<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using Radio Connectivity to Define Transmission Schedules in Multihop Wireless Networks
2
Using radio frequency identify (RFID) radar to detect overhead high voltage power line position
3
Using radio frequency reconstructed IVUS images in tissue classification
4
Using radio irregularity for increasing residential energy awareness
5
Using radio irregularity for vehicle detection in adaptive roadway lighting
6
Using Radio Network Feedback to Improve TCP Performance over Cellular Networks
7
Using radio waves to study planetary atmospheres
8
Using radiocommunication in order to increase efficiency of search and rescue operations at sea
9
Using radioelectronic devices of mm-wave range for measuring length of moving objects
10
Using radio-frequency electrical measurements as a plasma diagnostic
11
Using radius to improve robot localization and mapping
12
Using RAIC for dependable on-line upgrading of distributed systems
13
Using railguns to break barriers between engineering disciplines at the United States Military Academy
14
Using rainwear as switching jackets. A reasonable solution for electric arc exposure
15
Using rainwear as switching jackets: a reasonable solution for electric arc exposure
16
Using Random Butterfly Transformations in parallel schur complement-based preconditioning
17
Using random early detection to ACK delay control of TCP traffic
18
Using random forest based on codon usage for predicting Human Leukocyte Antigen gene
19
Using Random Forest classifiers to detect duplicate gazetteer records
20
Using Random Forest to integrate lidar data and hyperspectral imagery for land cover classification
21
Using Random Forests for Handwritten Digit Recognition
22
Using Random Forests for Network-based Anomaly detection at Active routers
23
Using random graphs in learning past tenses
24
Using Random Matrix Theory to determine the number of endmembers in a hyperspectral image
25
Using Random Perturbation Method to Improve Efficacy Prediction of siRNA Sequences
26
Using random phase multisines to perform non-invasive glucose measurements
27
Using random projections to identify class-separating variables in high-dimensional spaces
28
Using Random Restart Hill Climbing Algorithm for Minimization of component Assembly Time Printed Circuit Boards
29
Using random shape theory to model blockage in random cellular networks
30
Using random signals with predefined statistical properties for the study of circuits in PSpice environment
31
Using random subspace to combine multiple features for face recognition
32
Using random task graphs to investigate the potential benefits of heterogeneity in parallel systems
33
Using random test selection to gain confidence in modified software
34
Using Random Undersampling to Alleviate Class Imbalance on Tweet Sentiment Data
35
Using random weights to train multilayer networks of hard-limiting units
36
Using Randomised Vectors in Transcription Factor Binding Site Predictions
37
Using randomization to cope with circuit uncertainty
38
Using Randomization to Identify Social Influence in Mobile Networks
39
Using randomization to solve the deterministic single and multiple vehicle routing problem with service time constraints
40
Using Randomized Caches in Probabilistic Real-Time Systems
41
Using randomized rounding to satisfy timing constraints of real-time preemptive tasks
42
Using randomized routing to counter routing table insertion attack on Freenet
43
Using Randomized Search Algorithms to Estimate HMM Learning Parameters
44
Using range and inertia sensors for trajectory and pose estimation
45
Using range data for inspecting printed wiring boards
46
Using range extension cooperative transmission in energy harvesting wireless sensor networks
47
Using range information to reduce local descriptor computations: A case study
48
Using range profiles as feature vectors to identify aerospace objects
49
Using range profiles for data association in multiple-target tracking
50
Using rank factorization in calculating the Moore-Penrose generalized inverse
51
Using Ranked Nodes to Model Qualitative Judgments in Bayesian Networks
52
Using ranking function in dual approach to solve quadratic programming problem under fuzzy environment
53
Using Rank-Metric Codes for Error Correction in Random Network Coding
54
Using Rao-Blackwellised Particle Filter Track 3D Arm Motion Based on Hierarchical Limb Model
55
Using rapid developing and developing speed model to decrease line width in electron beam lithography
56
Using rapid development tools to design and construct a STATCOM with active harmonic cancellation capabilities
57
Using Rapid Feedback to Enhance Student Learning and Satisfaction
58
Using Rapid Feedback to Enhance Student Learning in Mechanics
59
Using rapid prototypes for early requirements validation
60
Using rapid prototyping molds to create patient specific polymethylmethacrylate implants in cranioplasty
61
Using rapid prototyping to teach design for automated assembly principles
62
Using rapid prototyping to teach the design of complete computing solutions
63
Using rapid visually evoked EEG activity for person identification
64
Using rapidly random trees and linear programming for stable operation of a multi-robot system on domes
65
Using rare event modeling & networking to build scenarios and forecast the future
66
Using RASSP modules in a rapid system prototyping class
67
Using Rate Balancing to Improve Throughput in a Wireless Multi-hop Chain Topology
68
Using rate matching attributes for differentiated QoS in units networks
69
Using rate monotonic scheduling technology for real-time communications in a wormhole network
70
Using Rate-Distortion Metrics for Real-Time Internet Video Streaming with TCP
71
Using rational approximations for evaluating the reliability of highly reliable systems
72
Using rational filters for digital correction of a spectrometric microtransducer
73
Using rational filters for digital correction of a spectrometric micro-transducer
74
Using rational Lyapunov function for estimating the domain of attraction of a nonlinear economic model : An LMI approach
75
Using rational NARMAX models to recover static nonlinearities
76
Using Rationale for Software Engineering Education
77
Using rattling ions to probe sub-ps water network dynamics
78
Using ray tracing for site-specific indoor radio signal strength analysis
79
Using ray tracing to study urban vector channel propagation characteristics
80
Using rays cycle mining to clarify sentiment analysis
81
Using RBAC to Enforce Solaris System Security
82
Using RBF algorithm for landcover or clutter classification for mobile planning
83
Using RBF Neural Network for Fault Diagnosis in Satellite ADS
84
Using RBF neural networks and a fuzzy logic controller to stabilize wood pulp freeness
85
Using RBF Neural Networks and Kullback-Leibler distance to classify channel models in Free Space Optics
86
Using RC type damping to eliminate right-half-plane zeros in high step-up DC-DC converter with diode-capacitor network
87
Using rCUDA to Reduce GPU Resource-Assignment Fragmentation Caused by Job Scheduler
88
Using RDF for policy specification and enforcement
89
Using RDF/RDFS to support visualized online authoring tool for teachers
90
Using RDL to Facilitate Customization of Variability Points
91
Using RE knowledge to assist automatically during requirement specification
92
Using Reactive Agents to Mimic the Dissemination of Slums in Cities
93
Using Reactive Tabu Search in Semi-supervised Classification
94
Using Readers´ Highlighting on Monochromatic Documents for Automatic Text Transcription and Summarization
95
Using reading techniques to focus inspection performance
96
Using real data for the implementation of multistatic passive radar geometry optimization procedure
97
Using real options to evaluate the reasonable Renminbi exchange rate interval
98
Using real options to manage condition-based maintenance enabled by PHM
99
Using real options to manage Technical Debt in Requirements Engineering
100
Using real options to select stable middleware-induced software architectures
101
Using real spatial correlation matrices for improved array processing
102
Using real time computer vision algorithms in automatic attendance management systems
103
Using real time dispatcher as a decision-making support system to resolve overlapping dispatching problem in FAB manufacturing
104
Using real world data in education
105
Using real world test data to improve laboratory testing techniques: Indy cars to cross country trucks-on-line
106
Using real-time acceleration data for exercise movement training with a decision tree approach
107
Using real-time adaptive noise masking to mitigate ambient interferences
108
Using real-time aircraft reports of wind and environmental parameters to enable dynamic cockpit-based wake tools
109
Using real-time awareness to manage performance of Java clients on mobile robots
110
Using real-time chemical plume models in virtual training systems
111
Using real-time data in reducing idle time due to avoidable interruptions
112
Using real-time dependability in adaptive service selection
113
Using real-time expert systems for control system prototyping
114
Using Real-Time Logic Synthesis Tool to Achieve Process Control over Wireless Sensor Networks
115
Using real-time outage information at Westar energy
116
Using real-time recognition of human-robot interaction styles for creating adaptive robot behaviour in robot-assisted play
117
Using real-time sensing data for predicting future state of building fires
118
Using real-time simulation to assess the impact of a high penetration of LV connected microgeneration on the wider system performance during severe low frequency
119
Using real-time system design methods to integrate SMPS control software with application software
120
Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval
121
Using realtime transcription to do member-checking during interviews
122
Using real-valued genetic algorithms to evolve rule sets for classification
123
Using real-valued meta classifiers to integrate binding site predictions
124
Using real-world data to calibrate a driving simulator measuring lateral driving behaviour
125
Using real-world data to increase students´ scientific literacy
126
Using reason mining to analyze external expert reviews for research project selection
127
Using Received Signal Strength Variation for Energy Efficient Data Dissemination in Wireless Sensor Networks
128
Using receiver-based rate matching for congestion detection in rate-based protocols
129
Using reciprocal derivative chronopotentiometry as a technique to determine safe charge injection limits of electrodes used for neural stimulation
130
Using reciprocating duty cycles to create reduced EMI clock signals
131
Using Recognition of Emotions in Speech to Better Understand Brand Slogans
132
Using Recommendation Systems for Explicit Knowledge Dissemination and Profiling Identification for Scientific and Engineering Contexts
133
Using Recommendation to Limit Search Space in Web Services Discovery
134
Using Recommender Systems to Assist in Intelligent Service Composition
135
Using reconciliation to share files between occasionally connected computers
136
Using Reconfigurable Computers for DSP Image Processing
137
Using reconfigurable computing techniques to accelerate problems in the CAD domain: a case study with Boolean satisfiability
138
Using Reconfigurable Devices to Maximize Spectral Efficiency in Future Heterogeneous Wireless Systems
139
Using reconfigurable FPGAs in test equipment applications
140
Using reconfigurable hardware devices in WSNs for accelerating and reducing the power consumption of header processing tasks
141
Using Reconfigurable Hardware Devices in WSNs for Reducing the Energy Consumption of Routing and Security Tasks
142
Using Reconfigurable HW for High Dimensional CAF Computation
143
Using Reconfigurable Logic to Optimise GPU Memory Accesses
144
Using Reconfigurable Radios to Increase Throughput in Wireless Sensor Networks
145
Using Reconfigurable Transmitarray to Achieve Beam-Steering and Polarization Manipulation Applications
146
Using reconfiguration for efficient management of replicated data
147
Using Reconstructability Analysis for Input Variable Reduction: A Business Example
148
Using reconstructability analysis to select input variables for artificial neural networks
149
Using Reconstructed IVUS Images for Coronary Plaque Classification
150
Using recorded values for bounding the minimum completion time in multiprocessors
151
Using rectangular-patches (RPs) to reduce far-end crosstalk noise and improve eye-diagrams on microstrip helix delay line
152
Using recurrence network approach to quantify nonlinear dynamics of skin blood flow in response to loading pressure
153
Using recurrence plots to visualize the temporal dynamics of tutor/student interactions
154
Using recurrence quantification analysis determinism for noise removal in cardiac optical mapping
155
Using recurrent ANNs for the detection of epileptic seizures in EEG signals
156
Using Recurrent Fuzzy Wavelet Neural Network to Control AC Servo System
157
Using recurrent multilayer neural network for simulating batch reactors
158
Using recurrent networks for non-temporal classification tasks
159
Using recurrent neural networks for adaptive communication channel equalization
160
Using recurrent neural networks for blind equalization of linear and nonlinear communications channels
161
Using Recurrent Neural Networks for Circuit Complexity Modeling
162
Using Recurrent Neural Networks for Slot Filling in Spoken Language Understanding
163
Using recurring costs for reputation management in peer-to-peer streaming systems
164
Using recursive Bayesian estimation for matching GPS measurements to imperfect road network data
165
Using recursive least square learning method for principal and minor components analysis
166
Using recursive parameter estimation for sleep disorder discrimination
167
Using recursive spectral registrations to determine brokenness as measure of structural map errors
168
Using red-black interval trees in device-level analog placement with symmetry constraints
169
Using Red-Eye to Improve Face Detection in Low Quality Video Images
170
Using redispatch generators to reduce the standing phase angle during system restoration
171
Using reduced motion vector set for real time motion registration in HDR imaging
172
Using reduced-order models in D/A converter testing
173
Using redundancies to find errors
174
Using redundancy in FDDI networks
175
Using redundancy to break the link between accuracy and speed in an adc
176
Using redundancy to enable interactive communication for moving vehicles
177
Using Redundancy to Optimize Manipulability of Stewart Platforms
178
Using redundancy to reduce accelerations near kinematic singularities
179
Using redundant DC power in high availability systems
180
Using redundant fitness functions to improve optimisers for humanoid robot walking
181
Using redundant number representations for efficient VLSI implementation of modular arithmetic
182
Using Redundant Threads for Fault Tolerance of OpenMP Programs
183
Using Reed–Muller RM (1, m) Codes Over Channels With Synchronization and Substitution Errors
184
Using Reed-Muller coefficients to synthesise optimal prediction modules for concurrent testing
185
Using reed-muller sequences as deterministic compressed sensing matrices for image reconstruction
186
Using reengineering and aspect-based techniques to retrieve knowledge embedded in object-oriented legacy system
187
Using re-factoring to reduce the pain of component evolution
188
Using Reference Models for Business Engineering - State-of-the-Art and Future Developments
189
Using reference objects to improve vision-based bearing measurements
190
Using reference ontology to elicit attributes of brain tumors database
191
Using Reference to Tune Language Model for Detection of Reading Miscues
192
Using reference trajectories for predicting uncertain systems exemplified for a power plant
193
Using Reflectance Measurements to Determine Light use Efficiency in Corn
194
Using reflection resonances to improve depth of field for imaging at ultra-high numerical apertures
195
Using reflection to introduce self-tuning technology into DBMSs
196
Using reflective practices to reduce dropout rates among first year students at a University of Technology, a South African perspective
197
Using reflective writing to promote metacognition [engineering education]
198
Using reflexivity to interface with CORBA
199
Using REFSENO to represent knowledge in the software maintenance process
200
Using region semantics and visual context for scene classification
201
Using regional homogeneity from functional MRI for diagnosis of ASD among males
202
Using Regional Information in Language Model Based Automatic Concept Annotation and Retrieval Of Video
203
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
204
Using register-transfer paths in code generation for heterogeneous memory-register architectures
205
Using Registration Algorithms for Wireless Sensor Network Node Localization
206
Using regression analysis for GA-based ATPG parameter optimization
207
Using regression model for eliminating the puzzlement of Non-Archimedean number in Data Envelopment Analysis
208
Using regression to improve local convergence
209
Using regression trees to classify fault-prone software modules
210
Using regression trees to learn action models
211
Using regressive graph as a novel paradigm in plan recognition
212
Using regular array methods for DSP module synthesis
213
Using regular expressions for mining data in large software repositories
214
Using regular tree automata as XML schemas
215
Using reinforcement learning for agent-based network fault diagnosis system
216
Using Reinforcement Learning for Call Admission Control in Cellular Environments featuring Self-Similar Traffic
217
Using reinforcement learning for city site selection in the turn-based strategy game Civilization IV
218
Using reinforcement learning for engine control
219
Using reinforcement learning for image thresholding
220
Using reinforcement learning for pro-active network fault management
221
Using Reinforcement Learning Techniques to Select the Best Action in Setplays with Multiple Possibilities in Robocup Soccer Simulation Teams
222
Using reinforcement learning to adapt an imitation task
223
Using reinforcement learning to catch a baseball
224
Using reinforcement learning to improve exploration trajectories for error minimization
225
Using Reinforcement Learning to Improve the Stability of a Humanoid Robot: Walking on Sloped Terrain
226
Using reinforcement learning to solve the labyrinth game, a nonlinear control application
227
Using Reinforcement Learning to the Priority-Based Routing and Call Admission Control in WDM Networks
228
Using relation algebra for the analysis of Petri nets in a CASE tool based approach
229
Using Relational Algebra on the Specification of Real World ETL Processes
230
Using relational algebra on the specification of Slowly Changing Dimensions - a first step
231
Using Relational Database to Build OWL Ontology from XML Data Sources
232
Using relational model transformations to reduce complexity in SoS requirements traceability: Preliminary investigation
233
Using Relational Similarity between Word Pairs for Latent Relational Search on the Web
234
Using Relational Topic Models to capture coupling among classes in object-oriented software systems
235
Using relationships for matching textual domain models with existing code
236
Using Relative Classification Probability to Increase Accuracy of Restricted Structure Bayesian Network Classifiers
237
Using relative compensatory method in adaptive filters
238
Using Relative Complexity Measurement Which from Complex Network Method to Allocate Resources in Complex Software System´s Gray-Box Testing
239
Using relative complexity to allocate resources in gray-box testing of object-oriented code
240
Using relative contrast and iterative normalization for improved prostate cancer localization with multispectral MRI
241
Using relative head and hand-target features to predict intention in 3D moving-target selection
242
Using Relative Neighborhood Graphs for Reliable Database Synchronization in MANETs
243
Using relative spatial relationships to improve individual region recognition
244
Using relative-relevance of data pieces for efficient communication, with an application to Neural data acquisition
245
Using relaxation velocity update strategy to improve particle swarm optimization
246
Using Relay Balance and AQM Schemes to Improve Performance in Multi-hop Wireless Networks
247
Using relay network to increase life time in wireless body area sensor networks
248
Using relays for unbalanced faults on generators
249
Using Relevance Feedback in Bridging Semantic Gaps in Content-Based Image Retrieval
250
Using relevance feedback in content-based image metasearch
251
Using Relevance Feedback Techniques for Optimising Media Retrieval Applications
252
Using relevance feedback to learn visual concepts from image instances
253
Using relevance feedback to reduce the semantic gap in content-based image retrieval of mammographic masses
254
Using relevant reasoning to solve the relevancy problem in knowledge discovery in databases
255
Using reliability analysis for optimum scheme
256
Using reliability analysis for sustained wind farm Operation in remote and weak transmission areas
257
Using reliability metrics to improve performance
258
Using reliability modeling and accelerated life testing to estimate solar inverter useful life
259
Using reliability-based models to assess rehabilitation needs
260
Using reliability-centered maintenance to support corporate TQM objectives
261
Using Relocatable Bitstreams for Fault Tolerance
262
Using REM sleep architecture to predict clinical responsiveness to antidepressant drugs
263
Using remaining battery lifetime information and relaying to decrease outage probability of a mobile terminal
264
Using Remote Access Laboratories in nursing education
265
Using remote experimentation for study on engineering concepts through a didactic press
266
Using remote experimentation in a large undergraduate course: Initial findings
267
Using remote joins for the processing of distributed mobile queries
268
Using Remote Lab Networks to Provide Support to Public Secondary School Education Level
269
Using remote laboratory eLab3D for a broader practical skills training in electronics
270
Using Remote Labs in Education (Zubia, J.G. and Alves, G.R.; 2011) [Book News]
271
Using remote labs to serve different teacher´s needs A case study with VISIR and RemotElectLab
272
Using remote memory to avoid disk thrashing: a simulation study
273
Using remote sensing and geographic information system for prioritization of areas for site specific agricultural development in Limpopo Province, South Africa
274
Using remote sensing and GIS to analyze land use/cover change and urban expansion in Xining City of Qinghai province, China
275
Using remote sensing and GIS to estimate the probability of soil erosion rapidly
276
Using remote sensing and spatial analysis to understand landslide distribution and dynamics in New Zealand
277
Using Remote Sensing Data to Quantify Changes in Vegetation over Peatland Areas
278
Using remote sensing derived spatial metrics for the calibration of land-use change models
279
Using Remote Sensing Documents In The Study Of Dune Formation In The Western Desert Fringes Of Middle Egypt
280
Using Remote Sensing for Mapping the Effects of Natural Hazards in New Zealand
281
Using remote sensing for risk mapping of malaria: A review of remote sensing approaches in environment
282
Using remote sensing free software in scientific research
283
Using remote sensing in the Tibetan part of national highway 317
284
Using remote sensing method analysis characteristic of Bohai Sea and Yellow Sea mixed zone
285
Using remote sensing satellites for water quality monitoring in the UAE
286
Using Remote Sensing Technology for Dynamic Monitoring of Poyang Lake Area and Capacity
287
Using remote sensing to estimate water use efficiency in Western China
288
Using remote sensing to evaluate land salinization in typical areas of Inner-Mongolia, China
289
Using remote sensing to monitor wetland cover change and succession in Dongting Lake of China during 1993-2010
290
Using remote sensing to promote signal and image processing
291
Using Remote Sensing to Track Variation in Phosphorus and Its Interaction With Chlorophyll-a and Suspended Sediment
292
Using remote update controller of FPGA´s as built-in self test for embedded systems
293
Using Remote Vision: The Effects of Video Image Frame Rate on Visual Object Recognition Performance
294
Using remotely sensed data to estimate surface albedo and absorbed photosynthetic active radiation
295
Using remotely sensed data to map variability in health and wealth indicators in Accra, Ghana
296
Using Remotely Sensed Data To Monitor Land Surface Climatology Variations In A Semi-arid Grassland
297
Using rendezvous to overcome communication limitations in multirobot exploration
298
Using renewable energy for rural connectivity and distance education in Latin America
299
Using renewable energy sources for electric vehicles charging
300
Using Renewable Energy to Include Off-grid Rural Schools into the National Equity Project Plan Ceibal
301
Using renewable MV wind energy resource to supply reactive power in MV distribution network
302
Using renewables to reduce peak demand: Lessons from an Australian experience
303
Using renyi entropy to detect early cardiac autonomic neuropathy
304
Using Reo for formal specification and verification of system designs
305
Using repairable fault trees for the evaluation of design choices for critical repairable systems
306
Using repair-depot system reliability to determine the distribution of supportability turn-around time
307
Using Repeated Games to Design Incentive-Based Routing Systems
308
Using repeat-pass SAR interferometry for mapping wet snowcovers
309
Using repertory grid-centered knowledge acquisition tools for decision support
310
Using repertory grids for knowledge acquisition for spatial expert systems
311
Using repertory grids to test data quality and experts´ hunches
312
Using repetitive control for light load THD and efficiency improvement for boost digital PFC converters
313
Using repetitive control for THD reduction over wide load range for boost digital PFC converters
314
Using replicated video servers for VoD traffic offloading in integrated metro/access networks
315
Using replication and checkpointing for reliable task management in computational Grids
316
Using replication and partitioning to build secure distributed systems
317
Using Replication to Build Highly Available .NET Applications
318
Using replicator dynamics for analyzing fMRI data of the human brain
319
Using representations of the dihedral groups in the design of early vision filters
320
Using representative-based clustering for nearest neighbor dataset editing
321
Using Reprints to Probe the Market
322
Using Reputation System in Ubiquitous Healthcare
323
Using Requirements Management Tools in Software Product Line Engineering: The State of the Practice
324
Using Requirements to Define Services for Service-Centric Food Traceability Information Systems
325
Using requirements traceability links at runtime - a position paper
326
Using Resampling for Optimizing Continuous Queries in Wireless Sensor Networks
327
Using Resampling Techniques to Compute Confidence Intervals for the Harmonic Mean of Rate-Based Performance Metrics
328
Using Rescue Points to Navigate Software Recovery
329
Using research results for power system classroom education: A power flow and transient stability case study
330
Using reservation-virtual-time-CSMA with split-channel reservation for packet voice and data
331
Using Reservoir Computing for Forecasting Time Series: Brazilian Case Study
332
Using Residential AC Load Control in Grid Operations: PG&E´s Ancillary Service Pilot
333
Using Residual Resampling and Sensitivity Analysis to Improve Particle Filter Data Assimilation Accuracy
334
Using Residual Stresses to Develop CMOS-compatible RF MEMS Switches
335
Using Residual Times to Meet Deadlines in M/G/C Queues
336
Using residual vector quantization for image content classification
337
Using Residue Number System for Edge Detection in Digital Images processing
338
Using Residue Number Systems for improving QoS and error detection & correction in Wireless Sensor Networks
339
Using resistive loading to control the radiation efficiency of a spiral antenna
340
Using resolution enhancement compression to reduce variance of scatterer size estimates from ultrasonic backscattered signals
341
Using resonating filter banks and energy levels to detect signal transitions in complex sound fields
342
Using resource and portfolio management solution to align IT investment with business
343
Using resource balancing to configure modular systems
344
Using Resource based Modeling to Evaluate Coordination Schemes in Wireless Sensor Networks
345
Using resource monitoring to select recovery strategies
346
Using Resource of Classroom and Content of Textbook to Build Immersive Interactive Learning Playground
347
Using Resource Pools for Pre-Signaled Restoration LSP in ASON Networks
348
Using Resource Space Model for Managing Nested Table
349
Using resource-bonded sensing in telerobotics
350
Using resource-level information into nonadditive negotiation models for cloud Market environments
351
Using Resource-Limited Nash Memory to Improve an
Othello
Evaluation Function
352
Using resources across educational digital libraries
353
Using resources provided by cell broadband engine in order to develop an application of hierarchical data clustering
354
Using respiratory resistance values in diagnosis of paradoxical Vocal Fold Motion
355
Using Response Surface Methodology To Link Force Structure Budgets To Campaign Objectives
356
Using response surfaces and expected improvement to optimize snake robot gait parameters
357
Using Responsibilities for Early Identification of Hot Spots Reused in Frameworks Modeling
358
Using responsive loads as a tool for congestion management and system loss reduction
359
Using REST Web-Services Architecture for Distributed Simulation
360
Using restricted loops in genetic programming for image classification
361
Using Restructured Electricity Markets in the Hydrogen Transition: The PJM Case
362
Using retransmission information in a black side data link layer
363
Using retreats to build teamwork
364
Using return ratios to design microwave oscillators
365
Using returns policies to coordinate the supply chain with a utility risk measure retailer
366
Using Revenue Management to Determine Pricing of Reservations
367
Using reverberation chamber for vehicle radiated emission measurement
368
Using reverberation chambers for EM measurements
369
Using reverberation techniques for testing an intercommunications system on a navy aircraft (2001: a test lunacy)
370
Using reverberation time estimates in blind separation of acoustic sources
371
Using Reverberation to Improve Range and Elevation Discrimination for Small Array Sound Source Localization
372
Using reverse blocking IGBTs in power converters for adjustable speed drives
373
Using reverse dynamic I-V characteristics of AlGaAs/GaAs optothyristor for pulsed power-switching applications
374
Using reverse-blocking IGBTs in power converters for adjustable-speed drives
375
Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That?
376
Using ReversePTP to distribute time in Software Defined Networks
377
Using Reversible Computation Techniques in a Parallel Optimistic Simulation of a Multi-Processor Computing System
378
Using reversible computing to achieve fail-safety
379
Using reversible jump MCMC for cognitive diagnostic model selection
380
Using revised string edit distance to sign language video retrieval
381
Using revolution, evolution, randomness and dead-ends in Educational Design
382
Using rewards to change a person´s behavior: A double-integrator output-feedback dynamic control approach
383
Using reward-weighted imitation for robot Reinforcement Learning
384
Using Reward-weighted Regression for Reinforcement Learning of Task Space Control
385
Using Rewriting Logic to Match Patterns of Instructions from a Compiler Intermediate Form to Coarse-Grained Processing Elements
386
Using rewriting rules and positive equality to formally verify wide-issue out-of-order microprocessors with a reorder buffer
387
Using RF filtering to reduce competitor-induced interference
388
Using RF recording techniques to resolve interference problems
389
Using RF Recording Techniques to Resolve Wireless Channel Interference Problems
390
Using RF Repeaters to Improve WCDMA HSDPA Coverage and Capacity Inside Buildings
391
Using RF Repeaters to Improve WCDMA Speech Coverage and Capacity Inside Buildings
392
Using RF ultrasound to monitor the progression of muscular dystrophy through passive stretching
393
Using RFC4893 Violations to Reveal the Topology of AS Confederations
394
Using RFID for anti-theft in a Chinese electrical supply company: A cost-benefit analysis
395
Using RFID for Risk Mitigation and Location Assuredness of High-Value Goods
396
Using RFID in localization for indoor navigation of mobile robots
397
Using RFID in Supply Chain Management for Customer Service
398
Using RFID tags for tracking patients, charts and medical equipment within an integrated health delivery network
399
Using RFID tags to improve pilgrimage management
400
Using RFID Technologies to Capture Simulation Data in a Hospital Emergency Department
401
Using RFID Technology and SOA with 4D Escape Route
402
Using RFID technology for sensor purposes
403
Using RFID technology in finding position and tracking based on RSSI
404
Using RFID Technology in Ubiquitous Resort Hotel Construction
405
Using RFID technology on clinic’s pharmacy operation management and development of intelligent medicine dispensing cabinet
406
Using RFID technology to develop an attendance system and avoid traffic congestion around kindergartens
407
Using RFID to Detect Interactions in Ambient Assisted Living Environments
408
Using RFID to evaluate evacuation behavior models
409
Using RFID to realize Human Computer Interaction
410
Using RFID-capable cell phones for creating an extended navigation assistance
411
Using rhetorical analysis to help undergraduates acquire effective professional writing skills
412
Using rhetorical annotations for generating video documentaries
413
Using rhythm awareness in long-term activity recognition
414
Using rhythmic features for Japanese spoken term detection
415
Using Rich Linguistic and Contextual Information for Tree-Based Statistical Machine Translation
416
Using Rich Multimedia Case Studies: Developing a Scalable Authoring Platform for Academia and Industry
417
Using rigidity analysis to probe mutation-induced structural changes in proteins
418
Using Rigorous Simulation to Support ISO 26262 Hazard Analysis and Risk Assessment
419
Using rinse resistivity to reduce UPW usage
420
Using Ripley´s K-function to improve graph-based clustering techniques
421
Using rising pitch as a communication metaphor: an empirical investigation
422
Using risk analyses in a multi criteria decision making framework for evaluation of hydropower maintenance projects
423
Using risk analysis to improve testing and maintenance
424
Using risk assessment to mitigate new business demands uncertainties
425
Using Risk in Access Control for Cloud-Assisted eHealth
426
Using risk management to balance agile methods: A study of the Scrum process
427
Using risk matrix as an inherent risk tool at preliminary design stage for inherently safer design
428
Using risk to balance agile and plan-driven methods
429
Using rival penalized competitive clustering for feature indexing in Hong Kong´s textile and fashion image database
430
Using RMA for evaluating design decisions
431
Using rma monte carlo analysis as part of the systems engineering design process
432
Using road IDs to enhance clustering in vehicular ad hoc networks
433
Using roadmap profiling to enhance the warning message dissemination in vehicular environments
434
Using Robot Based Learning to Enhance CS Curriculum Delivery
435
Using robot mobility to exploit multipath fading
436
Using robot skills for flexible reprogramming of pick operations in industrial scenarios
437
Using robotic exploratory procedures to learn the meaning of haptic adjectives
438
Using robotic technology as a constructionist mindtool in knowledge construction
439
Using Robotics as a Learning Tool in Latin America and Spain
440
Using robotics educational module as an interactive STEM learning platform
441
Using robotics for STEM education in primary/elementary schools: Teachers´ perceptions
442
Using Robotics To Assist In Determining Cognitive Age Of Very Young Children
443
Using robotics to teach software engineering
444
Using Robotis Bioloid systems for instructional Robotics
445
Using Robots and Animals as Motivational Tools in ICT Courses
446
Using Robots and Contract Learning to Teach Cyber-Physical Systems to Undergraduates
447
Using robots as a means of integrating manufacturing systems engineering education
448
Using robots for astronaut training
449
Using robots in an undergraduate artificial intelligence course: an experience report
450
Using robots to help people habituate to visible disabilities
451
Using robots to increase the accuracy of surgical interventions
452
Using Robots to Raise Interest in Technology Among Underrepresented Groups
453
Using robots to teach programming to K-12 teachers
454
Using robust adaptive mixing for statistical fault macromodelling
455
Using robust and simplified geometric models in skill-based manipulation
456
Using robust Capon beamforming to minimise the impact of angle of arrival errors in 2-D arrays
457
Using robust design as a conceptual framework to understand expertise
458
Using Robust Estimation for Visual Servoing Based on Dynamic Vision
459
Using robust features with multi-class SVMs to classify noisy sounds
460
Using robust methods for automatic extraction of buildings
461
Using Robust PCA to estimate regional characteristics of language use from geo-tagged Twitter messages
462
Using robust portfolio modeling to selecting of New Product Development projects
463
Using robust principal component analysis to alleviate day-to-day variability in EEG based emotion classification
464
Using robust regressions and residual analysis to verify the reliability of LS estimation: Application in robotics
465
Using ROC curves and AUC to evaluate performance of no-reference image fusion metrics
466
Using Rogowski coils for transient current measurements
467
Using Rogowski coils inside protective relays
468
Using role interaction nets in designing embedded systems for supporting coordinated work
469
Using Role Knowledge for Service Configuration in SOA-based Enterprise Representation
470
Using role sets to engage and persuade visitors of Web sites that promote safe sex
471
Using role theory in monitoring web group learning systems
472
Using role-based control to produce locomotion in chain-type self-reconfigurable robots
473
Using Role-Based Modeling Language (RBML) to characterize model families
474
Using RoleOf relationship in design pattern instantiation
475
Using Roll-Angle Measurements to Track Aicraft Maneuvers
476
Using root distribution of specific functions in signal recovery from nonuniform samples
477
Using Rotatable and Directional (R&D) Sensors to Achieve Temporal Coverage of Objects and Its Surveillance Application
478
Using Rotatable Planar Phase Shifting Surfaces to Steer a High-Gain Beam
479
Using rotation for steerable needle detection in 3D color-Doppler ultrasound images
480
Using Rotoscopy Technique to Assist the Teaching of Handwriting for Children with Dyspraxia
481
Using Rough Reducts Based SVM Ensemble for SAR of the Ethofenprox Analogous of Pesticide
482
Using Rough Set and Fuzzy Method to Discover the Effects of Acid Rain on the Plant Growth
483
Using Rough Set and Support Vector Machine for Network Intrusion Detection System
484
Using rough set based multi-checkpointing for fault-tolerance scheduling in economic grids
485
Using Rough Set in Assessing Website´s Service Quality
486
Using rough set theory for mining the level of hearing loss diagnosis knowledge
487
Using rough set theory to construct e-learning faq retrieval infrastructure
488
Using Rough Set Theory to Recruit and Retain High-Potential Talents for Semiconductor Manufacturing
489
Using Rough Set theory to support OWSs semantic reasoning
490
Using Rough Set to Support Investment Strategies of Rule-Based Trading with Real-Time Data in Futures Market
491
Using rough sets for decision making in ambient information environments
492
Using rough sets for optimal cost evaluation in supply chain management
493
Using rough sets for rough classification
494
Using rough sets in homophily based link prediction in online social networks
495
Using rough sets techniques as a fault diagnosis classifier for induction motors
496
Using rough sets theory and database operations to construct a good ensemble of classifiers for data mining applications
497
Using rough sets to build-up Web-based one to one customer services
498
Using rough sets to construct sense type decision trees for text categorization
499
Using rough sets to edit training set in k-NN method
500
Using Round-Robin Tracepoints to debug multithreaded HLS circuits on FPGAs
501
Using router Diffserv mechanisms to implement military QoS
502
Using routers to build logic circuits: How powerful is BGP?
503
Using Routing Optimization in Next Generation Network to Achieve High QoS
504
Using routing zones to support route maintenance in ad hoc networks
505
Using roving STARs for on-line testing and diagnosis of FPGAs in fault-tolerant applications
506
Using Row Operation Unit to Realize Reconfigurable Ternary Optical Processor
507
Using RPC Detectors as a Cosmic Rays Monitor in the Naples Area
508
Using RPC Detectors as Cosmic Rays Monitor
509
Using Rprop for on-line learning of inverse dynamics
510
Using RRNS Codes for Cluster Faults Tolerance in Hybrid Memories
511
Using RS and GIS technique to monitor China urbanization development
512
Using RS and GIS to monitoring Beijing wetland resources evolution
513
Using RSDM to mine socio-economic indicators
514
Using RSL for the Formal Specification of PopOrg-based Multiagent Systems Organizations
515
Using RSM Techniques to Contour Plot Response Distributions of Semiconductor Processes
516
Using RSS to support ubiquitous learning based on media richness theory
517
Using RSS with difference method in localization algorithm for sensor networks
518
Using RSSI parameter in tracking methods — Practical test
519
Using RSSI value for distance estimation in wireless sensor networks based on ZigBee
520
Using RSUs as delegates for pervasive access to services in vehicle ad hoc networks
521
Using RTAI/LXRT for partitioning in a prototype implementation of the DECOS architecture
522
Using RTCP to evaluate the QoS of multi-path transmission
523
Using RTL statespace information and state encoding for induction based property checking
524
Using RTL-to-C++ translation for large soc concurrent engineering: a case study
525
Using RTOS in the AAA methodology automatic executive generation
526
Using R-trees in content-based region query with spatial bounds
527
Using RTT Variability for Adaptive Cross-Layer Approach to Multimedia Delivery in Heterogeneous Networks
528
Using rubrics in IT: Experiences of assessment and feedback at Deakin University
529
Using Rugby MSF Broadcast for Time Division Multiplexing Synchronisation in a Housing Community Sensor Network
530
Using Rule Based Expert System to Wrap Procedural Code of Integrated Watershed Model
531
Using rule induction for prediction of self-injuring behavior in animal models of development disabilities
532
Using rule induction methods to analyze gene expression data
533
Using rule mining to understand appliance energy consumption patterns
534
Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
535
Using rule sets to maximize ROC performance
536
Using rule-based context knowledge to model table-top scenes
537
Using Rule-based Fuzzy Cognitive Maps to Model Dynamic Cell Behavior in Voronoi Based Cellular Automata
538
Using Rule-based Knowledge to Improve LVCSR
539
Using rule-free sets to find frequent itemsets
540
Using RuleML and database metadata for automatic generation of web forms
541
Using RuleML to specify cross-domain information flow control policies
542
Using Rules and Data Dependencies for the Recovery of Concurrent Processes in a Service-Oriented Environment
543
Using Rules for Web Service Client Side Testing
544
Using rules in a workflow model for planning and scheduling
545
Using rules to improve letter to sound conversion of names
546
Using Rules to Investigate the Differences in Partonomy between Biomedical Ontologies
547
Using Running Subtraction to Detect the Wavefront of Cortical Spreading Depression
548
Using run-time checking to provide safety and progress for distributed cyber-physical systems
549
Using run-time data for program comprehension
550
Using run-time reconfiguration for fault injection applications
551
Using run-time reconfiguration for fault injection applications
552
Using run-time reconfiguration for fault injection in hardware prototypes
553
Using run-time reconfiguration for fault injection in hardware prototypes
554
Using Run-Time Reconfiguration to Implement Fault-Tolerant Coarse Grained Reconfigurable Architectures
555
Using Runtime Verification to Design a Reliable Execution Framework for Scientific Workflows
556
Using RZ DPSK-Based Transponders for Upgrades on Existing Long-Haul Submarine WDM Systems
557
Using SaaS and Cloud Computing for On Demand E Learning Services Application to Navigation and Fishing Simulator
558
Using saddle points for subpixel feature detection in camera calibration targets
559
Using SADTs to support irregular computational problems
560
Using safe operation regions to assess the error probability of logic circuits due to process variations
561
Using Safety Contracts to Guide the Integration of Reusable Safety Elements within ISO 26262
562
Using Sagittal Mapping analysis for fuzzy decomposition
563
Using salient region constraints on Active Appearance Model initialization for facial feature extraction
564
Using salt and pepper noise detection and removal based on neighbor pixels in gray-scale images
565
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning
566
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
567
Using SAML Callout to Realize Access Restriction for Geospatial Grid Services
568
Using SAML to protect the session initiation protocol (SIP)
569
Using SAR Images to Detect Ships From Sea Clutter
570
Using SAT & ILP techniques to solve enhanced ILP formulations of the Clustering Problem in MANETS
571
Using SAT for combinational equivalence checking
572
Using SAT for verification in the presence of unknowns
573
Using SAT scores as predictors for future academic success
574
Using SAT techniques in dynamic burn-in vector generation
575
Using SAT-based craig interpolation to enlarge clock gating functions
576
Using satellite altimetry and historical gauge data for validation of the hydrological significance of the JERS-1 SAR (GRFM) mosaics in central Africa
577
Using satellite communication for aircraft automatic dependent surveillance
578
Using satellite data into productivity model
579
Using satellite data to calibrate in-situ temperature measurements and to improve their assimilation into MODAS
580
Using satellite imagery and rainfall data to track climate variability in South Africa
581
Using satellite imagery to observe the habitat of Dongsha Atoll crest
582
Using Satellite Images To Estimate Rainfall In Northern Latitudes
583
Using Satellite Information As A Tool For Range Management
584
Using satellite radar data to map and monitor variations in Great Lakes ice cover
585
Using Satellite Remote Sensing to Assess and Monitor Ecosystem Integrity and Climate Change in Canadas National Parks
586
Using satellite remote sensing to produce a terrain cover database for the UK-a pilot study
587
Using Satellite-Derived SST Fronts to Evaluate an Eddy Resolving Numerical Circulation Model
588
Using satellites
589
Using satellites to help people make a bigger profit
590
Using satellites to predict earthquakes, volcano eruptions, identify and track tsunamis from space
591
Using satellites¿receiving the signal
592
Using Satisfaction Arguments to Enhance i* Modelling of an Air Traffic Management System
593
Using satisfiability in application-dependent testing of FPGA interconnects
594
Using saturated SiGe HBTs to realize ultra-low voltage/power X-band low noise amplifiers
595
Using saturation detection to shorten the training duration for Gaussian ANNs
596
Using saturation effects in a nonlinear amplifying loop mirror for multilevel phase-preserving amplitude regeneration
597
Using SAW Filters to Process Two-Dimensional Data by Means of the Radon Transform
598
Using SBS loop for extinction ratio enhancement and flatness improvement in optical comb generation
599
Using SBVR, REST and relational databases to develop information systems native to the digital ecosystem
600
Using SCADA Data Fusion by Swarm Intelligence for Wind Turbine Condition Monitoring
601
Using SCADA for energy management and waste detection [paper industry]
602
Using scaffolded, integrated, and reflexive analysis (SIRA) of cases in a cyber-enabled learning infrastructure to develop moral reasoning in engineering students
603
Using Scaffolding to Improve Written Communication of Software Engineering Students
604
Using scalable game design to promote 3D fluency: Assessing the AgentCubes incremental 3D end-user development framework
605
Using Scalable Video Coding for Dynamic Adaptive Streaming over HTTP in mobile environments
606
Using scalar fuzzy control for aggregation problems in knowledge based diagnosis for implantable devices
607
Using Scale Coordination and Semantic Information for Robust 3-D Object Recognition by a Service Robot
608
Using scale in content-based queries for spatial data
609
Using scale invariance for wide-band frequency modeling of power systems
610
Using scaled down testing to improve full scale intelligent transportation
611
Using Scaled Models for Wind Turbine EM Scattering Characterization: Techniques and Experiments
612
Using scaled vehicles to investigate the influence of various properties on rollover propensity
613
Using scales in the multiobjective approach
614
Using scales in the multi-objective approach
615
Using scaling approach to estimate MRI RF field induced heating for small medical implant
616
Using scalp electrical biosignals to control an object by concentration and relaxation tasks: Design and evaluation
617
Using SCAN Bridge as an IEEE 1149.31 protocol addressable, multi-drop, backplane test bus
618
Using scan technology for debug and diagnostics in a workstation environment
619
Using Scan-Dump Values to Improve Functional-Diagnosis Methodology
620
Using scanned electron beams for testing microstructure isolation and continuity
621
Using scattered data interpolation for radiosity reconstruction
622
Using scattering parameters to characterize EMI filters
623
Using scenario analysis as an alternative to task analysis
624
Using Scenario Oriented Response-time Management for Composite Web Services
625
Using scenarios in deficiency-driven requirements engineering
626
Using Scenarios to Discover Requirements for Engine Control Systems
627
Using scenarios to showcase how RPAS can be implemented in border surveillance
628
Using scenarios to systematically support goal-directed elaboration for information system requirements
629
Using scene constraints during the calibration procedure
630
Using scene features to improve wide-area video surveillance
631
Using scene-change detection and multiple-thread background memory for efficient video coding
632
Using SchedFlow for performance evaluation of workflow applications
633
Using schedule simulation approaches to reduce greenhouse gas emissions in highway construction project
634
Using SCIELAB for image and video quality evaluation
635
Using Science-Fiction Prototyping as a Means to Motivate Learning of STEM Topics and Foreign Languages
636
Using SciLab for building of virtual lab
637
Using SCL to specify and check design intent in source code
638
Using Scope-agent to Improve MAODV Protocol
639
Using scoping rules as a distributed coordination language
640
Using SCOR as a supply chain management framework for government agency contract requirements
641
Using score-informed constraints for NMF-based source separation
642
Using scout clusters for motion planning
643
Using scouts to predict swarm success rate
644
Using scratchpad to exploit object locality in Java
645
Using Scrum and Wikis to manage student major projects
646
Using Scrum for Software Engineering Class Projects
647
Using Scrum in Distributed Agile Development: A Multiple Case Study
648
Using Scrum in Global Software Development: A Systematic Literature Review
649
Using Scrum in small teams: Combining case study with grounded theory
650
Using scrum to teach software engineering: A case study
651
Using SCTP to hide latency in MPI programs
652
Using SCTP to improve performances of hybrid broadcast/telecommunication network system
653
Using SDE to achieve the stable and statistical analyses for TCP/RED flows
654
Using SDF method for simultaneous location of multiple radio transmitters
655
Using SDL a tool for system simulations
656
Using SDL for implementing a wireless medium access control protocol
657
Using SDL in embedded systems design: a tool for generating real-time OS pSOS based embedded systems applications software
658
Using SDL to model an object-oriented real-time software architectural design
659
Using SDN as a key enabler for co-primary spectrum sharing
660
Using SDN for Cloud Services Provisioning: The XIFI Use-Case
661
Using SDN in centralized data centers in power communication networks for disaster recovery
662
Using SDN technology to enable cost-effective bandwidth-on-demand for cloud services
663
Using sdn technology to enable cost-effective bandwidth-on-demand for cloud services [Invited]
664
Using SDN technology to mitigate congestion in the OpenStack data center network
665
Using SDRAMs for two-dimensional accesses of long 2
n
× 2
m
-point FFTs and transposing
666
Using SeaDataNet management system to preserve the XBT data-set of the Mediterranean Sea
667
Using Seafloor Arrays To Measure Sediment Seismoacoustic And Geotechnical Properties
668
Using Search Engine for Classification: Does It Still Work?
669
Using search engines and artificial neural networks for style checking
670
Using Search Methods for Selecting and Combining Software Sensors to Improve Fault Detection in Autonomic Systems
671
Using search to improve hidden Markov models
672
Using search-based metric selection and oversampling to predict fault prone modules
673
Using seas to assess GPS constellation resiliency in an urban canyon environment
674
Using Seasonal Time Series Analysis to Predict China´s Demand of Electricity
675
Using SeaWiFS Measurements to Evaluate Radiometric Stability of Pseudo-Invariant Calibration Sites at Top of Atmosphere
676
Using second generation SOPC boards for student design projects
677
Using second generation wavelets for ECG characteristics points detection
678
Using Second Life in ESL/EFL teaching and teacher-training in the Web2.0 environment
679
Using second order residue in PolInSAR phase unwrapping
680
Using second order sliding mode principle to design tracking controller for a kind of piezoelectric actuators
681
Using Secondary Evaporator For A Window Type Air-Conditioner
682
Using Secondary Resonances for Amplification of Short-Wave Radiation
683
Using second-order hidden Markov model to improve speaker identification recognition performance under neutral condition
684
Using sectioning to construct confidence intervals for quantiles when applying importance sampling
685
Using section-semantic relation structures to enhance the performance of Web search
686
Using sector information with linear genetic programming for intraday equity price trend analysis
687
Using Secure Multiparty Computation for Collaborative Information Exchange
688
Using Security and Dependability Patterns for Reaction Processes
689
Using Security and Domain Ontologies for Security Requirements Analysis
690
Using Security Context Pre-Transfer to Provide Security Handover Optimization for Vehicular Ad Hoc Networks
691
Using Security Logs for Collecting and Reporting Technical Security Metrics
692
Using security metrics coupled with predictive modeling and simulation to assess security processes
693
Using security metrics in software quality assurance process
694
Using security models to investigate CMW design and implementation
695
Using Security Patterns for Modelling Security Capabilities in Grid Systems
696
Using Security Patterns to Combine Security Metrics
697
Using security policies in a network securing process
698
Using Security Proxy Based Trusted Computing Enhanced Grid Security Infrastructure
699
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation
700
Using SEE and SaaS-QUAL to Explore the Demand of CRM System
701
Using segmentation for confidentiality aware image storage and retrieval on clouds
702
Using segmentation in CT metal artifact reduction
703
Using Segmentation to Control the Retrieval of Data
704
Using Segmentation to Verify Object Hypotheses
705
Using segmented 3D point clouds for accurate likelihood approximation in human pose tracking
706
Using segmented fields to treat the breast
707
Using selected-plaintext sets for efficient evaluation of EM information leakage from cryptographic devices
708
Using selection to improve particle swarm optimization
709
Using selective asymptotics to accelerate dispersion analysis of microstrip lines
710
Using selective partial update-selective regressor affine projection algorithms for adaptive equalization in underwater acoustic communications
711
Using selective path-doubling for parallel shortest-path computations
712
Using Selective Sampling for the Support of Scalable and Efficient Network Anomaly Detection
713
Using selective voltage binning to maximize yield
714
Using Selective Voltage Binning to Maximize Yield
715
Using self organising feature maps for feature selection in supervised neural networks
716
Using Self Organized Mapping to Seek Refactorable Code Clone
717
Using self organizing map in wireless sensor network for designing energy efficient topologies
718
Using Self Organizing Map to cluster Arabic crime documents
719
Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme
720
Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme
721
Using Self-Announcer Approach for Resource Availability Detection in Grid Environment
722
Using self-assembly for the fabrication of nano-scale electronic and photonic devices
723
Using Self-Assessments for Predicting the Success of Study
724
Using Self-Configurable Particle Swarm Optimization for Allocation Position of Rescue Robots
725
Using self-correction for min-sum based decoding algorithms of LDPC codes
726
Using self-creating neural network for surface reconstruction
727
Using self-diagnosis to adapt organizational structures
728
Using self-directed work group concepts for successful classroom group experiences
729
Using Self-Driven AC–DC Synchronous Rectifier as a Direct Replacement for Traditional Power Diode Rectifier
730
Using Self-Feedback Controlled Colorless Fabry-Perot Laser Diode for Remote Control Free Single-Mode DWDM-PON Transmission
731
Using Self-Histories to Predict Store Visits in Indoor Retail Environments for Mobile Advertising: A Ranked-Based Technique
732
Using Self-Imitation to Direct Learning
733
Using Self-led Critical Friend Topology Based on P2P Chord Algorithm for Node Localization within Cloud Communities
734
Using self-organising feature maps for the control of artificial organisms
735
Using self-organising maps to classify radar range profiles
736
Using self-organization for functional integrity maintenance of wireless sensor networks
737
Using self-organized and supervised learning neural networks in parallel for automatic target recognition
738
Using self-organizing artificial neural networks for solving uncertain dynamic nonlinear system identification and function modeling problems
739
Using Self-Organizing Feature Maps and Data Mining to Analyze Liability Authentications of Two-Vehicle Traffic Crashes
740
Using self-organizing incremental neural network (SOINN) For radial basis function networks
741
Using Self-Organizing Map and Data Mining Measurements to Improve Thai-English Statistical Machine Translation
742
Using Self-Organizing Map and Heuristics to Identify Small Statistical Areas Based on Household Socio-Economic Indicators in Turkey´s Address Based Population Register System
743
Using Self-Organizing Map in Backbone Formation for Wireless Sensor Networks
744
Using self-organizing map in identification of load-loss state
745
Using self-organizing maps approach to pipeline localization
746
Using self-organizing maps for analyzing credit rating and financial ratio data
747
Using self-organizing maps for anomaly detection in hyperspectral imagery
748
Using Self-Organizing Maps for Fraud Prediction at Online Auction Sites
749
Using self-organizing maps for identification of roles in social networks
750
Using Self-Organizing Maps in constrained ensemble clustering framework
751
Using self-organizing maps to control physical robots with omnidirectional drives
752
Using self-organizing maps to learn geometric hash functions for model-based object recognition
753
Using self-reconfigurable workplaces to automate the maintenance of evolving business applications
754
Using Self-Reconfiguration to Increase Manufacturing Yield of CNTFET-based Architectures
755
Using Self-Regulation Theory to Inform Technology-Based Behavior Change Interventions
756
Using Self-Synchronization Error Dynamics Formulation Based Controller for Maximum Photovoltaic Power Tracking in Micro-Grid Systems
757
Using self-training and graph laplacian in semi-supervised band selection for hyperspectral image classification
758
Using semantic and structural similarities for indexing and searching scientific papers
759
Using semantic annotation for ontology based decision support in product family design
760
Using Semantic Association to Extend and Infer Literature-Oriented Relativity Between Terms
761
Using semantic class information for rapid development of language models within ASR dialogue systems
762
Using Semantic clustering to enhance the navigation structure of Web sites
763
Using Semantic Commonsense Resources in Image Retrieval
764
Using Semantic Component Interfaces in Software Engineering Training
765
Using semantic data models in knowledge-based manufacturing-workcell design
766
Using semantic dependencies to mine depressive symptoms from consultation records
767
Using semantic differencing to reduce the cost of regression testing
768
Using Semantic Documents and Social Networking in Authoring of Course Material: An Empirical Study
769
Using Semantic Features for Scene Classification: how Good do they Need to Be?
770
Using semantic features to improve large-scale visual concept detection
771
Using semantic fields to model dynamic spatial relations in a robot architecture for natural language instruction of service robots
772
Using Semantic Graphs for Image Search
773
Using Semantic Graphs in Clustering Process : Enhance Information Level
774
Using Semantic Inference for Software Understanding and Design Recovery
775
Using semantic information for web usage mining based recommendation
776
Using semantic information to guide efficient parallel I/O on clusters
777
Using semantic information to improve transparent query caching for dynamic content Web sites
778
Using semantic knowledge of distributed objects to increase reliability and availability
779
Using semantic knowledge of partitioning and allocation of data in distributed databases
780
Using Semantic Negotiation for Ontology Enrichment in e-Learning Multi-agent Systems
781
Using Semantic Networks for Assessment of Learners´ Answers
782
Using semantic networks for knowledge representation in an intelligent environment
783
Using semantic networks to counter cyber threats
784
Using semantic policies for ad-hoc coalition access control
785
Using semantic policies for ad-hoc coalition access control
786
Using Semantic Policies to Reason over User Availability
787
Using Semantic Roles for Coreference Resolution
788
Using semantic search to reduce cognitive load in an electronic health record
789
Using Semantic Services in Service-Oriented Information Systems
790
Using Semantic Similarities to Instrument Informal Learning Activities in Ubiquitous Environments
791
Using semantic similarity matrix for defining operations involved in NTSO for clustering 20NewsGroups
792
Using semantic similarity model to improve OGC web services matching accuracy
793
Using semantic similarity to detect features in yeast protein complexes
794
Using semantic technologies for dynamic and flexible trip planning
795
Using semantic technologies to describe robotic embodiments
796
Using Semantic Technologies to Enhance a Requirements Engineering Approach for Alignment of IT with Business Strategy
797
Using semantic technologies to improve grid resource management
798
Using semantic technologies to promote interoperability between electronic healthcare records´ information models
799
Using Semantic Web for Information Retrieval Based on Clonal Selection Strategy
800
Using Semantic Web Ontologies for better inter-operability on social network sites
801
Using Semantic Web Resources to Translate Existing Files Between CIM and IEC 61850
802
Using Semantic Web Services technology for simulating collaborative learning activities: An approach based on ITSs´ and e-learning standards extension
803
Using Semantic Web Technologies for Exploratory OLAP: A Survey
804
Using semantic web technologies for quality measure phenotyping algorithm representation and automatic execution on EHR data
805
Using Semantic Web Technologies for RBAC in Project-Oriented Environments
806
Using Semantic Web technologies for ubiquitous computing
807
Using Semantic Web Technologies in a Web Based System for Personalized Learning AI Course
808
Using Semantic Web Technologies in Visualizing Medicinal Vocabularies
809
Using Semantic Web Technologies to Analyze Learning Content
810
Using semantic web technologies to integrate models to analytical tools
811
Using semantic web technologies to manage complexity and change in biomedical data
812
Using Semantic Web Technologies to Specify Constraints of RBAC
813
Using Semantic Web Technology for Self-Management of Distributed Object-Oriented Systems
814
Using semantic Web technology to automate data integration in grid and Web service architectures
815
Using semantic Web technology to enhance current business-to-business integration approaches
816
Using semantic Web to build and execute ad-hoc processes
817
Using semantic web to reduce the cold-start problems in recommendation systems
818
Using semantic Wikis as collaborative tools for geo-ontology
819
Using Semantic Wikis for User Information Management in E-Business
820
Using Semantically Linked Content to Support Creativity in Product Innovation
821
Using Semantics for Dynamic Access Control of XML Documents in Dynamic Coalition Environment
822
Using Semantics for News Navigation
823
Using semantics for paragraph selection in question answering systems
824
Using Semantics for Resource Allocation in Computing Service Providers
825
Using Semantics for Speech Annotation of Images
826
Using semantics in INES, an Intelligent Educational System
827
Using Semantics in Predictive Big Data Analytics
828
Using semantics in the selection mechanism in Genetic Programming: A simple method for promoting semantic diversity
829
Using semantics to facilitate data integration of offshore wind farms
830
Using semantics to learn about routing data for improved network management in the Future Internet
831
Using Semantics-Enabled Information Retrieval in Requirements Tracing: An Ongoing Experimental Investigation
832
Using Seme Based Graph to Estimate Chinese Lexical Semantic Relatedness
833
Using semi-blind source separation in multi-sensor fault location of satellite attitude determination system
834
Using Semiconductor-Optical Amplifiers With Constant Envelope WDM Signals
835
Using semicontrollable interfaces in testing army communications protocols: application to MIL-STD 188-220B
836
Using semiconvex duality and max-plus analysis to obtain a new fundamental solution for the differential riccati equation
837
Using semidefinite programming for L
1
identification of the ARX model
838
Using Semidefinite Relaxation to Solve the Day-Ahead Hydro Unit Commitment Problem
839
Using semidefinite relaxation to solve the day-ahead hydro unit commitment problem
840
Using Semi-discrete Decomposition for Topic Identification
841
Using semi-implicit representation of algebraic surfaces
842
Using Semiotic Inspection Method to Evaluate a Human-Robot Interface
843
Using Semiotic Profiles to Design Graphical User Interfaces for Social Media Data Spaces on Mobile Phone Screens
844
Using semi-supervised clustering to improve regression test selection techniques
845
Using semi-supervised learning in multi-label classification problems
846
Using Semi-Supervised Learning to Build Bayesian Network for Personal Preference Modeling in Home Environment
847
Using SEND Signature Algorithm Agility and Multiple-Key CGA to Secure Proxy Neighbor Discovery and Anycast Addressing
848
Using SenseCam for Capturing Ubiquitous Learning Log
849
Using sensitivity analysis to validate a state variable model of the software test process
850
Using sensitivity analysis to validate Bayesian networks for airplane subsystem diagnosis
851
Using sensitivity coefficients for power swing protection
852
Using sensitivity of a bayesian network to discover interesting patterns
853
Using Sensor and Location Information for Context-Aware Access Control
854
Using sensor enabled augmented reality for healthcare
855
Using sensor fusion and contextual information to perform event detection during a phase-based manipulation task
856
Using sensor fusion in a time-triggered network
857
Using sensor habituation in mobile robots to reduce oscillatory movements in narrow corridors
858
Using Sensor Information to Reduce the Carbon Footprint of Perishable Goods
859
Using Sensor Inputs to Affect Virtual and Real Environments
860
Using Sensor Morphology for Multirobot Formations
861
Using sensor networks for highway and traffic applications
862
Using Sensor Networks for Pedestrian Detection
863
Using sensor networks to detect urinary tract infections in older adults
864
Using sensor pattern noise for camera model identification
865
Using sensor technology to augment traditional healthcare
866
Using sensor technology to protect an endangered species: A case study
867
Using Sensor Web Processes and Protocols to Assimilate Satellite Data into a Forecast Model
868
Using sensorml to describe scientific workflows in distributed Web Service environments
869
Using sensors and data-loggers in an integrated mobile school-lab setting to teach Light and Optics
870
Using sensors and labeled graphs to detect the space confusion´s problem of patients suffering from Alzheimer´s disease
871
Using sensors to bridge the gap between real places and their web-based representations
872
Using sensory data fusion methods for infant body posture assessment
873
Using sensory-motor phase-plots to characterise robot-environment interactions
874
Using sentiment analysis to measure the effects of leaders in global software development
875
Using sentiment orientation features for mood classification in blogs
876
Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?
877
Using SentiWordNet for multilingual sentiment analysis
878
Using separable functional network for function approximation
879
Using separable game theory to develop adaptive algorithms for joint codeword optimization and power control in cdma systems
880
Using separate algorithms to process read-only transactions in real-time systems
881
Using separation and composition of concerns to build multiuser virtual environments
882
Using Sequence Analysis to Classify Web Usage Patterns across Websites
883
Using Sequence Diagram to Support Aspect-Oriented Programming in MDA
884
Using Sequence Diagrams to Detect Communication Problems between Systems
885
Using sequence diagrams to document Web elements´ unknown behavior
886
Using sequence number compensation to design DCCP partial reliability extension
887
Using sequences of movement dependency graphs to form object categories
888
Using sequential and non-sequential patterns in predictive Web usage mining tasks
889
Using sequential approximate optimization and a genetic algorithm to calibrate agent-based models
890
Using Sequential Context for Image Analysis
891
Using sequential floating forward selection algorithm to detect epileptic seizure in EEG signals
892
Using Sequential Kalman Filters for State Estimation of Nonlinear Systems
893
Using Sequential Pattern Mining and Interactive Recommendation to Assist Pipe-like Mashup Development
894
Using serial bluetooth converters as a sensor link in networked control systems
895
Using Serial Resistors to Reduce the Power Consumption of Resistive Touch Panels
896
Using series capacitors to mitigate voltage flicker problems
897
Using serious game to simplify algorithm learning
898
Using Serious Games to Motivate Children with Cystic Fibrosis to Engage with Mucus Clearance Physiotherapy
899
Using serious games to train evacuation behaviour
900
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis
901
Using server side XML to create individualized Web pages
902
Using servers to enhance control system capability
903
Using server-to-server communication in parallel file systems to simplify consistency and improve performance
904
Using service brokers for accessing backend servers for web applications
905
Using Service Challenge-based Evaluations for the systematic innovation of proactive remote services — An industry case study
906
Using service models for management of Internet services
907
Using Service Orientation to Drive Business Processes
908
Using Service Oriented Architecture in a Generic Virtual Power Plant
909
Using service oriented architecture in a new anonymous mobile payment system
910
Using Service Patterns to Achieve Web Service Composition
911
Using service records to improve documentation accuracy and usability
912
Using service specific proxies to migrate web services to the "Wireless web": an illustrative case study of adaptive maintenance
913
Using service utilization metrics to assess the structure of product line architectures
914
Using Service-Based GIS to Support Earthquake Research and Disaster Response
915
Using service-learning and global virtual team projects to integrate sustainability into the technical communication curriculum
916
Using SESAME to implement role based access control in Unix file systems
917
Using SESAME´s GSS-API to add security to Unix applications
918
Using Session Identifiers as Authentication Tokens
919
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
920
Using S-estimators in parameter identification
921
Using Set Operations to Deal with the Frame Problem
922
Using Set Theoretic Estimation to Address the PAPR Problem of Spectrum-Constrained Signals
923
Using Set Theoretic Estimation to Implement Shannon Secrecy
924
Using Set-Based Heading to Improve Mobile Agent Movement
925
Using seven-level cascade H-bridge inverter with HVDC system to improve power quality
926
Using Sex Differences to Link Spatial Cognition and Program Comprehension
927
Using SGML to create complex interactive documents for electronic publishing
928
Using SGML to produce reusable technical documentation
929
Using Shaded Views in 3D Multiview Representation of Monotonous Polyhedron
930
Using shadow lines to assure accurate signal return current in electrical package analysis codes
931
Using shadow pointers to trace C pointer values in FPGA circuits
932
Using Shannon entropy and Kolmogorov complexity to study the language and intelligence of ants
933
Using Shannon Entropy in ETL Processes
934
Using Shannon´s Information Theory and Artificial Neural Networks to Implement Multimode Authentication
935
Using shape analysis to verify graph transformations in model driven design
936
Using shape distributions as priors in a curve evolution framework
937
Using shape feature matching to track moving objects in image sequences
938
Using shape priors for improved lip segmentation
939
Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation
940
Using Shaped Beam Patterns for Tracking
941
Using shaped phase-thresholds for detecting moving targets in multiple-channel SAR
942
Using shape-generation code vectorization for modeling magnetic fields of spatial currents
943
Using Shared Arrays in Message-Driven Parallel Programs
944
Using Shared Beacon Channel for Fast Handoff in IEEE 802.11 Wireless Networks
945
Using Shared Leadership to Foster Knowledge Sharing in Information Systems Development Projects
946
Using shared library interposing for transparent application acceleration in systems with heterogeneous hardware accelerators
947
Using shared memory for read-mostly RPC services
948
Using Shared Memory to Accelerate MapReduce on Graphics Processing Units
949
Using shared parity disks to improve the reliability of RAID arrays
950
Using Shared Procedural Knowledge for Virtual Collaboration Support in Emergency Response
951
Using shared resource capacity for robust control of failure prone manufacturing systems
952
Using shared-packed forests in a GB parser
953
Using Shared-Resource Capacity for Robust Control of Failure-Prone Manufacturing Systems
954
Using sharing trees in the automated analysis of real-time systems with data
955
Using sheet steel in the construction of shielded rooms
956
Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository System
957
Using shiftable content addressable memories to double memory capacity on embedded systems
958
Using Ship Movement in the Irish Sea for MANET Evaluation
959
Using ship tracking methods to assist in quality controlling and bias adjusting meteorological observations in a marine environment
960
Using ship tracking methods to assist in quality controlling and bias adjusting meteorological observations in a marine environment
961
Using SHM-PWAM modulation technique for three-phase four-leg active power filter
962
Using SHOALS LIDAR system to detect bottom material change
963
Using Short Message Service (SMS) to deploy Android exploits
964
Using Short Synchronous WOM Codes to Make WOM Codes Decodable
965
Using short-circuit currents to perform a protective device coordination study
966
Using short-time Fourier transform and wavelet packet filter banks for improved frequency measurement in a Doppler robot tracking system
967
Using shunt resistive-feedback to design 3.1GHz ∼ 10.6GH ultra-wideband low noise amplifier with shunt resistive feedback
968
Using Shuttle Radar Topography Mission Elevation Data to Map Mangrove Forest Height in the Caribbean
969
Using SiC MOSFETs to improve reliability of EV inverters
970
Using side information to improved channel estimation for channels with fractionally-spaced medium rays
971
Using side scan sonar for relative navigation
972
Using side scan sonar in the characterization of the continental shelf: Touros area
973
Using side scan sonar to relative navigation
974
Using side-looking acoustic Doppler current profiler (ADCP) and Doppler radar systems to characterize a convergent surface front
975
Using SIFT features in palmprint authentication
976
Using SIFT for the Filtering of Chinese Text in Image of Multimedia Message Service
977
Using sigcomp and ROHC in wireless networks
978
Using SigComp to compress SIP/SDP messages
979
Using SiGe HBT technology for extreme environment electronics
980
Using SiGe technology in extreme environments
981
Using Sigma-Delta conversion for velocity estimation in bio-inspired detection system
982
Using signal cancellation for optimum beamforming in a cellular CDMA system
983
Using signal estimation for near-field plate optimization
984
Using SIGNAL for developing neural control systems
985
Using SIGNAL for developing neural control systems
986
Using Signal Processing and Semantic Web Technologies to Analyze Byzantine Iconography
987
Using signal processing techniques for DNA sequence comparison
988
Using signal processing techniques to characterise change in the dynamics of foreign exchange markets following political and economic events
989
Using signal processing techniques to model worm propagation over wireless sensor networks
990
Using signal processing technologies from the Radio Frequency domain in optics
991
Using signal processing to improve communications on the manufacturing shop floor
992
Using signal processing to improve throughput on meteor burst communications channels
993
Using Signal/Residual Information of Eigenfaces for PCA Face Space Dimensionality Characteristics
994
Using Signals from Text to Identify Roles within a Group
995
Using Signals from Two Gauges to Estimate MD Variations for CD Control Systems
996
Using signals of the global navigation satellites for diagnostics of above land troposphere refraction
997
Using signals scattered from diffuse inhomogeneities to correct for phase aberrations caused by a phase-screen far from the transducer
998
Using Signatures of Self-Organisation for Monitoring and Influencing Large Scale Autonomic Systems
999
Using signatures to improve URL routing
1000
Using signed digit arithmetic for low-power multiplication