<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
VTC Comes to Baltimore [VTS News]
2
VTC Organizing Committee
3
VTC Program
4
VTC
O
: a second-order theory for TC
0
5
VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026)
6
VTC2004 Wireless Technologies for Gobal Security Sept. 26-29, 2004 LA, CA
7
VTC2004-Fall Wireless Technologies for Global Security
8
VTC2005-Fall
9
VTC2005-Fall
10
VTC2005-Fall
11
VTC2005-Fall Mid Way Through the Dedade - Technology Past, Present and Future
12
VTC2006-Spring reviewers
13
VTC2006-Spring reviewers
14
VTC2006-Spring reviewers
15
VTC2006-Spring reviewers
16
VTC2006-Spring reviewers
17
VTC2006-Spring reviewers
18
VTC2006-Spring Technical Program Committee
19
VTC2006-Spring Technical Program Committee
20
VTC2006-Spring Technical Program Committee
21
VTC2006-Spring Technical Program Committee
22
VTC2006-Spring Technical Program Committee
23
VTC2006-Spring Technical Program Committee
24
VTC2007 - Fall
25
VTC2007 - Spring
26
VTC2007-FaII
27
VTC2007-Fall Baltimore 1-3 Oct. 2007
28
VTC2007-Spring in Dublin
29
VTC2008 - Fall
30
VTC2008 - Spring
31
VTC2008-Fall in Calgary [VTS News]
32
VTC2008-Spring - Call for Papers Sept. 2007
33
VTC2008-Spring in Singapore
34
VTC2009 Spring Barcelona
35
VTC2009-Spring in Barcelona [VTS news]
36
VTC2010-Fall
37
VTC2010-Fall
38
VTC2011-Fall
39
VTC2011-Fall
40
VTC2011-Spring
41
VTC2012-Fall
42
VTC2012-Fall
43
VTC2012-Spring
44
VTC2012-Spring
45
VTC2012-Spring Final Programme
46
VTC2013 Fall
47
VTC2013 Spring
48
VTC2014-Fall
49
VTC2014-Fall
50
VTC2014-Spring
51
VTC2015-Fall
52
VTC2015-Fall Final Program
53
VTC2015-Fall Members
54
VTC2015-Fall Patrons
55
VTC2015-Fall Reviewers
56
VTC2015-Fall Welcome from the General Co-chairs
57
VTC2015-Fall Welcome from the Technical Program Co-chairs
58
VTC2015-Fall Welcome from the VTS President
59
VTC2015-Spring
60
VTC2015-Spring
61
VTC2015-Spring Advance Programme
62
VTC2015-Spring Organizing Committee
63
VTC2015-Spring Patrons
64
VTC2015-Spring Reviewers
65
VTC2015-Spring Technical Program Committee
66
VTC2015-Spring Title Page
67
VTC2015-Spring Welcome from the General Co-chairs
68
VTC2015-Spring Welcome from the Technical Program Co-chairs
69
VTC2015-Spring Workshops Committee
70
VTC2016 Spring
71
VTC2016 Spring
72
Vtcf07 and Wivec07 TOC
73
vtcfall07 Patrons
74
VTCMOS characteristics and its optimum conditions predicted by a compact analytical model
75
VTCMOS characteristics and its optimum conditions predicted by a compact analytical model
76
Vt-conscious repeater insertion in power-managed VLSI
77
VTD: A monitoring index of transmission quality for streaming media
78
VTDM: a variable bit rate TDM switch architecture for video stream
79
VTDM-a dynamic multicast routing algorithm
80
VTD-XML-Based Design and Implementation of GML Parsing Project
81
VTE - A new method for the characterisation of thin film thermophysical properties
82
VTEAM: A General Model for Voltage-Controlled Memristors
83
VTEC estimation with Taylor Series Expansion model using GPS data for low latitude region
84
VTEG: VHDL test environment generator
85
VTERM/220 Quality Makes All Other DEC Terminal Emulators Obsolete
86
VTERM/220 Quality Makes All Other DEC Terminal Emulators Obsolete [advertisement]
87
VTest program mixed-signal virtual test approach
88
VTest system overview
89
vTestkit: A Performance Benchmarking Framework for Virtualization Environments
90
Vth control in GaAs by substrate parameters
91
V-Theme Park authoring for fear diminishing
92
V-three methods of measuring dielectric power loss and power factor
93
Vth-tunable CMIS platform with high-k gate dielectrics and variability effect for 45nm node
94
Vth-Variation Compensation of Multiple-Valued Current-Mode Circuit Using TMR Devices
95
VTIcompose - A Powerful Graphical Chip Assembly Tool
96
VTJukebox: implementation issues for RTP-based recording and on-demand multicast of multimedia conferences
97
VTK: Vertical Mining of Top-Rank-K Frequent Patterns
98
VT-KFER: A Kinect-based RGBD+time dataset for spontaneous and non-spontaneous facial expression recognition
99
VTL zone-aware path cloaking algorithm
100
VTLN adaptation for statistical speech synthesis
101
VTLN Based Approaches for Speech Recognition with Very Limited Training Speakers
102
VTLN Using Analytically Determined Linear-Transformation on Conventional MFCC
103
Vtln Warping Factor Estimation Using Accumulation of Sufficient Statistics
104
VTLN-based cross-language voice conversion
105
VTLN-based voice conversion
106
VTM Special Issue
107
VTM-MAC: Vehicle traffic monitoring MAC in WSNs
108
VTOA/VoIP/ISDN telephony gateway
109
V-Tokens for Conditional Pseudonymity in VANETs
110
VTOL aerial robot for inspection of transmission line
111
VTOL Aircraft Control Output Tracking Sensitivity Design
112
VTOL control for shipboard landing in high sea states
113
VTOL Flight-Control System Design Using Sensitivity Analysis
114
VTonDemand: a framework for indexing, searching and on-demand playback of RTP-based multimedia conferences
115
V-Touch: Markerless laser-based interactive surface
116
VTouch: Vision-enhanced interaction for large touch displays
117
V-to-V communication using speed synchronization priority protocol for variable speed vehicle in VANET
118
V-Toys: An Experiment in Adding Visual Tiles to EToys
119
VTP: an end-user programming paradigm based on tool-based language constructs
120
VTP-CSMA: A Virtual Token Passing Approach for Real-Time Communication in IEEE 802.11 Wireless Networks
121
VTQ-Tree: Quadtree Access Method With Variable Threshold; Application To GIS
122
VTrack: Video analytics for automatic video-surveillance
123
Vtrim: A Performance Optimization Mechanism for SSD in Virtualized Environment
124
VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications
125
VTS 2003 best innovative practice session award
126
VTS 2003 best panel award
127
VTS 2003 best paper award
128
VTS 2004 Best Innovative Practices Session Award
129
VTS 2004 Best Panel Award
130
VTS 2004 Best Paper Award
131
VTS 2008 Chapter of the Year [VTS News]
132
VTS 2011 Best Paper Award
133
VTS 2012 Best Paper award [includes Best Special Session Award]
134
VTS 2013 Best Paper Award [includes 2 other awards]
135
VTS 2014 Best Paper Award
136
VTS 2015 organizing committee
137
VTS 2015 steering and program committees
138
VTS Constitution and Bylaws [Society News]
139
VTS Elections [VTS News]
140
VTS Elections [VTS News]
141
VTS News - Changes to the Constitution and Bylaws / VTC2006-Spring in Melbourne
142
VTS news - VTS digital archive
143
VTS News: VTC Present and Future
144
VTS residual noise compensation
145
VTS´02 Best Panel Award
146
VTS´02 Best Paper Award
147
VTT quantum-Hall setup
148
VTube: Towards the media rich city life with autonomous vehicular content distribution
149
VTV - A Voting Strategy for Real-Time Systems
150
VT-ware: A wearable tactile device for upper extremity motion guidance
151
VUEMS: a virtual urban environment modeling system
152
VU-Flow: A Visualization Tool for Analyzing Navigation in Virtual Environments
153
VUI system of the portable maintenance aids based on cloud computing
154
Vuk and Georgi: An adventure into active systems via mechatronics, robotics and manufacturing engineering
155
Vulcan - A versatile high-power glass laser for multiuser experiments
156
VULCAN: A Tool for Automatically Generating Code from Design Patterns
157
VULCAN: A Versatile Ultra High Power Nd: Glass Laser System
158
Vulcan: Hardware Support for Detecting Sequential Consistency Violations Dynamically
159
VULCAN: Vulnerability Assessment Framework for Cloud Computing
160
Vulcan; a petawatt laser facility for 10/sup 21/ W cm/sup -2/ experiments
161
Vulcanization Control of Rubber Fender Based on Neural Network PID Method
162
Vulcanization process: a stochastic method for identification and control problem
163
Vulcanized fibre-an old material with a new relevancy
164
Vulcanized joints and repair patches made without molds
165
Vulcanus: A recommender system for accessibility based on trails
166
Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing
167
VulHunter: Toward Discovering Vulnerabilities in Android Applications
168
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment
169
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu´s Secure Cell Relay Routing Protocol for Sensor Networks
170
Vulnerabilities and measures on smart grid application in renewable energy
171
Vulnerabilities and security enhancements for the IEEE 802.11 WLANs
172
Vulnerabilities and security for ad-hoc networks
173
Vulnerabilities and security issues in optical networks
174
Vulnerabilities and security threats in structured overlay networks: a quantitative analysis
175
Vulnerabilities and storage security in cloud computing
176
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
177
Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey
178
Vulnerabilities in a new RFID access control protocol
179
Vulnerabilities in binary face template
180
Vulnerabilities in Epidemic Forwarding
181
Vulnerabilities in network layer at wireless mesh networks (WMNs)
182
Vulnerabilities in personal firewalls caused by poor security usability
183
Vulnerabilities in social networking sites
184
Vulnerabilities in SOHO VoIP gateways
185
Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols
186
Vulnerabilities in some recently proposed RFID ownership transfer protocols
187
Vulnerabilities in synchronous IPC designs
188
Vulnerabilities in the open shortest path first interior gateway protocol
189
Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
190
Vulnerabilities of android data sharing and malicious application to leaking private information
191
Vulnerabilities of CAPTCHA used by IRCTC and an alternative approach of Split Motion Text (SMT) CAPTCHA
192
Vulnerabilities of cognitive radio MAC protocols and countermeasures
193
Vulnerabilities of fuzzy vault schemes using biometric data with traces
194
Vulnerabilities of Geocast Message Distribution
195
Vulnerabilities of Internet Access Mechanisms from Mobile Ad Hoc Networks
196
Vulnerabilities of ISPs
197
Vulnerabilities of PKI based Smartcards
198
Vulnerabilities of radio frequencies
199
Vulnerabilities of reliable multicast protocols
200
Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
201
Vulnerabilities of the Real-Time Transport (RTP) Protocol for Voice over IP (VoIP) Traffic
202
Vulnerabilities of two recently RFID authentication protocols
203
Vulnerabilities of UMTS Access Domain Security Architecture
204
Vulnerabilities Scoring Approach for Cloud SaaS
205
Vulnerabilities static detection for Web applications with false positive suppression
206
Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses
207
Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network
208
Vulnerabilities, influences and interaction paths: failure data for integrated system risk analysis
209
Vulnerability & attack injection for web applications
210
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
211
Vulnerability analysis and best practices for adopting IP telephony in critical infrastructure sectors
212
Vulnerability analysis and patches management using secure mobile agents
213
Vulnerability analysis and PMUs as next generation protection system in Smart Grid
214
Vulnerability Analysis and Protection Schemes of Universal Plug and Play Protocol
215
Vulnerability analysis for a quantitative security evaluation
216
Vulnerability analysis for crypto devices against probing attack
217
Vulnerability Analysis for Custom Instructions
218
Vulnerability analysis for distributed and coordinated destabilization attacks
219
Vulnerability Analysis for X86 Executables Using Genetic Algorithm and Fuzzing
220
Vulnerability analysis in multicommodity stochastic networks by game theory
221
Vulnerability Analysis in SOA-Based Business Processes
222
Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams
223
Vulnerability analysis of application in virtual environment
224
Vulnerability analysis of C3I networks using discrete event simulation and modelling
225
Vulnerability Analysis of Clock Synchronization Protocol Using Stochastic Petri Net
226
Vulnerability analysis of coupled heterogeneous critical infrastructures: A Co-simulation approach with a testbed validation
227
Vulnerability analysis of disaster risk based on geographic information and Dempster-Shafer theory
228
Vulnerability analysis of DT fusion diagnostics for laser megajoule facility a new tool: Diacad
229
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
230
Vulnerability Analysis of HD Photo Image Viewer Applications
231
Vulnerability Analysis of Intelligent Network System
232
Vulnerability analysis of IP traceback schemes
233
Vulnerability Analysis of L2 Cache Elements to Single Event Upsets
234
Vulnerability analysis of large-scale dynamical networks to coordinated attacks
235
Vulnerability Analysis of LTE Location Services
236
Vulnerability Analysis of MMS User Agents
237
Vulnerability analysis of optical fibers for laser megajoule facility: preliminary studies
238
Vulnerability Analysis of Power Distribution Systems for Cost-Effective Resource Allocation
239
Vulnerability analysis of power distribution systems for cost-effective resource allocation
240
Vulnerability analysis of power grid based on multi-agent complex systems
241
Vulnerability analysis of power grid considering the different stages with faults evolution
242
Vulnerability analysis of power grid network against failures by state classification
243
Vulnerability Analysis of Power Grids With Line Switching
244
Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks
245
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness
246
Vulnerability analysis of secure USB flash drives
247
Vulnerability Analysis of Service Architecture in NGN
248
Vulnerability analysis of shipboard power system from a network theoretic prospect
249
Vulnerability analysis of smart grid based on complex network theory
250
Vulnerability analysis of structures under loads based on the form
251
Vulnerability analysis of the global navigation satellite systems from the information flow perspective
252
Vulnerability analysis of the integrated energy infrastructure
253
Vulnerability analysis of the Nordic power system
254
Vulnerability analysis of the Nordic power system
255
Vulnerability Analysis of the Optical Network NMS
256
Vulnerability analysis of the optimized link state routing protocol version 2 (OLSRv2)
257
Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks
258
Vulnerability analysis of transmission lines based on the performance of Mho relays and series/shunt compensation systems
259
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer
260
Vulnerability Analysis of Urban Infrastructures
261
Vulnerability analysis on Mobile VoIP supplementary services and MITM attack
262
Vulnerability Analysis on the CNG Crypto Library
263
Vulnerability analysis on virtualized environment using FPVA
264
Vulnerability analysis related to extraordinary events in power systems
265
Vulnerability analysis using network timestamps in full virtualization virtual machine
266
Vulnerability and coupling behaviour of a TETRA communication system to electromagnetic fields
267
Vulnerability and economic considerations in designing network topology
268
Vulnerability and interdependency of critical infrastructure: A review
269
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
270
Vulnerability assessment activities [for electric utilities]
271
Vulnerability assessment and allocation of protection resources in power systems
272
Vulnerability assessment and control of large scale interconnected power systems using neural networks and neuro-fuzzy techniques
273
Vulnerability assessment and control of power system
274
Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks
275
Vulnerability assessment and emergency response for booster chlorination systems
276
Vulnerability assessment and patching management
277
Vulnerability Assessment by Learning Attack Specifications in Graphs
278
Vulnerability assessment for cascading failures in electric power systems
279
Vulnerability assessment for communication network of Substation Automation Systems to cyber attack
280
Vulnerability Assessment for Critical Infrastructure Control Systems
281
Vulnerability Assessment for Interdependent Gas and Electricity Networks
282
Vulnerability Assessment for Power Grid Based on Small-world Topological Model
283
Vulnerability Assessment in Autonomic Networks and Services: A Survey
284
Vulnerability assessment in wireless networks
285
Vulnerability assessment of a food supply chain to an intentional attack
286
Vulnerability Assessment of a Large Sized Power System Using Radial Basis Function Neural Network
287
Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks
288
Vulnerability assessment of aircraft guarantee system based on improved FPN
289
Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons
290
Vulnerability assessment of bulk power grid based on complex network theory
291
Vulnerability assessment of combined impacts of sea level rise and coastal flooding for China´s coastal region using remote sensing and GIS
292
Vulnerability Assessment of Cyber Security in Power Industry
293
Vulnerability Assessment of Cybersecurity for SCADA Systems
294
Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees
295
Vulnerability assessment of electric power system for the case of Latvian EPS
296
Vulnerability assessment of geological hazards based on geo-rough space and GIS
297
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
298
Vulnerability Assessment of Power Grid Based on Complex Network Theory
299
Vulnerability Assessment of Power System Using Various Vulnerability Indices
300
Vulnerability Assessment of Regional Water Distribution Systems
301
Vulnerability assessment of the electric power and communication composite system
302
Vulnerability Assessment of the Groundwater Source on Yinchuan Plain
303
Vulnerability assessment of the mountain-basin system in the northern tianshan mountains
304
Vulnerability assessment of web applications - a testing approach
305
Vulnerability Assessment Scheme for Power System Transmission Networks Based on the Fault Chain Theory
306
Vulnerability assessment system (VAS)
307
Vulnerability assessment through mobile agents
308
Vulnerability assessments: a case study of Jordanian universities
309
Vulnerability Bazaar
310
Vulnerability Black Markets: Empirical Evidence and Scenario Simulation
311
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
312
Vulnerability Control for Power System by Smart Demand Response
313
Vulnerability Data Fusion Method Based on the D-S theory of Evidence
314
Vulnerability database analysis for 10 years for ensuring security of cyber critical green infrastructures
315
Vulnerability Dependencies in Antivirus Software
316
Vulnerability detection in 802.11i wireless networks through link layer analysis
317
Vulnerability Detection of Android System in Fuzzing Cloud
318
Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking
319
Vulnerability Detection Systems: Think Cyborg, Not Robot
320
Vulnerability detector using parse tree annotation
321
Vulnerability Discovery in Multi-Version Software Systems
322
Vulnerability discovery model for a software system using stochastic differential equation
323
Vulnerability Discovery Modeling Using Weibull Distribution
324
Vulnerability Discovery with Attack Injection
325
Vulnerability Discrimination Using CVSS Framework
326
Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook)
327
Vulnerability evaluation based on CVSS and environmental information statistics
328
Vulnerability evaluation for securely offloading mobile apps in the cloud
329
Vulnerability evaluation of geological environment based on GIS in Lijiang
330
Vulnerability evaluation of power system integrated with large-scale distributed generation based on complex network theory
331
Vulnerability for reentry in a three dimensional model of human atria: a simulation study
332
Vulnerability hierarchies in access control configurations
333
Vulnerability identification and classification via text mining bug databases
334
Vulnerability in a one-dimensional transmural model of human ventricular tissue in heart failure
335
Vulnerability in Public Malware Sandbox Analysis Systems
336
Vulnerability indices for power systems
337
Vulnerability Localization Method Based on Software Structural Signature of Complex Network
338
Vulnerability Mapping of a Coastal Aquifer in Qingdao City, China, using Mapinfo and the DRASTIC Approach
339
Vulnerability mapping of carbonate aquifer using Geographic Information Systems
340
Vulnerability mechanism and evaluation of human-land system of mining cities in China
341
Vulnerability mining for network protocols based on fuzzing
342
Vulnerability mining of Cisco router based on fuzzing
343
Vulnerability modelling for periodical flexgrid network planning
344
Vulnerability Modelling for the Analysis of Network Attacks
345
Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities
346
Vulnerability of a non-membership proof scheme
347
Vulnerability of an Improved Elliptic Curve Diffie-Hellman Key Agreement and its Enhancement
348
Vulnerability of asymmetric cryptosystem based on spherical wave illumination against specific attack
349
Vulnerability of Bluetooth to impulsive noise in Electricity transmission substations
350
Vulnerability of Communication Networks
351
Vulnerability of complex networks under multiple node-based attacks
352
Vulnerability of continuous-time network synchronization processes: A minimum energy perspective
353
Vulnerability of core networks under different epidemic attacks
354
Vulnerability of CPS inference to DoS attacks
355
Vulnerability of digital satellite business data links to optimised jamming
356
Vulnerability of directed communication nets
357
Vulnerability of DM watermarking of non-iid host signals to attacks utilising the statistics of independent components
358
Vulnerability of dynamic systems
359
Vulnerability of Ecological Environment in Leizhou Peninsula Coastal Zone and Countermeasures
360
Vulnerability of European Rail Traffic Management System to Radiated Intentional EMI
361
Vulnerability of Feedthroughs Operated at a Low-Impedance Point on DIII-D
362
Vulnerability of hydropower projects to climate change
363
Vulnerability of IEEE802.11 WLANs to MAC laver DoS attacks
364
Vulnerability of Information Disclosure in Data Transfer Section for Safe Smartwork Infrastructure
365
Vulnerability of insens to denial of service attacks
366
Vulnerability of Large Steam Turbine Generators to Torsional Interactions During Electrical Grid Disturbances
367
Vulnerability of LTE to hostile interference
368
Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers
369
Vulnerability of multibit clock-controlled cascades to inversion attack
370
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
371
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis
372
Vulnerability of radar protocol and proposed mitigation
373
Vulnerability of sensor networks to unauthorized traversal and monitoring
374
Vulnerability of small networks for the TTL expiry DDoS attack
375
Vulnerability of Smart Grids With Variable Generation and Consumption: A System of Systems Perspective
376
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
377
Vulnerability of speaker verification to voice mimicking
378
Vulnerability of Structures to Weapons Effect
379
Vulnerability of Structures to Weapons Effects
380
Vulnerability of Terrestrial-Trunked Radio to Intelligent Intentional Electromagnetic Interference
381
Vulnerability of the Colombian electric system to blackouts and possible remedial actions
382
Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people
383
Vulnerability of the Day: Concrete demonstrations for software engineering undergraduates
384
Vulnerability of the Smartphone Applications to Connect with Compromised Access Point
385
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity
386
Vulnerability of Zigbee to impulsive noise in electricity substations
387
Vulnerability Ontology for web applications to predict and classify attacks
388
Vulnerability profile for Linux
389
Vulnerability ranking based on exploitation and defense graph
390
Vulnerability reduction through local seismic culture
391
Vulnerability Reduction through Local Seismic Culture The Case Study of Lefkada, Greece
392
Vulnerability scanning for buffer overflow
393
Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
394
Vulnerability studies of high-speed compulsators
395
Vulnerability Testing of Software Using Extended EAI Model
396
Vulnerability testinh of WAP based on extended syntax analysis
397
Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation
398
Vulnerability to atrial fibrillation under stretch can be explained by stretch-activated channels
399
Vulnerability to electric shocks in the regionally-ischemic ventricles
400
Vulnerability to re-entry arising from LPC-induced alterations of cardiac sodium current kinetics: A simulation study
401
Vulnerability to reentry during the acute phase of myocardial ischemia: a simulation study
402
Vulnerability to reentry in a 3D regionally ischemic ventricular slab preparation: A simulation study
403
Vulnerability Trends: Measuring Progress
404
Vulnerability windows in vehicular communications
405
Vulnerability-Based Backdoors: Threats from Two-step Trojans
406
Vulnerability-based Interleaving for Multi-Bit Upset (MBU) protection in modern microprocessors
407
Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns
408
Vulnerability-Constrained Transmission Expansion Planning: A Stochastic Programming Approach
409
Vulnerable Atherosclerotic Plaque Elasticity Reconstruction Based on a Segmentation-Driven Optimization Procedure Using Strain Measurements: Theoretical Framework
410
Vulnerable Branch Assessment Based on Branch Energy Function
411
Vulnerable branch assessment of power grid contains double-fed wind farms
412
Vulnerable Cloud: SOAP Message Security Validation Revisited
413
Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks?
414
Vulnerable line assessment based on community structure
415
Vulnerable links and secure architectures in the stabilization of networks of controlled dynamical systems
416
Vulnerable operation of turbine-generator due to EAF loads in Bangladesh Power System
417
Vulnerable Road Users Detection Using V2X Communications
418
vUML: a tool for verifying UML models
419
VUML: a viewpoint oriented UML extension
420
VUSW 2009: Managing Vagueness and Uncertainty in the Semantic Web
421
VUV and soft X-ray light source “New SUBARU”
422
VUV and X-ray imaging from 25 eV to 8 keV with CCD-based detection systems
423
VUV efficiency and radiant emittance characterization of xenon positive column discharges
424
VUV Emission and Streamer Formation in Pulsed Dielectric Surface Flashover at Atmospheric Pressure
425
VUV emission by XeI excimer in Low-Pressure Xenon-Iodine mixture
426
VUV emission from dielectric surface flashover at atmospheric pressure
427
VUV emission from discharge-pumped Ar supersonic jets under high-excitation conditions
428
VUV frequency combs and fundamental limits of intracavity HHG due to ionization dynamics
429
VUV generation by high-order CARS
430
VUV laser in the Lyman band of molecular hydrogen pumped by fs titanium-sapphire laser pulses
431
VUV laser micromachining and bulk modification of photonic materials
432
VUV laser plasma formation and microwave agile mirror/absorber
433
VUV laser plasma formation and microwave agile mirror/absorber
434
VUV laser spectroscopy of the O/sub 2/ Schumann-Runge system near the dissociation limit
435
VUV laser-induced plasma emissions for ultra-micro spectrochemical analysis of liquid samples
436
VUV light induced outgassing from resist polymers: a study using in-situ QCM technique
437
VUV Luminescence With Nd Doped KCaF
Under X-Ray Excitation
438
VUV photo-ionization parameters and effective mean free path of epithermal photoelectrons in pure non-polar dielectric liquids
439
VUV scintillation of LuPO
4
:Nd and YPO
4
:Nd
440
VUV scintillation of LuPO
4
:Nd and YPO
4
:Nd
441
VUV Si photodiode as the gas proportional scintillation counter readout
442
VUV spectra of rare-gas fluoride ionic excimers
443
VUV spectral lines of C and Ne ions measured in LHD at NIFS
444
VUV Spectroscopic Measurement for Dielectric Barrier Discharge Excited by Piezoelectric Transformer in He–Xe Mixture
445
VUV spectroscopic observations on the sabre applied-B ion diode
446
VUV spectroscopy and electronic structure of Al(PO
3
)
3
crystals
447
VUV stimulated anti-Stokes Raman emission in inverted atomic selenium
448
VUV/Low-Energy Electron Si Photodiodes With Postmetal 400
PureB Deposition
449
VUV-assisted low temperature bonding for organic/inorganic hybrid integration at atmospheric pressure
450
VUV-Spectroscopy of Multiply Charged Ion Source-Plasmas
451
VUV-VIS Imaging of High-Pressure Pulsed Volume Discharge in Argon
452
VV & A Process of Guidance Simulation System
453
VVC in the Smart Grid era
454
VVCS: Verifiable Visual Cryptography Scheme
455
VVDS: A Verification/Diagnosis System for VHDL
456
V-vector algebra and its application to Volterra-adaptive filtering
457
VVGP features for speaker verification using i-vector framework
458
vVHDL: a visual hardware description language
459
VVMOS power transistors: upper and lower bounds of the on-resistance
460
VVT terminology: a proposal
461
VVVF inverter equipment for EMUs
462
V-W Band CMOS Distributed Step Attenuator With low Phase Imbalance
463
VWP photonic transport systems with opto-electronic wavelength conversion
464
VWP; A New Approach to Small, Light, Efficient, High Power Regulated Power Supplies
465
VWP; A New Approach to Small, Light, Efficient, High Power Regulated Power Supplies
466
VWQGRR: A Novel Packet Scheduler
467
VWRAP for virtual worlds interoperability [Standards]
468
VWS: A versatile warp scheduler for exploring diverse cache localities of GPGPU applications
469
VXD3: the SLD vertex detector upgrade based on a 307 MPixel CCD system
470
VXI ATE technology
471
VXI based breadboard module use
472
VXI based Low Level RF system for Fermilab Linac Upgrade
473
VXI based microwave testing on the flight line
474
VXI based multibunch detector and QPSK modulator for the PEP-II/ALS/DA/spl Phi/NE longitudinal feedback system
475
VXI based solutions for flight controls test and simulation
476
VXI electronics for EUROGAM clover detectors
477
VXI electronics for EUROGAM clover detectors
478
VXI evaluation test bed
479
VXI evaluation testbed
480
VXI implementation of a millimeter wave measurement system
481
VXI instrumentation: message-based or register-based devices?
482
VXI LVDT simulation COTS resource augments legacy commercial airline industry ATE
483
VXI or PXI test system improvement using DSP
484
VXI plug´n pray
485
VXI RF measurement analyzer
486
VXI Standard Revision to Meet Today´s Technology Requirements
487
VXI synchro/resolver and phase-angle voltmeter COTS resources for F-15 AADTS program ATE
488
VXI synchro/resolver measurement and simulation COTS hardware for commercial airline industry ATE
489
VXI synchro/resolver measurement and simulation COTS hardware for Turkish Airforce F-16 depot program ATE
490
VXI/VME integrated data acquisition and control system for the EUROGAM array
491
VXI: The Test Platform of the Future?
492
VXI-a standard for the future
493
VXI-based automatic scalar network analyzer system in 2-118.1 GHz frequency range
494
VXI-based data acquisition system allows re-use of application software [in aircraft engine testing]
495
VXI-based virtual instrument in undergraduate measurement laboratory experiments
496
VXIbus based optical transducer evaluation system
497
VXIbus instrumentation-using tomorrow´s technology today with existing IEEE-488 instruments and controllers
498
VXIbus instruments: past, present and future
499
VXIbus instruments-past, present and future
500
VXIbus Revision 2.0 - What´s new?
501
VXIbus: a military ATE application
502
VXIplug&play technology introduction
503
VXIplug&play WIN framework introduction
504
VXlbus Embedded PC Based Data Acquisition
505
VXPath: A Visual XPath Query Evaluator
506
VXS switch card for high speed high density data acquisition system
507
VXT: Visual XML Transformer
508
VXVDE: A Switch-Free VXLAN Replacement
509
VxWorks layer for LynxOS
510
VxWorks porting based on MPC8313E hardware platform
511
VxWorks set for another stay on Mars
512
VxWorks support for Collider Run II data acquisition at Fermilab
513
VxWorks, Version 5.2 [New Products]
514
VxWorks: an interactive development environment and real-time kernel for Gmicro
515
VxWorks-based real-time data gathering software design for seismic data acquisition system
516
VyapaarSEWA™ - a business service platform for improving the livelihood of rural Women Self-Help Groups
517
Vygotsky in a TeamRoom: an exploratory study on collective concept formation in electronic environments
518
Vying for next video player crown
519
Vying for the lead in high-performance processors