<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using Significant Classification Rules to Analyze Korean Customers´ Power Consumption Behavior: Incremental Tree Induction using Cascading-and-Sharing Method
2
Using Significant, Positively Associated and Relatively Class Correlated Rules for Associative Classification of Imbalanced Datasets
3
Using silhouette for pose estimation of object with surface of revolution
4
Using silicon contacts to test and burn-in flash memory, microprocessors, and FPGAs
5
Using silicon device modeling techniques for GaAs devices
6
Using silicon injection phenomenon during fire-through contact formation to improve process control and performance of screen-printed multicrystalline-silicon solar cells
7
Using silicon-germanium mainstream BiCMOS technology for X-band and LMDS (25-30 GHz) microwave applications
8
Using silver and semi-gold standard corpora to compare open named entity recognisers
9
Using SIMAN in simulating manufacturing systems
10
Using SIMCA statistical software package to apply orthogonal projections to latent structures modeling
11
Using SIMD instructions for fast likelihood calculation in LVCSR
12
Using SIMD parallelism to support rule-based systems
13
Using SIMD technology to speed up likelihood computation in HMM-based speech recognition systems
14
Using similarity assessment in case-based reasoning to solve power system substation problems
15
Using similarity criteria to make negotiation trade-offs
16
Using similarity degree approach for shortest path in Intuitionistic fuzzy network
17
Using similarity learning to improve network-based gene function prediction
18
Using similarity measures for an efficient business information-exchange
19
Using Similarity Measures for Context-Aware User Interfaces
20
Using similarity measures for test scenario selection
21
Using similarity scores from a small gallery to estimate recognition performance for larger galleries
22
Using similarity-based selection in evolutionary design of decision trees
23
Using SIMIO for laparoscopic cholecystectomy(LC) surgery simulation
24
Using simio for simulation of ultrasound appointment
25
Using SIMIO for the specification of an integrated automated weighing solution in a Cement plant
26
Using Simio for wartime casualty treatment simulation
27
Using SIMM2 to model muscle length changes due to negative heel rocker sole modification
28
Using simple calibration load models to improve accuracy of Vector Network Analyzer measurements
29
Using simple coordinate logic operators to realize basic morphological operations
30
Using simple decomposition for smoothing and feature point detection of noisy digital curves
31
Using simple diffusion to synchronize the clocks in a distributed system
32
Using simple force feedback mechanisms as haptic visualization tools
33
Using Simple Gaussian Mixture Model for Multi-Class Classification Based on Tumor Gene Expression Data
34
Using simple harmonic motion to estimate walking distance for waist-mounted PDR
35
Using simple page placement policies to reduce the cost of cache fills in coherent shared-memory systems
36
Using simple relays to improve physical-layer security
37
Using simple remote evaluation to enable efficient application protocols in mobile environments
38
Using SIMPLE to support the teaching of signal processing through multimedia tools
39
Using simple tools to evaluate complex architectural trade-offs
40
Using SiMPLE++ For Improved Modeling Efficiencies And Extending Model Life Cycles
41
Using simplex algorithm to calculate the near-field power densities of aperture antennas
42
Using simplex codes to improve OTDR sensitivity
43
Using simplicity to control complexity
44
Using simplified discrete-event simulation models for health care applications
45
Using simply self-injection technology for low cost upstream signal in 10 Gbps TDM-PON
46
Using SimscapeTM to support system-level design
47
Using Simuiation To Explore Potential Improvements In An Existing Automated Assembly System
48
Using Simulated Annealing and Ant Colony Hybrid Algorithm to Solve Traveling Salesman Problem
49
Using Simulated Annealing Embedded Modified Gauss-Newton Algorithm to identify parameters of nonlinear degradation model
50
Using Simulated Annealing for Task Scheduling in Distributed Systems
51
Using simulated annealing in the minimisation of AND-EXOR functions
52
Using simulated annealing to calculate the trembles of trembling hand perfection
53
Using simulated annealing to design a material-handling system
54
Using simulated annealing to design digital transmission codes for analogue sources
55
Using simulated annealing to design good codes
56
Using simulated annealing to estimate parameters of optimal sensor array
57
Using Simulated Annealing to Find Lower Bounds of Localization with Noisy Measurements
58
Using simulated annealing to minimize operational costs in the steel making industry
59
Using simulated annealing to optimize receptive fields for MLP networks with ensemble encoding
60
Using simulated annealing to select least-cost assembly sequences
61
Using simulated annealing to solve the classroom assignment problem
62
Using simulated data in support of research on regression analysis
63
Using simulated data sets to compare data analysis techniques used for software cost modelling
64
Using Simulated Fault Injection for Fault Tolerance Assessment of Quantum Circuits
65
Using simulated students to evaluate an adaptive testing system
66
Using simulation & Joint Time/Frequency domain analysis to evaluate absorber/lossy material performance in resonant cavities
67
Using simulation analysis for mining project risk management
68
Using simulation and critical points to define states in continuous search spaces
69
Using simulation and daily-demand method to analyze the capacity utilization for product-mix in semiconductor fabrication
70
Using simulation and Data Envelopment Analysis in optimal healthcare efficiency allocations
71
Using Simulation and Evolutionary Algorithms to Evaluate the Design of Mix Strategies of Decoy and Jammers in Anti-Torpedo Tactics
72
Using simulation and genetic algorithms to improve cluster tool performance
73
Using simulation and hybrid sequencing optimization for makespan reduction at a wet tool
74
Using simulation and Markov modeling to select data flow threads
75
Using simulation and modeling for advanced SATCOM design verification and operational planning
76
Using Simulation and Modeling Tools in Teaching Computer Network Courses
77
Using simulation and neural networks to develop a scheduling advisor
78
Using simulation and optimization to inform army force structure reduction decisions
79
Using simulation and satisfiability to compute flexibilities in Boolean networks
80
Using simulation and visualization technologies to strengthen the design/construction interface
81
Using simulation as a teaching tool in an introductory operations management course
82
Using Simulation as a Tool for Business Process Innovation
83
Using simulation as an integral part of the power converter design process
84
Using simulation based approach to improve on the mean cycle time performance of dispatching rules
85
Using simulation early in the design of a fuel injector production line
86
Using simulation for assessing the real impact of test coverage on defect coverage
87
Using simulation for assessing the real impact of test-coverage on defect-coverage
88
Using simulation for design validation of switching power converters
89
Using simulation for design verification of bias power supply and its interactions in a multiple-converter system
90
Using simulation for economic policy analysis in the global agricultural supply chain
91
Using simulation for launch team training and evaluation
92
Using simulation for manufacturing process reengineering-a practical case study
93
Using simulation for option pricing
94
Using simulation for plant monitoring in real time
95
Using simulation for the economic evaluation of liver transplantation
96
Using simulation games to teach global software engineering courses
97
Using simulation in call centers
98
Using simulation in design of a cellular assembly plant with automatic guided vehicles
99
Using simulation in process engineering
100
Using simulation in semiconductor fabrication
101
Using simulation in the architectural concept phase of an emergency department design
102
Using simulation in the implementation of an Outpatient Procedure Center
103
Using simulation model to integrate production plan and dispatching system
104
Using simulation modeling to assess rail track infrastructure in densely trafficked metropolitan areas
105
Using simulation modeling to calculate WIP levels in semiconductor manufacturing
106
Using simulation optimization as a decision support tool for supply chain coordination with contracts
107
Using simulation platform to analyze radio modem security in SCADA
108
Using simulation techniques for continuous process verification in industrial system development
109
Using Simulation Techniques To Improve Skeletal Plans For The Control Of A Vertical, Internal Grinding Machine
110
Using simulation to analyze R&D value creation
111
Using simulation to analyze supply chains
112
Using simulation to approximate subgradients of convex performance measures in service systems
113
Using simulation to assess costs of quality
114
Using simulation to assist recruitment in seasonally dependant contact centers
115
Using simulation to benchmark traditional vs. activity-based costing in product mix decisions
116
Using simulation to build inspection efficiency benchmarks for development projects
117
Using Simulation to Characterize Topology of Peer to Peer Botnets
118
Using simulation to choose between rental car lot layouts
119
Using simulation to craft a national organ transplantation policy
120
Using simulation to determine the costs of offering caps on adjustable rate mortages
121
Using simulation to empirically investigate test coverage criteria based on statechart
122
Using simulation to evaluate buffer adjustment methods in order promising
123
Using simulation to evaluate call forecasting algorithms for inbound call center
124
Using simulation to evaluate cargo ship design on the LPD17 program
125
Using simulation to evaluate how multi-agent transportation planners cope with truck breakdowns
126
Using simulation to evaluate prediction techniques [for software]
127
Using simulation to evaluate site traffic at an automobile truck plant
128
Using Simulation to Evaluate the Impact of New Requirements Analysis Tools
129
Using simulation to examine appointment overbooking schemes for a medical imaging center
130
Using simulation to examine live-fire test configurations
131
Using simulation to explore distributed key-value stores for extreme-scale system services
132
Using simulation to explore the impact of inventory policies on supply chain performance
133
Using simulation to facilitate effective workflow adaptation
134
Using simulation to facilitate the study of software product line evolution
135
Using simulation to improve fault coverage of analog and mixed-signal test program sets
136
Using simulation to improve planning decisions in mixed-model assembly lines
137
Using simulation to influence foreign policy
138
Using Simulation to Investigate Requirements Prioritization Strategies
139
Using simulation to model of SCM Libyan cement factory
140
Using simulation to optimize a horizontal carousel storage system
141
Using simulation to predict market behavior for outbound call centers
142
Using simulation to predict multi-robot performance on coverage tasks
143
Using simulation to preview plans of a container port operations
144
Using simulation to reduce length of stay in emergency departments
145
Using Simulation To Schedule Manufacturing Resources
146
Using simulation to solve facility layout for food industry at XYZ Company
147
Using Simulation to Solve Problems
148
Using simulation to study service-rate controls to stabilize performance in a single-server queue with time-varying arrival rate
149
Using simulation to study statistical tests for arrival process and service time models for service systems
150
Using simulation to study the impact of improving Lookahead planning on the reliability of production planning
151
Using simulation to support implementation of flexible manufacturing cell
152
Using simulation to teach business processes design and improvement
153
Using simulation to test the robustness of various existing production control policies
154
Using simulation to understand capacity constraints and improve efficiency on process tools
155
Using simulation to understand interim brigade combat team (IBCT) munitions logistics
156
Using Simulation to Validate Style-Specific Architectural Refactoring Patterns
157
Using simulation tool as a decision-making support system to do PM3 plan in FAB manufacturing
158
Using simulation with a logit choice model to assess the commercial feasibility of an advanced environmental technology
159
Using simulation with Design For Six Sigma in a server manufacturing environment
160
Using Simulation, Data Mining, and Knowledge Discovery Techniques for Optimized Aircraft Engine Fleet Management
161
Using Simulation, Fault Injection and Property-Based Testing to Evaluate Collision Avoidance of a Quadcopter System
162
Using Simulation, Historical and Hybrid Estimation Systems for Enhacing Job Scheduling on NOWs
163
Using simulation/modeling in the implementation of automation systems
164
Using simulation-based finite capacity planning and scheduling software to improve cycle time in front end operations
165
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains
166
Using simulation-based scheduling to maximize demand fulfillment in a semiconductor assembly facility
167
Using simulation-based Stochastic Approximation to optimize staffing of systems with Skills-Based-Routing
168
Using Simulations and Experiential Learning Approaches to Train Careers of Seniors
169
Using simulations to automatically generate authentic constructivist learning environments
170
Using simulations to enhance PQ monitoring [of industrial power systems]
171
Using simulations to provide safety and operations training in the electric power industry
172
Using Simulations to Study the Efficiency of Update Control Protocols
173
Using simulators to model transmitted variability in IC manufacturing
174
Using Simulink models for education purposes in the subject automation of electric power systems
175
Using Simulink to Generate HDL Code for Validating an Embedded Kalman Filter
176
Using simultaneous transmission and scatter SPECT imaging from external sources for the determination of the thoracic μ-map
177
Using simultaneous transmission and scatter SPECT imaging from external sources for the determination of thoracic μ-map
178
Using sine wave histograms to estimate analog-to-digital converter dynamic error functions
179
Using Single Error Correction Codes to Protect Against Isolated Defects and Soft Errors
180
Using single leg standing time to predict the fall risk in elderly
181
Using single log-Gabor filter and reassignment method for audio classification applications
182
Using single perspective views for 3-D object recognition
183
Using Single Propeller Performance Data to Predict the Performance of a Counterrotating Pair
184
Using single source data to better understand User-generated Content (UGC) behavior
185
Using single source precursors and spray chemical vapor deposition to grow thin-film CuInS2 [solar cells]
186
Using single/multi-channel energy transform as preprocessing tool for magnetoencephalographic data-based applications
187
Using single-camera geometry to perform gyro-free navigation and attitude determination
188
Using Single-Layer neural network for recognition of isolated handwritten Persian digits
189
Using Single-Trial EEG to Estimate the Timing of Target Onset During Rapid Serial Visual Presentation
190
Using Single-Wall Carbon Nanotubes and Raman Spectroscopy to Measure Local Stresses in First-Level Flip-Chip Organic Packages
191
Using Singular Eigenvalues of Wavelet coefficient as the Input of SVM to Recognize Motion Patterns of the Hand
192
Using Singular Spectrum Analysis for new product development forecasts
193
Using Singular Value Decomposition (SVD) as a solution for search result clustering
194
Using Singular Value Decomposition and Discrete Fourier Transform to Characterize Protein Structure and Build Fast Fold Recognition
195
Using Singular value decomposition and high order spectrum for Bearings Fault Diagnosis
196
Using singular value decomposition approximation for collaborative filtering
197
Using singular value decomposition to improve a genetic algorithm´s performance
198
Using singular values for model reduction of flexible structures
199
Using singularity exponent in distance based classifier
200
Using sink mobility to increase wireless sensor networks lifetime
201
Using SINR as Vertical Handoff Criteria in Multimedia Wireless Networks
202
Using SI-NS Diagram to Normalize the Program Code
203
Using sinusoidal stimuli and Fourier analyses for memory IC testing
204
Using SiO2 nanoparticles to efficiently enhance light emission from metal-oxide silicon tunneling diodes on Si
205
Using SIP for floor control in a videoconference
206
Using SIP for seamless handover in heterogeneous networks
207
Using SIP identity to prevent man-in-the-middle attacks on ZRTP
208
Using SIR-C SAR and Cloude´s decomposition for the determination of soil moisture in vegetated areas
209
Using SIR-C/X-SAR data in the analysis of volcanic and sedimentary areas. The Campania test site (Southern Italy)
210
Using site-diversity reception to overcome rain depolarization in millimeter wave satellite communications systems
211
Using Site-Level Modeling to Evaluate the Performance of Parallel System Schedulers
212
Using Site-Specific, Ray-Tracing Channel Models to Control Wireless Testbeds
213
Using situation lattices in sensor analysis
214
Using situational simulations to collect and analyze dynamic construction management decision-making data
215
Using Six Sigma
216
Using six sigma in new service development
217
Using Six Sigma to achieve sustianble manufacturing
218
Using Six Sigma to Enhance the Process Maturity of a Supply Chain
219
Using six-port reflectometer measurement of complex dielectric constant
220
Using Skeletonization and Shortest Skeleton Path Approach for Chinese Character Representation
221
Using skeletons for nonholonomic path planning among obstacles
222
Using skew Gabor filter in source signal separation and local spectral multi-orientation analysis
223
Using skin-color motion for 3D face modelling and synthesis
224
Using Skipping for Sequence-Based Collaborative Filtering
225
Using SLA Context to Ensure Quality of Service for Composite Services
226
Using SLA to guide database transition to NoSQL on the cloud: A systematic mapping study
227
Using sliding concentric windows for license plate segmentation and processing
228
Using sliding frame approach for scheduling large and complex projects
229
Using sliding mode control method to suppress fuel sloshing of a liquid-filled spacecraft
230
Using sliding mode control theory for radio resource management in wireless systems
231
Using sliding mode controller techniques to design PWM DC-DC
232
Using slithers of simulation in a new approach for intelligent initialization of non-terminating systems
233
Using Slocum gliders for coordinated spatial sampling
234
Using slowness principle for feature selection: Relevant feature analysis
235
Using sludge ceramic to prepare LC40 lightweight aggregate concrete
236
Using SMAC Agent Securely in Heterogonous Database Systems
237
Using Small Abstractions to Program Large Distributed Systems
238
Using small AUV for oceanographic measurements
239
Using Small Baseline SAR Interferometry to Investigate Land Subsidence Induced by Underground Coal Mining
240
Using small computers in manufacturing
241
Using small format aerial photographs (SFAP) to map coral reefs in Rio Grande do Norte, Brazil
242
Using small metasurface lens for antenna gain echancement
243
Using small numbers of subjects in fMRI-based research
244
Using small pressure transducers to measure the cerebral perfusion pressure of conscious rats
245
Using Small-World Model to Improve the Performance of Alignment Particle Swarm Optimization
246
Using Smap and Smllr for Arabic Speaker Adaptation
247
Using smart antennas for enhancing cognitive radio non-intrusiveness on a primary network
248
Using Smart Cameras to Localize Self-Assembling Modular Robots
249
Using smart cards as a secure storage for digitally signed documents
250
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
251
Using smart cards in electronic commerce
252
Using smart cards to authenticate passwords
253
Using smart devices for system-level management and control in the smart grid: A reinforcement learning framework
254
Using smart devices to provide distributed reactive power support
255
Using smart diagnostic scheme for fault detection in the fault tolerant system to eliminate intermittent and permanent faults causing digital system failure
256
Using Smart Meter Data to Improve the Accuracy of Intraday Load Forecasting Considering Customer Behavior Similarities
257
Using smart meter data to improve the performance of overcurrent protective devices in distribution systems with DG
258
Using smart meters for diagnostics and model-based control in thermal comfort systems
259
Using smart meters for load monitoring and active power-factor correction
260
Using smart meters in state estimation of distribution networks
261
Using smart meters to build feeder section load profiles to evaluate distributed energy resource connections
262
Using Smart Mobile Devices for Collecting Structured Data in Clinical Trials: Results from a Large-Scale Case Study
263
Using Smart Mobile Terminal Antennas to Achieve Optimal Wireless Network Performance and Security
264
Using smart phones and body sensors to deliver pervasive mobile personal healthcare
265
Using smart phones for context-aware prompting in smart environments
266
Using smart phones for large-display interaction
267
Using smart phones to access site-specific services
268
Using Smart Sampling to Discover Promising Regions and Increase the Efficiency of Differential Evolution
269
Using Smart Sensor Strings for Continuous Monitoring of Temperature Stratification in Large Water Bodies
270
Using smartglasses for utility-meter reading
271
Using smart-grid technologies to implement market-based demand response
272
Using Smartphone Sensors for Improving Energy Expenditure Estimation
273
Using Smartphone to Facilitate English Communication and Willingness to Communicate in a Communicative Language Teaching Classroom
274
Using smart-phones and floor plans for indoor location tracking
275
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services
276
Using smartphones as mobile implementation platforms for applied digital signal processing courses
277
Using Smartphones in Healthcare and to Save Lives
278
Using SMI to model SNA networks
279
Using Smodels (declarative logic programming) to verify correctness of certain active rules
280
Using smooth approximation for beam dynamics investigation in superconducting linac
281
Using smoothed K-TSS language models in continuous speech recognition
282
Using SMS and web technology in mobile government information services platform
283
Using SMS to deliver location-based services
284
Using SMS to Transfer Small Data Packets during Periods of High Workload on Mobile Data Networks
285
Using SMT to Hide Context Switch Times of Large Real-Time Tasksets
286
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images
287
Using SNMP to manage guaranteed performance connections
288
Using SNMP to manage networks
289
Using SNR to Improve Multi-Hop Routing
290
Using SNS as Access Control Mechanism for DLNA Content Sharing System
291
Using SOA for development of information system “Smart city”
292
Using SOA in Critical-Embedded Systems
293
Using SOAP and .NET Web Service to build SCORM RTE and LMS
294
Using SOAP to clean up configuration management
295
Using Social Analytics for Studying Work-Networks: A Novel, Initial Approach
296
Using social big media for customer analytics
297
Using social cognitive optimization algorithm to solve nonlinear equations
298
Using Social Contextual Information to Match Criminal Identities
299
Using social cues to estimate possible destinations when driving a robotic wheelchair
300
Using social effects to guide tracking in complex scenes
301
Using social integrity constraints for on-the-fly compliance verification of medical protocols
302
Using Social Intelligence for New Event Detection in Microblog Stream
303
Using social learning in network engineering curricula
304
Using Social Listening to Evaluate Opinion Research for Social Network Brand Community
305
Using social media aggregation and curation techniques in the classroom to identify discourse trends and support brand operations
306
Using social media in Engineering Support and Space flight operations control
307
Using Social Media in Government: The Australian Taxation Office e-Tax Facebook Page
308
Using social media sentiment analysis to understand audiences: A new skill for technical communicators?
309
Using Social Media to Capture and Convey Cultural Knowledge: A Case of Chamorro People
310
Using Social Media to Enhance Emergency Situation Awareness
311
Using Social Media to Predict Future Events with Agent-Based Markets
312
Using social media to study social pheonomena: An example using Twitter data
313
Using Social Navigation for Multimedia Content Suggestion
314
Using Social Network Analysis and Hierarchical Clustering to Identify Groups in Wikis
315
Using social network analysis for software project management
316
Using social network analysis technique for supporting software product line process
317
Using Social Network Analysis to Better Understand the Dependencies in UML Use Cases Collection
318
Using Social Network Analysis to Identify Key Players within Clinical Teams for Improving Pain Management
319
Using Social Network Analysis to Inform Management of Open Source Software Development
320
Using Social Network Analysis to Test an IT-Enabled Business Process Reengineering Theory
321
Using Social Network Analysis to Unveil Cartels in Public Bids
322
Using Social Network and Semantic Overlay Network approaches to share knowledge in distributed data mining scenarios
323
Using social network knowledge for detecting spider constructions in social security fraud
324
Using social network technology as a peer-mediated learning tool in a computer course
325
Using social network theory for modeling human mobility
326
Using social network theory to elucidate the impact of diversity on the social processes in design
327
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
328
Using Social Network to Predict the Behavior of Active Members of Online Communities
329
Using Social Networking and Collections to Enable Video Semantics Acquisition
330
Using Social Networking and Semantic Web Technology in Software Engineering--Use Cases, Patterns, and a Case Study
331
Using Social Networking and Virtual Reality to Harness Creativity in Students in E-learning Situations
332
Using social networking technologies to implement adaptive business networks
333
Using Social Networking Technology to Enhance Learning in Higher Education: A Case Study Using Facebook
334
Using social networking to enhance the EFL classroom
335
Using social networks analysis for collaboration and team formation identification
336
Using social networks at university: The case of school of computer science
337
Using Social Networks for Exchanging Valuable Real Time Public Transport Information among Travellers
338
Using social networks for supervising and mentoring
339
Using Social Networks for Web Services Discovery
340
Using social networks in resolving conflicts of concept learning process
341
Using Social Networks to Improve the Performance of a Service Desk
342
Using Social Networks to Solve Data Sparsity Problem in One-Class Collaborative Filtering
343
Using Social Sensing to Understand the Links between Sleep, Mood, and Sociability
344
Using Social Sensors for Influence Propagation in Networks With Positive and Negative Relationships
345
Using Social Simulation for Aid and Development Analytics during Armed Conflict: Experiences from Uruzgan
346
Using social software to improve learning performance of deaf university learner
347
Using social software to informal learning in higher education
348
Using Social Visualization to Motivate Social Production
349
Using SocialAction to uncover structure in social networks over time
350
Using Socially Assistive Human–Robot Interaction to Motivate Physical Exercise for Older Adults
351
Using socially assistive robotics to augment motor task performance in individuals post-stroke
352
Using Socio-Technical and Resilience Frameworks to Anticipate Threat
353
Using soft computing for a prototype collagen plate inspection system
354
Using Soft Computing Methods as an Effective Tool in Predicting Surface Roughness
355
Using Soft Constraints to Interpret Descriptions of Shapes
356
Using soft constraints to learn semantic models of descriptions of shapes
357
Using soft processors for component design in SOC: A case-study of timers
358
Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments
359
Using soft secondary electron programming to reduce drain disturb in floating-gate NOR flash EEPROMs
360
Using Soft Similarity in Multi-label Classification for Reuters-21578 Corpus
361
Using Soft System Methodology to Support Stakeholders Management: Integrating Case-Based Reasoning
362
Using Soft Systems Methodology on the Problem of Water Scarcity
363
Using soft systems methodology to improve requirements practices: an exploratory case study
364
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks
365
Using software agents to avoid collisions among multiple robots
366
Using software agents to generate VLSI layouts
367
Using software agents to test electric markets and systems
368
Using Software Agents with MPEG-7 Descriptions for a Distribute Flexible Multimedia System
369
Using Software and Hardware in Distant Training System for Computer Professionals
370
Using Software Archaeology to Measure Knowledge Loss in Software Projects Due to Developer Turnover
371
Using software architectural patterns for synthetic embedded multicore benchmark development
372
Using software architecture for code testing
373
Using software architectures and design patterns for developing distributed applications
374
Using software architectures to retrieve interaction information in eLearning environments
375
Using software categories for the development of generative software
376
Using software component generators to construct a meta-weaver framework
377
Using Software Component Models and Services in Embedded Real-Time Systems
378
Using software defined radio (SDR) to demonstrate concepts in communications and signal processing courses
379
Using Software Dependencies and Churn Metrics to Predict Field Failures: An Empirical Case Study
380
Using software development progress data to understand threats to project outcomes
381
Using Software Distributions to Understand the Relationship among Free and Open Source Software Projects
382
Using software document evaluations to enhance software supportability
383
Using Software Engineering Methodologies to Port a Scientific Code to GPUs: Experiences and Lessons Learned
384
Using Software Engineering Principles to Develop Reusable Business Rules
385
Using software engineering to break the programming barrier [teaching]
386
Using software evolution history to facilitate development and maintenance
387
Using software fault insertion to improve CCS network
388
Using software implemented fault inserter in dependability analysis
389
Using software invariants for dynamic detection of transient errors
390
Using software logging to support multiversion buffering in thread-level speculation
391
Using software maintainability models to track code health
392
Using software metrics and measurements to improve software productivity and quality
393
Using software metrics and measurements to improve software productivity and quality
394
Using software metrics in the evaluation of a conceptual component model
395
Using software metrics to control firmware evolution
396
Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software
397
Using software metrics to select refactoring for long method bad smell
398
Using software metrics tools for maintenance decisions: a classroom exercise
399
Using Software Model Checking for Software Component Certification
400
Using Software Project Courses to Integrate Education and Research: An Experience Report
401
Using software protocols to mask CAN bus insecurities
402
Using Software Reliability Growth Models in Practice
403
Using software reliability models for security assessment — Verification of assumptions
404
Using Software Repositories to Investigate Socio-technical Congruence in Development Projects
405
Using software sensors for migrating from classical simulation systems towards virtual worlds
406
Using Software Stacks to Explain Complementarities: The Case of Mergers and Acquisitions in the Software Industry
407
Using Software Structure to Predict Vulnerability Exploitation Potential
408
Using Software to Enhance Power Engineering Education in a Technology Program
409
Using software to push back the limits of the moment method
410
Using software tools and metrics to produce better quality test software
411
Using Software-Based Animations of Signal Processing Mathematics to Enhance Learning
412
Using software-defined radio network testbed to enhance undergraduate education and encourage graduate level studies
413
Using Software-Defined Radio to Validate Wireless Models in Simulation
414
Using SOI double-gate MOSFET NDR structures to improve ultra-low power full adder performance
415
Using SOI to achieve low-power consumption in digital
416
Using solar irradiation for steam generation in Bioethanol production: An initial study
417
Using solar power as an alternative source of electrical energy for street lighting in Ghana
418
Using Solar Robotic Technology to Detect Lethal and Toxic Chemicals
419
Using solar shadow trajectories for camera calibration
420
Using Sole Pressure Signals to Analyze Walking Posture
421
Using Solid Angles to Detect Protein Docking Regions by CUDA Parallel Algorithms
422
Using solid diagrams for tangible interface prototyping
423
Using solid-state over-voltage protection devices for high intensity discharge lamps ignition
424
Using Soloman-Felder Learning Style Index to Evaluate Pedagogical Resources for Introductory Programming Classes
425
Using SOM and DBSCAN-based models for landslide hazard and spatial correlations analysis: A case study in central Taiwan
426
Using SOM based graph clustering for extracting main ideas from documents
427
Using SOM to estimate optical inherent properties from remote sensing reflectance
428
Using SOM to Mine Product Features from Free-Text Customer Reviews
429
Using Somatosensory Video Games to Promote Quality of Life for the Elderly with Disabilities
430
Using some database principles to improve cooperation in multi-application smart cards
431
Using Some Nanoparticles as Contrast Agents for Optical Bioimaging
432
Using SOMs and CoAP-RELOAD to enable autonomous wide area sensor networks
433
Using SOMs as feature extractors for speech recognition
434
Using SOM-Ward Clustering and Predictive Analytics for Conducting Customer Segmentation
435
Using sonar in terrain-aided underwater navigation
436
Using sonar technology for flowmeter applications
437
Using sonar to describe temporal patterns of oceanic organisms from the MARS observatory
438
Using SOS in blind Bussgang equalization for QAM communication systems
439
Using sound diffraction to determine the seabed slope
440
Using Sound feedback to counteract visual distractor during robot-assisted movement training
441
Using sound reflections to detect moving entities out of the field of view
442
Using sound to classify vehicle-terrain interactions in outdoor environments
443
Using sound to communicate program execution
444
Using source code metrics to predict change-prone Java interfaces
445
Using source-code analysis to help end-user programmers create dependable software
446
Using sources of opportunity to compensate for receiver mismatch in HF arrays
447
Using sources of opportunity to estimate digital compensation for receiver mismatch in HF arrays
448
Using source-to-source compilation to instrument circuits for debug with High Level Synthesis
449
Using Source-to-Source Transformation Tools to Provide Distributed Parallel Applications from OpenMP Source Code
450
Using Space and Attribute Partitioned Partial Replicas for Data Subsetting and Aggregation Queries
451
Using space and network diversity combining to solve masked node collision in wireless adhoc network
452
Using Space D* for Crowded Real Robots Environments
453
Using space diversity against attenuation through vegetation: a field study for quasi-mm wave band fixed wireless access systems
454
Using space syntax to understand knowledge acquisition and wayfinding in indoor environments
455
Using space time codes on FDMA/TDMA based system with soft and hard handoff algorithms
456
Using space time coding MIMO system for software-defined radio to improve BER
457
Using space transformation for exact diagnostic of induction motor stator faults
458
Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System
459
Using Space-Based Downstream Services for Urban Management in Smart Cities
460
Using space-based remote sensing for improved global navigation and communication
461
Using spaceborne hyperspectral data for spectral cross-calibration of multispectral sensors
462
Using space-domain resonance in antenna with nonlinear loads
463
Using space-filling curve to generate the feasible routes for the set partitioning problem
464
Using space-time TCM with rotated constellations for transmission over mobile communications channels
465
Using SpaceWire with LabVIEW
466
Using Spanning Graphs for Efficient Image Registration
467
Using spanning sets for coverage testing
468
Using spanning trees for reduced complexity image mosaicing
469
Using Spanning-Trees for Balancing Dynamic Load on Multiprocessors
470
Using S-parameters successfully in time domain link simulations
471
Using spare network computing power for genetic algorithm problems
472
Using sparse coding for landmark localization in facial expressions
473
Using sparse random linear codes for data transmission in wireless sensor networks
474
Using sparse regression to learn effective projections for face recognition
475
Using sparse representations for exemplar based continuous digit recognition
476
Using sparse representations for missing data imputation in noise robust speech recognition
477
Using sparse trace neural network to extract temporal-spatial invariance
478
Using Spatial Abstractions in Industrial Environments
479
Using Spatial and Compressed Features for Multi-Spectral Image Retrieval
480
Using spatial and spectral information for improving endmember extraction algorithms in hyperspectral remotely sensed images
481
Using spatial and temporal contrast for fluent robot-human hand-overs
482
Using Spatial Audio Cues from Speech Excitation for Meeting Speech Segmentation
483
Using spatial augmented reality for appliance design
484
Using spatial context in satellite data to infer regional scale evapotranspiration
485
Using spatial context knowledge in gesture recognition for commanding a domestic service robot
486
Using spatial correlation of ocean current for velocity estimate of underwater drifting nodes
487
Using spatial correlations in distributed video coding
488
Using spatial correspondences for hyperspectral knowledge transfer: Evaluation on synthetic data
489
Using spatial cues for meeting speech segmentation
490
Using Spatial Diversity to Detect Narcotics and Explosives Using NQR Signals
491
Using Spatial Diversity to Improve the Confidentiality of Atmospheric Free Space Optical Communication
492
Using spatial geometric constraints histogram descriptors based on curvature mesh graph for 3D pollen recognition
493
Using spatial H2 norm for sensor placement in parabolic partial differential equations
494
Using spatial information to analyze correlations between test structure data
495
Using spatial information to analyze correlations between test structure data [semiconductor IC manufacture]
496
Using spatial language in a human-robot dialog
497
Using spatial language to drive a robot for an indoor environment fetch task
498
Using spatial ontology methodology to implement spatial information integration in the cloud environment
499
Using spatial processing based on the double weighted Fourier transform for eliminating the multipath effect
500
Using spatial pyramids with compacted VLAT for image categorization
501
Using Spatial Relations for Graphical Symbol Description
502
Using spatial relations of objects in real world scenes for scene structuring and scene understanding
503
Using spatial relationships as features in object recognition
504
Using Spatial Representations in Designing English Software Manuals for Non-native Speakers: A Preliminary Study
505
Using spatial representations in gesture to facilitate early word learning: A priming process model
506
Using spatial sorting and ranking in model-based object recognition
507
Using spatial summation of multi-site stimulation electrodes to improve the capability of a sensory neural interface
508
Using spatio-temporal coherence of HF arrays to inform receiver processing
509
Using spatio-temporal interest points (STIP) for myoclonic jerk detection in nocturnal video
510
Using Spatio-Temporal Patches for Simultaneous Estimation of Edge Strength, Orientation, and Motion
511
Using SPC and template monitoring method for fault detection and prediction in discrete event manufacturing systems
512
Using SPC Table to Strengthen SCORM Compliant Assessment
513
Using speaker group dependent modelling to improve fusion of fragmentary classifier decisions
514
Using special parameter back-calculation techniques to extract size distribution information of pneumatically conveyed particles
515
Using speciality engineering synthesis on Air-to-Air missiles system
516
Using Specialized Agents in a Distributed MAS to Solve Airline Operations Problems: A Case Study
517
Using special-purpose hardware to achieve a hundred-fold speedup in molecular dynamics simulations of proteins
518
Using specific binding DNA capture elements to direct pulsed power killing of biological agents
519
Using Specifications
520
Using spectral analysis and modal estimation for identifying electromechanical oscillations: A case study of the power system in northern Norway and northern Finland
521
Using spectral analysis to determine the equivalent circuit of the output filter of DC-DC converters at their operating frequency
522
Using Spectral Analysis to Extract Frequency Components from Electroencephalography: Application for Fatigue Countermeasure in Train Drivers
523
Using spectral clustering to automate identification and optimization of component structures
524
Using spectral correlation for non-cooperative RSS-based positioning
525
Using spectral estimation methods for external problems of microwave measurements
526
Using spectral estimation techniques in adaptive processing antenna systems
527
Using spectral features for modelbase partitioning
528
Using Spectral Features to Improve Sentiment Analysis
529
Using Spectral Fingerprints to Improve Wireless Network Security
530
Using spectral techniques for improved performance in artificial neural networks
531
Using spectral warping for instrumentation and measurements in mixed-signal testing
532
Using spectroellipsometry to examine multilayer gratings for sensors and photodetectors
533
Using spectrograms in EMI-analysis - an overview
534
Using spectrometry and photography to study color underwater
535
Using spectrum analyzer to determine frequency modulation accuracy of a synthesizer and its measurement uncertainty
536
Using spectrum fragmentation to better allocate time-varying connections in elastic optical networks
537
Using spectrum management techniques to differentiate services in Elastic Optical Networks
538
Using spectrum to extract texture feature
539
Using Spectrum-Based Fault Localization for Test Case Grouping
540
Using specular highlights as pose invariant features for 2D-3D pose estimation
541
Using specularities for recognition
542
Using Specularities to Recover Multiple Light Sources in the Presence of Texture
543
Using speculation to enhance javascript performance in web applications
544
Using speculation to simplify multiprocessor design
545
Using speculative computation and parallelizing techniques to improve scheduling of control based designs
546
Using speculative execution for fault tolerance in a real-time system
547
Using Speculative Functional Units in high level synthesis
548
Using Speech Acts to Categorize Email and Identify Email Genres
549
Using speech analysis techniques for language learning
550
Using speech and electrocorticography to map human auditory cortex
551
Using Speech for Handwritten Mathematical Expression Recognition Disambiguation
552
Using speech for mode selection in control of multifunctional myoelectric prostheses
553
Using speech in noise to improve understandability for elderly listeners
554
Using speech processing methods to model blood flow signals
555
Using speech recognition for real-time captioning and lecture transcription in the classroom
556
Using Speech Recognition for Real-Time Captioning of Multiple Speakers
557
Using speech recognition in a personal communications system
558
Using speech recognition technology to come true Liberated Learning for deaf students
559
Using speech recognition technology to support education for deaf students
560
Using speech recognition to enhance the Tongue Drive System functionality in computer access
561
Using Speech Statistics to Achieve Flexibility and Spectral Efficiency in Wireless Communication Systems
562
Using speech technology to enhance isotope ID and classification
563
Using speech to guide a mobile robot manipulator
564
Using speech transformation to increase speech intelligibility for the hearing- and speaking-impaired
565
Using speech/non-speech detection to bias recognition search on noisy data
566
Using Speed Diagrams for Symbolic Quality Management
567
Using speed measures to predict performance in x-ray luggage screening tasks
568
Using SP-Frames for Error Resilience in Optimized Video Streaming
569
Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras
570
Using spherical harmonics for modeling antenna patterns
571
Using spherical moments for visual servoing from a special target with unique projection center cameras
572
Using spherical near field measurements in computational EMC
573
Using spherically bent crystals for obtaining high-resolution, large-field, monochromatic X-ray backlighting imaging for wide range of Bragg angles
574
Using Spice and behavioral synthesis tools to optimize ASICs´ peak power consumption
575
Using SPICE for power system simulations
576
Using SPICE to calculate MOSFET operating temperature
577
Using SPICE to determine stability
578
Using SPICE to model the dynamic behavior of DC-to-DC converters employing magnetic amplifiers
579
Using spikes to deal with elephants
580
Using spike-triggered averaging to characterize motor unit twitch vectors in the first dorsal interosseous
581
Using spiking neural networks for light spot tracking
582
Using spin images for efficient object recognition in cluttered 3D scenes
583
Using spin images for hand gesture recognition in 3D point clouds
584
Using SPIN model checking for flight software verification
585
Using SPIN to Check Nondeterministic Simulink Stateflow Models
586
Using SPIN to check Simulink Stateflow models
587
Using SPIN to model cryptographic protocols
588
Using spiral intensity profile to quantify head and neck cancer
589
Using SPIRIT Cores in SonicsStudio
590
Using spline basis functions in Volterra series based models
591
Using spline-function for the reason unceasing description of the metrological features of the measures ORF
592
Using split capabilities for access control
593
Using split event sets to form and schedule event combinations in discrete event simulation
594
Using split objects for maintenance and reengineering tasks
595
Using split processing to improve the performance of space-time OFDM over digital TV channels
596
Using spoken text to aid debugging: An empirical study
597
Using spoken utterance compression for meeting summarization: A pilot study
598
Using sport analogy in high-tech management to improve productivity by improving personal and team performance
599
Using SPOT 5 high spatial resolution image to detect vegetation patches at Gudong oil field
600
Using SPOT imagery to assess the effectiveness of combating desertification in Marrakech, Morocco
601
Using Spot Images To Study Surface Water
602
Using SPOT5 fusion-ready image to identify the statistical characteristics of vegetation patches
603
Using spread spectrum techniques to combat multipath interference in mobile random accessed networks
604
Using spread spectrum techniques to combat multipath interference in mobile random accessed networks
605
Using spread spectrum transform for fast and robust simultaneous measurement in active sensors with multiple emitters
606
Using spreadsheet programs on personal computers for electromagnetic coupling calculations
607
Using spreadsheet programs on personal computers for electromagnetic coupling calculations
608
Using spreadsheet software as a platform for power system analysis
609
Using spreadsheets features to schedule non-identical multi-storey building projects
610
Using spreadsheets in introductory EE courses
611
Using spreadsheets in student exercises for signal and linear system analysis
612
Using spreadsheets to teach problem solving in a first year class
613
Using spread-spectrum in a high-capacity fiber-optic local network
614
Using spread-spectrum radio as a cost-effective teleprotection channel - field experience in Mexico
615
Using Sprott Chaos Synchronization-Based Voltage Relays for Protection of Microdistribution Systems Against Faults
616
Using SPUDT structure to design high selectivity W-CDMA base station filters
617
Using spur lines to develop the microstrip bandpass filter with a wide stopband
618
Using spy node to identify cyber-attack in power systems as a novel approach
619
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities
620
Using square array structures in parallel ATPG
621
Using squids for AC measurements
622
Using SQUIDs for AC measurements
623
Using SSADM to specify requirements
624
Using SSDE for USB2.0 conformance co-verification
625
Using SSL/TLS in authentication and key agreement procedures of future mobile networks
626
Using SSM proxies to provide efficient multiple-source multicast delivery
627
Using SSSC based induction machines for indirect toque control during fault
628
Using SST/Macro for Effective Analysis of MPI-Based Applications: Evaluating Large-Scale Genomic Sequence Search
629
Using SSVEP based brain-computer interface to control functional electrical stimulation training system
630
Using stability of interpretation as verification for low level processing: An example from egomotion and optic flow
631
Using Stabilizer Dynamic Pre-Compensator to Design Robust Controllers for an Unstable MIMO System
632
Using Stacked Bitlines and Hybrid ROM Cells to Form ROM and SRAM-ROM With Increased Storage Density
633
Using stacked generalization and complementary neural networks to predict Parkinson´s disease
634
Using Stacked Generalization to Combine SVMs in Magnitude and Shape Feature Spaces for Classification of Hyperspectral Data
635
Using stacked transformations for recognizing foreign accented speech
636
Using stacking-energies (INN and INN-HB) for improving the accuracy of RNA secondary structure prediction with an evolutionary algorithm - a comparison to known structures
637
Using Stage-Gate Processes effectively for managing technology-based projects
638
Using Stakeholder Analysis for Improving Statechart Merging in Software Requirement Management
639
Using standard forms for controller design
640
Using standard peak-current-mode controllers in high-power-factor rectifiers based on up-down switching converters
641
Using standard verifier to check secure information flow in Java bytecode
642
Using standard-cell design methodologies on a gate-array base
643
Using standardized metadata to improve the search and analysis of remote sensing data for change detection
644
Using standardized quantization for multi-party PPUF matching: Foundations and applications
645
Using standards in digital library design&development
646
Using Standards to Automate Electronic Health Records (EHRs) and to Create Integrated Healthcare Enterprises
647
Using standards to integrate distributed energy resources with distribution management systems
648
Using Standards-Based Interfaces to Share Data across Grid Infrastructures
649
Using standing-wave electroabsorption modulators to generate 40 GHz optical pulses
650
Using Star-P® on DoD High Performance Computing Systems
651
Using stashing to increase node autonomy in distributed file systems
652
Using STATCOM interfacing of renewable energy source to grid and power quality improvement
653
Using STATCOM to mitigate voltage fluctuations due to aerodynamic aspects of wind turbines
654
Using State Diagrams for Modeling Maintenance of Deteriorating Systems
655
Using state dominance for path planning in dynamic environments with moving obstacles
656
Using State Estimation for parameter and model error identification
657
Using state estimation residuals to detect abnormal SCADA data
658
Using State Machine to Integrate Human Activity into BPEL in Dartflow
659
Using state machines to model and manage requirements changes and specification changes
660
Using state modules for adaptive query processing
661
Using statecharts for hardware description and synthesis
662
Using Stateful Activities to Facilitate Monitoring and Repair in Workflow Choreographies
663
Using state-level information in the HMM
664
Using State-Space Database to Control Vehicles
665
Using state-space models for accurate computations of transient thermal behavior of electronic packages
666
Using state-space techniques to represent frequency dependent single-phase lines directly in time domain
667
Using static analysis data for performance modeling and prediction
668
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
669
Using static analysis for knowledge extraction from industrial User Interfaces
670
Using Static Analysis to Find Bugs
671
Using static analysis to improve communications infrastructure
672
Using static analysis to manage the execution of transactional composite services
673
Using static and dynamic canonical correlation coefficients as quantitative EEG markers for Alzheimer´s disease severity
674
Using static capacity modeling and queuing theory equations to predict factory cycle time performance in semiconductor manufacturing
675
Using static capacity modeling techniques in semiconductor manufacturing
676
Using static code analysis to improve coarse task granularity in bobox
677
Using Static Code Analysis to Improve Performance of GridRPC Applications
678
Using Static Percentiles of AE9/AP9 to Approximate Dynamic Monte Carlo Runs for Radiation Analysis of Spiral Transfer Orbits
679
Using Static Priority Queueing to optimize the Avionics Full Duplex Switched Ethernet
680
Using static scheduling techniques for the retargeting of high speed, compiled simulators for embedded processors from an abstract machine description
681
Using static voltage analysis and voltage-aware DRC to identify EOS and oxide breakdown reliability issues
682
Using Stationary Electronic Noses Network to Locate Dynamic Odour Source Position
683
Using stationary vehicles to enhance cooperative positioning in Vehicular Ad-hoc Networks
684
Using stationary wavelet transformation for signal denoising
685
Using Stationary-Dynamic Camera Assemblies for Wide-area Video Surveillance and Selective Attention
686
Using statistical analysis and support vector machine classification to detect complicated attacks
687
Using statistical analysis methods to predict switching stability
688
Using statistical and neural network methods to explore the relationship between systematic risk and firm´s long term investment activities
689
Using statistical and uncertainty analyses in design, applied to a tokamak central solenoid
690
Using statistical bandwidth in token ring networks
691
Using statistical characteristics of gradient phases for robust face recognition under illumination variations
692
Using statistical data feedback by-products of expert systems
693
Using statistical data for context sensitive pervasive advertising
694
Using Statistical Discriminators and Cluster Analysis to P2P and Attack Traffic Monitoring
695
Using statistical distribution network planning for voltage control method selection
696
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited
697
Using Statistical Information to Communicate Android Permission Risks to Users
698
Using statistical learning theory for modeling the uncertainty in business and engineering systems: a qualitative introduction
699
Using statistical learning theory for purchase behavior prediction via direct observation of in-store behavior
700
Using Statistical Machine Translation Model to Improve Domain-Specific Metasearch Engines
701
Using Statistical Machine Translation to Grade Training Data
702
Using statistical median to check sensitivity of defect inspection
703
Using Statistical Methods in a Parametric Thermal Analysis
704
Using Statistical Methods to Compute the Probability Distribution of Message Response Time in Controller Area Network
705
Using statistical methods to improve knowledge-based news categorization
706
Using statistical methods to predict link quality in COTS-based fiber optic networks
707
Using statistical methods to simplify control system selection
708
Using statistical models of book sales to assess the greenhouse gas reduction potential of print on demand
709
Using statistical models to characterize eco-driving style with an aggregated indicator
710
Using statistical models to interpret complex and variable images
711
Using Statistical Models to Predict Software Regressions
712
Using statistical models with duplication and compare for reduced cost FPGA reliability
713
Using statistical moments as invariants for eye detection
714
Using statistical network link model for routing in ad hoc networks with multi-agent reinforcement learning
715
Using statistical parameters for chaos detection
716
Using statistical power analysis to tune-up a research experiment: a case study
717
Using statistical process control chart techniques to ensure quality of care in pharmacy department of a hospital
718
Using statistical process control charts for monitoring birth weight at a national level
719
Using statistical room acoustics for analysing the output SNR of the MWF in acoustic sensor networks
720
Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection
721
Using Statistical Similarity to Identify Corresponding Attributes between Heterogeneous Spatial Databases
722
Using statistical transformations to improve compression for linear decompressors
723
Using statistically designed experiments to improve reliability and to achieve robust reliability
724
Using statistics and neural networks in fault determination
725
Using Statistics and Spatial Data Mining to Study Land Cover in Wyoming :Can We Predict Vegetation Types from Environmental Variables?
726
Using Statistics of Extremes for Electromigration and Time-Dependent Dielectric Breakdown
727
Using statistics of the extremes for software reliability analysis
728
Using statistics of the extremes for software reliability analysis of safety critical systems
729
Using statistics to reduce the uncertainty in system level susceptibility testing
730
Using steady-state prior knowledge to constrain parameter estimates in nonlinear system identification
731
Using Steady-State Suppression to Improve Speech Intelligibility in Reverberant Environments for Elderly Listeners
732
Using Stealth Mixins to Achieve Modularity
733
Using STEAM for Thermal Simulation of Storage Systems
734
Using steepest descent method to refine the node positions in wireless sensor networks
735
Using steerable filters for illumination-invariant recognition in multispectral images
736
Using steerable wavelets and minimal paths to reconstruct automatically filaments in fluorescence imaging
737
Using STEM with quasi-parallel illumination and an automated peak-finding routine for strain analysis at the nanometre scale
738
Using stepwise regression and support vector regression to comprise REITs´ portfolio
739
Using stereo camera system to realize realistic video avatar in virtual environment
740
Using stereo for object recognition
741
Using stereo geometry towards accurate 3D reconstruction
742
Using Stereo Information for Instrument Identification in Polyphonic Mixtures
743
Using Stereo Matching for 2-D Face Recognition Across Pose
744
Using Stereo Matching with General Epipolar Geometry for 2D Face Recognition across Pose
745
Using stereo vision analysis to recognize partially obscured objects
746
Using Stereo Vision to Construct 3-D Surface Models
747
Using stereo vision to pursue moving agents with a mobile robot
748
Using Stereo Vision to Pursue Moving Agents with a Mobile Robot
749
Using stereographic projection as a preprocessing technique for Upstart
750
Using stereomotion to track binocular targets
751
Using stereotypes in the automatic generation of natural language summaries for C++ methods
752
Using stereotypes to help characterize commits
753
Using Stereotypes to Identify Risky Transactions in Internet Auctions
754
Using Sticker-based Model to Solve the Clique Problem on DNA-based Computing
755
Using stigmergy to co-ordinate pervasive computing environments
756
Using STIL to describe embedded core test requirements
757
Using Stiquito in an introduction to engineering skills and design course
758
Using STK Toolkit for Evaluating a GA Base Algorithm for Ground Station Scheduling
759
Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications
760
Using Stochastic Approximation for Parameter Estimation in Option Pricing
761
Using stochastic approximation to design OSPF routing areas that satisfy multiple and diverse end-to-end performance requirements
762
Using stochastic architectures for edge detection algorithms
763
Using stochastic chaotic simulated annealing in the FPGA segmented channel routing problem
764
Using Stochastic Comparison for Efficient Model Checking of Uncertain Markov Chains
765
Using stochastic complexity for ECG signal analysis
766
Using stochastic computing to implement digital image processing algorithms
767
Using stochastic control with data compression perspectives to enhance P300 Neural Communication Prostheses
768
Using stochastic differential equation for assertion based verification of noise in analog/RF circuits
769
Using stochastic dual dynamic programming and a periodic autoregressive model for wind-hydrothermal long-term planning
770
Using stochastic dynamic step length particle swarm optimization to direct orbits of chaotic systems
771
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers
772
Using stochastic gradient-descent scheme in appearance model based face tracking
773
Using stochastic grammars for modelling and recognising cursive script
774
Using stochastic intervals to predict application behavior on contended resources
775
Using stochastic linear-parameter-varying control for CPU management of internet servers
776
Using stochastic logic for efficient pattern recognition analysis
777
Using stochastic methods in modeling of the monthly precipitation and mean temperature (A case study: Shiraz station, Iran)
778
Using Stochastic Model Checking to Provision Complex Business Services
779
Using Stochastic Modeling for Texture Generation
780
Using stochastic models for analyzing power system dynamics
781
Using stochastic models to effectively schedule hardware test efforts
782
Using Stochastic Models to Predict User Response in Social Media
783
Using Stochastic Petri Nets for Level-Crossing Collision Risk Assessment
784
Using stochastic Petri nets for performance modelling of application servers
785
Using Stochastic State Classes in Quantitative Evaluation of Dense-Time Reactive Systems
786
Using stochastic syntactic analysis for extracting a logical structure from a document image
787
Using stochastic timed Petri nets for modeling and analysing an industrial application based on FIP fieldbus
788
Using stochastic-dominance relationships for bounding travel times in stochastic networks
789
Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances
790
Using STOQS (The spatial temporal oceanographic query system) to manage, visualize, and understand AUV, glider, and mooring data
791
Using storage class memories to increase the reliability of two-dimensional RAID arrays
792
Using storage devices for compensating uncertainties caused by non-dispatchable generators
793
Using storage to integrate renewables into the distribution system — A case study
794
Using Storage to Minimize Carbon Footprint of Diesel Generators for Unreliable Grids
795
Using store-forward technique to conserve energy in wireless sensor networks: Initial step for routing mechanism
796
Using stories to understand patterns
797
Using Storm to Perform Dynamic Egocentric Network Motif Analysis
798
Using stormwater detention tanks as storage system for sustainable energy management in a smart city framework
799
Using storytelling methods to improve emotion, motivation and attitude of students writing scientific papers and theses
800
Using Storytelling to record requirements: Elements for an effective requirements elicitation approach
801
Using strain to increase the reliability of scaled spin MOSFETs
802
Using strand maps to engage digital library users with science content
803
Using Strand Space Model to Verify the Privacy Properties of a Fair Anonymous Authentication Scheme
804
Using S-Transform and Shannon energy for electrical disturbances detection
805
Using S-transform in EEG analysis for measuring an alert versus mental fatigue state
806
Using Strategic Fit for Portfolio Management
807
Using strategic models in electricity distribution investment planning
808
Using strategic models in electricity distribution investment planning
809
Using strategy maps in the design initiatives for the environment
810
Using Strategy Maps to Align Distributed Service Organizations
811
Using strategy trees in change management in clouds
812
Using Stratified Attribute Tracking (SAT) Diagrams for Learning Analytics
813
Using stream queries to measure communication performance of a parallel computing environment
814
Using stream rewriting for mapping and scheduling data flow graphs onto many-core architectures
815
Using stream semantics for continuous queries in media stream processors
816
Using Stress Functions to Obtain OWA Operators
817
Using stress to disambiguate spoken Thai sentences containing syntactic ambiguity
818
Using String Distances for Test Case Prioritisation
819
Using String Kernel to Predict Binding Peptides for MHC Class II Molecules
820
Using String Matching for Deep Packet Inspection
821
Using string similarity metrics for automated grading of SQL statements
822
Using strong bisimulation to resolve ontology integration equality
823
Using strong sustainability to optimize electricity generation fuel mixes
824
Using Strongly Typed Genetic Programming for knowledge discovery of course quality from e-learning´s web log
825
Using structural and color features of streptomyces clavuligerus bacteria in approximating of production level of clavulanic acid
826
Using structural and procedural knowledge in database and knowledge base integration
827
Using structural and semantic information to support software refactoring
828
Using structural and semantic metrics to improve class cohesion
829
Using structural bootstrapping for object substitution in robotic executions of human-like manipulation tasks
830
Using structural complexity management for design process driven modularization
831
Using Structural Constraints to Specify and Check Design Intent in Source Code - Ph.D. Dissertation Synopsis -
832
Using structural context to recommend source code examples
833
Using Structural degradation and Parallax for reduced-reference quality assessment of 3D images
834
Using structural domains to predict obligate and non-obligate protein-protein interactions
835
Using structural equation modeling for measuring quality culture in a construction company
836
Using structural features to detect buildings in panchromatic satellite and aerial images
837
Using structural information for reduced reference image quality assessment
838
Using structural knowledge for interactive 3D modeling of piping environments
839
Using structural modeling to guarantee timing consistency
840
Using structural relations for checking combinationality of cyclic circuits
841
Using Structural Similarity Quality Metrics to Evaluate Image Compression Techniques
842
Using structural testing information to support monitoring activities
843
Using Structural Testing to Identify Unintended Join Points Selected by Pointcuts in Aspect-Oriented Programs
844
Using structure of data to improve classification
845
Using structured ASIC to improve design productivity
846
Using structured benchmarking to fast-track CMM process improvement
847
Using structured changes for elucidating data evolution
848
Using Structured EHR Data and SVM to Support ICD-9-CM Coding
849
Using structured grammar domain models to capture software system essence
850
Using Structured Illumination to Enhance Video-Based Eye Tracking
851
Using structured input patterns for neural based image recognition
852
Using structured P2P overlay networks to build content sensitive communities
853
Using Structured Queries for Source Code Search
854
Using Structured UKR manifolds for motion classification and segmentation
855
Using structures to synchronize cameras of robots swarms
856
Using student conative behaviors and technical skills to form effective project teams
857
Using Student Conferences to Increase Participation in the Classroom: A Case Study
858
Using student feedback to improve instruction in engineering calculus
859
Using student-computer interactions to categorize educational software
860
Using student-created multimedia programs to teach design and communications
861
Using students as subjects in experiments on decision support systems
862
Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students´ Learning Proces
863
Using students as subjects in requirements prioritization
864
Using Students´ Devices and a No-to-Low Cost Online Tool to Support Interactive Experiential mLearning
865
Using students´ previous experience and prior knowledge to facilitate conceptual change in an introductory materials course
866
Using students´ tracking data in E-learning: Are we always aware of security and privacy concerns?
867
Using Student-student Feedback to Improve Term Projects and Project Presentations
868
Using Stuffed Quadratic Congruence Codes for SAC Labels in Optical Packet Switching Network
869
Using Styles to Improve the Architectural Views Design
870
Using subclass discriminant analysis, fuzzy integral and symlet decomposition for face recognition
871
Using subclasses in discriminant non-negative subspace learning for facial expression recognition
872
Using Sub-dictionaries for Image Representation Based on the Bag-of-Visual-Words Approach
873
Using Subfiling to Improve Programming Flexibility and Performance of Parallel Shared-file I/O
874
Using Subjective Logic to Handle Uncertainty and Conflicts
875
Using subject-oriented modeling to develop Jini applications
876
Using subject-oriented programming to overcome common problems in object-oriented software development/evolution
877
Using suboptimal state feedback controllers in certainty equivalence measurement feedback nonlinear H control
878
Using subspace-based learning methods for medical drug design and characterization
879
Using substation automation information for electric power load modeling and predictive maintenance of circuit breaker
880
Using sub-systems behavioral modeling to speed-up RFIC design optimizations and verifications
881
Using Subthreshold Heavy Ion Upset Cross Section to Calculate Proton Sensitivity
882
Using Subtle Interaction for non-intrusive Social Networks
883
Using subwavelength diffraction gratings to design open microwave cavities
884
Using Suffix Tree to Detect Communities from Bipartite Network
885
Using Suffix Tree to Discover Complex Repetitive Patterns in DNA Sequences
886
Using suffix trees for periodicity detection in time series databases
887
Using suitable action selection rule in reinforcement learning
888
Using Suitable Neighbors to Augment the Training Set in Hyperspectral Maximum Likelihood Classification
889
Using sulfide treatment to improve performance of GaSb/GaInAsSb/GaAlAsSb photodiode heterostructures for spectral range, of 1.7-2.5 μm
890
Using sum rules to investigate the character of nonlinear susceptibilities
891
Using summer camps to motivate rural students in science and engineering
892
Using Super Capacitor Based Energy Storage to Improve Power Quality in Distributed Power Generation
893
Using Super Cut-off Carbon Nanotube Sleep Transistors in Silicon Based Low Power Digital Circuits
894
Using super resolution pitch in waveform speech coders
895
Using supercapacitors to improve battery performance
896
Using Superconducting Fault Current Limiters to enhance the reliability of power transmission systems
897
Using super-efficiency DEA to benchmark the Internet channels efficiency
898
Using Superimposed ASK label in a 10-Gb/s multihop all-optical label swapping system
899
Using superpixels in monocular SLAM
900
Using superplacstic alloys to cut cavity mould costs
901
Using Superposition Codebooks and Partial Decode-and-Forward in Low-SNR Parallel Relay Networks
902
Using superquadrics for the approximation of objects and its application to grasping
903
Using Super-Resolution Methods to Solve a Novel Multi-Sinusoidal Signal Model
904
Using super-resolution to study small scale structures in the atmosphere
905
Using SuperScan™ and SuperScan II™ to improve Vt variations in a p-channel power MOSFET device
906
Using supertasks to improve processor utilization in multiprocessor real-time systems
907
Using supervised and transductive learning techniques to extract network attack scenarios
908
Using Supervised Attribute Selection for Unsupervised Learning
909
Using supervised learning to classify clothing brand styles
910
Using supervised training signals of observable state dynamics to speed-up and improve reinforcement learning
911
Using supervisory control methods for model based control of multi-agent systems
912
Using supervisory control to synthesize safety controllers for connected spaces
913
Using support vector machine (SVM) for agriculture land use mapping with SAR data: Preliminary results from western Canada
914
Using Support Vector Machine and Sequential Pattern Mining to Construct Financial Prediction Model
915
Using support vector machine in traffic analysis for Website recognition
916
Using Support Vector Machine Regression for Measuring Electromagnetic Parameters of Magnetic Materials
917
Using support vector machine to construct a predictive model for clinical decision-making of ventilation weaning
918
Using support vector machine to develop an early warning system for the risks of derivative financial instruments
919
Using support vector machine to predict consumers’ repurchase behavior
920
Using Support Vector Machines and two dimensional discrete cosine transform in speech automatic recognition
921
Using support vector machines for anomalous change detection
922
Using support vector machines for determining voltage unstable areas in power systems
923
Using support vector machines for face authentication based on elastic graph matching
924
Using support vector machines for mining regression classes in large data sets
925
Using Support Vector Machines for Numerical Prediction
926
Using support vector machines for recognizing shifts in correlated manufacturing processes
927
Using support vector machines for stability region determination
928
Using support vector machines in multi-objective optimization
929
Using support vector machines in optimization for black-box objective functions
930
Using support vector machines to automatically extract open water signatures from POLDER multi-angle data over boreal regions
931
Using Support Vector Machines to Classify Student Attentiveness for the Development of Personalized Learning Systems
932
Using support vector machines to detect medical fraud and abuse
933
Using Support Vector Machines to Enhance the Performance of Bayesian Face Recognition
934
Using support vector machines to enhance the performance of elastic graph matching for frontal face authentication
935
Using Support Vector Machines to Learn How to Compile a Method
936
Using Support Vector Machines to Predict the Performance of MLP Neural Networks
937
Using Support Vector Machines to Predict the Variation of Organic Pollutants in Pond Water
938
Using surface charge analysis to characterize the radiation response of Si/SiO2 structures
939
Using surface electromyography (SEMG) to classify low back pain based on lifting capacity evaluation with principal component analysis neural network method
940
Using surface electromyography to predict single finger forces
941
Using surface excitations to detect bare vortices in a hose einstein condensate
942
Using surface model to correct and fit disparity data in stereo vision
943
Using surface normals to localize subdural intracranial electrodes placed during neurosurgery
944
Using surface plasmon coupling for enhancing the emission efficiency of UV LED
945
Using Surface Plasmon Propagation through Nanostructures for Chemical and Biological Sensing
946
Using surface plasmon resonance to detect the deoxidized process of graphene oxide
947
Using surface plasmons to enhance the speed and efficiency of superconducting nanowire single-photon detectors
948
Using Surface Stations to Improve Sounding Retrievals from Hyperspectral Infrared Instruments
949
Using Surface Stress Sensitive Films for Pressure and Friction Measurements in Mini- and Micro-Channels
950
Using surface transverse waves to guard your property
951
Using surface-plasmon effects to improve process latitute in near-field optical lithography
952
Using Surprise in Human-Computer Interfaces to Enhance Knowledge  Communication Effectiveness
953
Using surrogate information to solve the multidimensional multi-choice knapsack problem
954
Using surrogate-based modeling to predict optimal I/O parameters of applications at the extreme scale
955
Using surrogates and optimal transport for synthesis of stationary multivariate series with prescribed covariance function and non-gaussian joint-distribution
956
Using surrogates to reduce time expenditure for optimization in systems and control
957
Using Survey and Weighted Functions to Generate Node Probability Tables for Bayesian Networks
958
Using survival models to analyze the effects of social attributes on length of stay of stroke patients
959
Using surviving information in multiple access packet collisions
960
Using SVC for SSO Damping and Its Side-effects on the AC System
961
Using SVD and analyzing wavelets for the analysis and the segmentation of digital subtraction angiography images
962
Using SVD for Segmentation and Classification of Human Hand Actions
963
Using SVD-En3DVar for Radar Data Assimilation: Comparing Local and Global Schemes
964
Using SVG Technique to Organize and Display Data of Embedded GIS
965
Using SVG to Model and Query Image Annotations and Their History
966
Using SVM for efficient detection of human motion
967
Using SVM to design facial expression recognition for shape and texture features
968
Using SVM to Learn the Efficient Set in Multiple Objective Discrete Optimization
969
Using SVM to Organize the Image Database
970
Using SVM with Adaptively Asymmetric MisClassification Costs for Mine-Like Objects Detection
971
Using SVM with uneven margins to extract acronym-expansions
972
Using SVMS and discriminative models for speech recognition
973
Using SVMs Method to Detect Abrupt Change
974
Using Swarm Intelligence and Bayesian Inference for Aircraft Interrogation
975
Using swarm intelligence for dynamic Web content organizing
976
Using Swarm intelligence for XML Clustering
977
Using swarm Intelligence to perceive the Semantic Web
978
Using swarm robots based on leader-followers method for spherical object manipulation
979
Using swarming agents for scalable security in large network environments
980
Using SWEBOK for education programs in industry and academia
981
Using swept frequency acoustic interferometry for spherical resonator characteristics determination
982
Using SWIG to bind C++ to Python
983
Using switch directories to speed up cache-to-cache transfers in CC-NUMA multiprocessors
984
Using switched delay lines for exact emulation of FIFO multiplexers with variable length bursts
985
Using switched delay lines for exact emulation of FIFO multiplexers with variable length bursts
986
Using Switched Ethernet for Hard Real-Time Communication
987
Using Switching Function in Preliminary EMI-analysis of a Switching Power Supply
988
Using switching transients to exploit sensorless control information for electric machines
989
Using SWN nets to specify and analyze FT mechanisms adopted in electric plant automation
990
Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks
991
Using syllabic Mel cepstrum features and k-nearest neighbors to identify anurans and birds species
992
Using Symbiotic Displays to View Sensitive Information in Public
993
Using symbolic algebra in algorithmic level DSP synthesis
994
Using symbolic and connectionist algorithms to knowledge acquisition for credit evaluation
995
Using symbolic computation for power electronics
996
Using symbolic computation to find algebraic invariants
997
Using symbolic computer algebra for subexpression factorization and subexpression decomposition in high level synthesis
998
Using symbolic data in neuro-fuzzy classification
999
Using symbolic evaluation to understand behavior in configurable software systems
1000
Using Symbolic Execution in Embedded Software Testing
بازگشت