<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using automated reasoning system for data model correctness analysis
2
Using Automated Regularization deconvolution to extract input parameters of the phase function from measurement
3
Using automated source code analysis for software evolution
4
Using automated tests for communicating and verifying non-functional requirements
5
Using Automated Validation Techniques to Detect Lockups in Packet-Switched Networks
6
Using automated wayside systems for condition-based maintenance and critical events reporting
7
Using automatic clustering to produce high-level system organizations of source code
8
Using automatic code differentiation for optimization
9
Using automatic code differentiation in power flow algorithms
10
Using Automatic Detection to Identify Students´ Learning Style in Online Learning Environment -- Meta Analysis
11
Using Automatic Frequency Shifting Techniques for LLC-SRC Output Voltage Regulation
12
Using automatic memoization as a software engineering tool in real-world AI systems
13
Using automatic metadata generation to reduce the knowledge and time requirements for making SCORM learning objects
14
Using automatic process clustering for design recovery and distributed debugging
15
Using automatic program decomposition techniques in software maintenance tools
16
Using Automatic Speech Recognition to Enhance Education for All Students: Turning a Vision into Reality
17
Using automatic static analysis to identify technical debt
18
Using automatic topology discovery to diagnose PROFINET networks
19
Using automatic vehicle location (AVL) data for evaluation of bus priority at traffic signals
20
Using automatically derived load thresholds to manage compute resources on-demand
21
Using automatically generated descriptions of human activity to index multi-media data
22
Using automatically generated invariants for regression testing and bug localization
23
Using Automation for finishing room capacity planning
24
Using automaton model to determine the complexity of algorithmic problems for virtual laboratories
25
Using Autonomic Principles to Manage Converged Services in Next Generation Networks
26
Using Autonomic Principles to Manage Converged Services in Next Generation Networks
27
Using autonomous agents to make recommendation in a modeling market
28
Using Autonomous Air Vehicle in DTN Sensor Network for Environmental Observation
29
Using autonomous components to improve runtime qualities of software
30
Using Autonomous Mobile Agents for Efficient Data Collection in Sensor Networks
31
Using autonomous modular material handling equipment for manufacturing flexibility
32
Using autonomous robots to enable self-organizing broadband networks
33
Using autoreducibility to separate complexity classes
34
Using autoregressive and ADALINE neural network modeling to improve downlink performance of smart antennas
35
Using autoregressive models to estimate the number of independent samples available with stirrer rotation in reverberation chamber
36
Using autoregressive spectral analysis to investigate weaning index
37
Using auto-tuning proportional integral probability to improve random early detection
38
Using AUV-acquired survey data to derive a magnetic model for a surface vessel
39
Using auxiliary amplifier to cancel third-order intermodulation distortion for a 1.9 GHz CMOS linear amplifier design
40
Using auxiliary signal to remove the SPR condition from recursive adaptive algorithms
41
Using auxiliary signals as a simple method for balancing DC bus voltages in cascaded H- bridge converters
42
Using available remote memory dynamically for parallel data mining application on ATM-connected PC cluster
43
Using available time series of Passive and Active Microwave to develop SMAP Freeze/Thaw algorithms adapted for the canadian subarctic
44
Using avatars to enhance active learning: Integration of virtual reality tools into college English curriculum
45
Using Aviris Data For Spectral Signature Mapping Over Northeast Nevada
46
Using A-weighting for psychoacoustic active noise control
47
Using AWPSO to Solve the Data Scarcity Problem in Wind Speed Prediction by Artificial Neural Networks
48
Using Axiomatic Design in the Process of Enterprise Architecting
49
Using B to Verify the Weaving of Aspects
50
Using Bézier curves to design self-adapting conformal phased-array antennas
51
Using back propagation neural network for cardiac wall motion detection on angiocardiography
52
Using Back Propagation Neural Network for Channel Estimation and Compensation in OFDM Systems
53
Using back-feed analysis method to construction a sight artificial island on soft foundation in Tianjin
54
Using background colors to support program comprehension in software product lines
55
Using background knowledge to improve inductive learning of DNA sequences
56
Using background knowledge to improve inductive learning: a case study in molecular biology
57
Using background knowledge with attribute-oriented data mining
58
Using background memory for efficient video coding
59
Using background modes for testing, debugging and emulation of microcontroller
60
Using background modes for testing, debugging and emulation of microcontrollers
61
Using backlight intensity for device identification
62
Using back-pressure to improve TCP performance with many flows
63
Using backprojections for fine motion planning with uncertainty
64
Using back-propagation networks to assess several image representation schemes for object recognition
65
Using Back-Propagation Neural Network for Automatic Wheezing Detection
66
Using backpropagation neural networks for flood forecasting in PhraNakhon Si Ayutthaya, Thailand
67
Using back-propagation neural networks for functional software testing
68
Using backstepping for control of elastic-joint robots with smaller gear ratios
69
Using backup coverage and TOPSIS fuzzy approach to emergency facilities layout in new development planning area
70
Using backwards design process for the design and implementation of computer science (CS) principles: A case study of a colombian elementary and secondary teacher development program
71
Using bacterial chemotaxis method for reactive power optimization
72
Using badges for shaping interactions in online learning environments
73
Using bag-of-words to distinguish similar languages: How efficient are they?
74
Using Balance Scorecard (BSC) to Evaluate Performance of Chinese Small and Middle Enterprises: Match or Not?
75
Using Balanced Random Forests on Load Spectrum Data for Classifying Component Failures of a Hybrid Electric Vehicle Fleet
76
Using Balanced Scorecard and system dynamics in exploring the performance of Taiwan´s pharmaceutical industry
77
Using bandwidth data to make computation offloading decisions
78
Using bandwidth-road maps for improving vehicular internet access
79
Using Banyan Networks for Load-Balanced Switches with Incremental Update
80
Using barometers to determine the height for indoor positioning
81
Using Barrier Graphs for Deadlock Prevention in Communication Networks
82
Using Base Pairing Probabilities for MiRNA Recognition
83
Using baseline methods to identify non-technical losses in the context of smart grids
84
Using Basic Block Based Instruction Prefetching to Optimize WCET Analysis for Real-Time Applications
85
Using basin ruins and co-moving low-dimensional latent coordinates for dynamic programming of biped walkers on roughing ground
86
Using basis vectors of ICA for blind separation of reflection from a single image
87
Using Battery Constraints within Mobile Hosts to Improve Network Security
88
Using battery energy storage system in a deregulated environment to improve power system performance
89
Using battery in mobile system
90
Using battery management systems to augment inter-area oscillation control in wind-integrated power systems
91
Using battery measurements to extend operating time
92
Using Bayes belief networks in industrial FMEA modeling and analysis
93
Using Bayes method and Fuzzy C - Mean Algorithm for Fire Detection in Video
94
Using Bayes Network for Prediction of Type-2 diabetes
95
Using Bayesian belief networks to evaluate credit guarantee risk
96
Using Bayesian Belief Networks to Model Software Project Management Antipatterns
97
Using Bayesian Belief Networks to Predict Change Propagation in Software Systems
98
Using Bayesian belief networks to predict the reliability of military vehicles
99
Using Bayesian classifier in relevant feedback of image retrieval
100
Using Bayesian classifiers for estimating quality of VOIP
101
Using Bayesian classifiers for low complexity multiview H.264/AVC and HEVC hybrid architecture
102
Using Bayesian Classifiers to Enhance Clustering
103
Using Bayesian Dominance Hierarchies to Determine Predictor Importance in Service Research Predictive Studies
104
Using Bayesian Filtering to Localize Flexible Materials During Manipulation
105
Using Bayesian Inference for Linear Antenna Array Design
106
Using Bayesian inference for sensor management of air traffic control systems
107
Using Bayesian Logistic Regression with High-Order Interactions to Model Radiation-Induced Toxicities Following Radiotherapy
108
Using Bayesian Network and LRFM Model in a Pediatric Dental Clinic
109
Using Bayesian Network and Neural Network Constructing Domain Ontology
110
Using Bayesian Network for combining classifiers
111
Using Bayesian Network for Fault Location on Distribution Feeder
112
Using Bayesian network for fault location on distribution feeder
113
Using Bayesian Network for planning course registration model for undergraduate students
114
Using Bayesian network for purchase behavior prediction from RFID data
115
Using Bayesian network for risk analysis of inland waterway transportation system considering environmental effects
116
Using Bayesian Network Learning Algorithm to Discover Causal Relations in Multivariate Time Series
117
Using Bayesian networks and importance measures to indentify tumour markers for breast cancer
118
Using Bayesian networks as an inference engine in KAMET
119
Using Bayesian Networks for Bankruptcy Prediction: Empirical Evidence from Iranian Companies
120
Using Bayesian Networks for Cognitive Control of Multi-hop Wireless Networks
121
Using Bayesian networks for convergence analysis of intelligent dynamic spectrum access algorithms
122
Using Bayesian networks for cyber security analysis
123
Using Bayesian networks for diagnostic reasoning in penetrating injury assessment
124
Using Bayesian networks for discovering temporal-state transition patterns in Hemodialysis
125
Using Bayesian networks for incorporating probabilistic a priori knowledge into Boltzmann machines
126
Using Bayesian Networks to Accurately Calculate the Reliability of Complementary Metal Oxide Semiconductor Gates
127
Using Bayesian networks to build data mining applications for an electronic commerce environment
128
Using Bayesian networks to built a diagnosis and prognosis model for breast cancer
129
Using Bayesian Networks to Implement Adaptivity in Mobile Learning
130
Using Bayesian networks to improve the decision-making process in public health systems
131
Using Bayesian Networks to Model Operational Risk of Bank
132
Using Bayesian networks to model the belief in the opponent in static game with incomplete information
133
Using Bayesian Networks with Human Personality and Situation Information to Detect Emotion States from EEG
134
Using Bayesian neural networks to classify segmented images
135
Using Bayesian Programming for multi-sensor multi-target tracking in automotive applications
136
Using Bayesian statistical methods to determine the level of error in large spreadsheets.
137
Using Bayesian statistics and Gabor Wavelets for recognition of human faces
138
Using Bayesian surprise to detect calcifications in mammogram images
139
Using BDDs and ZBDDs for efficient identification of testable path delay faults
140
Using BDDs to Design ULMs for FPGAs
141
Using bdds to verify multipliers
142
Using BEACON to generate embedded software from Simulink models
143
Using beamforming in the audio source separation problem
144
Using bearing-sensitive infrared sensor arrays in Motion localization for human-following robots
145
Using beat notation for enhancement of chord sheet music document similarity
146
Using beat sequence filter to reduce noise in late potentials detecting
147
Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations
148
Using behavior models for anomaly detection in hybrid systems
149
Using behavior templates to design remotely executing agents for wireless clients
150
Using Behavioral Analysis to Improve Student Confidence With Analog Circuits
151
Using behavioral mixed-signal simulation to implement COTS rapid technology insertion in avionics systems
152
Using behavioral modeling and simulation for learning communication circuits and systems
153
Using Behavioral Profiles to Detect Software Flaws in Network Servers
154
Using behavioural synthesis for hardware generation of a contour-based image segmentation algorithm
155
Using Belief Degree-Distributed Fuzzy Cognitive Maps in nuclear safety culture assessment
156
Using belief networks for PERT
157
Using belief networks to assess risk
158
Using belief propagation to counter correlated reports in cooperative spectrum sensing
159
Using Belief Theory to Diagnose Control Knowledge Quality: Application to Cartographic Generalisation
160
Using benchmarking to advance research: a challenge to software engineering
161
Using benchmarking to introduce and improve reliability engineering
162
Using benchmarking to promote efficient metro asset maintenance: case study from London underground
163
Using benchmarking to quantify power supply customer perceptions
164
Using Benchmarks for Radiation Testing of Microprocessors and FPGAs
165
Using Best Practices of Software Engineering into a Real Time System Development
166
Using best practices to improve portfolio management PPM accelerate: A benchmarking study
167
Using Betweenness Centrality to Identify Manifold Shortcuts
168
Using BGP in a Satellite-Based Challenged Network Environment
169
Using bibliometric maps to visualise term distribution in scientific papers
170
Using Bi-clustering Algorithm for Analyzing Online Users Activity in a Virtual Campus
171
Using bicycles to teach system dynamics
172
Using bidirectional associative memories for joint spectral envelope modeling in voice conversion
173
Using bi-directional associative memories for speaker identification
174
Using bidirectional Binary Particle Swarm Optimization for feature selection in feature-level fusion recognition system
175
Using bidirectional lstm recurrent neural networks to learn high-level abstractions of sequential features for automated scoring of non-native spontaneous speech
176
Using Bidirectional Search to Compute Optimal Shortest Paths over Multi-weight Graphs
177
Using Big Data and predictive machine learning in aerospace test environments
178
Using Big Data and sentiment analysis in product evaluation
179
Using Big Data for Profiling Heavy Users in Top Video Apps
180
Using big data to study the link between human mobility and socio-economic development
181
Using big data to support automatic Word Sense Disambiguation
182
Using big geospatial data for fast flood detection: Developments from the IQmulus project
183
Using bilateral symmetry to improve non-local means denoising of MR brain images
184
Using bi-layer structure to enhance the electrochromic properties of WO3: Self-organized nanotube thin films on DC sputter thin films
185
Using Bilevel Feature Extractors to Reduce Dimensionality in Images
186
Using bilinear and quadratic forms for frequency estimation
187
Using Bilinear Models for View-invariant Action and Identity Recognition
188
Using Bilinear Transformations to Estimate The Ratios of Accommodation and Vergence Responses of Binocular Vision
189
Using Bilingual Lexicon to Judge Sentiment Orientation of Chinese Words
190
Using bilingual Web data to mine and rank translations
191
Using binarual processing for automatic speech recognition in multi-talker scenes
192
Using Binary Decision Diagrams to Efficiently Represent Alpha-Beta Associative Memories
193
Using binary decision diagrams to speed up the test pattern generation of behavioral circuit descriptions written in hardware description languages
194
Using Binary Decision Tree and Multiclass SVM for Human Gesture Recognition
195
Using binary fruit fly algorithm for solving the set covering problem
196
Using binary method to deal with the problem of visual BRT
197
Using binary-reflected gray coding for crosstalk mitigation of network on chip
198
Using binaural and spectral cues for azimuth and elevation localization
199
Using Binding Bigraphs to Model Context-Aware Adaptive Applications
200
Using binocular energy modeling for stereoscopic color image coding
201
Using Binocular Feature Combination for Blind Quality Assessment of Stereoscopic Images
202
Using binocular stereopsis for vision-based vehicle control
203
Using bio-electrical signals to influence the social behaviours of domesticated robots
204
Using biofeedback for standing-steadiness, weight-bearing training
205
Using biofunctionality as a novel learning method for intelligent agents
206
Using bioinformatic technique to discovery Huangqin and Lianqiao combination as a potential new drus for treatment acne
207
Using Bioinspired Meta-heuristics to Solve Reward-Based Energy-Aware Mandatory/Optional Real-Time Tasks Scheduling
208
Using Bio-inspired Models to Design Peer-to-Peer Overlays
209
Using biological approaches for the control of a 9-DoF wheelchair-mounted robotic arm system: Initial experiments
210
Using biological spring to improve propulsive efficiency for fishlike robot
211
Using biology and ecology as inspiration for software maintenance? (Keynote abstract)
212
Using biomedical engineering and “hidden capital” to provide educational outreach to disadvantaged populations
213
Using biomedical sensor - reflectometry interference spectroscopy for evaluation of biocompatibility of biomaterials
214
Using biometric facial recognition for verification and identification
215
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials
216
Using Biometric Verification to Estimate Identification Performance
217
Using bio-ontologies as data annotation, integration & analytical tools at the Mouse Genome Informatics resource
218
Using bio-signals to evaluate multi discomfort in image viewing - balancing visually induced motion sickness and field of view -
219
Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks
220
Using BIP to reinforce correctness of resource-constrained IoT applications
221
Using Bipartite Anomaly Features for Cyber Security Applications
222
Using Bipartite Graph for Resolving Multiple Requests Conflicts
223
Using Bipartite Graphs for 3D Cardiac Model Retrieval
224
Using bipartite matching in graph spectra for protein structural similarity
225
Using bisection method for fast CFO estimation in OFDM systems
226
Using bisimulation to solve discrete event control problems
227
Using bispectral analysis in OSAS estimation
228
Using BIST circuitry to measure DRV of large SRAM arrays
229
Using BIST control for pattern generation
230
Using bit recycling to reduce Knuth´s balanced codes redundancy
231
Using bit recycling to reduce the redundancy in plurally parsable dictionaries
232
Using bit-edge equalization in highspeed backplane data transmission
233
Using bitmap index for interactive exploration of large datasets
234
Using bitmaps for executing range queries in encrypted databases
235
Using Bittorrent and SVC for efficient video sharing and streaming
236
Using bivariate Bezier distributions to model simulation input processes
237
Using bivariate Gaussian distribution for image denoising in the 2-D complex wavelet domain
238
Using Bivariate Probit Model to Analyze Bank Lending Policy
239
Using BK-products of fuzzy relations in quality of service adaptive communication
240
Using black box and machine learning approach in controlling a machine
241
Using blackboard system to automate and optimize workflow orchestrations
242
Using Blackboards to Optimize Grid Workflows with Respect to Quality Constraints
243
Using Black-Box Modeling Techniques for Modern Disk Drives Service Time Simulation
244
Using black-box persistent state manifest for dependency management in patching and upgrading J2EE based applications
245
Using Blended Learning to Enhance Students´ Cognitive Presence
246
Using blending control to suppress multi-frequency disturbances
247
Using Blind Identification in the Dynamic Characterization of High Voltage Oscilloscope Probes
248
Using blocks to get more blocks: Exploring linked data through integration of queries and result sets in block programming
249
Using blocks+ database in Needleman-Wunsch algorithm
250
Using blog to realize popular knowledge management
251
Using blogs in teaching postgraduate courses
252
Using Bloom’s Taxonomy of learning to make engineering courses comparable
253
Using Bloom´s taxonomy to enhance interactive concentric circles representation
254
Using Blueprints for Engineering Electronic Market Services
255
Using Bluetooth and sensor networks for intelligent transportation systems
256
Using Bluetooth for short-term ad hoc connections between moving vehicles: a feasibility study
257
Using Bluetooth in a system for integrated control of home digital network devices
258
Using Bluetooth transceivers in mobile robot
259
Using Bluetooth wireless technology in vehicles
260
Using Bode Plots to Access Intracellular Coupling
261
Using BODIPY dye-primer chemistry in large-scale sequencing
262
Using body bias when upsizing length for maximizing the static noise margins of CMOS gates
263
Using body biasing to control phase-noise of CMOS LC oscillators
264
Using body movement and posture for emotion detection in non-acted scenarios
265
Using Body Sensor Networks for Increased Safety in Bomb Disposal Missions
266
Using bohn´s model to conduct knowledge audit of a real-estate company
267
Using BOINC desktop grid for high performance memory detection
268
Using Bond-Graph Technique for Modelling and Simulating Railway Drive Systems
269
Using Boolean Tests to Improve Detection of Transistor Stuck-Open Faults in CMOS Digital Logic Circuits
270
Using boosted cascade of class specific features for identification of fungal species
271
Using Boosted Features for the Detection of People in 2D Range Data
272
Using Boosting and Clustering to Prune Bagging and Detect Noisy Data
273
Using boosting mechanism to refine the threshold of VSM-based similarity in text classification
274
Using Boosting Techniques to Improve Software Reliability Models Based on Genetic Programming
275
Using boosting to improve a hybrid HMM/neural network speech recognizer
276
Using Boosting to Improve Oil Spill Detection in SAR Images
277
Using boosting to simplify classification models
278
Using Bootstrap AdaBoost with KNN for ECG-based automated obstructive sleep apnea detection
279
Using bootstrap identifiability as a metric for model selection for dynamic [/sup 11/C]DASB PET data
280
Using boron cluster ion implantation to fabricate ultra-shallow junctions
281
Using Boruta-Selected Spectroscopic Wavebands for the Asymptomatic Detection of Fusarium Circinatum Stress
282
Using Bottom-Up Design Techniques in the Synthesis of Digital Hardware from Abstract Behavioral Descriptions
283
Using bottom-up LRIC models to calculate radio spectrum value for mobile operators
284
Using boundary conditions for estimation of complex modulus from flexural wave experiments
285
Using boundary element method in a layer stripping reconstruction algorithm for impedance imaging
286
Using boundary management for more effective product development
287
USING BOUNDARY SCAN DESCRIPTION LANGUAGE IN DESIGN
288
Using boundary scan test to test random access memory clusters
289
Using boundary scan with a fault dictionary to test and diagnose clusters of non-scan logic
290
Using Bounded Fairness to Specify and Verify Ordered Asynchronous Multi-agent Systems
291
Using Bounded Model Checking with BOGOR
292
Using bounded query classes to separate classes in the exponential time hierarchy from classes in PH
293
Using bounded-influence M-estimators in multi-frame super-resolution reconstruction: A comparative study
294
Using box structures with the Z notation
295
Using BP nerual networks for the simulation of energy consumption
296
Using BP Neural Network Algorithm Improve the Prediction Accuracy of Distance between ZigBee
297
Using BPEL workflow processing for cross-layer orchestrations in IP-over-optical networks: A proof of concept
298
Using BPM Technologies for Material Balances Modelling
299
Using BP-network to construct fuzzy decision tree with composite attributes
300
Using brain connectivity measure of EEG synchrostates for discriminating typical and Autism Spectrum Disorder
301
Using Brain Imaging to Interpret Student Problem Solving
302
Using Brain-Computer Interface to control an avatar in a Virtual Reality Environment
303
Using brain-computer interface to steer a humanoid robot
304
Using brain-computer interfaces to determine the location of missing people
305
Using branch and bound method and optimal placement of phasor measurement unit of power network in Khouzestan province in Iran
306
Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection
307
Using branch handling hardware to support profile-driven optimization
308
Using Branch Predictors and Variable Encoding for On-the-Fly Program Tracing
309
Using Branch-and-Price Algorithm to Solve Raw Materials Logistics Planning Problem in Iron and Steel Industry
310
Using breakdown phenomenon as mobile magnetic field sensor in microfluidics
311
Using Brewster angle for measuring microwave material parameters of bi-isotropic and chiral media
312
Using Broad Phonetic Group Experts for Improved Speech Recognition
313
Using broadband generator in microwave electrothermal installations
314
Using broad-band irradiance data to model the short circuit response of aSi modules
315
Using broadband passive harmonic filters for harmonic mitigation in AC drives
316
Using broadband power line communications in non-conventional applications
317
Using broadcast primitives in replicated databases
318
Using broadcast to protect user privacy in location-based applications
319
Using B-spline curves for hand recognition
320
Using B-Splines to entirely model the scattering of thin wires
321
Using buddies to live longer in a boring world [sensor network protocol]
322
Using buffer management in 3G radio bearers to enhance end-to-end TCP performance
323
Using buffer-to-BRAM mapping approaches to trade-off throughput vs. memory use
324
Using Bug Report Similarity to Enhance Bug Localisation
325
Using building blocks to design analog neuro-fuzzy controllers
326
Using Building Plans and Self-Contained Sensors with GNSS Initialization for Indoor Navigation
327
Using built-in fine resolution clipping technique for high-speed testing by using low-speed wireless tester
328
Using Built-In Interoperability with Self-Adaptive Components for RTS
329
Using built-in self-test and adaptive recovery for defect tolerance in molecular electronics-based nanofabrics
330
Using built-in sensors to cope with long duration transient faults in future technologies
331
Using built-in-test to reduce TPS run times and improve TPS reliability
332
Using built-in-test to reduce TPS run times and improve TPS reliability
333
Using Bulk Built-In Current Sensors and recomputing techniques to mitigate transient faults in microprocessors
334
Using Bulk Built-in Current Sensors to Detect Soft Errors
335
Using Bulk-driven Technology Operate in Subthreshold Region to Design a Low Voltage and Low Current Operational Amplifier
336
Using buried capacitor in LTCC-MLC balun
337
Using burst detection techniques to identify suspicious vehicular traffic at border crossings
338
Using burst onset information to improve stop/affricate phone recognition
339
Using burst recovery concept to obtain global stability and performance of discrete-time adaptive controller for time-varying systems
340
Using Burstiness to Improve Clustering of Topics in News Streams
341
Using bursts to overcome the effects of adversarial interventions on asynchronous sequential machines
342
Using bus impedance and bus P-Q curve for voltage stability control
343
Using bus-based connections to improve field-programmable gate-array density for implementing datapath circuits
344
Using business games to enhance engineering students capacity for individual and social awareness
345
Using Business Goals to Inform a Software Architecture
346
Using business performance to communicate change
347
Using business process modelling to reduce the effects of requirements changes in software projects
348
Using business process models to foster competencies in requirements engineering
349
Using Business Process Reengineering to Develop Information Service Project Plans
350
Using Business Processes in System Requirements Definition
351
Using Business Rule Engine to Integrate Electronic Form with Workflow Management System
352
Using Business Transactions to Analyse the Consistency of Business Process Models
353
Using BVL correlation to validate the effectiveness of an interorganizational system: analysis and statistical modeling
354
Using Bypass to Tighten WCET Estimates for Multi-Core Processors with Shared Instruction Caches
355
Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications
356
Using Byzantine Agreement in the Design Of IPS Systems
357
Using C based logic synthesis to bridge the productivity gap
358
Using C programming as a vehicle to overcome barriers
359
Using C to implement high-efficient computation of dense optical flow on FPGA-accelerated heterogeneous platforms
360
Using C# attributes to describe hardware artefacts within kiwi
361
Using C/C++ as a common software interface for test systems
362
Using C++ in an object oriented paradigm. A practical approach
363
Using Cable-Based Mobile Sensors to Assist Environment Surveillance
364
Using cable-based mobile sensors to assist environment surveillance
365
Using cache mapping to improve memory performance handheld devices
366
Using cache mechanisms to exploit nonrefreshing DRAMs for on-chip memories
367
Using cache optimizing compiler for managing software cache on distributed shared memory system
368
Using cache to reduce power in content-addressable memories (CAMs)
369
Using CAD as an aerodynamic tool
370
Using CAD drawings for robot navigation
371
Using CAD Geometric Variation Approach for Lettering Complicated Letter on 3D Free-Form Surface by a 3-DOF Parallel Machine Tool
372
Using CAD software to simulate PV energy yield: Predicting the charge yield of solar cells incorporated into a PV powered consumer product under 3D-irradiation conditions
373
Using CAD systems and e-Learning in radiologists training
374
Using CAD to Shape Experiments in Molecular QCA
375
Using CAD Tools in the Design of CRISP
376
Using CAD, CAM, and rapid prototyping technologies to model parts for electrical manufacture
377
Using CAD/CAM in the design of a robotic micromanipulator
378
Using CAE to check stress levels in power circuits
379
Using CAE/CAT tools to evaluate power supply parasitics
380
Using CAEME Software Book in teaching and research
381
Using Calibrated Camera for Euclidean Path Modeling
382
Using calibration methods for the verification of NFC RF Conformance Test Tool
383
Using Call Patterns to Detect Unwanted Communication Callers
384
Using Call-Context to Prevent the Emergence of Chaotic Workflow Behaviors in Overload Situations
385
Using calligraphies features for off line writer identification
386
Using CAM software to improve factory floor productivity
387
Using camera motion to estimate range for robotic parts manipulation
388
Using camera motion to identify types of American football plays
389
Using camera-equipped mini-UAVS to support collaborative wilderness search and rescue teams
390
Using cameras to deter the illegal use of bus lanes in Birmingham
391
Using CamiTK for rapid prototyping of interactive Computer Assisted Medical Intervention applications
392
Using camp-on to improve the performance of a Fibre Channel switch
393
Using Canadian Strengths To Create A Sustainable Society
394
Using Candidate Exploration and Ranking for Abbreviation Resolution in Clinical Document
395
Using CANNOT framework to generate video based applications
396
Using Canny algorithm in QEM simplification for textured 3D models
397
Using canonical models for LQR and H-infinity control of structures
398
Using CAP dimensionality for service and user allocation for optical access networks
399
Using capability profiles for appliance aggregation
400
Using Capaciflectors for ORU Docking
401
Using capacitance measurements to determine fill of VPI coils
402
Using capacitance methods for interface trap level density extraction in graphene field-effect devices
403
Using capacitive cross-coupling technique in RF low noise amplifiers and down-conversion mixer design
404
Using capacity as a competition strategy in a manufacturing duopoly
405
Using Capacity Flexibility Model for responsive tourism logistics: The case of Pattaya city
406
Using Capillary Gas Chromatography to Determine Poluchlorinated Biphenyls (PCBs) in Electrical Insulating Liquids
407
Using Capillary Gas Chromatography to Determine Polychlorinated Biphenyls (PCBs) in Electrical Insulating Liquids
408
Using cap-integral standoffs to reduce chip hot-spot temperatures in electronic packages
409
Using CAPTCHA Selectively to Mitigate HTTP-Based Attacks
410
Using Captchas to Mitigate the VoIP Spam Problem
411
Using Capture-Recapture method for Web intelligence
412
Using capture-recapture models to make objective post-inspection decisions
413
Using carbazole-triazole derives host in blue phosphorescent OLEDs
414
Using carbon nanotube in digital memories
415
Using Carbon Nanotubes to Absorb Low-Concentration Hydrogen Sulfide in Fluid
416
Using card sorting technique to classify requirements change
417
Using card sorts to elicit web page quality attributes
418
Using CARE to construct verified software
419
Using Carnot for enterprise information integration
420
Using CARR model and GARCH model to forecast volatility of the stock index: Evidence from China´s Shanghai stock market
421
Using carrier frequency estimators developed for AWGN channel in multipath fading channel
422
Using carrier sensing to improve energy efficiency of MAC protocol in sensor networks
423
Using carry-save adders in low-power multiplier blocks
424
Using case studies to evaluate learning technologies
425
Using case studies to increase awareness of, and improve resolution strategies for, ethical issues in engineering
426
Using CASE tools to improve the security of applications systems
427
Using Case-Based Reasoning and Social Trust to Improve the Performance of Recommender System in E-Commerce
428
Using case-based reasoning as a reinforcement learning framework for optimisation with changing criteria
429
Using case-based reasoning for autonomous vehicle guidance
430
Using case-based reasoning for decision support
431
Using case-based reasoning into a decision support methodology for the incident resolution control in IT
432
Using case-based reasoning to acquire user scheduling preferences that change over time
433
Using case-based reasoning to improve the performance of Bass model
434
Using Case-Based Reasoning to Support Systematic Evaluation and Decision Making in Engineering Design
435
Using case-based retrieval for customer technical support
436
Using Cases in Variability Analysis to Promote the Design of Flexible, Adaptable and Adaptive Systems
437
Using catadioptric sensor to obtain image of the inner surface of a pipe and detection and analysis of faults by image processing
438
Using Categorial Context-SHOIQ(D) DL to Integrate Context-aware Web Ontology MetaData
439
Using categorical regression instead of a NOAEL to characterize a toxicologist´s judgment in noncancer risk assessment
440
Using Categorization to Further Enhance the Utilization of Semantic Web in UDDI
441
Using Category and Keyword for Personalized Recommendation: A Scalable Collaborative Filtering Algorithm
442
Using category theory to model software component dependencies
443
Using category-based adherence to cluster market-basket data
444
Using category-based collaborative filtering in the Active WebMuseum
445
Using category-based semantic field for text categorization
446
Using causal models in heterogeneous information fusion to detect terrorists
447
Using causal ordering for explanation in model-based diagnosis of continuous dynamic systems
448
Using causal reasoning for automated failure modes and effects analysis (FMEA)
449
Using causal reasoning to validate stochastic models
450
Using causal scene analysis to direct focus of attention
451
Using causality analysis in the beef quality information tracing
452
Using Causal-Link Graphs to Detect Conflicts Among Goals
453
Using C-Band Synthetic Aperture Radar Data to Monitor Forested Wetland Hydrology in Maryland´s Coastal Plain, USA
454
Using CBIR and pathfinder networks for image database visualisation
455
Using CBIR and semantics in 3D-model retrieval
456
Using CBT for organizational knowledge management
457
Using CCD Cameras for Car Following Algorithms
458
Using CC-TLP to get a CDM robustness value
459
Using C-D function and path analysis to study Chinese energy enterprises´ technological innovation—A case of research instruction in management statistics
460
Using CDIF for concept-oriented rapid prototyping of electronic systems
461
Using CDMA to Enhance the MAC Performance of ISO/IEC 18000-6 Type C
462
Using CD-ROM for health care information retrieval
463
Using CEBM to save power of sensor nodes in wireless network of test and control for grain
464
Using Cell Processors for Intrusion Detection through Regular Expression Matching with Speculation
465
Using CellML in Computational Models of Multiscale Physiology
466
Using cellular automata as heuristic of computer Go
467
Using Cellular Automata for feature construction - preliminary study
468
Using Cellular Automata for Modeling the Virus Infection Process
469
Using Cellular Automata Images to Predict Protein Structural Classes
470
Using cellular automata on recommendation mechanism for smart parking in vehicular environments
471
Using Cellular Automata Pedestrian Flow Statistics with Heuristic Search to Automatically Design Spatial Layout
472
Using Cellular Automata to Form Car Society in Vehicular Ad Hoc Networks
473
Using cellular automata to model evolutionary dynamics of social network
474
Using cellular automata to model social networking behavior
475
Using cellular automata to teach complexity theory
476
Using cellular automata with evolutionary learned rules to solve the online partitioning problem
477
Using cellular evolution for diversification of the balance between accurate and interpretable fuzzy knowledge bases for classification
478
Using cellular graph embeddings in solving all pairs shortest paths problems
479
Using Cellular Network for Inner-Suburban Freeway Traffic Monitoring
480
Using Cellular Network Signal Strength to Monitor Vegetation Characteristics
481
Using cellular phones in higher education: mobile access to online course materials
482
Using Cellular Sensor Networks for Environment Protection
483
Using CELP for compression of ECG signals
484
Using census data and remote sensing for mapping urban verticalization: A study case in Brazil
485
Using central manifold theorem in the analysis of master-slave synchronization networks
486
Using Centrality-Based Power Control for Hot-Spot Mitigation in Wireless Networks
487
Using centroid covariance in target recognition
488
Using cepstral and prosodic features for Chinese accent identification
489
Using cereal grain permittivity for quality sensing by moisture determination
490
Using cereal grain permittivity for sensing moisture content
491
Using cerebrospinal fluid for in situ fabrication of injectable alginate hydrogels for spinal cord repair
492
Using CERES Data to Evaluate the Infrared Flux Derived From Diffusivity Approximation
493
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6
494
Using certification trails to achieve software fault tolerance
495
Using CFAR algorithm to further improve a combined through-wall imaging method
496
Using CFD in robotic simulators for pollution monitoring
497
Using CGM and FDFD Techniques to Investigate the Radar Detection of Two-Dimensional Airplanes in Random Media for Beam Wave Incidence
498
Using Chain Graphical Model to Analyze the Efficacy of a Chinese Medicine
499
Using Change Impact Analysis to Select Tests for Extended Finite State Machines
500
Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures 1
501
Using change tracking component to manage OO driven user interface layout management system
502
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
503
Using Channel Output Feedback to Increase Throughput in Hybrid-ARQ
504
Using channel pipelining in reconfigurable interconnection networks
505
Using channel representations in regularization terms a case study on image diffusion
506
Using channels for multimedia communication
507
Using chaos in genetic algorithms
508
Using chaos to broaden the capture range of a phase-locked loop
509
Using chaos to broaden the capture range of a phase-locked loop: experimental verification
510
Using chaos to characterise tape noise
511
Using chaos to model sound
512
Using chaos-parallel evolutionary programming to solve the flow-shop scheduling problem
513
Using chaotic 3D watermarking for game design copy right protection
514
Using chaotic adaptive PSO-SVM for heart disease diagnosis
515
Using chaotic attractors as a means of discriminating neonatal heart rate variability
516
Using chaotic device to suppress non-Markovian quantum noises
517
Using Chaotic Maps for Encrypting Image and Video Content
518
Using chaotic measures to summarize medical signal analysis
519
Using chaotic quantum genetic algorithm solving environmental economic dispatch of Smart Microgrid containing distributed generation system problems
520
Using character recognition and segmentation to tell computer from humans
521
Using character shape coding for information retrieval
522
Using characteristic invariants to infer new spatial relationships from old
523
Using characteristic loci in the Hopf bifurcation
524
Using characteristic mode theory to estimate air-substrate microstrip patch antenna input impedance
525
Using characteristic multiplier loci to predict bifurcation phenomena and chaos-a tutorial
526
Using Characteristics of Computational Science Schemas for Workflow Metadata Management
527
Using Charge Accumulation to Improve the Radiation Tolerance of Multi-Gb NAND Flash Memories
528
Using charge self-compensation domino full-adder with multiple supply and dual threshold voltage in 45nm technology
529
Using CHARM-2 wafers to increase reliability in ion implant processing
530
Using Charts to Present International Trade Data
531
Using Chatbots for Network Management Training through Problem-based Oriented Education
532
Using Chatbots to Teach Socially Intelligent Computing Principles in Introductory Computer Science Courses
533
Using Chebyshev chaotic map to construct infinite length hash chains
534
Using chebyshev polynomials for interpreting structured light images
535
Using checkable types in automatic protocol analysis
536
Using Checkpointing and Virtualization for Fault Injection
537
Using Checkpointing to Enhance Turnaround Time on Institutional Desktop Grids
538
Using checkpoints to localize the effects of faults in distributed systems
539
Using checksum to reduce power consumption of display systems for low-motion content
540
Using Chemical Cellular Automata in Simulation of Chemical Materials
541
Using Chemical Metaphor to Express Workflow and Service Orchestration
542
Using chemical reaction network theory to discard a kinetic mechanism hypothesis
543
Using chemical solution process to fabricate zinc oxide micro/nano-structure on GaN with different growth time
544
Using Chemoinformatics and Rough Set Rule Induction for HIV Drug Discovery
545
Using children´s developmental psychology to guide augmented-reality design and usability
546
Using child-robot interaction to investigate the user acceptance of constrained and artificial languages
547
Using Chimeric Users to Construct Fusion Classifiers in Biometric Authentication Tasks: An Investigation
548
Using Chinese part-of-speech patterns for sentiment phrase identification and opinion extraction in user generated reviews
549
Using Chinese spoken-language access to the WWW
550
Using chip interleaving to improve chaos-based code tracking performance
551
Using chirp signal for accurate RFID positioning
552
Using Chi-Square Automatic Interaction Detector to Solve the Polysemy Problems in a Chinese to Taiwanese TTS System
553
Using Chi-Square test and heuristic search for detecting metamorphic malware
554
Using chloride mass-balance and stream hydrographs to estimate groundwater recharge in the Hailiutu River Basin, NW China
555
Using Choice Experiments to Value an Electronic Commerce
556
Using Choquet integrals for kNN approximation and classification
557
Using Chord for meta-data management in the N3FS distributed file system
558
Using Chou´s amphiphilic Pseudo-Amino Acid Composition and Extreme Learning Machine for prediction of Protein-protein interactions
559
Using chroma histogram to measure the perceptual similarity of music
560
Using chromaticity distributions and eigenspace analysis for pose-, illumination-, and specularity-invariant recognition of 3D objects
561
Using Chunked Extendible Array for Physical Storage of Scientific Datasets
562
Using Chunking to Optimise an Alpha-Beta Search
563
Using CIGAR for finding effective group behaviors in RTS game
564
Using cine MR images to evaluate myocardial infarct transmurality on delayed enhancement images
565
Using circle criteria for verifying asymptotic stability in PI-like fuzzy control systems: application to the milling process
566
Using circuit design software to simulate mechanical components
567
Using circuit hierarchy for fault simulation in combinational and sequential circuits
568
Using circuit model from layout-level synthesis as coarse model in space mapping and its application in modelling low-temperature ceramic cofired radio frequency circuits
569
Using circuit transformations for the evaluation of amplifier parameters
570
Using circuits and systems-level research to drive nanotechnology
571
Using circular statistics for trajectory shape analysis
572
Using circularly polarized waves for small elongated objects detection in microwave imaging
573
Using Citation Behavior to Rethink Academic Impact in Software Engineering
574
Using citation influence to predict software defects
575
Using Citation-KNN for Automatic Keyword Assignment
576
Using citations for ranking in digital libraries
577
Using CiteSeer to analyze trends in the ACM´s computing classification system
578
Using CLASP to assess perimeter security
579
Using class decompilers to facilitate the security of Java applications!
580
Using Class Imbalance Learning for Software Defect Prediction
581
Using class separation for feature analysis and combination of class-dependent features
582
Using Class-Based Reasoning to Improve the Accuracy of Symbolic Rules in a Hybrid Possibilistic Approach
583
Using class-center vectors to build support vector machines
584
Using class-dependent projection for text categorization
585
Using classic approximation techniques for approximate reasoning
586
Using classification and key phrase extraction for information retrieval
587
Using classification for constrained memetic algorithm: A new paradigm
588
Using classification for video quality evaluation
589
Using classification techniques for creation of predictive intrusion detection model
590
Using classification trees for software quality models: lessons learned
591
Using Classified Intelligence to Defend Unclassified Networks
592
Using Classifier diversity to handle label noise
593
Using classifier systems to design neural nets
594
Using classifiers to predict linear feedback shift registers
595
Using Classifiers to Solve Warehouse Location Problems
596
Using clean room design procedures to reduce the legal risk involved in the creation of functionally compatible products
597
Using clerk in parallel processing
598
Using clickers in lectures to help identify and teach the control topics students find difficult
599
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment
600
Using client-server applications in proximity networking
601
Using client-side access partitioning for data clustering in big data applications
602
Using Clifford Algebra to position a test fixture
603
Using clinical data, hypothesis generation tools and PubMed trends to discover the association between diabetic retinopathy and antihypertensive drugs
604
Using clinical datafiles to improve expert systems efficiency
605
Using clinical decision support to maintain medication and problem lists A pilot study to yield higher patient safety
606
Using clinical information and nonlinear EEG analysis for diagnosis of dementia
607
Using clinical information in goal-oriented learning
608
Using Clinical Workflows to Improve Medical Device/System Development
609
Using clipping and filtering algorithm to reduce PAPR of OFDM system
610
Using CLNS for FFTs in OFDM demodulation of UWB receivers
611
Using clock accuracy to guide model synthesis in distributed systems: An application in power grid control
612
Using clock changes in multi-path applications
613
Using clock gating technique for energy reduction in portable computers
614
Using clocked UWB antenna arrays for 3D imaging
615
Using Clock-Vdd to Test and Diagnose the Power-Switch in Power-Gating Circuit
616
Using clone detection to identify bugs in concurrent software
617
Using close range photogrammetric method to estimate kinetic variables in olympic-style weightlifting
618
Using closed captions to train activity recognizers that improve video retrieval
619
Using closed frequent sets to cluster malwares
620
Using closed loop feedback control theoretic techniques to improve obs networks performance
621
Using closely-related language to build an ASR for a very under-resourced language: Iban
622
Using Cloud Computing and Mobile Devices to Facilitate Students´ Learning through E-Learning Games
623
Using cloud computing in Stjepan Benceković elementary school
624
Using Cloud Computing Systems to Create Virtual Classroom Model for Thai-Nichi´s Students
625
Using cloud computing to enhance automatic test equipment testing and maintenance capabilities
626
Using Cloud Computing to Implement a Security Overlay Network
627
Using cloud computing to improve network operations and management
628
Using Cloud Constructs and Predictive Analysis to Enable Pre-Failure Process Migration in HPC Systems
629
Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment
630
Using cloud shadows to infer scene structure and camera calibration
631
Using cloud technologies for large-scale house data in smart city
632
Using Cloud Technologies to Optimize Data-Intensive Service Applications
633
Using CloudRFID middleware for fuel supply control of vehicles fleets
634
Using clouds for metagenomics: A case study
635
Using Clouds for Smart City Applications
636
Using CloudSim to Model and Simulate Cloud Computing Environment
637
Using CLP to Automatically Generate Test Sequences for Synchronous Programs with Numeric Inputs and Outputs
638
Using cluster analysis in Persona development
639
Using cluster analysis techniques to improve machine reliability
640
Using Cluster Analysis To Define A Coherent Diagnostic Strategy
641
Using Cluster Analysis to Identify Coincidental Correctness in Fault Localization
642
Using cluster analysis to improve gene selection in the formation of discriminant rules for the prediction of disease outcomes
643
Using Cluster Analysis to Improve the Design of Component Interfaces
644
Using Cluster and Correlation to Construct Attack Scenarios
645
Using cluster computing to support automatic and dynamic database clustering
646
Using cluster ensemble to improve classification of student dropout in Thai university
647
Using Cluster Similarity to Detect Natural Cluster Hierarchies
648
Using cluster skeleton as prototype for data labeling
649
Using cluster specific salience weighting to determine the preferences of agents for multi-agent simulations
650
Using cluster technology for establishing meteorological communication system based on shared memory
651
Using cluster-based stereotyping to foster human-robot cooperation
652
Using clustering algorithms in legacy systems remodularization
653
Using Clustering and Co-Training to Boost Classification Performance
654
Using clustering comparison measures for speaker recognition
655
Using clustering for maintaining case based reasoning systems
656
Using clustering techniques to analyze fraudulent behavior changes in online auctions
657
Using clustering techniques to improve capacity of LTE networks
658
Using clustering technology to improve XML semantic search
659
Using Clustering to Achieve Quality Software Structure
660
Using clustering to discover the preferences of computer criminals
661
Using clustering to evaluate reliability of composite power systems
662
Using Clustering to Improve Decision Trees Visualization
663
Using clustering to improve WLZ77 compression
664
Using Clustering to Personalize Visualization
665
Using clustering to support the migration from static to dynamic web pages
666
Using clustering-based bagging ensemble for credit scoring
667
Using Clusters in RDF Visualization
668
Using clusters in undergraduate research: Distributed animation rendering, photo processing, and image transcoding
669
Using CMAC neural networks and optimal control
670
Using CM-ED for the generation of graphical exercises based on concept maps
671
Using CNLS-net to predict the Mackey-Glass chaotic time series
672
Using CNN to unravel space-time processing in the vertebrate retina
673
Using COALA to develop a distributed object-based application
674
Using coalitions and services for implementing sharing in a large network of databases
675
Using coarse/fine manipulation with vision to place fine pitch SMD components
676
Using Coaxial Probe for Broadband Microwave Characterization of Biological Tissues
677
Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation
678
Using Co-change Histories to Improve Bug Localization Performance
679
Using code division technique to improve the performance of ad hoc wireless network
680
Using code instrumentation for creating initial impact set for software change request
681
Using code level model checking to discover automation surprises
682
Using code metrics to predict maintenance of legacy programs: a case study
683
Using code ownership to improve IR-based Traceability Link Recovery
684
Using codebooks generated from text skeletonization for forensic writer identification
685
Using coded signals to benefit from ultrasonic sensor crosstalk in mobile robot obstacle avoidance
686
Using codes for error correction and detection (Corresp.)
687
Using Codes of Conduct to Resolve Legal Disputes
688
Using co-design techniques to increase the reliability of the Electronic control system for a Multilevel Power Converter
689
Using codesign techniques to support analog functionality
690
Using codewords to protect database data from a class of software errors
691
Using coding techniques to analyze weak feedback polynomials
692
Using coding to support data resiliency in distributed systems
693
Using Coding-Based Ensemble Learning to Improve Software Defect Prediction
694
Using co-evolution to produce robust robot control
695
Using co-evolved RTS opponents to teach spatial tactics
696
Using Cognitive Apprenticeship Framework in Technology Education by Pre-service Teachers
697
Using cognitive artifacts to understand distributed cognition
698
Using cognitive artifacts to understand distributed cognition
699
Using cognitive automation for aircraft general systems management
700
Using Cognitive Behavioral Learning in Multi-agent Pursuit-Evasion Game
701
Using cognitive easiness metric for program comprehension
702
Using Cognitive Fit Theory to Evaluate the Effectiveness of Information Visualizations: An Example Using Quality Assurance Data
703
Using Cognitive Interference Routing to Avoid Congested Areas in Wireless Ad Hoc Networks
704
Using Cognitive Mapping to Elicit Modelling Requirements: An Overview
705
Using cognitive model to automatically analyze Chinese predicate
706
Using cognitive modeling for requirements engineering in anesthesiology
707
Using cognitive radar to traverse apertures
708
Using Cognitive Radio for Improving the Capacity of Wireless Mesh Networks
709
Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview
710
Using cognitive radio interference mitigation technique to enhance coexistence and sharing between DVB-T and LTE system
711
Using cognitive radio principles for wireless resource management in home networking
712
Using cognitive radio to deliver ‘Green’ communications
713
Using Cognitive Semantics to Integrate Perception and Motion in a Behavior-Based Robot
714
Using cognitive simulation to develop user interface design principles
715
Using cognitive techniques for assessing the influence of coupling on the maintainability of OCL expressions
716
Using Cognitive Traits for Improving the Detection of Learning Styles
717
Using Cognitive Walkthrough procedure to prototype and evaluate dynamic menu interfaces: A design improvement
718
Using Coherence Information and Decay Techniques to Optimize L2 Cache Leakage in CMPs
719
USING COHERENT ANTI-STOKES RAMAN SCATTERING (CARS) TO IMAGE BRAIN TISSUES
720
Using Coincident Optical Pulses for Parallel Memory Addressing
721
Using coincident SSM/I and infrared geostationary satellite data for rapid updates of rainfall
722
Using cold FET to check accuracy of microwave noise parameter test set
723
Using cold trapped atoms to determine lifetime of a Rydberg sequence
724
Using co-line search technique to improve performance of PSO
725
Using Collaboration Processes to Gain a Competitive Edge
726
Using Collaborative Activities on Tabletops to Enhance Learning and Knowledge Transfer
727
Using collaborative Autonomous Vehicles in Mine Countermeasures
728
Using Collaborative Concept Maps for Coordination and Knowledge-sharing in Learning Communities for Science
729
Using Collaborative Engineering to Inform Collaboration Engineering
730
Using Collaborative Filtering Algorithms as eLearning Tools
731
Using collaborative filtering to enhance domain-independent CBR recommender´s personalization
732
Using collaborative haptics in remote surgical training
733
Using collaborative knowledge base to realize adaptive message filtering in collaborative virtual environment
734
Using collaborative learning for image contrast enhancement
735
Using collaborative reading annotation system with self-regulated learning mechanisms to promote reading performance in English
736
Using collaborative virtual geographic environment for fire disaster simulation and virtual fire training
737
Using Collaborative Virtual Objects Based on Services to Communicate Smart Objects
738
Using collection descriptions to enhance an aggregation of harvested item-level metadata
739
Using collective decision system support to manage error in wireless sensor fusion
740
Using collective information in semi-supervised learning for speech recognition
741
Using collective intelligence for opinion analysis and tendency determination
742
Using collective intelligence to detect pragmatic ambiguities
743
Using Collective Intelligence to Support Multi-objective Decisions: Collaborative and Online Preferences
744
Using collective intentionality to model fleets of autonomous underwater vehicles
745
Using collinear points to compute egomotion and detect nonrigidity
746
Using collision avoidance algorithms for designing multi-robot emergent behaviors
747
Using collision avoidance frequency hopping technique in a fixed wireless network with star topology
748
Using co-located sidescan imagery to verify patch test results of a Multibeam sonar
749
Using color and text in multimedia projections
750
Using color bin images for crowd detections
751
Using Color Compatibility for Assessing Image Realism
752
Using color concepts in the retrieval of color artistry
753
Using color distribution to effectively query image databases
754
Using color effectively in computer graphics
755
Using color histogram as the trait of retina biometric
756
Using color histograms and range data to track trajectories of moving people from a mobile robot platform
757
Using color image
758
Using color in online marketing tools
759
Using color in the X Window system versus Microsoft Windows. 1
760
Using color in the X Window System versus Microsoft Windows. 2
761
Using Color Indices to Overcome the Scattering Problem in Line Laser Scanners
762
Using Color Strings Comparison for Video Frames Retrieval
763
Using color texture sparsity for facial expression recognition
764
Using Colored Petri Nets for the requirements engineering of a surface electrogastrography system
765
Using colour features to block dubious images
766
Using colour Gabor texture features for scene understanding
767
Using colour information in an omnidirectional perception system for autonomous robot localization
768
Using colour local binary pattern features for face recognition
769
Using coloured Petri nets to aid the design of object-based systems
770
Using coloured Petri nets to evaluate the impact of the QoS of failure detectors in the performance of a consensus protocol
771
Using column dependency to compress tables
772
Using Comb Filter to Enhance SSVEP for BCI Applications
773
Using combination charts to cocoa powder production process control
774
Using combination of join and semijoin operations for distributed query processing
775
Using Combination of Statistical Models and Multilevel Structural Information for Detecting Urban Areas From a Single Gray-Level Image
776
Using combination of structural, feature and raster classifiers for recognition of handprinted characters
777
Using combination recurrent neural network and fuzzy time series for data envelopment analysis (DEA)
778
Using combinational verification for sequential circuits
779
Using Combinative Proposal Distribution in Particle Filtering Algorithm
780
Using Combinatorial Approaches for Testing Mobile Applications
781
Using combinatorial designs to construct partial concentrators
782
Using combinatorial optimization to design good unit-memory convolutional codes
783
Using combinatory categorial grammar to extract biomedical information
784
Using Combined 532 NM HSRL and 1064 NM Elastic-Scatter Lidar Observations to Verify and Update CRAM Dual-Wavelength Aerosol Retrieval Models
785
Using Combined Cellular Ad Hoc Communications for Smart Environments
786
Using combined characteristics to identify inrush current and internal fault current of traction transformer
787
Using Combined Difference Image and k -Means Clustering for SAR Image Change Detection
788
Using combined electrodynamic methods for analysis of interoperability of local antenna groups
789
Using combined keying materials for key distribution in wireless sensor networks
790
Using combined photoreflectance and photoluminescence for understanding optical transitions in perovskites
791
Using Combined Ultrasound and Zeolite-GAC Filtration Lab-Scale Process for Pre-Treating Micropolluted Water
792
Using combined XRD-XRF analysis to identify meteorite ablation debris
793
Using combining evolution of Pictogram Chinese Characters to represent ideogrammic compounds Chinese characters
794
Using commercial design software as an aid for teaching electromagnetics
795
Using commercial interpretive software as a teacher´s reference tool in digital ECG laboratory
796
Using commercial modeling and simulation tools within NGTG processes
797
Using commercial off-the-shelf (COTS) equipment to meet joint service requirements
798
Using commercial off-the-shelf business intelligence software tools to support aircraft and automated test system maintenance environments
799
Using commercial satellites for buoy-based remote radios
800
Using commercial satellites to provide communication support for space missions
801
Using commercial semiconductor technologies in space
802
Using commercial web services to build Automated Test Equipment cloud based applications
803
Using Committee Machine with Intelligent Systems for Permeability Prediction, A case study of South Pars Gas Field, Persian Gulf, Iran
804
Using Commodity Graphics Hardware for Real-Time Digital Hologram View-Reconstruction
805
Using Common Criteria to Assess Quality of Web Services
806
Using common devices as collaborative tools for collecting and connecting people´s stories
807
Using common elements to explain electromagnetism to children: Remote Laboratory of Electromagnetic Crane
808
Using Common LISP in the EAVE autonomous underwater vehicle
809
Using common motion patterns to improve a robot´s operation in populated environments
810
Using common random numbers for indifference-zone selection
811
Using common spatial pattern algorithm for unsupervised real-time estimation of fingertip forces from sEMG signals
812
Using common subexpressions to optimize multiple queries
813
Using Common Table Expressions to Build a Scalable Boolean Query Generator for Clinical Data Warehouses
814
Using Commonality and Variability Analysis to Define the Platform/Waveform Boundary in A2G Systems
815
Using commonKADS in "soft" domains
816
Using common-mode filtering structures with microstrip differential lines in a multilayer printed circuit board environment
817
Using common-sense knowledge-base for detecting word obfuscation in adversarial communication
818
Using communicating Petri nets to implement parallel computation in single-tasking operating systems
819
Using Communication Analysis Techniques for Organizational Change
820
Using Communication Genre for searching with Small Display Devices
821
Using Communication Technology for Automation Negotiation in E-Commerce Environment
822
Using communications assignments to improve students´ preparation for the major design experience
823
Using communications technology for cross cultural training and development: the participatory developmental education model
824
Using communication-to-computation ratio in parallel program design and performance prediction
825
Using communicative acts in interaction design specifications for automated synthesis of user interfaces
826
Using community detection for sentiment analysis
827
Using community detection to support decision making process
828
Using community engagement to teach engineering and computing
829
Using Community Sticker for defining Migration Operator in Community Algorithm
830
Using community-based projects in software engineering education
831
Using commutative replicated data type for collaborative video annotation
832
Using compact disc player optical systems to measure differentially hard disk drive slider and disk motion under hostile conditions
833
Using compact distance energy model to recover human pose in markerless motion capture
834
Using compact models in the early thermal design of electronics
835
Using comparative human descriptions for soft biometrics
836
Using Comparative Process Analysis To Improve Outcomes Of Surgical Procedures
837
Using comparison of parallel phoneme probability streams for OOV word detection
838
Using compatible keys for secure multicasting in E-commerce
839
Using compensated MRAS for model predictive control of induction machine
840
Using Compensating Reconfiguration To Maintain Military Distributed Simulations
841
Using Competencies to Search for Suitable Exercises
842
Using competition to build a stronger team
843
Using Competitive Analysis to get the competitive advantage
844
Using competitive digital game-based learning to improve learning motivation
845
Using competitive learning for state-space partitioning
846
Using compiled knowledge to guide and focus abductive diagnosis
847
Using Compiler Techniques to Improve Automatic Performance Modeling
848
Using compiler-generated approximate critical path information to prioritise instructions for value prediction
849
Using Complement Register Structure Circuit against H-O DPA
850
Using complementary formulations for accurate computations of magnetostatic fields and forces in a synchronous motor
851
Using complementary sequences for direct transmission path identification
852
Using Complementary Sequences with Doppler Tolerance for Radar Sidelobe Suppression in Meteorological Radar
853
Using Complementary Split Ring Resonators (CSRR) to Design Bandpass Waveguide Filters
854
Using complementation and resequencing to minimize transitions
855
Using complete machine simulation for software power estimation: the SoftWatt approach
856
Using complete system simulation for temporal debugging of general purpose operating systems and workloads
857
Using Complete-1-Distinguishability for FSM equivalence checking
858
Using Complex Adaline for the Direct Symmetrical Components Estimation
859
Using Complex Computer Games As Task Simulators In The Training Of Flight Skills
860
Using Complex Event Processing for Dynamic Business Process Adaptation
861
Using Complex Event Processing for implementing a geofencing service
862
Using Complex Event Processing to support data fusion for ambulance coordination
863
Using complex IT in specific domains: developing and assessing a course for nonmajors
864
Using complex lexical types to model the polysemy of collective nouns within the Generative Lexicon
865
Using complex linguistic features in context-sensitive text classification techniques
866
Using complex network theory in the Internet engineering
867
Using Complex Networks for Language Processing: The Case of Summary Evaluation
868
Using Complex Neural Networks on Noise Cancelling
869
Using Complex Products and Systems in the Pharmaceutical Innovation: Case study of R&D project in pharmaceutical industry
870
Using complex sequential modules in RTL synthesis
871
Using complexity theory to understand what´s happening to technical communication
872
Using complexity-tracking in software development
873
Using complex-valued ICA to efficiently combine radar polarimetric data for target detection
874
Using complex-valued Levenberg-Marquardt algorithm for learning and recognizing various hand gestures
875
Using compliant membranes for dynamic flow stabilization in microfluidic systems
876
Using component business modeling to facilitate business enterprise architecture and business services at the US Department of Defense
877
Using component features for face recognition
878
Using component metacontent to support the regression testing of component-based software
879
Using Component Metadata based on Dependency Relationships Matrix to improve the Testability of Component-based Software
880
Using Component Synchrony Measure for somatosensory evoked potential detection
881
Using component technology in power system simulations
882
Using Component-based Middleware to Design and Implement Data Distribution Service (DDS) Systems
883
Using component-level measurements to determine system-level radiated emissions
884
Using Component-Oriented Process Models for Multi-metamodel Applications
885
Using components for architecture-based management
886
Using components for modeling intelligent and collaborative mobile agents
887
Using components for rapid distributed software development
888
Using components to increase maintainability in a large telecommunication system
889
Using components, patterns and frameworks to realize architecture
890
Using composite low rank and sparse graph for label propagation
891
Using Composition Policies to Manage Authentication and Authorization Patterns and Services
892
Using composition to design secure, fault-tolerant systems
893
Using composition to design secure, fault-tolerant systems
894
Using Compositionality to Formally Model and Analyze Systems Built of a High Number of Components
895
Using compound electrodes in electrical impedance tomography
896
Using Comprehensive Analysis for Performance Debugging in Distributed Storage Systems
897
Using comprehensive entities for product planning
898
Using Comprehensive Memory Cycle Updating in Extensive Reading
899
Using compressed audio-visual words for multi-modal scene classification
900
Using Compressed B+-trees for Line-based Database Indexes
901
Using compressed bytecode traces for slicing Java programs
902
Using Compression Energy Efficiently in Mobile Environment
903
Using compression models for filtering troll comments
904
Using compression to identify acronyms in text
905
Using compression to understand the distribution of building blocks in genetic programming populations
906
Using compressive sensing to reduce fingerprint collection for indoor localization
907
Using compromised method in design of reverse logistics network with eco-efficiency consideration
908
Using Computation to Decode the First Known Computer
909
Using Computational Argumentation to Support E-participation
910
Using computational auditory models to predict simultaneous masking data: model comparison
911
Using computational learning theory to analyze the testing complexity of program segments
912
Using computational method to identify the binding site of 8R-lipoxygenase for arachidonic acid
913
Using computational methods for the prediction of drug vehicles
914
Using Computational Methods to Reinvigorate an Undergraduate Physics Curriculum
915
Using computational models for development of the three-dimensional visualization in molecular biology
916
Using computational RAM for volume rendering
917
Using computational reflection in optimistic distributed simulations
918
Using computational simulation to model CdS/CdTe processing in close-space sublimation
919
Using computational swarm intelligence for real-time asset allocation
920
Using computer aided language software for teaching and self-learning
921
Using computer assisted classrooms
922
Using computer assisted collaborative learning for high quality distance education
923
Using computer assisted collaborative learning to improve distance education
924
Using computer conferencing to improve productivity in the 90s
925
Using computer games for hybrid systems controller synthesis
926
Using computer games in a computer course to improve learning
927
Using computer gaming models to understand the behavior of industrial machines
928
Using computer generated uniform random variables to generate PN like codes
929
Using computer graphics as a vehicle for teaching software engineering concepts
930
Using computer history as innovation for computer organization subjects
931
Using computer labs for distributed computing
932
Using Computer Modeling to Evaluate Fixed VS. Random Grid Sampling for Fisheries Resource Assessment
933
Using computer modelling in image coding
934
Using computer models to understand the roles of tissue structure and membrane dynamics in arrhythmogenesis
935
Using computer network simulation tools as supplements to computer network curriculum
936
Using computer network to cultivate English learner autonomy
937
Using Computer Programming to Enhance Science Learning for 5th Graders in Taipei
938
Using computer simulation and robust design techniques to improve production yield [of electronic circuits]
939
Using computer simulation as an alternative mechanism to transfer knowledge among the knowledge workers
940
Using computer simulation as virtual implementation platforms in developing energy efficiency projects
941
Using computer simulation for rapid transit operating strategies
942
Using Computer Simulation in Operating Room Management: Impacts of Information Quality on Process Performance
943
Using Computer Simulation in Operating Room Management: Impacts on Process Engineering and Performance
944
Using computer simulation to compare tool delivery systems in an FMC
945
Using computer simulation to mitigate risk in electricity generation/consumption collaboration policies
946
Using Computer Simulation To Optimize Flexible Manufacturing System Design
947
Using computer simulation to reengineer traditional stove-piped army staffs for information operations in the 21st century
948
Using computer simulations to teach electrical power systems
949
Using computer software to assess the intellectual development of engineering students
950
Using computer spreadsheets in engineering and education
951
Using computer technology to reform college English teaching in China
952
Using computer technology to support cost-effective paperless interactive technical data
953
Using computer to simulate the movement of plane link mechanism dynamically
954
Using computer tools to predict the consequences of internal arcs
955
Using computer trees to derive lower bounds for selection problems
956
Using Computer Vision and Dead Reckoning Technology to Monitor Transit Service Reliability
957
Using Computer Vision for 3D Probabilistic Reconstruction and Motion Tracking
958
Using computer vision for the automatic inspection and alignment of television displays
959
Using computer vision techniques for dangerous situation detection in domotic applications
960
Using computer vision to generate customized spatial audio
961
Using Computer-Assisted Test to Harmlessly Improve the Efficiency of Heterogeneous Grouping in Collaborative Learning
962
Using Computer-Based Survey to Gather Knowledge Sharing Relationship Data
963
Using computer-generated graphics to make engineering documents and presentations more effective
964
Using Computerized Clinical Practice Guidelines to Generate Tailored Patient Education Materials
965
Using computerized lexical analysis of student writing to support Just-in-Time teaching in large enrollment STEM courses
966
Using computerized routers to control product flow
967
Using Computer-Mediated Peer Review in an Engineering Design Course
968
Using computers as Mindtools to learn time concept in elementary school
969
Using computers in an engineering curriculum. Where are we? Where are we going?
970
Using Computers in Education
971
Using computers in our daily life
972
Using computers in software quality assurance
973
Using computers to deliver a mathematics course, to increase recruitment and retention rate of non-traditional students and reduce staff workload
974
Using computing to improve the quality team process: some initial observations from the IRS-Minnesota project
975
Using COMSOL Multiphysics software to model anisotropic dielectric and metamaterial effects in folded-waveguide traveling-wave tube slow-wave circuits
976
Using COMTRADE records to commission protection
977
Using COMTRADE records to test protective relays
978
Using concavity trees for shape description
979
Using concentric circular invariant features for face image retrieval
980
Using Concept Lattices to Support Web Service Compositions with Backup Services
981
Using concept mapping for maintainability assessments
982
Using concept mapping tools to enhance collaborative problem solving and innovation in corporate e-Learning
983
Using concept maps and concept questions to enhance conceptual understanding
984
Using concept maps as a cross-language resource discovery tool for large documents in digital libraries
985
Using concept maps for evaluating program objectives
986
Using concept maps for information conceptualization and schematization in technical reading and writing courses: A case study for computer science majors in Japan
987
Using concept maps in digital libraries as a cross-language resource discovery tool
988
Using concept maps in knowledge assessment of short and open answer questions
989
Using concept maps to assess design process knowledge
990
Using concept structures for efficient document comparison and location
991
Using Concept-Analyzer for Comparing Concepts
992
Using Concepts Analysis for Mining Functional Features from Legacy Code
993
Using concepts from painting
994
Using conceptual graphs to represent modern music
995
Using Conceptual Model and Reflection Mechanism to Resolve the Structural Conflict in AOP Application
996
Using Conceptual Modeling and Value Analysis to Identify Sustainable m>Business Models in Industrial Services
997
Using conceptual reasoning for inconsistencies detection in Islamic advisory opinion (Fatwas)
998
Using conceptual roles of data for enhanced program comprehension
999
Using Conceptual Spaces for Belief Update in Multi-agent Systems
1000
Using conceptual structures in service creation and verification
بازگشت