessor based system for programming and controlling manipulators in robotic applications
642
Priroda passive microwave observations in the Southern Great Plains 1997 Hydrology Experiment
643
PRIS: Image processing tool for dealing with criminal cases using steganography technique
644
PRISAD: a partitioned rendering infrastructure for scalable accordion drawing
645
PRISC software acceleration techniques
646
PRISCA: A policy search method for extreme trajectory following
647
PrisCrawler: A Relevance Based Crawler for Automated Data Classification from Bulletin Board
648
PriSec 2014 Program Committee
649
PriSec 2014 Symposium Organization
650
PriSecCSN2012 Organizing and Program Committees
651
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems
652
Prisident´s column
653
PRISM (PRoductivity Improvement Systems for Manufacturing)-a CIM integration at AT&T
654
PRISM 2.0: a tool for probabilistic model checking
655
PRISM architecture: parallel and pipeline features
656
Prism array-based receiver with application in MIMO indoor optical wireless communications
657
Prism based pulse shaper for direct phase manipulation
658
Prism couples laser beams to thin films
659
Prism coupling measurements of AlxGa1-xAs native oxides
660
Prism coupling technique: a method for measurement of propagation constant and beat length in single-mode fibres
661
Prism fiber reading tube
662
Prism fiber reading tube and thin film electron-beam penetration printing tube for fast facsimile transmission
663
Prism Left-Handed Waveguide Coupler
664
PRISM On-Orbit Geometric Calibration and DSM Performance
665
PRISM Product Examination Process for component based development
666
PRISM™: a Web-based framework for deploying predictive clinical models
667
Prism, The Advanced Liquid Metal Reactor Design Concept
668
PRISM: a "reversed" multimedia coding paradigm
669
Prism: a multi-view visualization tool for multi-physics simulation
670
Prism: A Primal-Encoding Approach for Frequent Sequence Mining
671
PRISM: A statistical modeling framework for text-independent speaker verification
672
PRISM: a systematic approach to planning technology transfer campaigns
673
PRISM: A Video Coding Paradigm With Motion Estimation at the Decoder
674
PRISM: an error-resilient video coding paradigm for wireless networks
675
PRISM: an integrated architecture for scalable shared memory
676
PRISM: An In-Vehicle CPU-Oriented Novel Azimuth Estimation Technique for Electronic-Scan 76-GHz Adaptive-Cruise-Control Radar System
677
PRISM: an uplink-friendly multimedia coding paradigm
678
PRISM: Fine-Grained Resource-Aware Scheduling for MapReduce
679
PRISM: Improving the Performance of Inverse-Multiplexed TCP in Wireless Networks
680
PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs)
681
PRISM: Program Replication and Integration for Seamless MILS
682
PRISM: protein integration of sequence metrics
683
PRISM: Zooming in persistent RAM storage behavior
684
PRISM´s high resolution MPEG chip set
685
Prism´s promising premises
686
Prism=methodology+process-oriented environment
687
Prism2Promela
688
PRISMA - A Multidimensional Information Visualization Tool Using Multiple Coordinated Views
689
PRISM-a design for scalable shared memory
690
Prisma Maps -- A  Geovisualization Support for Prisma Multiple Coordinated View Information Visualization Tool
691
PRISMA Mobile: An Information Visualization Tool for Tablets
692
PRISM-a tool for modelling proton energy deposition in semi-conductor materials
693
PRISMA/DB: a parallel, main memory relational DBMS
694
PRISMA: a prioritized slotted multiple access protocol for bank data center LANs
695
PRISMA: towards quality, aspect oriented and dynamic software architectures
696
PRISMA-MDE - Distributed and Scalable Environment for Multiple Views of Data Coordinates
697
PRISMA-MDE - Information Visualization Environment for Multiple Display
698
Prismatic applicator for continuous microwave-assisted synthesis of metallic nanoparticles
699
Prismatic applicator for continuous-flow microwave-assisted synthesis of metallic nanoparticles
700
Prismatic cell lithium-ion battery using lithium manganese oxide
701
Prismatic Coupling Structure for Intrachip Global Communication
702
Prismatic covers for boosting the efficiency of high-concentration PV systems
703
Prismatic lithium-ion batteries
704
Prismatic Omni-directional legged machine for rough environmet movement by a simple mechanical drive
705
Prismatic platelet growth of HgI2 with organic additives
706
Prismatic Sealed Ni-Cd Battery For Aircraft Power
707
Prismatic sealed nickel-cadmium batteries utilizing fiber structured electrodes. I. New advances in cell design
708
Prismatic sealed nickel-cadmium batteries utilizing fiber structured electrodes. II. Applications as a maintenance free aircraft battery
709
PRISMATICA: a multi-sensor surveillance system for public transport networks
710
PRISMATICA: toward ambient intelligence in public transport environments
711
Prism-based pulse shaper for octave spanning spectra
712
Prism-Coupled Silica Micro-tube Resonator as a Bio-sensor
713
Prism-Coupler Revisited: Analysis and Performance Characteristics Using the Finite-Difference Frequency-Domain Method
714
Prism-coupling of light into narrow planar optical waveguides
715
PRISM-II compiler and architecture
716
Prismless diode-pumped femtosecond Nd:glass laser
717
Prismless Kerr-Lens Mode-Locked Femtosecond Cr:LiSGaF Laser
718
Prism-like folded cavity surface-emitting laser diode: electromagnetic-threshold analysis
719
Prism-methodology and process-oriented environment
720
Prism-pair interferometer for precise refractive index measurement using spectral lamp radiation with simultaneous wavelength calibration
721
PRISMS: an approach to software process improvement for small to medium enterprises
722
Prism-shaped Fabry-Perot etalon for absorption measurement in the terahertz range
723
Prismspect and pegasys: plasma simulation and experimental analysis codes
724
Prison Breach: F.S.T.S.E Design Method for Toy Based on Mental and Behavioral Characteristic of Children
725
Prison Break: A Generic Schema Matching Solution to the Cloud Vendor Lock-in Problem
726
Prison security updated
727
Prison: Tracking Process Interactions to Contain Malware
728
Prisoner Dilemma: Generator Strategic Bidding in Electricity Markets
729
Prisoner´s Dilemma in Graphs with Heterogeneous Agents
730
Prisoners, chickens, volunteers, free riders and suckers: dilemmas on the Internet
731
Prisoners´ Dilemma of Endogenous Spillovers and Investment Equilibrium Strategies of Exogenous
732
Pristine spider silk fibers as waveguiding microstructure in free space and in an integrated photonic chip
733
PrIter: A Distributed Framework for Prioritizing Iterative Computations
734
PRITI: Estimation of maximal currents and current derivatives in complex CMOS circuits using activities waveforms
735
Pritrans: A prioritized converge-cast scheme using consensus ranking in wireless sensor networks
736
PRIUS: An Educational Framework on PRAGMA Fostering Globally-Leading Researchers in Integrated Sciences
737
Privacy - preserving top-k queries
738
Privacy - The forgotten challenge in sensor and distributed systems
739
Privacy - The times they are a-changin´ [Introduction]
740
Privacy & Security Issues Related to Match Scores
741
Privacy – aware average speed monitoring system for vehicular ad-hoc networks
742
Privacy (Regimes) Do Not Threaten Location Technology Development
743
Privacy Access Control Model for Aggregated e-Health Services
744
Privacy Access Control Model with Location Constraints for XML Services
745
Privacy Adaptation for Secured Associations in a Social Cloud
746
Privacy against aggregate knowledge attacks
747
Privacy against statistical inference
748
Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions
749
Privacy algorithm for cylindrical holographic weapons surveillance system
750
Privacy algorithm for cylindrical holographic weapons surveillance system
751
Privacy amplification against active attacks with strong robustness
752
Privacy Amplification and Non-malleable Extractors via Character Sums
753
Privacy amplification of content identification systems based on fingerprint bit reliability
754
Privacy amplification over a non-authentic public channel
755
Privacy amplification secure against an adversary with selectable knowledge
756
Privacy amplification theorem for bounded storage eavesdropper
757
Privacy analysis and improvements of two recent RFID authentication protocols
758
Privacy analysis of user association logs in a large-scale wireless LAN
759
Privacy and Access Control for Outsourced Personal Records
760
Privacy and Access Control Issues in Financial Enterprise Content Management
761
Privacy and anonymity in personal networks
762
Privacy and authentication for wireless local area networks
763
Privacy and authentication needs of PCS
764
Privacy and authentication on a portable communications system
765
Privacy and authentication on a portable communications system
766
Privacy and authentication protocols for PCS
767
Privacy and authentication: An introduction to cryptography
768
Privacy and Big Data
769
Privacy and communication complexity
770
Privacy and confidentiality
771
Privacy and confidentiality in Cyber-Physical Power Systems
772
Privacy and Confidentiality in E-Learning Systems
773
Privacy and confidentiality in healthcare delivery information system
774
Privacy and contextual integrity: framework and applications
775
Privacy and customer segmentation in the smart grid
776
Privacy and Cybersecurity: The Next 100 Years
777
Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case
778
Privacy and data protection in eHealth: A comparative approach between South African and French legal systems
779
Privacy and data protection in technology-enhanced professional learning
780
Privacy and Data Security
781
Privacy and eHealth-enabled smart meter informatics
782
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
783
Privacy and ethical issues in location-based tracking systems
784
Privacy and Identity Management
785
Privacy and incentive mechanisms in people-centric sensing networks
786
Privacy and Information Markets: Controlling Information Flows in Decentralized Social Networking
787
Privacy and Information Security in Brazil? Yes, We Have It and We Do It!
788
Privacy and integrity in spatial queries by using Voronoi Neighbors
789
Privacy and integrity preserving multi-dimensional range queries for cloud computing
790
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
791
Privacy- and integrity-preserving range query in wireless sensor networks
792
Privacy and interaction in quantum communication complexity and a theorem about the relative entropy of quantum states
793
Privacy and Node Cooperation in Mobile Social Networks
794
Privacy and non-repudiation on pay-TV systems
795
Privacy and online social networks: can colorless green ideas sleep furiously?
796
Privacy and ownership preserving of outsourced medical data
797
Privacy and Protection in Operating Systems
798
Privacy and Quality Preserving Multimedia Data Aggregation for Participatory Sensing Systems
799
Privacy and rationality in individual decision making
800
Privacy and Reliability in Crowdsourcing Service Delivery
801
Privacy and Scalability Analysis of Vehicular Combinatorial Certificate Schemes
802
Privacy and secrecy with multiple measurements of physical and biometric identifiers
803
Privacy and Security [Guest editors´ introduction]
804
Privacy and Security As Assets: Beyond Risk Thinking to Profitable Payback
805
Privacy and security as ideology
806
Privacy and security concern of online social networks from user perspective
807
Privacy and security concerns for health data collected using off-the-shelf health monitoring devices
808
Privacy and security control architecture for ubiquitous RFID healthcare system in wireless sensor networks
809
Privacy and security for online social networks: challenges and opportunities
810
Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database
811
Privacy And Security In An Oncology Information System
812
Privacy and security in biomedical applications of wireless sensor networks
813
Privacy and security in communications
814
Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem
815
Privacy and security in environmental monitoring systems
816
Privacy and Security in Internet of Things and Wearable Devices
817
Privacy and Security in Multi-modal User Interface Modeling for Social Media
818
Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety
819
Privacy and security in the Digital Age
820
Privacy and Security Issues in Information Systems
821
Privacy and security of features extracted from minutiae aggregates
822
Privacy and Security on Anonymous Routing Protocols in MANET
823
Privacy and Security Problems in RFID
824
Privacy and security protection of RFID data in e-passport
825
Privacy and security shield for health information systems (e-Health)
826
Privacy and Social Effects in Location Sharing Services
827
Privacy and social implications of distinct sensing approaches to implementing smart homes for older adults
828
Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour?
829
Privacy and the computer age
830
Privacy and the market for private data: A negotiation model to capitalize on private data
831
Privacy and the Price of Data
832
Privacy and the System Life Cycle
833
Privacy and Traceability in Social Networking Sites
834
Privacy and trust in cloud database using threshold-based secret sharing
835
Privacy and Trust in Smart Camera Sensor Networks
836
Privacy and trust in the Islamic perspective: Implication of the digital age
837
Privacy and trust policies within SOA
838
Privacy and trusted computing
839
Privacy and usability in SMS-based G2B/B2G m-Government: STK and SMS: Balancing privacy and usability
840
Privacy and usability of image and text based challenge questions authentication in online examination
841
Privacy and utility for defect prediction: Experiments with MORPH
842
Privacy and Utility in Business Processes
843
Privacy and Value Co-creation for IT-Enabled Service Systems: Cui Bono?
844
Privacy and/or Security: Take Your Pick
845
Privacy APIs: access control techniques to analyze and verify legal privacy policies
846
Privacy Application Infrastructure: Confidential Data Masking
847
Privacy arguments: Analysing selective disclosure requirements for mobile applications
848
Privacy as a coordination game
849
Privacy as a Product: A case study in the m-Health sector
850
Privacy as a Service in Social Network Communications
851
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
852
Privacy as a Tradeoff: Introducing the Notion of Privacy Calculus for Context-Aware Mobile Applications
853
Privacy Aspects of eHealth
854
Privacy Aspects of Mashup Architecture
855
Privacy assessment in vehicular networks using simulation
856
Privacy Assurance in Data-Aggregation for Multiple MAX Transactions
857
Privacy assurance in mobile sensing networks: Go beyond trusted servers
858
Privacy Assuring Video-Based Monitoring System Considering Browsing Purposes
859
Privacy Aware Adaptable Web Services Using Petri Nets
860
Privacy aware data generation for testing database applications
861
Privacy Aware Demand Response and Smart Metering
862
Privacy aware incentive mechanism to collect mobile data while preventing duplication
863
Privacy aware localization in VANET
864
Privacy Aware Non-linear Support Vector Machine for Multi-source Big Data
865
Privacy Aware Parallel Computation of Skyline Sets Queries from Distributed Databases
866
Privacy Aware Recommender Service for IPTV Networks
867
Privacy aware service selection of composite web services invited paper
868
Privacy Awareness Diffusion in Social Networks
869
Privacy awareness of online social networking in Saudi Arabia
870
Privacy Based Access to Parlay X Location Services
871
Privacy breach of social relation from location based mobile applications
872
Privacy Butler: A personal privacy rights manager for online presence
873
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records
874
Privacy By Design [From the Editor in Chief]
875
Privacy by Design [Leading Edge]
876
Privacy by Design in Federated Identity Management
877
Privacy by information accountability for e-health systems
878
Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA
879
Privacy Challenges and Methods for Virtual Classrooms in Second Life Grid and OpenSimulator
880
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment
881
Privacy challenges in proximity based social networking: Techniques & solutions
882
Privacy Challenges in Third-Party Location Services
883
Privacy challenges of open APIs: Case location based services
884
Privacy Compliance Engineering Process
885
Privacy compliance in european healthgrid domains: An ontology-based approach
886
Privacy Compliance Risks for Facebook
887
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet
888
Privacy concern and perceived benefits towards privacy and election in Indonesia
889
Privacy concern toward using social networking services: A conceptual model
890
Privacy Concerns
891
Privacy Concerns for Photo Sharing in Online Social Networks
892
Privacy Concerns of Semantic Web
893
Privacy Concerns, Trust in Government and Attitudes to Identity Cards in the United Kingdom
894
Privacy conscious web apps composition
895
Privacy conserving and secure distribution of personal health information using cloud
896
Privacy consideration for trustworthy vehicular ad hoc networks
897
Privacy considerations for cloud-based positioning
898
Privacy constrained energy management for self-interested microgrids
899
Privacy constrained energy management in microgrid systems
900
Privacy constrained information processing
901
Privacy Contracts as an Extension of Privacy Policies
902
Privacy control based on event elements in action logs
903
Privacy Control in Cloud VM File Systems
904
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling
905
Privacy control in the cloud based on multilevel policy enforcement
906
Privacy Crisis Due to Crisis Response on the Web
907
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy
908
Privacy Data Envelope: Concept and implementation
909
Privacy data preserving method based on fuzzy discretization
910
Privacy debate centers on radio frequency identification
911
Privacy Disclosure Identification in Social Networks
912
Privacy Disclosure: Personal Information and Images on Social Networking Sites in Taiwan
913
Privacy Domain-Specific Ontology Building and Consistency Analysis
914
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption
915
Privacy enabled web service access control using SAML and XACML for home automation gateways
916
Privacy enablement in a surveillance system
917
Privacy enforcement for distributed healthcare queries
918
Privacy Enforcement of Composed Services in Cellular Networks
919
Privacy Engine for Context-Aware Enterprise Application Services
920
Privacy Engineering Emerges as a Hot New Career
921
Privacy enhanced access control by SPKI
922
Privacy enhanced access control in pervasive computing environments
923
Privacy enhanced access control mechanism for home networks
924
Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme
925
Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search
926
Privacy enhanced cloud services home aggregator
927
Privacy enhanced data management for an electronic identity system
928
Privacy enhanced electronic cheque system
929
Privacy enhanced electronic mail
930
Privacy enhanced mutual authentication in LTE
931
Privacy Enhanced Pixel-Level Image Processing in the Clouds
932
Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking
933
Privacy enhancement for data outsourcing
934
Privacy enhancement of common randomness based authentication: Key rate maximized case
935
Privacy enhancements for mobile and social uses of consumer electronics
936
Privacy Enhancing Framework on PaaS
937
Privacy Enhancing Proxies in Attribute Releases: Two Approaches
938
Privacy Enhancing Technologies
939
Privacy enhancing technologies in video surveillance applied to JPEG2000 codestreams
940
Privacy Exposure of Online Social Search
941
Privacy Flag - collective privacy protection scheme based on structured distributed risk assessment
942
Privacy for IoT: Involuntary privacy enablement for smart energy systems
943
Privacy for Low-Power Sensor Node based on Alias in Ubiquitous Network
944
Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures
945
Privacy for Telecom Services
946
Privacy Framework for Open Environments
947
Privacy Framework for Peer Affective Feedback
948
Privacy friendly applications using citizen cards based on cryptographic smartcards
949
Privacy Frost: A User-Oriented Data Anonymization Tool
950
Privacy Gets a New Round of Prominence
951
Privacy Goals and Settings Mediator Model for PHRs
952
Privacy Governance in Cyberspace
953
Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 Scheme
954
Privacy Guarantees through Distributed Constraint Satisfaction
955
Privacy handling for critical information infrastructures
956
Privacy homomorphisms for e-gambling and mental poker
957
Privacy image protection using fine-grained mosaic technique
958
Privacy impact assessment for online social networks
959
Privacy Implications of Automated GPS Tracking and Profiling
960
Privacy Implications of Identity References in Biometrics Databases
961
Privacy implications of in-network aggregation mechanisms for VANETs
962
Privacy Implications of Smartphone-Based Connected Vehicle Communications
963
Privacy implications of the Traffic Probe Message Service
964
Privacy Improvement through Pseudonymity in Parlay X for Location Based Services
965
Privacy in a mobile environment
966
Privacy in an identity-based DRM system
967
Privacy in Bidirectional Relay Networks
968
Privacy in Content-Based Opportunistic Networks
969
Privacy in context: Privacy issues in Ubiquitous Computing applications
970
Privacy in context-based and epidemic forwarding
971
Privacy in data publishing
972
Privacy in distributed electronic commerce
973
Privacy in distributed reputation management
974
Privacy in E-learning: How to implement anonymity
975
Privacy in horizontally distributed databases based on association rules
976
Privacy in interoperability contexts — The area of health
977
Privacy in inter-vehicular networks: Why simple pseudonym change is not enough
978
Privacy in Location Based Services: Primitives Toward the Solution
979
Privacy in Location-Aware Computing Environments
980
Privacy in Location-Based Services: State-of-the-Art and Research Directions
981
Privacy in machine-to-machine communications A state-of-the-art survey
982
Privacy in mini-drone based video surveillance
983
Privacy in mini-drone based video surveillance
984
Privacy in mining crime data from social Media: A South African perspective
985
Privacy in mobile agents
986
Privacy in Mobile Web Services eHealth
987
Privacy in Online Review Sites
988
Privacy in Online Social Networking at Workplace
989
Privacy in opportunistic network contact graphs
990
Privacy in overlay-based smart traffic systems
991
Privacy in Pervasive Computing and Open Issues
992
Privacy in pervasive computing environments - a contradiction in terms?
993
Privacy in Service Oriented Architectures: SOA Boundary Identity Masking for Enterprises
994
Privacy in social networks: Existing challenges and proposals for solution
995
Privacy in Social Networks: How Risky is Your Social Graph?
996
Privacy in Statistical Databases: k-Anonymity Through Microaggregation
997
Privacy in stochastic control: A Markov Decision Process perspective
998
Privacy in the age of big data
999
Privacy in the Age of Google and Facebook
1000
Privacy in the Age of Mobility and Smart Devices in Smart Homes
بازگشت