<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using the root-mean-square detector for weighting of disturbances according to its effect on digital communication services
2
Using the Routh-Hurwitz test to determine numbers and multiplicities of real roots of polynomial
3
Using the rules of planetary system to control the multi-robot formations
4
Using the scaling ambiguity for filter shortening in convolutive blind source separation
5
Using the SCR* toolset to specify software requirements
6
Using the script MIB for policy-based configuration management
7
Using the seasonal diversity between renewable energy sources to mitigate the effects of Wind generation uncertainties
8
Using the Security Camera System Based on Individually Maintained Computers for Homeland Security: The e-JIKEI Network Project
9
Using the Selected Candidate Vectors to Determine Kernel Parameters
10
Using the Self Aligned Field Implant to Design High Voltage Devices in Sub- µm CMOS Technologies
11
Using the self-organizing map to speed up the probability density estimation for speech recognition with mixture density HMMs
12
Using the Semantic Web and Web Apps to Connect Radiologists and Oncologists
13
Using the semantic Web to automate the operation of a hybrid internetwork
14
Using the semantic web to define a language for modelling controlled flexibility in software processes
15
Using the semantic web to enhance the digital living experience
16
Using the Semantically Interoperable Biospecimen Repository Application, caTissue: End User Deployment Lessons Learned
17
Using the Semantics Inherent in Sitemaps to Learn Ontologies
18
Using the sensitivity analysis of the noise spectral density and the sensitivity analysis of the noise figure for practical circuit design
19
Using the series-parallel resonant converter in capacitor charging applications
20
Using the shape-matching method to compute sea-surface velocities from AVHRR satellite images
21
Using the Shapley Value for Fair Consumer Compensation in Energy Demand Response Programs: Comparing Algorithms
22
Using the Sherman-Morrison-Woodbury Formula for Coupling External Circuits With FEM for Simulation of Eddy Current Problems
23
Using the Shlaer-Mellor object-oriented analysis method
24
Using the signal processing tools in a power systems course
25
Using the Signal Stopping Technique as a Measure of Editing Skills
26
Using the similarities between biological and computer virus behavior to connect and teach introductory concepts in cybersecurity in a biology classroom
27
Using the Simulation of Ecological Systems to Explain the Wheel of Retailing
28
Using the single point excitation technique to measure aperture impedance over a broad frequency range
29
Using the skin effect to estimate cracks depths in mettalic structures
30
Using the small-world model to improve Freenet performance
31
Using the smartphone camera to monitor heart rate and rhythm in heart failure patients
32
Using the Social Network Analysis as a Pedagogical Tool to Enhance Online Interactions
33
Using the Social Networking Graph for Image Organization
34
Using the social networks on the internet to establish Mechatronics Network
35
Using the software capability maturity model for certification projects
36
Using the Software Engineering Code of Ethics in Professional Computing Issues
37
Using the Software Process Improvement approach for Defining a Methodology for Embedded Systems Development using the CMMI-DEV v1.2
38
Using the software process model to analyze a software project
39
Using The Soybean Genome Database (SoyGD) To Display and Analyze a 1 Gbp Genome Sequence
40
Using the sphericity test for source detection with narrow-band passive arrays
41
Using the spheroidal coordinates for solving the diffraction problems by pattern equation method
42
Using the spiral model to assess, select and integrate software development tools
43
Using the Spring Physical Model to Extend a Cooperative Caching Protocol for Many-Core Processors
44
Using the SR3–60 Railgun in Augmented Mode
45
Using the SR3-60 railgun in augmented mode
46
Using the ST725 sonar for AUV feature based navigation and correction
47
Using the staff meeting format to teach oral communications
48
Using the STATCOM with energy storage to enhance the stability of AC-DC hybrid system
49
Using the STEP standard and databases in science
50
Using the Stochastic Collocation Method for the Uncertainty Quantification of Drug Concentration Due to Depot Shape Variability
51
Using the Stream Control Transmission Protocol and Multi-core Processors to Improve the Performance of Web Servers
52
Using the strong magnetic field to promote the ignition process in Magneto-Inertial Fusion
53
Using the structred analysis and design technique (SADT) in simulation conceptual modeling
54
Using the Structure of Subfields in the Construction of Goppa Codes and Extended Goppa Codes
55
Using the structure of the abstract to clarify and organize students´ thinking
56
Using the Structured-case Approach to Build Theory in E-Government
57
Using the superposition method to formulate the state variable matrix for linear networks
58
Using the Support Vector Regression Approach to Model Human Performance
59
Using the Surface Plasmon Resonance of Au Nanoparticles to Enhance Ultraviolet Response of ZnO Nanorods-Based Schottky-Barrier Photodetectors
60
Using the Surgery Suturing Progress Consequences to Design a Minimally Invasive Suturing Device
61
Using the Surrounding WEB Content of Pictures to Generate Candidates for Photo Annotation
62
Using the Swedish Ionosonde Network
63
Using the symmetrical six-port waveguide junction as a six-port reflectometer
64
Using the symmetries of a multi-layered network to reduce the weight space
65
Using the system [manufacturing software]
66
Using the system identify theorem for constructing the dynamic compliance of the brachial artery
67
Using the system linearity of reverberation chambers to derive an equivalent baseband model in time-domain to predict the chamber response to an input signal
68
Using the system-model-operator metaphor for knowledge acquisition
69
Using the Taguchi method to improve the brightness of AlGaInP MQW LED by wet oxidation
70
Using the Taguchi method to optimize the inspection equipment for human chorionic gonadotropin detection
71
Using the Taguchi methods to study the balance control of a rotary inverted pendulum
72
Using the task function approach to avoid robot joint limits and kinematic singularities in visual servoing
73
Using the Technology Acceptance Model to Explore Online Shopping Behavior: Online Experiences as a Moderator
74
Using the technology of low temperature co-fired ceramic to design the dual-band bandpass filter
75
Using the temperature coefficient of the resistance (TCR) as early reliability indicator for stressvoiding risks in Cu interconnects
76
Using the Testability Analysis Methodology for the Validation of AIRBUS Systems
77
Using the theories of finite automata and formal languages to determine observability of switched Boolean control networks
78
Using the theory of constraints to discover breakthrough solutions
79
Using the theory of constraints´ production application in a semiconductor fab with a reentrant bottleneck
80
Using the Theory of Inventive Problem-Solving (TRIZ) to Implement Safety Improvements in Foundry Engineering Pouring Procedures
81
Using the thermal-field measurements to evaluation the parameters of the MC based on AS
82
Using the Think Aloud Method to Observe Students´ Help-seeking Behavior in Math Tutoring Software
83
Using the thinkLet framework to improve distributed collaborative writing
84
Using the third order exponential smoothing forecasts on reducing the bullwhip effect and inventory costs in supply chain
85
Using the Thue-Morse Sequence to Cancel Low-Frequency Fluctuations
86
Using the time domain sensitivity analysis for an efficient design of symmetric microwave circuits
87
Using the time frequency structure of pitch periods to improve speaker verification systems
88
Using the timely computing base for dependable QoS adaptation
89
Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network
90
Using the TMS 320 on-chip CAN to control drive applications
91
Using the TOP500 to trace and project technology and architecture trends
92
Using the topological skeleton for scalable global metrical map-building
93
Using the topology-preserving properties of SOFMs in speech recognition
94
Using the total productive manufacturing (TPM) model to drive to a higher level of pollution prevention
95
Using the traction drive as the sensor to evaluate and track deterioration in electrified vehicle gearboxes
96
Using the Traction Drive as the Sensor to Evaluate and Track Deterioration in Electrified Vehicle Gearboxes
97
Using the trajectory analysis for measuring nano-objects by the interference phase-shifting systems
98
Using the transformed data to construct an extension-based fuzzy inference model
99
Using the Translation Lookaside Buffer to Map Threads in Parallel Applications Based on Shared Memory
100
Using the translational potential energy of springs for prosthetic systems
101
Using the trees to find the forest trustworthy computing as a systems-level issue
102
Using the Triangle Inequality to Accelerate TTSAS Cluster Algorithm
103
Using the TSPi Defined Process and Improving the Project Management Process
104
Using the turbo principle for exploiting temporal and spectral correlations in speech presence probability estimation
105
Using the UHF technique to investigate PD produced by defects in solid insulation
106
Using the Ultraviolet Laser Beam for Control of Radio-Protective Effect During the Action of Hard Ionizing Radiation on DNA Macromolecules
107
Using the UML language to express the ODP enterprise concepts
108
Using the UML Testing Profile for Enterprise Service Choreographies
109
Using the union algorithm of SLM and PTS to reduce PAPR in OFDM system
110
Using the union algorithm of SLM and PTS to reduce PAPR in OFDM system
111
Using the unity® game engine as a platform for advanced real time cinema image processing
112
Using the Unix System
113
Using the Unix System
114
Using the Unscented Kalman Filter in Mono-SLAM with Inverse Depth Parametrization for Autonomous Airship Control
115
Using the user space file system to protect file
116
Using the value chain model as a method of prioritizing green reengineering efforts
117
Using the variational methods and LPτ-search method in stochastic system study
118
Using the vectorcardiogram to remove ECG noise
119
Using the vibration frequency response analysis method to detect the winding deformation of power transformer
120
Using the Vietnamese Language Query Processing Framework to Build a Courseware Searching System
121
Using the Virtual Heart Model to validate the mode-switch pacemaker operation
122
Using the VISA Transition Library (VTL) version 3.0
123
Using the visitor experiences for mapping the possibilities of implementing a robotic guide in outdoor sites
124
Using the visual component in automatic speech recognition
125
Using the visual Words based on Affine-SIFT descriptors for face recognition
126
Using The Voice Spectrum For Improved Tracking Of People In A Joint Audio-Video Scheme
127
Using the VSim GUI to visualize high-order FV24 simulations of electrically large systems
128
Using the VXIplug&play WIN framework instrument drivers in Lab Windows/CVI and LabVIEW
129
Using the Waseda Bioinstrumentation System WB-1R to analyze Surgeon’s performance during laparoscopy - towards the development of a global performance index -
130
Using the waveguide invariant to analyze Lofargrams
131
Using the wavelet analysis based noise canceling technique to detect the integrity of the compensating capacitors of UM71 track circuit
132
Using the wavelet method for a multispectral remote sensing study of plant community spatial processes in broad range of spatial scales
133
Using the wavelet transform for the detection of magnetic underwater transient signals
134
Using the weak inversion region to optimize input stage design of CMOS op amps
135
Using the Web 1T 5-Gram Database for Attribute Selection in Formal Concept Analysis to Correct Overstemmed Clusters
136
Using the Web and Jini to link vending machines and enterprise systems
137
Using the Web corpus to translate the queries in cross-lingual information retrieval
138
Using the Web for document versioning: an implementation report for DeltaV
139
Using the Web in supplementary teacher education
140
Using the Web in your courses: the how-to´s and the why´s
141
Using the Web in your courses: what can you do? what should you do?
142
Using the Web to Construct Taxonomy for a Heterogeneous Community of Practice
143
Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition
144
Using the Web to create student dialogue outside the lecture hall: an empirical evaluation
145
Using the web to enhance education
146
Using the web to integrate ethics in the engineering curriculum
147
Using the Web to invite the local community into the engineering classroom
148
Using the Web to support distance learning of computer science
149
Using the wiki to deliver paperless software documentation
150
Using the Windowed means paradigm for single trial P300 detection
151
Using the WinWin spiral model: a case study
152
Using the Wireless and PLC Channels for Diversity
153
Using the World Wide Web for distributed learning: two examples
154
Using the World Wide Web for social change: drummergirl.com, a case study
155
Using the World Wide Web for teaching control systems design
156
Using the World Wide Web to link marine scientists and educators
157
Using the World Wide Web to promote software engineering education
158
Using the World Wide Web to provide a platform independent interface to high performance computing
159
Using the World Wide Web to teach biological engineering
160
Using the WWW as a medium for marketing research in financial services: the case of Xenon Laboratories
161
Using the WWW in advanced digital design courses
162
Using the WWW Test Pattern to check HTML client compliance
163
Using the WWW to support Project-Team formation
164
Using the XML-based Clinical Document Architecture for exchange of structured discharge summaries
165
Using the XQoS platform for designing and developing the QoS-seeker system
166
Using the X-Y Flexure Watch Crystal as a Pressure-Force Transducer
167
Using the Yourdon structured method (YSM) and Vienna development method (VDM) together during the system lifecycle
168
Using the ZDelta compression algorithm for data reduction in cellular networks
169
Using their digital notes: three cases to make Tacit knowledge visible in a Web-based surrounding
170
Using theorem provers to guarantee closed-loop system properties
171
Using theoretical descriptors in quantitative structure activity relationships
172
Using Theoretical Descriptors Tn St13ucture Activity Relationships: Acetylcholtnesterase Inhibition
173
Using theory of constraints to find the problem about high level inventory in the aerospace industry
174
Using theory of regions with selective siphon control for deadlock prevention policy in Petri nets
175
Using Theory to Enhance Technology Transfer and Diffusion of Innovations
176
Using theory to self-tune migration periods in distributed genetic algorithms
177
Using thermal analysis to enhance fault isolation techniques
178
Using thermal cycle and temperature / voltage testing to reduce the incidence of resistive / open reliability defects
179
Using Thermal Diagram Method for Heat Calculation of a Crane Induction Motor
180
Using thermal infrared temperature over sparse semi-arid vegetation for sensible heat flux estimation
181
Using thermal profiling to quantify optical feedback into semiconductor lasers
182
Using Thermal Time and Pixel Purity for Enhancing Biophysical Variable Time Series: An Interproduct Comparison
183
Using thermal transients at the outlet of electrical water heaters to recognise consumption patterns for heating schedule optimisation
184
Using thermodynamic impact for detecting refrigerant leaks in vapor compression equipment
185
Using Thermoelectric Cooling Chip (T.E.C.) to improve the stability of the Heat Pipe Performance Test Instrument
186
Using thermoelectric energy harvesting to power a self-sustaining temperature sensor in body area networks
187
Using ThermoNet, a web-based learning-resource, for teaching thermodynamics
188
Using thesaurus to model keyblock-based image retrieval
189
Using Thesaurus-Based Tag Clouds to Improve Test-Driven Code Search
190
Using thevenin equivalents to improve electricity delivery efficiency in AC and DC systems
191
Using Thick Substrates and Capacitive Probe Compensation to Enhance the Bandwidth of Traditional CP Patch Antennas
192
Using thin emitters to control BVce0 effects in punch-through diodes for ESD protection
193
Using thin films as debris shields for laser micro-machining and high energy laser target interactions
194
Using Thin Films to Screen Possible Scintillator Materials
195
Using thin metal layers on composite structures for shielding the electromagnetic pulse caused by nearby lightning
196
Using thin-film piezoelectret to detect tactile and slip signals for restoring sensation of prosthetic hands
197
Using thinking-aloud data to characterize cognitive tasks in hypertext
198
Using third order derivative method for syllable concatenation text to speech conversion
199
Using third-harmonic microscopy to easure ultrafast phase m transition in vanadium dioxide
200
Using Third-party Subsidy Program to Improve Trading Efficiency for Online Marketplaces
201
Using Thoracic Impedance for Identification of Return of Spontaneous Circulation during Resuscitation
202
Using threading and factory model to improve the performance of distributed object computing system
203
Using threats to demonstrate the elements of information security
204
Using three kinds of solid wastes improving barren soil
205
Using Three Layer Model (TLM) in Web Form Design: WeFDeC Checklist Development
206
Using Three Layer Neural Networks to Compute Discrete Real Functions
207
Using Three States for Binary Consensus on Complete Graphs
208
Using three-dimensional features to improve terrain classification
209
Using three-tier strategy based on GQM to generate test case metircs
210
Using three-winding transformers to save money and improve reliability and performance
211
Using threshold method to separate the edge, coating and body of tongue in automatic tongue diagnosis
212
Using threshold-based PUSC for throughput enhancement in WiMAX OFDMA
213
Using thresholding techniques for object detection in infrared images
214
Using thyristors and diodes to improve commutation
215
Using THz frequency combs generated from unstabilized femtosecond lasers for near- and far-field characterization of GHz and THz emitters
216
Using THz-TDS of ethyl lactate/water mixtures to gain insight into solvent dynamics
217
Using tickets to enforce the serializability of multidatabase transactions
218
Using TILCO for specifying real-time systems
219
Using tiling to scale parallel data cube construction
220
Using tilt-control in non-contact manipulation systems: Development of 2-DOF tilting actuator with remote center of rotation
221
Using time advance information to choose coding scheme in GPRS
222
Using time changing weights to improve the performance of multirobot multitarget observation
223
Using Time Decompositions to Analyze PubMed Abstracts
224
Using Time Delay Estimation and Perfect Tracking Control to Improve Precise Positioning of the Transmission System
225
Using time dependent variables for hazard analysis
226
Using Time Discretization to Schedule Scientific Workflows in Multiple Cloud Providers
227
Using time error differential measurement in protection applications
228
Using time moments to determine system response
229
Using time reversal of multipath for intra-pulse radar-embedded communications
230
Using time reversal technique to restore source image
231
Using Time Separation of Signals to Obtain Independent Proton and Antiproton Beam Position Measurements Around the Tevatron
232
Using time series analysis to forecast emergency patient arrivals in CT department
233
Using time series of SPOT VGT NDVI for crop yield forecasting
234
Using Time Series Segmentation for Deriving Vegetation Phenology Indices from MODIS NDVI Data
235
Using time skewing to eliminate idle time due to memory bandwidth and network limitations
236
Using time to improve the performance of coordinated checkpointing
237
Using Time Warp for computer network simulations on transputers
238
Using time-aware memory sensing to address resistance drift issue in multi-level phase change memory
239
Using Timed Automata for Modeling Distributed Systems with Clocks: Challenges and Solutions
240
Using Timed Automata Framework for Modeling Home Care Plans
241
Using timed Boolean algebra to solve false path problem in timing analysis
242
Using timed CSP for specification verification and simulation of multimedia synchronization
243
Using time-dependent neural networks for EEG classification
244
Using time-dependent reliability fallout as a function of yield to optimize burn-in time for a 130 nm SRAM device
245
Using time-discrete recurrent neural networks in nonlinear control
246
Using time-divisioning to improve the performance of bit-loading algorithms
247
Using time-frequency analysis technique in the classification of surface EMG signals
248
Using Timeline Displays to Improve Medication Reconciliation
249
Using time-of-day and location-based mobility profiles to improve scanning during handovers
250
Using Time-of-Flight cameras with active gaze control for 3D collision avoidance
251
Using Time-of-Flight Measurements for Privacy-Preserving Tracking in a Smart Room
252
Using time-resolved THz spectroscopy to study carrier dynamics and solar energy conversion in nanostructured materials
253
Using time-reversal symmetry for stabilizing a simple 3D walker model
254
Using timers to switch-off TCAM banks in routers
255
Using Time-Sequential Sampling to Stabilize the Color and Tone Reproduction Functions of a Xerographic Printing Process
256
Using time-series modis data for agricultural drought analysis in Texas
257
Using Times-Four Carrier Recovery in M-QAM Digital Radio Receivers
258
Using timestamp to realize audio-video synchronization in Real-Time streaming media transmission
259
Using timestamping to optimize two phase commit
260
Using time-triggered communications over IEEE 802.15.4
261
Using time-varying autoregressive filter to improve EMG amplitude estimator
262
Using Time-Varying Texels to Simulate Withering Grassland
263
Using Timing Advance to support proximity discovery in network-assisted D2D communication
264
Using timing analysis for the design of future switched based Ethernet automotive networks
265
Using timing flexibility of automatic test equipment to complement X-tolerant test compression techniques
266
Using TINA concepts for IN evolution
267
Using TL 9000 measurements [telecommunication industry quality standards]
268
Using TL 9000 requirements to improve telecommunications product quality and reliability
269
Using TLA for modeling and analysis of Web services composition
270
Using TLM for exploring bus-based SoC communication architectures
271
Using TLM method for simulation a new mine detection technique
272
Using TMR Architectures for SoC Yield Improvement
273
Using TMR Architectures for Yield Improvement
274
Using t-norms in multi-objective analysis with fuzzy criteria
275
Using TOC Thinking Process Tools to Improve Safety Performance
276
Using token allocations in a leaky bucket scheme
277
Using token leaky buckets for congestion feedback control in packets switched networks with guaranteed boundedness of buffer queues
278
Using tolerance results to improve reconfiguration process in flexible manufacturing systems
279
Using Tolerance Results To Improve Reconfiguration Process In Flexible Manufacturing Systems
280
Using tomographic (“ART”) methods with an interferometer to diagnose asymmetrical gas flow
281
Using tomographic measurements in process control
282
Using tone information for Vietnamese continuous speech recognition
283
Using tongue-hump-position information for vowel adaptation within a subcluster neural network
284
Using tool abstraction to compose systems
285
Using Tools in Teaching University Courses in Information Technology
286
Using Tool-Supported Model Based Safety Analysis -- Progress and Experiences in SAML Development
287
Using TOOMS/TROL for specifying a cellular phone
288
Using top n Recognition Candidates to Categorize On-line Handwritten Documents
289
Using TOP-C and AMPIC to Port Large Parallel Applications to the Computational Grid
290
Using Topic and Sample Weighting Clustering to Detect Hotspots and Their Trend in a Special Domain
291
Using Topic Discovery to Segment Large Communication Graphs for Social Network Analysis
292
Using Topic Hierarchies with Privileged Information to Improve Context-Aware Recommender Systems
293
Using topic keyword clusters for automatic document clustering
294
Using topic maps to describe engineering knowledge and geometry of CAD-designed products
295
Using topic models in domain adaptation
296
Using Topic Models to Support Software Maintenance
297
Using topic-concept based Clustering for Genomic Information Retrieval in TREC
298
Using topographic slope distributions to infer seafloor patterns
299
Using topographical channel distribution to decode movement directions from Local Field Potentials
300
Using topography statistics to help phase unwrapping
301
Using Topological Analysis to Support Event-Guided Exploration in Urban Data
302
Using topological constraints as context for the joint classification of image regions in a traffic environment
303
Using topological information of images to improve stereo matching
304
Using Topology Aggregation for Efficient Shared Segment Protection Solutions in Multi-Domain Networks
305
Using topology-aware communication services in grid environments
306
Using TOPSAR for District Observation
307
Using TOPSIS Method with Interval Number to Assess Air Quality for 16th Asian Olympic Games
308
Using torque-ripple-induced vibration to determine the initial rotor position of a permanent magnet synchronous machine
309
Using torsional vibration analysis as a synergistic method for crack detection in rotating equipment
310
Using total correlation to discover related clusters of clinical chemistry parameters
311
Using total lightning data in severe storm prediction: Global case study analysis from north America, Brazil and Australia
312
Using touch gestures to adjust context parameters in mobile recommender and search applications
313
Using Touchable Tabletop as Unified Control Platform in Digital Home
314
Using TouchPad pressure to detect negative affect
315
Using TPACK to assess integration of remote experiments in Basic Education
316
Using TPM to ensure security, trust and privacy (STP) in VANET
317
Using TPM to improve boot security at BIOS layer
318
Using T-QAAT for comparison of quality management practices in telecom industry (a comparative case study of telecom organizations of Pakistan)
319
Using Trac for Empirical Data Collection and Analysis in Developing Small and Medium-Sized Enterprise Systems
320
Using Trace Scratchpads to Reduce Execution Times in Predictable Real-Time Architectures
321
Using Traceability for Incremental Construction and Evolution of Software Product Portfolios
322
Using traceability links to identifying potentially erroneous artifacts during regulatory reviews
323
Using Traceability Links to Recommend Adaptive Changes for Documentation Evolution
324
Using traceability mechanisms to support software product line evolution
325
Using Traceability to Enhance Mutation Analysis Dedicated to Model Transformation
326
Using Traceability to Support SOA Impact Analysis
327
Using tracelab to design, execute, and baseline empirical requirements engineering experiments
328
Using TRACER to capture and control requirements-the equipment specification
329
Using traces based on procedure calls to reason about composability
330
Using Traces to Qualify Learner´s Engagement in Game-Based Learning
331
Using Tracing to Diagnose or Monitor Systems
332
Using tracing to direct our reasoning about distributed programs
333
Using Tracing to Solve the Multicore System Debug Problem
334
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
335
Using tractography to infer Basal ganglia´s functional subterritories distribution change in Huntington disease
336
Using trade-off analysis to uncover links between functional and non-functional requirements in use-case analysis
337
Using traders for autonomous service provision in intelligent networks
338
Using Traditional Data Analysis Algorithms to Detect Access Patterns for Massive Data Processing
339
Using traditional horizontal-vertical illusion figures and single lines to directly compare haptics and vision
340
Using traditional methods and technology in cognitive stimulation in the elderly: an experimental study with a control group
341
Using traffic agents to improve bus services
342
Using Traffic Analysis to Identify the Second Generation Onion Router
343
Using traffic data of various types in the estimation of dynamic O-D matrices
344
Using traffic flow data to analyze the large-scale social networking behavior
345
Using traffic flow for cluster formation in vehicular ad-hoc networks
346
Using traffic phase shifting to improve AFDX link utilization
347
Using traffic regulation to meet end-to-end deadline in hard real time ATM networks
348
Using traffic regulation to meet end-to-end deadlines in ATM LANs
349
Using traffic regulation to meet end-to-end deadlines in ATM networks
350
Using Traffic Self-Similarity for Network Anomalies Detection
351
Using Traffic Shaping to Improve Performance for Raw Data Transfer and Video Streaming
352
Using training and development to recover failing projects
353
Using trajectory features for upper limb action recognition
354
Using trajectory sensitivity for different models and operation conditions for synchronous generator parameter estimation
355
Using Trajectory Sensitivity for Stability Assessment of a Ward-PV Equivalent Power System
356
Using trajectory tracking control for expressive-based SLA applications in internet computing
357
Using Tranformation Rules to Align Requirements and Archictectural Models
358
Using Transaction Level Modeling techniques for wireless sensor network simulation
359
Using Transactional Memory on CC-NUMA systems
360
Using Transactional Memory to Synchronize an Adaptive Garbage Collector in Real-Time Java
361
Using transaction-level simulation to prepare for and recover from supply-chain disasters
362
Using transactions in distributed applications
363
Using Transfer Function Calculation and Extrapolation to Improve the Efficiency of the Finite-Difference Time-Domain Method at Low Frequencies
364
Using Transfer Learning to Speed-Up Reinforcement Learning: A Cased-Based Approach
365
Using Transfer Matrix Method to Study the Acoustic Property of Drill Strings
366
Using transfer matrix to analyze the dosimetry of ion implanters
367
Using Transfer-Resource Graph for Software-Based Verification of System-on-Chip
368
Using TransFlow to Analyze Open Source Developers´ Evolution
369
Using transformation optics to design optical devices
370
Using transformations in specification-based prototyping
371
Using transformations to analyze defect structure SPC charts: a case study
372
Using transformer differential relay IOP characteristics to measure near-trip conditions
373
Using transformer parasitics for resonant converters - a review of the calculation of the stray capacitance of transformers
374
Using Transformer Parasitics for Resonant Converters—A Review of the Calculation of the Stray Capacitance of Transformers
375
Using transient behavior of TCP in mitigation of distributed denial of service attacks
376
Using transient electrical measurements for real-time monitoring of battery state-of-charge and state-of-health
377
Using transient models of liquid pipelines
378
Using transient properties of a tunable narrowband antenna to realize a dual-band antenna
379
Using transient response of tin oxide gas sensor for measuring hydrogen concentration
380
Using transient waveform recorders to measure and store beam parameters
381
Using transient/persistent errors to develop automated test oracles for event-driven software
382
Using transistors to linearise biochemistry
383
Using transit or municipal vehicles as moving observer platforms for large scale collection of traffic and transportation system information
384
Using transition systems to formalize a pattern for time dependable applications
385
Using transition test to understand timing behavior of logic circuits on UltraSPARCTM T2 family
386
Using transitive construction for developing Arabic text summarization system
387
Using Translation Paraphrases from Trilingual Corpora to Improve Phrase-Based Statistical Machine Translation: A Preliminary Report
388
Using translational science in visual analytics
389
Using translational score maps to aid MT evaluation
390
Using Transmission Laser Bonding Technique for Line Bonding in Microsystem Packaging
391
Using Transmission Line Outage Data to Estimate Cascading Failure Propagation in an Electric Power System
392
Using Transmission Lines for Global On-Chip Communication
393
Using transmission lines properties for converter realization
394
Using transmission properties to determine blood glucose levels
395
Using Transmit-Only Sensors to Reduce Deployment Cost of Wireless Sensor Networks
396
Using Transmural Regularization and Dynamic Modeling for Noninvasive Cardiac Potential Imaging of Endocardial Pacing With Imprecise Thoracic Geometry
397
Using transparent files in a fault tolerant distributed file system
398
Using Transparent Shaping and Web Services to Support Self-Management of Composite Systems
399
Using transparent WDM metro rings to provide an out-of-band control network for OpenFlow in MAN
400
Using transport equations in the teaching of electromagnetics
401
Using Transputer Computing Systems at the Budker Institute of Nuclear Physics
402
Using travel-time perception models for traveler information systems evaluation
403
Using Tree Diagram Concepts to model Use Case Flows
404
Using tree of concepts and hierarchical reordering for diversity in image retrieval
405
Using tree structures to resynchronize permutation codes
406
Using tree topology for multicast congestion control
407
Using tree-grammars for training set expansion in page classi .cation
408
Using triads to identify local community structure in social networks
409
Using triangle inequality to efficiently process continuous queries on high-dimensional streaming time series
410
Using triangular fuzzy numbers in the tests of control charts for unnatural patterns
411
Using triangular voltage sweep to detect mobile ions in silicon carbide MOS
412
Using Triangularly Weighted Interpolation to Get 13-Bit PCM from a Sigma-Delta Modulator
413
Using triangulation to identify word senses
414
Using triangulation to include target structure improves drug resistance prediction accuracy
415
Using tries for subset and superset queries
416
Using tries to eliminate pattern collisions in perfect hashing
417
Using trinocular vision to build a real-time world model
418
Using trip information for PHEV fuel consumption minimization
419
Using Triplet Arrays for Broadband Reverberation Analysis and Inversions
420
Using tri-training to exploit spectral and spatial information for hyperspectral data classification
421
Using TRIZ, parametric modeling, FEA simulation, and rapid prototyping to foster creative design
422
Using Tropos to model agent based architectures for adaptive systems: a case study in ambient intelligence
423
Using Tropos to model quality of service for designing distributed systems
424
Using trunk compensation to model head stabilization during locomotion
425
Using trust and possibilistic reasoning to deal with untrustworthy communication in VANETs
426
Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks
427
Using Trust and Risk in Access Control for Grid Environment
428
Using Trust and Self-Confidence for Coalition Formation in Migrating Workflow
429
Using trust for key distribution and route selection in Wireless Sensor Networks
430
Using trust for secure collaboration in uncertain environments
431
Using trust in distributed consensus with adversaries in sensor and other networks
432
Using Trust in Key Distribution in Wireless Sensor Networks
433
Using Trust Metric to Detect Malicious Behaviors in WSNs
434
Using Trust to reduce wasteful computation in open Desktop Grid Systems
435
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
436
Using Trusted Computing to Build a Safer World
437
Using trusted platform module to mitigate SSL stripping
438
Using trusted third party services to provide a secure Web-based medical environment
439
Using Trustworthy and Referee Agents to Secure Multi-Agent Systems
440
Using Trustworthy Simulation to Engineer Cloud Schedulers
441
Using truth maintenance systems. A tutorial
442
Using TS fuzzy models in anytime control systems
443
Using Tsallis entropy into a Bayesian network for CBIR
444
Using TSVs for thermal mitigation in 3D circuits: Wish and truth
445
Using Tsypkin´s Approach for the Study of a Class of Mixed-Signal Nonlinear Systems
446
Using TTCN-3 as a modeling language for web penetration testing
447
Using TTCN-3 in Performance Test for Service Application
448
Using TTCN-3 to Test SPDY Protocol Interaction Property
449
Using Tuangou to Reduce IP Transit Costs
450
Using Tucker Decomposition to Compress Color Images
451
Using tunable optical transceivers for reducing the number of ports in WDM/TDM networks
452
Using Tuneable Fuzzy Similarity in Non-metric Search
453
Using tuned diffuse scattering parameters in ray tracing channel modeling
454
Using tuned LS-SVR to derive normal height from GPS height
455
Using turbo code in BLAST system
456
Using turbo codes with layered space-time coding for MIMO wireless systems
457
Using TV receiver information to increase cognitive white space spectrum
458
Using TV White Space for interference mitigation in LTE Femtocell Networks
459
Using TV White Spaces and e-Learning in South African rural schools
460
Using TWDP to quantify channel performance with frequency-domain s-parameter data
461
Using twinning to adapt programs to alternative APIs
462
Using Twitter as a diagnostic teaching and learning assessment tool
463
Using Twitter Content to Predict Psychopathy
464
Using Twitter data to improve news results on search engine
465
Using Twitter for Next-Place Prediction, with an Application to Crime Prediction
466
Using Twitter for Tapping Public Minds, Predict Trends and Generate Value
467
Using Twitter Sentiment to Forecast the 2013 Pakistani Election and the 2014 Indian Election
468
Using Twitter to define human uses for the MSP process
469
Using Twitter to Enhance Traffic Incident Awareness
470
Using Twitter to Support Peer Instruction: A Case Study
471
Using Twitter´s Mentions for Efficient Emergency Message Propagation
472
Using two global positioning system satellites to improve wireless fidelity positioning accuracy in urban canyons
473
Using two GNSS satellites and few DVB-T signals for positioning in dynamic scenarios
474
Using two kinds of consensus control to solve the energy equalization problem of battery pack
475
Using two line scanning based spectral cameras simultaneously in one measurement process to create wider spectral area from the measured target
476
Using two methods for recognition common carotid artery of B-mode longitudinal ultrasound image
477
Using two multivariate methods for line congestion study in transmission systems under uncertainty
478
Using Two Multivariate Methods for Line Congestion Study in Transmission Systems under Uncertainty
479
Using Two Nodes and Neighbors Examining to Improve Positioning Capability in Sensor Networks
480
Using Two Ontologies to Index e-Learning Resources
481
Using two PSO-structures approaches to estimate induction machine parameters
482
Using two ray multipath model for microwave link budget analysis
483
Using two semi-fragile watermark for image authentication
484
Using two-class classifiers for multiclass classification
485
Using two-dimensional filament modeling to predict Ldmos and Scrldmos behavior under high current ESD conditions
486
Using Two-Dimensional Markov Models and the Effective-Capacity Approach for Cross-Layer Design in AMC/ARQ-Based Wireless Networks
487
Using two-dimensional structures to model filamentation in semiconductor devices
488
Using two-dimensional subspaces gained by intersections to recognize three-dimensional objects
489
Using two-level modulation technique QAM-FM for radio link digital updating
490
Using two-level stable storage for efficient checkpointing
491
Using Two-mode Input Shaping to Repress the Residual Vibration of Cherry Pickers
492
Using two-stage Approach to Clustering
493
Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy
494
Using two-stage genetic algorithms to solve the nonlinear time series models for ten-day streamflow forecasting
495
Using Two-Stage Method to Solve 1.5-Dimensional Cutting Stock Problem
496
Using Two-Step Mesa to Prevent the Effects of Sidewall Defects on the GaN p-i-n Diodes
497
Using Two-tier Bitwise Interest Oriented QRP Data Structure for High Clustering through Interest Similarity in SWB P2P Systems
498
Using two-tier bitwise interest oriented QRP with artificial bee colony optimization to reduce message flooding and improve recall rate for a small world peer-to-peer system
499
Using Two-Way Datacasting to Deliver Real-Time Public Safety Information
500
Using type enforcement to assure a configurable guard
501
Using type inference and induced rules to provide intensional answers
502
Using type transformations to generate program variants for FPGA design space exploration
503
Using Type-2 fuzzy function for diagnosing brain tumors based on image processing approach
504
Using type-2 fuzzy logic systems for spike detection in the hypoxic ischemic EEG of the preterm fetal sheep
505
Using type-2 fuzzy logic systems to infer the operative configuration of distribution networks
506
Using Type-2 Fuzzy Models to Detect Fall Incidents and Abnormal Gaits among Elderly
507
Using Type-of-Relationship (ToR) Graphs to Select Disjoint Paths in Overlay Networks
508
Using Types and Inheritance in Object-Oriented Programming
509
Using Types to Enforce Architectural Structure
510
Using UAVs for remote study of ice in the arctic with a view to laying the optimal route vessel
511
Using Ubi-media in natural language interfaces of robots
512
Using ubiquitous computing technology to realise scalable intelligent agricultural environments
513
Using Ubiquitous Sensor Network to predict the failure of slope by mathematical model
514
Using U-Bot for RoboCup@home
515
Using UG Software Straight Bevel Gear 3D Modeling
516
Using UHF connectivity to off-load VHF messaging in tactical MANETs
517
Using UICDS to Share Data in the Real-Time Decision Support System for Pandemic Response
518
Using ultra narrow bandwidth to overcome traditional problems with distribution line carrier
519
Using ultra violet radiation curable resins for printed circuit coatings
520
Using ultracapacitors as energy-storing devices on a mobile robot platform power system for ultra-fast charging
521
Using ultracapacitors to optimize energy storage in a photovoltaic system
522
Using ultrasonic energy for reducing ACF bonding process time
523
Using ultrasonic guided wave mode cutoff for corrosion detection and classification
524
Using ultrasonic hand tracking to augment motion analysis based recognition of manipulative gestures
525
Using ultrasonics for sensing in a robotic environment
526
Using ultrasonics to control robot arm positioning
527
Using ultrasonography method for monitoring ovarian status in freshwater stingray (Potamotrygon sp.)
528
Using Ultrasound Backscattering Signals and Nakagami Statistical Distribution to Assess Regional Cataract Hardness
529
Using ultrasound image analysis to evaluate the role of elastography imaging in the diagnosis of carotid atherosclerosis
530
Using Ultrasound Images of the Forearm to Predict Finger Positions
531
Using ultrasound imaging to identify landmarks in vertebra models to assess spinal deformity
532
Using ultrasound to understand acupuncture
533
Using ultraviolet imaging method to detect the external insulation faults of electric device
534
Using ultra-wideband sensing technology for intestinal motility measurement
535
Using UltraWideband to teach electromagnetics
536
Using UltraWideband to teach electromagnetics
537
Using UML 2 activity diagram for visual business management modeling
538
Using UML 2.0 for system level design of real time SoC platforms for stream processing
539
Using UML Activity Diagrams and Event B for Distributed and Parallel Applications
540
Using UML and Maude for writing and reasoning about ODP policies
541
Using UML and object-coordination-nets for workflow specification
542
Using UML as Front-end for Heterogeneous Software Code Generation Strategies
543
Using UML Diagrams to Model Real-Time Web Services
544
Using UML for modeling PDM system architectures
545
Using UML for Modelling Cross-Cutting Concerns in Aspect Oriented Software Engineering
546
Using UML for Real Time Geomatic Modelisation
547
Using UML for service creation
548
Using UML for the development of distributed industrial process measurement and control systems
549
Using UML in control and automation: a model driven approach
550
Using UML Models and Formal Verification in Model-Based Testing
551
Using UML Profile and OCL to Impose Regulatory Requirements on Safety-Critical System
552
Using UML profile for connecting information architecture and detailed information design
553
Using UML Profiles for Enterprise Knowledge Modelling
554
Using UML profiles to interchange DSML and UML models
555
Using UML scenarios in B2B systems
556
Using UML Sequence Diagrams and State Machines for Test Input Generation
557
Using UML state diagrams for visual modeling of business rules
558
Using UML to design distributed collaborative workflows: from UML to XPDL
559
Using UML to model dependencies in systems of systems
560
Using UML to specify general communication systems
561
Using UML(VR) for Supporting the Automated Test Data Generation
562
Using UML2.0 and GG for describing the dynamic of software architectures
563
Using UML-based rate monotonic analysis to predict schedulability
564
Using UML-based Rules for Web Services Modeling
565
Using UMLS-based Re-Weighting Terms as a Query Expansion Strategy
566
Using uncertain complex numbers with VNA measurements
567
Using uncertain set points in predictive functional control
568
Using Uncertainty Bounds in the Design of an Embedded Real-Time Type-2 Neuro-Fuzzy Speed Controller for Marine Diesel Engines
569
Using uncertainty techniques to aid defect classification in an automated visual inspection system
570
Using Uncertainty to Guide Characterization, Closure, and Long-Term Management of an Underground Nuclear Test Site
571
Using Unclaimed Sub-Carriers in Opportunistic OFDMA Systems
572
Using unconstrained elite archives for multiobjective optimization
573
Using unconstrained optimization in the design of two-channel perfect-reconstruction linear-phase FIR filter banks
574
Using Unconstrained Tongue Motion as an Alternative Control Mechanism for Wheeled Mobility
575
Using Unconventional Awareness in Emergency Responses
576
Using unconventional materials for electromagnetic shielding
577
Using uncorrelated discriminant analysis for tissue classification with gene expression data
578
Using Uncorrupted Neighborhoods of the Pixels for Impulsive Noise Suppression With ANFIS
579
Using Underutilized CPU Resources to Enhance Its Reliability
580
Using underwater ambient sound to localize swarms of underwater vehicles
581
Using unfamiliar platforms in software engineering projects
582
Using unfoldings in automated testing of multithreaded programs
583
Using unified famous objects (UFO) to automate Alzheimer´s disease diagnostics
584
Using unified modeling language to model the immune system in object oriented perspective
585
Using unified parallel C to parallelize the FDTD method of computational electrodynamics
586
Using unified power format standard concepts for power-aware design and verification of systems-onchip at transaction level
587
Using Uniform-Design Genetic Expression Programming for chaotic time series prediction
588
Using Uniformization for Derivative Estimation in Simulation
589
Using UniMod for maintenance tasks: An experimental assessment in the context of model driven development
590
Using Unity 3D to facilitate mobile augmented reality game development
591
Using unity for 3D object orientation in a virtual environment
592
Using Unity to semi-automatically integrate relational schema
593
Using Univariate Bezier Distributions to Model Simulation Input Processes
594
Using universal coding approach to randomness testing
595
Using Universal Line Model (ULM) for Simulating Electromagnetic Transients in Three-Phase Transmission Lines
596
Using universe knowledge and arithmetic to get faster parallel algorithms
597
Using universities as a knowledge resource: how to identify and develop effective, educational programs for technical communicators
598
Using University-Funded Research Projects to Teach System Design Processes and Tools
599
Using unknown input observers to detect and isolate sensor faults in a turbofan engine
600
Using unknowns for hiding sensitive predictive association rules
601
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings
602
Using unlocated fingerprints in generation of WLAN maps for indoor positioning
603
Using Unmanned Aerial Vehicle chain to improve link capacity of two mobile nodes
604
Using unmanned aerial vehicle for remote sensing application
605
Using Unmanned Aerial Vehicle to Connect Disjoint Segments of Wireless Sensor Network
606
Using unmanned aerial vehicles as relays in wireless balloon networks
607
Using unmanned ground vehicle performance measurements as a unique method of terrain classification
608
Using Unmixing Method to Retrieve the Concentration of Chl-a in Lake Tai
609
Using unreliable data for creating more reliable online learners
610
Using unrestricted loops in genetic programming for image classification
611
Using Unrestricted Mobile Sensors to Infer Tapped and Traced User Inputs
612
Using Unscented Kalman Filter for Road Tracing from Satellite Images
613
Using unscented transform as alternative to Monte Carlo in bit error rate calculations
614
Using unsuccessful auction bids to identify latent demand
615
Using Unsupervised Analysis to Constrain Generalization Bounds for Support Vector Classifiers
616
Using Unsupervised Learning for Graph Construction in Semi-supervised Learning with Graphs
617
Using unsupervised learning to determine risk level for left ventricular diastolic dysfunction
618
Using Untampered Metrics to Decide When to Stop Testing Software
619
Using unusable frequencies [solid-state terahertz laser]
620
Using UPFC in order to Power flow control
621
Using UPnP-CWMP integration for operator-assisted management of domestic LANs
622
Using UPPAAL to model and verify a clock synchronization protocol for the controller area network
623
Using upper bounds on attainable discrimination to select discrete valued features
624
Using upper confidence bounds for online learning
625
Using use cases in Executable Z
626
Using User Interface Design to Enhance Service Identification
627
Using user interface event information in dynamic voltage scaling algorithms
628
Using user models in software agents: the Virtual Secretary
629
Using User Perception to Determine Suitable Error Thresholds for Dead Reckoning in Distributed Interactive Applications
630
Using User Preferences to Enhance Privacy in Pervasive Systems
631
Using user similarity to infer trust values in social networks regardless of direct ratings
632
Using User-Level Virtualization in Desktop Grid Clients for Application Delivery and Sandboxing
633
Using users: when does external knowledge enhance corporate product innovation?
634
Using U-Shaped Localized Surface Plasmon Resonance Sensors to Compensate for Nonspecific Interactions
635
Using UTAUT to explore the behavior of 3G mobile communication users
636
Using utility and microutility for information dissemination in Vehicle Ad Hoc Networks
637
Using utility demand-side management programs to spur the development of more efficient appliances
638
Using utility information to calibrate customer demand management behavior models
639
Using utility information to calibrate customer demand management behavior models
640
Using Utility Information to Calibrate Customer Demand Management Behavior Models
641
Using utility prediction models to dynamically choose program thread counts
642
Using UV roll-to-plate imprint lithography to fabricate light guide plates with microdot patterns
643
Using UWB Gaussian pulses for inter-vehicle communications
644
Using UWB Radios as Sensors for Disaster Recovery
645
Using UWB sensor for delta robot vibration detection
646
Using V2V communication to create Over-the-horizon Awareness in multiple-lane highway scenarios
647
Using vague knowledge for image description
648
Using Vagueness Measures to Re-rank Documents Retrieved by a Fuzzy Set Information Retrieval Model
649
Using validation by inference to select a hypothesis function
650
Using Value Added Services to Realise the Benefits of Enterprise Small Cell Deployments: Discussion and Prototype
651
Using value engineering and TRIZ for better business process management
652
Using value locality to reduce memory encryption overhead in embedded processors
653
Using Value Network Analysis to Support Data Driven Decision Making in Urban Planning
654
Using value similarity of registers for soft error mitigation
655
Using VANET to support green vehicle communications for urban operation rescue
656
Using vanishing points for purposive adjustment of viewing direction
657
Using vanishing points to correct camera rotation in images
658
Using vanishing points to estimate parameters of fisheye camera
659
Using vanishing points to improve visual-inertial odometry
660
Using Variability Models to Reduce Verification Effort of Train Station Models
661
Using variable clocking to reduce leakage in synchronous circuits
662
Using Variable Communication Technologies for Realizing Business Collaborations
663
Using variable length 13-ary, radix-4 CSD coefficients to achieve low-area implementations of FIR filters
664
Using variable length coefficients to design low-space FIR filters for FPGAs
665
Using Variable Neighborhood Search to improve the Support Vector Machine performance in embedded automotive applications
666
Using variable reluctance sensors for differential odometer applications
667
Using variable-length codes to correct Insertion, Deletion and substitution errors
668
Using variable-length error-correcting codes in MPEG-4 video
669
Using variable-MHz microprocessors to efficiently handle uncertainty in real-time systems
670
Using variable-speed drives with `sloppy´ mechanical systems
671
Using variational approach and spectrometry-specific criteria for calibration of spectrometric systems
672
Using variational bayes free energy for unsupervised voice activity detection
673
Using various computer tools in electrical transients studies
674
Using Various Pulse Durations and Reference Cells on Long-Pulse Solar Simulator for CIGS Thin-Film PV Module Performance Measurements
675
Using varying channel impulse response to determine water pollution
676
Using VCSELs and multicore fiber for multi-channel transmission
677
Using VEC formulation for energy demand and consumption forecasts for short and long term considering the impact of price-elasticity and external shocks
678
Using Vector Clocks to Visualize Communication Flow
679
Using vector of fractal dimensions for feature reduction and phoneme recognition and classification
680
Using vector of fractal dimensions for feature reduction and phoneme recognition and classification
681
Using vector operations to identify niches for particle swarm optimization
682
Using vector quantization for image processing
683
Using vector quantization in Automatic Speaker Verification
684
Using Vector Quantization of Hough Transform for Circle Detection
685
Using vector quantization to build nonlinear factorial models of the low-dimensional independent manifolds in optical imaging data
686
Using vector time to handle multiple failures in distributed systems
687
Using vector-metrics for the comparison of communication technologies in smart grids
688
Using vehicle-to-grid to maximize the integration of intermittent renewable energy resources in islanded electric grids
689
Using vehicular networks for urban surveillance: An adaptive data collection scheme
690
Using Vehicular Sensor Networks for Mobile Surveillance
691
Using vela to teach AC theory
692
Using Verbal Protocols to Assess the Influence of Import-Coupling on the Comprehensibility of OCL Expressions
693
Using verification technology for validation coverage analysis and test generation
694
Using verified control envelopes for safe controller design
695
Using Verilog LOGISCOPE to analyze student programs
696
Using Verilog simulation libraries for ATPG
697
Using version control data to evaluate the impact of software tools
698
Using version control data to evaluate the impact of software tools: a case study of the Version Editor
699
Using Version Control History to Follow the Changes of Source Code Elements
700
Using version control systems in software development
701
Using version information in architectural clustering - a case study
702
Using version spaces to support incremental searches in a software library
703
Using vertical and horizontal multipath models in radar simulations
704
Using vertical integration to improve assimilation of GSS: a case study
705
Using very high resolution satellite imagery for land cover mapping in Pico Da Vara Nature Reserve (S. Miguel Island, Archipelago of the Azores, Portugal)
706
Using very large arrays of intelligent sensors
707
Using Very Small Population Sizes in Genetic Programming
708
Using very-low-frequency and oscillating-wave tests to improve the reliability of distribution cables
709
Using VFTLP data to design for CDM robustness
710
Using VHDL for board level simulation
711
Using VHDL for datapath synthesis
712
Using VHDL for high-level, mixed-mode system simulation
713
Using VHDL for HW/SW co-specification
714
Using VHDL for Link to Synthesis Tools
715
Using VHDL for modeling and design of processing units
716
Using VHDL for simulation of SDL specifications
717
Using VHDL Simulator to Estimate Logic Path Delays in Combinational and Embedded Sequential Circuits
718
Using VHDL to Improve an FPGA Based Educational Microcomputer
719
Using VHDL-based fault injection to exercise error detection mechanisms in the time-triggered architecture
720
Using via fences for crosstalk reduction in PCB circuits
721
Using Via Stubs in Periodic Structures for Microwave Filter Design
722
Using vibration monitoring techniques to minimize plant downtime
723
Using vibro-acoustography to detect brachytherapy metal seeds
724
Using vibro-ultrasound method to assess the vastus intermedius stiffness over the entire range of step isometric contraction of knee extensors
725
Using vicon bodybuilder and plug-in-gait to generate L5/S1 angles, forces and moments
726
Using video conferencing for international teaching: A case study linking the us to Central America
727
Using video for recovering texture
728
Using Video Mashup to deliver personalized video services in IMS networks
729
Using video microscopy to characterize micromechanical systems
730
Using Video Scalability for Designing Safe Multimedia Transactions
731
Using video technology for reducing TV energy
732
Using video tools to teach nanoparticles characterization: Contents for a distance learning course
733
Using Video Tutorials as a Carrot-and-Stick Approach to Learning
734
Using Videos Derived from Simulations to Support the Analysis of Spatial Awareness in Synthetic Vision Displays
735
Using videotaped cases to elicit perceptual expertise in laparoscopic surgery
736
Using view interpolation for low bit rate video
737
Using ViewPoints for inconsistency management
738
Using viewpoints to define domain requirements
739
Using views for customizing reusable components in component-based frameworks
740
Using views for product data exchange
741
Using Views in a Multilevel Secure Database Management System
742
Using views to maintain Petri-net-based process models
743
Using Views to Specify a Synchronization Aspect for Object-Oriented Languages
744
Using VIIRS to provide data continuity with MODIS
745
Using VIRMANEL and SILUMOD to study protocol for mobile multihop networks
746
Using virtual addresses as object references
747
Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications
748
Using virtual coordinates for wireless sensor networks: Proof-of-concept experimentation
749
Using Virtual CPU Migration to Solve the Lock Holder Preemption Problem in a Multicore Processor-Based Virtualization Layer for Embedded Systems
750
Using virtual credits to provide incentives for vehicle communication
751
Using virtual data effects to stabilize pilot run neural network modeling
752
Using virtual direct power control for synchronizing DFIG with grid
753
Using virtual environments as a tool to evaluate electric vehicle sounds
754
Using Virtual Environments for Stroke Rehabilitation
755
Using virtual environments to support electrical safety awareness in construction
756
Using Virtual Environments to Tell the Story: "The Battle of Thermopylae"
757
Using virtual environments to train firefighters
758
Using Virtual Forest Environment on collaborative forest management
759
Using virtual grids to simplify application scheduling
760
Using virtual humans to solve real ergonomic design problems
761
Using virtual impedance network to improve the control performances of LCL-type grid-connected inverter under the weak grid condition
762
Using virtual impedance to analyze the stability of LCL-filtered grid-connected inverters
763
Using virtual internships as an innovative learning technique
764
Using virtual learning environments: lecturers´ conceptions of teaching and the move to student-centred learning
765
Using virtual links for reliable information retrieval across point-to-point networks
766
Using Virtual Linux servers
767
Using virtual load/store queues (VLSQs) to reduce the negative effects of reordered memory instructions
768
Using Virtual Machine Protections to Enhance Whitebox Cryptography
769
Using Virtual Machine Security to Reinforce Components Constraints
770
Using virtual machine technology to establish Network Security teaching platform
771
Using virtual machines in a K-12 Outreach program to increase interest in information security fields
772
Using Virtual Manipulatives Based on Misconception to Assist After-School Remedial Instruction: A Case Study
773
Using Virtual Manufacturing Technology to design and manufacture the product
774
Using virtual MIMO in off-body channels for power efficient communications
775
Using Virtual Mobile Nodes for Neighbor Detection in Proximity-Based Mobile Applications
776
Using virtual objects to aid underground storage tank teleoperation
777
Using virtual organizations membership system with EDG´s grid security and database access
778
Using virtual potential fields for electric wheelchair guidance
779
Using Virtual Private Networks for Reliable VM Based HPC Systems
780
Using virtual reality for diagnosis and rehabilitation of patients with hemispatial neglect
781
Using virtual reality for distance teaching a graduate information systems course
782
Using Virtual Reality for Gesture and Vocal Interface Validation in Industrial Environments
783
Using Virtual Reality for Interpreter-mediated Communication and Training
784
Using virtual reality for teaching solid geometry: A case study for a cube section
785
Using virtual reality technology in linguistic research
786
Using Virtual Reality to Analyze Sports Performance
787
Using virtual reality to bring Singaporean heritage to life
788
Using virtual reality to construct knowledge
789
Using virtual reality to induce cross-axis adaptation of postural control: Implications for rehabilitation
790
Using Virtual Reality to Visualize Scientific, Engineering, and Medical Data
791
Using Virtual Reference Tags to Improve the Accuracy of Active RFID-Based Positioning Systems
792
Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks
793
Using Virtual Services to Bridge the Semantic Gap
794
Using virtual SIP links to enable QoS for signalling
795
Using virtual subsystems in project management
796
Using Virtual Team project communication as a means of predicting Virtual Team effectiveness
797
Using Virtual World Environments in Conservation-Restoration
798
Using virtual world technology to construct immersive 3D virtual university
799
Using virtual worlds for corporate training
800
Using Virtual Worlds in distance learning environments
801
Using virtual worlds to explore electric power grids and plants
802
Using Virtualization and Automatic Evaluation: Adapting Network Services Management Courses to the EHEA
803
Using Virtualization and Guacamole/VNC to Provide Adaptive User Interfaces to Disabled People in Cloud Computing
804
Using Virtualization and Job Folding for Batch Scheduling
805
Using Virtualization and noVNC to Support Assistive Technology in Cloud Computing
806
Using virtualization for online kernel profiling, code coverage and instrumentation
807
Using Virtualization Software in Operating Systems Course
808
Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services Firms
809
Using virtualization to improve durability and portability of industrial applications
810
Using Virtualization to Improve Software Rejuvenation
811
Using Virtualization to Improve Software Rejuvenation
812
Using Virtualization to Prepare Your Data Center for "Real-Time Assurance of Business Continuity"
813
Using virtualization to reduce the cost of test
814
Using virtualized operating systems as a ubiquitous computing infrastructure
815
Using VisAD to build tools for visualizing and analyzing remotely sensed data
816
Using viseme based acoustic models for speech driven lip synthesis
817
Using viseme based acoustic models for speech driven lip synthesis
818
Using visibility cameras to estimate atmospheric light extinction
819
Using vision and haptic sensing for human-humanoid joint actions
820
Using vision based tracking to support real-time graphical instruction for students who have visual impairments
821
Using vision system technologies to enable operational improvements for low visibility approach and landing operations
822
Using vision system technologies to enable operational improvements for low visibility approach and landing operations
823
Using vision technique for the bridge deformation detection
824
Using vision, acoustics, and natural language for disambiguation
825
Using vision-based control techniques for grasping objects
826
Using VISIR in a large undergraduate course: Preliminary assessment results
827
Using VISSIM simulation model and Surrogate Safety Assessment Model for estimating field measured traffic conflicts at freeway merge areas
828
Using visual analysis as part of executable specifications
829
Using Visual Analysis to Weight Multiple Signatures to Discriminate Complex Data
830
Using visual analytics to analyze movement and action patterns
831
Using visual analytics to detect problems in datasets collected from photo-sharing services
832
Using visual analytics to maintain situation awareness in astrophysics
833
Using visual analytics to provide situation awareness for movement and communication data
834
Using visual analytics to support decision making to solve the Kronos incident (VAST challenge 2014)
835
Using visual and auditory feedback for instrument-playing humanoids
836
Using visual augmentations to test control interactions in visual dataflow languages
837
Using Visual Clues Concept for Extracting Main Data from Deep Web Pages
838
Using Visual Context and Region Semantics for High-Level Concept Detection
839
Using Visual Cues of Contact to Improve Interactive Manipulation of Virtual Objects in Industrial Assembly/Maintenance Simulations
840
Using Visual Cues on DOITree for Visualizing Large Hierarchical Data
841
Using Visual Design Experts in Critique-Based Evaluation of 2D Vector Visualization Methods
842
Using visual exploratory data analysis to find bias in option pricing models
843
Using visual feature extraction neural network model to improve performance of quadtree based image coding
844
Using visual features for anti-spam filtering
845
Using Visual Features for Fine-Grained Genre Classification of Web Pages
846
Using visual features to build topological maps of indoor environments
847
Using visual information in automatic speech segmentation
848
Using Visual Interpretation of Small Ensembles in Microarray Analysis
849
Using Visual Momentum to Explain Disorientation in the Eclipse IDE
850
Using visual odometry to create 3D maps for online footstep planning
851
Using visual programming kit and LEGO Mindstorms: An introduction to embedded system
852
Using visual rhetoric to avoid PowerPoint pitfalls
853
Using Visual Rhythms for Detecting Video-Based Facial Spoof Attacks
854
Using visual saliency for object tracking with particle filters
855
Using visual segments and spatial layouts for unsupervised object co-segmentation
856
Using Visual Stability to Support Search Efficiency and User Experience in Dynamic Graph Drawings
857
Using Visual Text Mining to Support the Study Selection Activity in Systematic Literature Reviews
858
Using visual texture analysis to classify raw coal components
859
Using visual tiling patterns to support the teaching of programming concepts
860
Using Visual Tools to Close the Home Networking Digital Divide
861
Using VISUAL3 for three dimensional time domain unstructured electromagnetic visualisation
862
Using visualization and analysis with efficient dimension Reduction to determine underlying factors in hospital inpatient procedure costs
863
Using visualization for architectural localization and extraction
864
Using Visualization for Exploring Relationships between Concepts in Ontologies
865
Using visualization for information management tasks
866
Using visualization in cockpit decision support systems
867
Using visualization in the archaeological excavations of a pre-Inca temple in Peru
868
Using visualization techniques for SNMP traffic analyses
869
Using visualization techniques in knowledge discovery process for decision making
870
Using Visualization to Debug Visualization Software
871
Using Visualization to Derive Insights from Research Funding Portfolios
872
Using visualization to maintain large computer systems
873
Using visualization to support network and application management in a data center
874
Using Visualization to Understand Dependability: A Tool Support for Requirements Analysis
875
Using visualization tools to improve undergraduates understanding of crystal structure
876
Using visualization tools to understand concurrency
877
Using visualizations to learn algorithms: should students construct their own, or view an expert´s?
878
Using visualizations to monitor changes and harvest insights from a global-scale logging infrastructure at Twitter
879
Using VLIW softcore processors for image processing applications
880
Using V-Model methodology, UML process-based risk assessment of software and visualization
881
Using voice conversion as a paradigm for analyzing breathy singing voices
882
Using Voice servers for Speech Analytics
883
Using voice suppression algorithms to improve beat tracking in the presence of highly predominant vocals
884
Using VOIP in Wireless LAN
885
Using volatile state storage for substantial improvement in RFID throughput
886
Using volatile witnesses to extend the applicability of available copy protocols
887
Using voltage analysis method to diagnose the winding faults of induction motor
888
Using voltage and temperature adders to account for variations in operating conditions during digital timing simulation
889
Using voltage distortion measurements for demand-side management
890
Using voltage measurements to improve the results of branch-current-based state estimators for distribution systems
891
Using voltage sag and interruption indices in distribution planning
892
Using voltage-driven model to correlate GTEM cell and anechoic chamber measurement
893
Using Volterra mapping based behavioural models to evaluate ACI and cross modulation in CDMA communication systems
894
Using Volume Features and Shape Features for Alzheimer´s Disease Diagnosis
895
Using Voluntary Activity of Peer To Peer to Distribute Digital Content Facing Information Asymmetry
896
Using volunteered data in land cover map validation: Mapping tropical forests across West Africa
897
Using Volunteered Data in Land Cover Map Validation: Mapping West African Forests
898
Using Voronoi Grid and SVM Linear Regression in Drug Discovery
899
Using voronoi grouping to solve set covering problem - Building an Integrated Delivering System for Taichung City
900
Using VPN Technology in the Campus Office Network Systems
901
Using VPRS-Based Group Decision-Making to Evaluate Partner Relationship in the Value Network of a Mobile Portal
902
Using VR for Human Development in Africa
903
Using VR technology to support e-learning: the 3D virtual radiopharmacy laboratory
904
Using VR technology to support the formation of cooperative learning groups
905
Using VR to assess the impact of seemingly life like and intelligent architecture on people´s ability to follow instructions from a teacher
906
Using VRML in a client-server architecture to visualise a simplified simulation model of tumor growth in vitro
907
Using vTree indices for queries over objects with complex motions
908
Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection
909
Using vulnerability information and attack graphs for intrusion detection
910
Using VXI based breadboard modules
911
Using VXI to test primary and secondary batteries
912
Using VXIbus-based products for RF test systems
913
Using W3C Web services choreography description language to define a generic SE development process
914
Using WADL Specifications to Develop and Maintain REST Client Applications
915
Using Wafer Map Features to Better Predict Die-Level Failures in Final Test
916
Using wake-up receivers in bird telemetry - Viability study
917
Using Walsh code selection to reduce the power variance of band-limited forward-link CDMA waveforms
918
Using Walsh Functions In Electrical Impedance Tomography
919
Using WAM in Croatian Power System for Energy Transit Utilization
920
Using WAP as the enabling technology for CORBA in mobile and wireless environments
921
Using warp as a supercomputer in signal processing
922
Using Warp to control network contention in Mermera
923
Using warping for privacy protection in video surveillance
924
Using water energy for electrical energy conservation by building of micro hydroelectric generators on the water pipelines that depend on the difference in elevation
925
Using watersheds segmentation on ISAR image for automatic target recognition
926
Using wave variables for system analysis and robot control
927
Using waveform engineering to optimize class-F power amplifier performance in an envelope tracking architecture
928
Using waveform engineering to optimize Class-F power amplifier performance in an envelope tracking architecture
929
Using Wavefront Coding in presence of non-symmetric aberrations
930
Using wavelength splitting at the remote node to mitigate Rayleigh backscattering for optical wired and wireless access networks
931
Using wavelength-dependent emissivity of semiconductor wafer to model heat transfer in rapid thermal processing station
932
Using wavelength-tunable self-seeding Fabry-Perot laser for upstream transmission in hybrid WDM/TDM PON
933
Using wavelet analysis for image scene registration
934
Using wavelet analysis to characterize effects of different head positions on blood flow
935
Using wavelet analysis to determine the influence of northern hemisphere teleconnection patterns on sea ice concentrations in the Odden ice peninsula, Greenland Sea
936
Using wavelet analysis to reveal the muscle functional recovery following nerve reinnervation in a rat model
937
Using Wavelet and Bayesian Decision Theory in Real-Time Prostate Volume Measurements
938
Using wavelet coefficients for the classification of the electrocardiogram
939
Using Wavelet Domain Workload Execution Characteristics to Improve Accuracy, Scalability and Robustness in Program Phase Analysis
940
Using wavelet for early detection of pathological tremor
941
Using wavelet function gauss second level for modeling of magnetic systems
942
Using wavelet multi-resolution in the remote sensing of air pollution
943
Using wavelet network for identifying the model of robot manipulator
944
Using wavelet network in nonparametric estimation
945
Using wavelet networks in image compression
946
Using wavelet neural network model product quality of continuous casting furnace and hot rolling mill
947
Using wavelet neural networks for the optimal design of electromagnetic devices
948
Using wavelet packet decomposition technique on fuzzy classify model for underwater acoustic signal recognition
949
Using Wavelet Support Vector Machine for Classification of Hyperspectral Images
950
Using Wavelet Support Vector Machines to Generate Expected Outputs
951
Using wavelet synopsis techniques on electric power system measurements
952
Using Wavelet theory for detection of broken bars in squirrel cage induction motors
953
Using wavelet transform and fuzzy neural network for VPC detection from the holter ECG
954
Using wavelet transform and neural network for solid velocity profiles
955
Using wavelet transform and neural networks for the analysis of brain MR images
956
Using wavelet transform for the ridges extraction of a parabolic frequency modulated signal. Part I
957
Using wavelet transform of hyperspectral reflectance curves for automated monitoring of Imperata cylindrica (cogongrass)
958
Using wavelet transform reassignment techniques for ECG characterisation
959
Using wavelet transform self-similarity for effective multiple description video coding
960
Using wavelet transform to analyse cardiorespiratory and electroencephalographic signals during sleep
961
Using Wavelet Transform to Extract Seismic Attributes
962
Using wavelet transform to improve generalization ability of neural network in next day load curve forecasting
963
Using Wavelet Transform, DPCM and Adaptive Run-length Coding to Compress Images
964
Using wavelet transforms for ECG characterization. An on-line digital signal processing system
965
Using wavelet-based indices for detecting abrupt changes in signals
966
Using wavelet-based method for detection of Atrial Late Potentials and ECG classification
967
Using Wavelets and Gaussian Mixture Models for Audio Classification
968
Using Wavelets for Compression and Detecting Events in Anomalous Network Traffic
969
Using wavelets for fast Monte Carlo simulation of Ising systems with distribution matching
970
Using wavelets for smoothing and denoising gated blood pool images
971
Using wavelets in nonparametric estimation
972
Using wavelets on denoising infrared medical images
973
Using Wavelets to Classify Documents
974
Using wavelets to define and detect harmonic fingerprints in non-sinusoidal waveforms
975
Using wavelets to define and detect harmonic fingerprints in non-sinusoidal waveforms
976
Using Wavelets to Get Sar Images "free" of Speckle
977
Using WAVES for verification of synthesized sub-components in a deeply hierarchical design
978
Using wavpack for real-time audio coding in interactive applications
979
Using ways of the trust, entrepreneurial orientation and the performance of venture enterprise
980
Using WBAN as an intelligent adviser gadget
981
Using Weak Bisimulation for Enterprise Integration Architecture Formal Verification--I
982
Using weak supervision in learning Gaussian mixture models
983
Using weakly conditionally stable-body of revolution-finite-difference time-domain method to simulate dielectric film-coated circular waveguide
984
Using wearable computers to construct semantic representations of physical spaces
985
Using wearable inertial sensors for posture and position tracking in unconstrained environments through learned translation manifolds
986
Using Wearable Sensors for Real-Time Recognition Tasks in Games of Martial Arts - An Initial Experiment
987
Using wearable sensors for semiology-independent seizure detection - towards ambulatory monitoring of epilepsy
988
Using wearable sensors to analyze the quality of use of mobility assistive devices
989
Using Wearable Sensors to Enhance DBS Parameter Adjustment for Parkinson´s Disease Patients Through Measures of Motor Response
990
Using wearable sensors to measure motor abilities following stroke
991
Using Wearable Sensors to Monitor Physical Activities of Patients with COPD: A Comparison of Classifier Performance
992
Using wearable sensors to predict the severity of symptoms and motor complications in late stage Parkinson´s Disease
993
Using wearable technology for psychophysiological experiments: Gender roles and cognitive appraisal impact cardiac response to socio-evaluative stress
994
Using wearable UWB radios to measure foot clearance during walking
995
Using weather derivatives to improve the efficiency of forward markets for electricity
996
Using weaves for software construction and analysis
997
Using weaving models in metamodel and model co-evolution approach
998
Using web - developer technologies for building an academic service
999
Using Web 2.0 applications to deliver innovative services on the internet
1000
Using Web 2.0 for Knowledge Management in Higher Education
بازگشت