<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Wheel independent-drive control based on dynamic tire LuGre friction model
2
Wheel load observer of a 6-Wheel-Independent-Driving (6WID) electric vehicle
3
Wheel load transfer in high-speed unmanned vehicles
4
Wheel odometry-based car localization and tracking on vectorial map
5
Wheel of Trust: A Secure Framework for Overlay-Based Services
6
Wheel rolling constraints and slip in mobile robots
7
Wheel rolling constraints and slip in mobile robots - simulation results
8
Wheel servo control based on feedforward compensation for an autonomous mobile robot
9
Wheel skid prediction and antiskid control of high speed trains
10
Wheel slip control for ABS with time delay input using feedback linearization and adaptive sliding mode control
11
Wheel slip control for hybrid braking system of electric vehicle
12
Wheel slip control in ABS brakes using gain scheduled constrained LQR
13
Wheel Slip Control of EVs Based on Sliding Mode Technique With Conditional Integrators
14
Wheel slip control systems utilizing the estimated tire force
15
Wheel slip control using energy shaping
16
Wheel slip control using gain-scheduled LQ — LPV/LMI analysis and experimental results
17
Wheel slip control via second order sliding modes generation
18
Wheel Slip Control via Second-Order Sliding-Mode Generation
19
Wheel slip controller for the regenerative braking of electric vehicle: Experimental results with a three wheels recreational hybrid vehicle
20
Wheel slip estimation based on real-time identification of tire-road friction conditions
21
Wheel Slip Prevention Control by Sliding Mode Control for Railway Vehicles(Experiments Using Real Size Test)
22
Wheel slip reset controller in automotive brake systems
23
Wheel slippage and sinkage detection for planetary rovers
24
Wheel spider with rolling locomotion: Modeling and simulation
25
Wheel Spinning Can Be Productive! [Essay]
26
Wheel thermal damage limits
27
Wheel torque control for a rough terrain rover
28
Wheel Torque Control in Rough Terrain - Modeling and Simulation
29
Wheel Torque Distribution Criteria for Electric Vehicles With Torque-Vectoring Differentials
30
Wheel torque proportioning, rear steering, and normal force control: a structural investigation
31
Wheel tracking evaluation of heavy duty pavement based on matter-element model
32
Wheel transformer: A miniaturized terrain adaptive robot with passively transformed wheels
33
Wheel Transformer: A Wheel-Leg Hybrid Robot With Passive Transformable Wheels
34
Wheel wear losses from bogie rotation resistance, effects of cant and speed
35
Wheel wear management on high-speed passenger rail: a common playground for design and maintenance engineering in the Talgo engineering cycle
36
Wheel wear prediction - comparison between analytical approaches and field tests
37
Wheel–Soil Interaction Model for Rover Simulation and Analysis Using Elastoplasticity Theory
38
Wheel/leg robot for public safety protection identification & detection
39
Wheel/rail adhesion wear investigation using a quarter scale laboratory testing facility
40
Wheel/rail profile studies
41
Wheel/rail profile studies
42
Wheel/tissue force interaction: A new concept for soft tissue diagnosis during MIS
43
Wheel+legs - A new solution for traction enhancement without additive soil compaction
44
Wheelchair assist devices
45
Wheelchair control and navigation based on kinematic model and iris movement
46
Wheelchair Control Based on Steady-State Somatosensory Evoked Potentials
47
Wheelchair control system by using electrooculogram signal processing
48
Wheelchair control system for quadriplegics and ocular keyboard
49
Wheelchair control using an EOG- and EMG-based gesture interface
50
Wheelchair Detection Using Cascaded Decision Tree
51
Wheelchair directional control, digital and analog simulation
52
Wheelchair Driver Assistance and Intention Prediction using POMDPs
53
Wheelchair Driving Control with Passenger´s Posture Behavior Suppression and Evaluation of Comfort of Ride by Emotional Sweating
54
Wheelchair driving control with sway suppression of passenger´s posture and evaluation of comfortable ride by emotional sweating
55
Wheelchair driving simulator: Computer aided training for persons with special need
56
Wheelchair for disabled children in Haiti
57
Wheelchair impact response to ISO test pendulum and ISO standard curb
58
Wheelchair injury clinical workstation: method for determining a characteristic stroke
59
Wheelchair maneuvering using leap motion controller and cloud based speech control: Prototype realization
60
Wheelchair motion control guide using eye gaze and blinks based on bug 2 algorithm
61
Wheelchair motion control guide using eye gaze and blinks based on Bug algorithms
62
Wheelchair Motion Control Guide Using Eye Gaze and Blinks Based on PointBug Algorithm
63
Wheelchair navigation assisted by Human-Machine shared-control and a P300-based Brain Computer Interface
64
Wheelchair navigation with an audio-cued, two-class motor imagery-based brain-computer interface system
65
Wheelchair obstacle avoidance based on fuzzy controller and ultrasonic sensors
66
Wheelchair pressure monitoring alert system for the reduction of the occurrence of pressure sores
67
Wheelchair recognition by using stereo vision and histogram of oriented gradients (HOG) in real environments
68
Wheelchair seating evaluation system ∼ Introduction of system functions ∼
69
Wheelchair support by a humanoid through integrating environment recognition, whole-body control and human-interface behind the user
70
Wheelchair technology as a profession
71
Wheelchair type biomedical system with event-recorder function
72
Wheelchair user support system using humanoid robots: system concept and experiments on pushing wheelchair
73
Wheelchair user´s cardiovascular evaluation system to support physiotherapy sessions
74
Wheelchair virtual joystick interface
75
Wheelchair.q, a mechanical concept for a stair climbing wheelchair
76
Wheelchairing for science
77
Wheelchair-mounted robotic arms: analysis, evaluation and development
78
Wheelchair-Mounted Robotic Arms: Design and Development
79
Wheelchair-mounted robots for the home environment
80
Wheelchairs: How They Are Used
81
Wheelchairs: Technical Design
82
Wheeled blimp : hybrid structured airship with passive wheel mechanism for tele-guidance applications
83
Wheeled human transportation vehicle implementation using output recurrent fuzzy control strategy
84
Wheeled inverted pendulum control based on model-free fuzzy control strategy
85
Wheeled inverted pendulum type assistant robot: inverted mobile, standing, and sitting motions
86
Wheeled inverted pendulum type robotic wheelchair with integrated control of seat slider and rotary link between wheels for climbing stairs
87
Wheeled Inverted Pendulum with Embedded Component System: A Case Study
88
Wheeled inverted-pendulum-type personal mobility robot with collaborative control of seat slider and leg wheels
89
Wheeled locomotion for payload carrying with modular robot
90
Wheeled mobile robot control using virtual pheromones and neural networks
91
Wheeled mobile robots navigation from a visual memory using wide field of view cameras
92
Wheeled Mobile Robots: A review
93
Wheeled robot control based on gesture recognition using the Kinect sensor
94
Wheeled robot control for catching up flying objects using RGB-D sensors
95
Wheeled robot navigation and local-map building in unknown environments
96
Wheeled robot slip compensation for trajectory tracking control problem with time-varying reference input
97
Wheeled robot with movable center of mass for traversing over rough terrain
98
Wheeled welding robot design and seam tracking simulation based on optimization models
99
Wheeled-tip object manipulation: Modeling and motion planning of throwing an object
100
Wheeler and Fano Impedance Matching [Antenna designer´s notebook]
101
Wheeler on wide-band amplifiers
102
Wheeler´s current sheet concept and Munk´s wideband arrays
103
Wheeler´s insightful approach to small antennas
104
Wheeler´s law and related issues in integrated antennas
105
Wheel-ground interaction modelling and torque distribution for a redundant mobile robot
106
WHEELIE - a mobile horizontal display filter to ease controller´s separation task
107
Wheelie detection for single-track vehicles
108
Wheeling & dealing — Scenarios for understanding the European energy future
109
Wheeling and dealing [power transmission]
110
Wheeling and transmission system service policy in North America
111
Wheeling charge based on identification of transaction paths in deregulated power markets
112
Wheeling charge under a deregulated environment
113
Wheeling charge under a deregulated environment
114
Wheeling charges with consideration of consumer load modeling
115
Wheeling of Power under Deregulated Environment of Power System: A Bibilographical Survey
116
Wheeling of power under deregulated environment of power system-a bibliographical survey
117
Wheeling rates based on marginal-cost theory
118
Wheeling Rates Based on Marginal-Cost Theory
119
Wheeling rates evaluation using optimal power flows
120
Wheeling rates of reactive power flow under marginal cost pricing
121
Wheeling using evolutionary programming based optimal power flow algorithm
122
Wheeling-a feasible solution for co-generation using biomass in Brazil
123
WheelLoc: Enabling continuous location service on mobile phone for outdoor scenarios
124
Wheel-of-time array devoted to near-field imaging applications
125
Wheel-rail contact parameters estimation for a conical solid-axle railway wheelset using least-absolute error with variable forgetting factor method
126
Wheel-rail joint geometry
127
Wheel-rail profile condition monitoring
128
Wheel-Rail Profile Estimation
129
Wheel-rail resistance and energy consumption analysis of cars on tangent track with different lubrication strategies
130
Wheel-Rail Slide Thermal-Elastic Coupled Analysis
131
Wheels identification using machine vision technology
132
WHEELS: a conversational system in the automobile classifieds domain
133
WHEELS: a statistical approach to EMC model validation
134
Wheel-slip detection in railroad braking
135
Wheel-soil interaction model for all-terrain vehicles
136
Wheel-soil interaction model for rover simulation based on plasticity theory
137
Wheel-Speed Induced Errors in the Use of Dry-Tuned Gyros
138
Wheel-Speed Induced Errors in the Use of Dry-Tuned Gyros
139
Wheely friends
140
Wheeze Detection Algorithm Based on Spectrogram Analysis
141
Wheeze Detection and Location using Spectro-temporal Analysis of Lung Sounds
142
Wheeze detection in the respiratory sounds using Hilbert-Huang transform
143
Wheeze Detection Using Cepstral Analysis in Gaussian Mixture Models
144
Wheeze detection using fractional Hilbert transform in the time domain
145
Wheezing sounds detection using multivariate generalized gaussian distributions
146
Whelchel Commended with O´Connell Award [News and Notes]
147
When "Grain Size" Doesn\´t Matter
148
When $80 Billion Is Not Enough
149
When & Where for the Static Switch
150
When “exact recovery” is exact recovery in compressed sensing simulation
151
When “not my problem” isn´t enough: Political neutrality and national responsibility in cyber conflict
152
When “almost” is good enough: a fresh look at DSP clock rates
153
When 12-dB SINAD is not 12-dB SINAD [land mobile FM receivers]
154
When 3D Reconstruction Meets Ubiquitous RGB-D Images
155
When 3G Meets VANET: 3G-Assisted Data Delivery in VANETs
156
When a Bloom filter is a Doom filter: Security assessment of a novel iris biometric template protection system
157
When a cone policy is coherent [single machine manufacturing systems]
158
When a facility becomes flooded-a case study [telephone power supplies]
159
When a feature detector becomes a feature generator
160
When a GUI Regression Test Failed, What Should be Blamed?
161
When a Manager Reaches Middle Age
162
When a password is not a password [computer resource security]
163
When a Patch Goes Bad: Exploring the Properties of Vulnerability-Contributing Commits
164
When a Personal Computer Isn´t Enough, You Need a Personal PDP-11. [advertisement]
165
When a robot orients visitors to an exhibit. Referential practices and interactional dynamics in real world HRI
166
When a software measure is not a measure
167
When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE) - providing learning and synthesizing experiences for cyber security students.
168
When a usability test is not the answer
169
When academy meets industry: A case study of team teaching between academic and industrial teachers
170
When Acceptance is not Enough - Taking TAM-Model into Healthcare
171
When accumulative information is beneficial for maximizing energy efficiency?
172
When Additional Views are Not Free: Active View Completion for Multi-view Semi-Supervised Learning
173
When AES blinks: introducing optical side channel
174
When agents roam, who can you trust?
175
When AIMD meets ICN: A bandwidth sharing perspective
176
When air becomes an electrical pathway
177
When Alamouti codes meet interference alignment: Transmission schemes for two-user X channel
178
When algorithms became local: solving computational geometry problems on neural networks
179
When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design
180
When an extra bit is a waste
181
When analogue is better [Electronic design]
182
When and by how much can helper node selection improve regenerating codes?
183
When and how cognitive style impacts decision-making
184
When and how coupled-mode theory fails in high-index contrast arrayed and multi-slot waveguides
185
When and how does group diversity increase group performance: A literature review and research agenda
186
When and how should decoding power be considered for achieving high energy efficiency?
187
When and how should the optical network be upgraded to flex grid?
188
When and how to argue
189
When and How to Change Quorums on Wide Area Networks
190
When and How to Delegate
191
When and how to help: An iterative probabilistic model for learning assistance by demonstration
192
When and How to Use Refurbished Equipment for IT Needs
193
When and How to use the online configurator in the Automobile Industry
194
When and How Using Structural Information to Improve IR-Based Traceability Recovery
195
When and How VOTM Can Improve Performance in Contention Situations
196
When and to what extent should two belief functions be discounted?
197
When and what kind of memetic algorithms perform well
198
When and when not to use fuzzy logic in industrial control
199
When and where do infants follow gaze?
200
When and Where Does the Reentry Start in Long-QT Syndrome? - A Computer Simulation Study
201
When and where is a service? Investigating temporal and locative service properties
202
When and where?
203
When and why developers adopt and change software licenses
204
When and Why Your Code Starts to Smell Bad
205
When App Stores Listen to the Crowd to Fight Bugs in the Wild
206
When applications can roam freely
207
When AppMon Met Stager
208
When AR meets food: A structural overview of the research space on multi-facets of food
209
When Arduino Meets Kinect: An Intelligent Ambient Home Entertainment Environment
210
When are Building Blocks Useful?
211
When Are Calories Like Furniture? Modeling Service Systems to Improve Health
212
When Are Dynamic Relaying Strategies Necessary in Half-Duplex Wireless Networks?
213
When are expert witnesses liable for their malpractice?
214
When are HF-radar observed wave heights modulated by periodic tidal and inertial currents?
215
When are maximum likelihood and minimum distance decoding equivalent for binary contagion channels?
216
When are pictures processed on a webpage?
217
When are product systems controllable?
218
When are Referral Reward Programs Effective: A Perspective of Regulatory Fit Theory
219
When are substrate effects important for on-chip interconnects?
220
When are tasks “difficult” for learning controllers?
221
When are the complex and the real stability radii equal?
222
When are the MLSD respectively the matched filter receiver optimal with respect to the BER?
223
When are transistors practical?
224
When are transmission-line effects important for on-chip interconnections
225
When are transmission-line effects important for on-chip interconnections?
226
When are two geometric Goppa codes equal?
227
When artists met EvoSpace-i
228
When atoms and bits collide: detroit goes digital
229
When bacteria talk: Time elapse communication for super-slow networks
230
When bad things happen to good technologies
231
When BDDs Fail: Conformance Testing with Symbolic Execution and SMT Solving
232
When BDI Meets Argumentation: The Conceptual Ideal
233
When Bias Matters: An Economic Assessment of Demand Response Baselines for Residential Customers
234
When Bits Bite
235
When Black Hats Are Really White
236
When bode meets shannon: control-oriented feedback communication schemes
237
When brain and behavior disagree: Tackling systematic label noise in EEG data with machine learning
238
When bust is best (destructive testing)
239
When caches aren´t enough: data prefetching techniques
240
When can a relay reduce end-to-end communication delay?
241
When can an autonomous reputation scheme discourage free-riding in a peer-to-peer system?
242
When Can Dictionary Learning Uniquely Recover Sparse Data From Subsamples?
243
When Can Interleaving Be Avoided for Reed-Solomon Coded Binary Markov Channels?
244
When can measurements inhibit decay?
245
When can tentative decisions be used to cancel (linear or nonlinear) intersymbol interference? (With application to magnetic recording channels)
246
When can the decentralised state feedback be realised as a static output feedback?
247
When can two unlabeled networks be aligned under partial overlap?
248
When can we test less?
249
When capacitive transduction meets the thermomechanical limit: Towards femto-newton force sensors at very high frequency
250
When Cars Went Electric, Part 2 [Historical]
251
When Cars Went Electric, Part One [Historical]
252
When catalogs collide: A mashup of the bibliographic records from New Zealand´s National Bibliography and the HathiTrust
253
When Cell Phones Become Computers
254
When Cellular Capacity Meets WiFi Hotspots: A Smart Auction System for Mobile Data Offloading
255
When cellular meets WiFi in wireless small cell networks
256
When Channel Bonding is Beneficial for Opportunistic Spectrum Access Networks
257
When Chickens Attack [Update]
258
When Children Sense in Colours: Determinants of Colour - Emotion Associations
259
When classifier selection meets information theory: A unifying view
260
When client/server isn´t enough: coordinating multiple distributed tasks
261
When cloud meets eBay: Towards effective pricing for cloud computing
262
When cloud virtual machine images need to be updated
263
When clusters meet partitions: new density-based methods for circuit decomposition
264
When code smells twice as much: Metric-based detection of variability-aware code smells
265
When Code-Anomaly Agglomerations Represent Architectural Problems? An Exploratory Study
266
When codeword frequency meets geographical location
267
When coherent light interacts with coherent atoms-optical properties of Bose-Einstein condensates
268
When Common Knowledge Becomes Common Doubt -- Modeling IT-Induced Ambiguities about the Strategic Situation as Reasons for Flash Crashes
269
When CoMP is beneficial — And when it is not. Selective coordination from a spectral efficiency and a users´ throughput perspective
270
When Competitive Intelligence Meets Geospatial Intelligence
271
When compressive sampling meets multicast: Outage analysis and subblock network coding
272
When Computer Science Emerged and Fuzzy Sets Appeared: The Contributions of Lotfi A. Zadeh and Other Pioneers
273
When computer security crashes into multimedia
274
When Computers are Scarce: a Case of Botswana Schools
275
When computers went to sea: The digitization of the United States Navy [Book Review]
276
When Computers Were Amateur
277
When Computers Were Human
278
When computing meets heterogeneous cluster: Workload assignment in graph computation
279
When Content Matters: The Role of Processing Code in Tactile Display Design
280
When coping doesn´t sit well
281
When could anyone have seen Leibniz´s stepped wheel?
282
When Counting is Not Enough: Limitations of NSA´s Effectiveness Assessment of Surveillance Technology
283
When crowdsourcing meets mobile sensing: a social network perspective
284
When Cryptographers Turn Lead into Gold
285
When culture and rhetoric contrast: examining English as the international language of technical communication
286
When cyberathletes conceal their game: Clustering confusion matrices to identify avatar aliases
287
When Cyborgs meet: building communities of cooperating wearable agents
288
When Data Do Not Bring Information: A Case Study in Markov Random Fields Estimation
289
When Data Grows Big
290
When data must satisfy constraints upon writing
291
When dead certs don´t run, turkeys fly
292
When devices become collaborative: Supporting device interoperability and behaviour reconfiguration across emergency management scenario
293
When dielectric spectroscopy meets THz spectroscopy; the tale of two estranged brothers
294
When digital becomes analog - Interfaces in high speed test
295
When Digital Forensic Research Meets Laws
296
When digital native meets analogue reality: A case study of ICT skills in first year university students
297
When disaster strikes
298
When disaster strikes, manage it [Notebook: Disaster Recovery]
299
When disaster strikes...- [Editorial]
300
When disparity meets distance: HEVC compression of double-faced depth map
301
When Distributed Hash Tables Meet Chemical Programming for Autonomic Computing
302
When Do Cooperative Networks Profit from CSI Feedback? - An Outage Capacity Perspective
303
When do corporate diversification increase financial liquidity?
304
When do distributed student teams work?
305
When do fixed point logics capture complexity classes?
306
When Do I Use An RLS Adaptive Filter ?
307
When Do Local Operations and Classical Communication Suffice for Two-Qubit State Discrimination?
308
When Do Non-Regenerative Two-Hop Relaying Networks Require a Global Phase Reference?
309
When do only sources need to compute? On functional compression in tree networks
310
When do redundant requests reduce latency ?
311
When do rotated constellations provide gains?
312
When do singular inputs of an LTI system not cause discontinuities in state variables?
313
When do the availability codes make the stored data more available?
314
When do the Manley-Rowe relations really hold?
315
When Do We (Not) Need Complex Assume-Guarantee Rules?
316
When Do We Eat? An Evaluation of Food Items Input into an Electronic Food Monitoring Application
317
When do we need non-quasistatic CMOS RF-models?
318
When Do We Need Rate Control for Dedicated Channels in UMTS?
319
When do WOM codes improve the erasure factor in flash memories?
320
When do you adopt CAE?
321
When do you start to design R&M into a product? Concurrent engineering, CALS, and the R&M engineer
322
When Does "Diversity"´ in Development Reduce Common Failures? Insights from Probabilistic Modeling
323
When does a camera see rain?
324
When does a circuit really fail?
325
When does a digraph admit a doubly stochastic adjacency matrix?
326
When Does a Refactoring Induce Bugs? An Empirical Study
327
When does an ensemble of matrices with randomly scaled rows lose rank?
328
When does asymptotic orthogonality exist for very large arrays?
329
When Does Computational Imaging Improve Performance?
330
When does content float? Characterizing availability of anchored information in opportunistic content sharing
331
When Does Cooperation Have Better Performance in Sensor Networks?
332
When Does Cotraining Work in Real Data?
333
When does CSMA become ALOHA?
334
When does feedback not increase capacity for channels with memory?
335
When does H equalizer outperform H2 equalizer in multipath fading environments?
336
When does interference not reduce capacity in multi-antenna networks?
337
When does it make C to give up physical test access?
338
When does it pay to make software more reliable?
339
When does lower bitrate give higher quality in modern video services?
340
When Does My Program Fail?
341
When does Network-on-Chip bypassing make sense?
342
When Does Online BP Training Converge?
343
When does opportunistic routing make sense?
344
When does or does not circle criterion help in robust control synthesis for LTI systems with sector type nonlinearities?
345
When does relaxation reduce the minimum cost of an optimal control problem?
346
When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks?
347
When Does Targeting Make Sense for an Attacker?
348
When does the AP deployment incentivize a user to offload cellular data: An energy efficiency viewpoint
349
When Does the Driver Workload Reaches Its Limits ?
350
When does the Freedom of Information Act apply to privately held data produced under a Federal grant? I
351
When does the H fixed-lag smoothing performance saturate for a finite smoothing lag?
352
When does the ISO 9000 quality assurance standard lead to performance improvement? Assimilation and going beyond
353
When does the modular distance induce a metric in the binary case? (Corresp.)
354
When does the source-channel separation theorem hold?
355
When Does the Wyner Model Accurately Describe an Uplink Cellular Network?
356
When downtime is a disaster [CHP for Internet service providers]
357
When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM
358
When Dynamic VM Migration Falls under the Control of VM Users
359
When East meets West (management problems)
360
When Eco-IT meets security: Concealed network coding for multicast traffic
361
When education and industry work together
362
When efficiency matters: Towards quality of context-aware peers for adaptive communication in VANETs
363
When elephants dance, mice watch out! [legal issues]
364
When Else Did This Happen? Efficient Subsequence Representation and Matching for Wearable Activity Data
365
When email was good
366
When employees face the choice of voice or silence: The moderating role of Chinese traditional culture values
367
When Endangered Species Collide: Ecosystem Restoration in Prince William Sound, Alaska
368
When engineering systems fail - the disconnection between continuity plans and organisational behaviour
369
When engineers had the stars in their sights [And Now This]
370
When enough is enough: early stopping of biometrics error rate testing
371
When Erico met Baxter [Backstory]
372
When Even the Interface Evolves...
373
When every atom counts
374
When every byte counts — Writing minimal length shellcodes
375
When existing recommendations for PST protection can let you down
376
When Expanders Help Self-Healing Distributed R-Tree Overlays
377
When expert advice works, and when it does not
378
When expertise goes awry, and when it proves helpful
379
When Face Recognition Meets with Deep Learning: An Evaluation of Convolutional Neural Networks for Face Recognition
380
When fear is the motivator [Manufacturing]
381
When fiction meets fact [Back Story]
382
When fish Moonwalk
383
When Fisher meets Fukunaga-Koontz: A New Look at Linear Discriminants
384
When Form and Function Combine: Hedonizing Business Information Systems for Enhanced Ease of Use
385
When free riding is the best choice: The case of network charges for content providers
386
When freedom rang [Spectral Lines]
387
When functions change their names: automatic detection of origin relationships
388
When giving pain a name causes more headaches
389
When good communication go bad: communications recovery for multi-robot teams
390
When good diagnostics go bad - Why maturation is still hard
391
When good enough software is best
392
When good requirements turn bad
393
When good trigger circuits go bad: A case history
394
When Good-Enough is Enough: Complex Queries at Fixed Cost
395
When growth controls photosynthesis
396
When hand-built is cooler [manufacturing retro audio]
397
When hardware is free, power is expensive! Is integrated power management the solution?
398
When HART goes wireless: Understanding and implementing the WirelessHART standard
399
When has a decision-directed equalizer converged?
400
When hashes collide [applied cryptography]
401
When Heat Losses in a Better Capacitor May Be More than in a Poorer One
402
When heavy-tailed and light-tailed flows compete: The response time tail under generalized max-weight scheduling
403
When high-quality face images match poorly
404
When high-tech goes awry
405
When HTTPS Meets CDN: A Case of Authentication in Delegated Service
406
When Huffman Meets Hamming: A Class of Optimal Variable-Length Error Correcting Codes
407
When Humans Become Objects: Out-Group Effects in Real and Artificial Faces
408
When hybrid cloud meets flash crowd: Towards cost-effective service provisioning
409
When hybrid dynamics increases interceptor´s capturability?
410
When IC yield missed the target, who is at fault?
411
When ICN meets C-RAN for HetNets: an SDN approach
412
When Idle Is Not Quiet: Energy-Efficient Platform Design in Presence of Network Background and Management Traffic
413
When in Rome: The role of culture & context in adherence to robot recommendations
414
When infinite flow is sufficient for ergodicity
415
When In-Network Processing Meets Time: Complexity and Effects of Joint Optimization in Wireless Sensor Networks
416
When In-Network Processing Meets Time: Complexity and Effects of Joint Optimization in Wireless Sensor Networks
417
When innovating, go slow [Spectral Lines]
418
When innovation fails
419
When integrated circuits couldn´t be trusted [And Now This]
420
When integration works better than segregation does in multiple-gain situations: The revised coding rules in mental accounting
421
When International Service Outsourcing Begin: A Transaction Cost Economics Perspective
422
When Internet Raised to the Things Power: Are Energy Efficiency Standards Sufficient to Curb Carbon Footprints?
423
When investing in CNC really takes off
424
When is (D,G)-scaling both necessary and sufficient
425
When is `partial´ adequate? A logic-based proof technique using partial specifications
426
When is 3D 2B?
427
When is a "Little in the Middle" ok? The Internet\´s end-to-end principle faces more debate
428
When is a controller optimal in the sense of ℋ loop-shaping?
429
When is a controller optimal in the sense of H loop-shaping?
430
When Is a Cyberattack a Use of Force or an Armed Attack?
431
When is a Discrete Diffusion a Scale-Space?
432
When is a document accurate and complete?
433
When is a field initiated bioeffect thermal?
434
When Is a Function Securely Computable?
435
When is a function securely computable?
436
When is a linear robust regulator optimal?
437
When is a maximal invariant hypothesis test better than the GLRT?
438
When is a mechanical control system kinematic?
439
When is a Message Decodable Over Fading Channels?
440
When is a model good for control design?
441
When is a parameterized controller suitable for adaptive control?
442
When is a pay-as bid preferable to uniform price in electricity markets
443
When is a Problem Solved?
444
When is a Process Model Not a Process Model - A Comparison Between UML and BPMN
445
When Is a Product a Security Product?
446
When is a satellite not a toaster? [satellite repair costs]
447
When is a semigroup a group?
448
When is a Swarm Necessary?
449
When is adaptive better than optimal?
450
When is adaptive better than optimal?
451
When is an accident not an accident?
452
When is an algorithm feasible? Soft computing approach
453
When is an estimation of distribution algorithm better than an evolutionary algorithm?
454
When is an obstacle a perfect obstacle
455
When is an obstacle a perfect obstacle?
456
When is an optimal transform coder orthonormal?
457
When is bit allocation for predictive video coding easy?
458
When Is CAN the Weakest Link? A Bound on Failures-in-Time in CAN-Based Real-Time Systems
459
When is Clarke´s Approximation Valid?
460
When is classical loop shaping H-optimal?
461
When is compress-and-forward optimal?
462
When is constrained control necessary for large scale processes?
463
When Is Differential Detection Optimum for Ideal and Partially Coherent Reception/Demodulation of $M$-PSK?
464
When Is Differential Detection Optimum for Ideal and Partially Coherent Reception/Demodulation of M-PSK?
465
When is DPCM a stable system?
466
When is dumb smart? [Reflections]
467
When is electromagnetic spectrum fungible?
468
When is FDMA Sum-Rate Optimal in 2x2 Gaussian Interference Channel?
469
When is hard decision decoding enough?
470
When is import competition detrimental to workers? An application of TAR model
471
When is instantaneous frequency the average frequency at each time?
472
When Is It Beneficial for a Firm to Pursue a Unified Procurement Strategy for Enterprise Software Solutions?
473
When is it intelligent to use a smart battery?
474
When is it possible to identify 3D objects from single images using class constraints?
475
When is it possible to simulate a DMC channel from another?
476
When is it time to add a Ph.D program?
477
When is it worth involving several cells in the call admission control process for multimedia cellular networks?
478
When is limited feedback for transmit beamforming beneficial?
479
When is nonadaptive information as powerful as adaptive information?
480
When is Nonlinear Dynamic Modeling Necessary?
481
When is non-negative matrix decomposition unique?
482
When is n-pairs information a multicommodity flow?
483
When is overload distortion negligible in uniform scalar quantization?
484
When is phonetic search with FPGAs efficient?
485
When is preview beneficial?
486
When is the Achievable Discrete-Time Delay Margin Nonzero?
487
When is the design of a manufacturing system acceptable in the presence of uncertainty?
488
When is the discretization of a PDE good enough for control?
489
When is the fast computation of the periodic steady state appropriate
490
When is the generalized delta rule a learning rule? a physical analogy
491
When is the generalized likelihood ratio test optimal?
492
When Is The Generalized Likelihood Ratio Test Optimal?
493
When is the image of a multilinear function a polytope?-A conjecture
494
When is the least-mean fourth algorithm mean-square stable?
495
When is the naive quantized control law globally optimal?
496
When is the set of base parameter values physically impossible?
497
When is the shape of a scene unique given its light-field: a fundamental theorem of 3D vision?
498
When is the weak rate equal to the strong rate?
499
When is two too many? [standards]
500
When is wavelength conversion contributing to reducing the blocking rate?
501
When ISPs Become Copyright Police
502
When it all comes raining down [business continuity planning]
503
When It Breaks, It Breaks: How Ecosystem Developers Reason about the Stability of Dependencies
504
When it comes to Testing, is Usability the Closest Analogy to Security?
505
When IT Gets Cultural: Data Management and Agile Development
506
When IT Risk Management Produces More Harm than Good: The Phenomenon of ´Mock Bureaucracy´
507
When it´s too hot to touch use infrared thermography
508
When Jobs Play Nice: The Case For Symbiotic Space-Sharing
509
When KAD Meets BitTorrent - Building a Stronger P2P Network
510
When knowledge becomes information: a case of mistaken identity
511
When knowledge is the critical resource, knowledge management is the critical task
512
When leader-member exchange promotes employee creativity
513
When Least Is Best: How Mathe-maticians Discovered Many Clever Ways to Make Things as Small (or as Large) as Possible [Book Review]
514
When Legacy Meets SOA: Achieving Business Agility by Integrating New Technology with Existing Software Asset
515
When less is more
516
When less is more: where the Communications Society´s publications are headed
517
When less means more; and more, the-same?
518
When loads stray: Evaluation of Different Measurement Methods to Determine Stray Load Losses in Induction Machines
519
When local becomes global: an application study of data consistency in a networked world
520
When local isn´t enough: extracting distributed rules from networks
521
When locally repairable codes meet regenerating codes — What if some helpers are unavailable
522
When Malware Attacks (Anything but Windows)
523
When management agents become autonomous, how to ensure their reliability?
524
When management gets serious about managing software
525
When mathematics knocks physics or the true story of the layer copper factor
526
When Misses Differ: Investigating Impact of Cache Misses on Observed Performance
527
When mobile terminals meet the cloud: computation offloading as the bridge
528
When Model Driven Engineering meets virtual reality: Feedback from application to the Collaviz framework
529
When models collide: lessons from software systems analysis
530
When MPEG-4 and COLLADA meet for a complete solution of distributing and rendering 3D graphics assets
531
When multimedia advertising meets the new Internet era
532
When My Avatar Went to Work
533
When network coding and dirty paper coding meet in a cooperative ad hoc network
534
When network coding improves the performances of clustered wireless networks
535
When new needs for satellite payloads meet with new filters architecture and technologies
536
When new needs for satellite payloads meet with new filters architecture and technologies
537
When no one´s home: being a remote writer on distributed teams
538
When not to spread spectrum - A sequel
539
When object-oriented operating system is time critical
540
When Occlusions are Outliers
541
When one door closes, another door opens... [Editor´s Remarks]
542
When one is really six
543
When one man´s experiences are not enough
544
When one quantum object is measured by another: a new class of quantum paradoxes
545
When one should consider Schmitt trigger gates
546
When Online Communities Become Self-Aware
547
When Online Reviews Meet Hyperdifferentiation: A Study of Craft Beer Industry
548
When Open Source Meets Network Control Planes
549
When open source turns cold on innovation — The challenges of navigating licensing complexities in new research domains
550
When opportunity proceeds from autonomy: A tour-based architecture for disconnected mobile sensors
551
When Optical Networking Meets Grid Computing?
552
When optimal entropy-constrained quantizers have only a finite number of codewords
553
When optimal sensor interrogation is rhythmic
554
When Optimized N-Detect Test Sets are Biased: An Investigation of Cell-Aware-Type Faults and N-Detect Stuck-At ATPG
555
When order matters: Communication scheduling for current injection control in micro grids
556
When Organization Gets in the Way of Achievement
557
When parts are scrap before they are made!
558
When past solutions cause future problems [Year 2000 problem]
559
When Patches Match -- A Statistical View on Matching under Illumination Variation
560
When path tracking using look-ahead distance about the lateral error method and the velocity change method tracking comparison
561
When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks
562
When people are too large and dirty (manufacturing computer control)
563
When People Meet Robots [News and Views]
564
When Performance & Price Really Count, Wrap it up with Nitto Tape [advertisement]
565
When physics rules robotics: scaling issues in the design of robots and robotic applications
566
When PIGs Fly - addressing software reliability concerns for the IRIS IP router operating system
567
When pilots should not be reused across interfering cells in massive MIMO
568
When Pixels Team up: Spatially Weighted Sparse Coding for Hyperspectral Image Classification
569
When plans are executed by mice and men
570
When Politics Overshadow Software Quality
571
When primary users whisper: A preliminary analysis on correlations of population-traffic dynamics
572
When priority resolution goes way too far: An experimental evaluation in PLC networks
573
When process data quality affects the number of bugs: Correlations in software engineering datasets
574
When Process is Getting in the Way of Creativity and Innovation
575
When processors get old: Evaluation of BTI and HCI effects on performance and reliability
576
When production engineering is all consuming
577
When push comes to crunch
578
When PV modules are becoming real building elements: White solar module, a revolution for BIPV
579
When QoS counts [Book Review]
580
When quadratic sorts use granules
581
When quasistatic jamming is impossible
582
When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds
583
When randomness improves the anomaly detection performance
584
When rats meet hearts: a gopher information server for cardiology
585
When reactors reach old age: Can an obsolete nuclear power plant site he safely and economically restored to its original environmental condition?
586
When reconfigurable architecture meets network-on-chip
587
When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs
588
When Robert Rules
589
When robots are late: Configuration planning for multiple robots with dynamic goals
590
When robots lie a comparison of auto-defamation law
591
When robots meet people
592
When Robots Meet Ubiquity and Grid Computing: Pervasive Grid Platform-Based Collaborative Work
593
When robots should be used
594
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
595
When Routines Strike Back: Developing ICT Supported Mathematics Instructional Practices
596
When Scalability Meets Consistency: Genuine Multiversion Update-Serializable Partial Data Replication
597
When Scavengers Meet Industrial Wireless
598
When science calls religion
599
When Science Fiction and Science Fact Meet
600
When script engravings reveal a semantic link between the conceptual and the spatial dimensions of a monument: The case of the tomb of Emperor Qianlong
601
When SDR meets a 5G candidate waveform : Agile use of fragmented spectrum and interference protection in PMR networks
602
When Security Meets Usability: A User-Centric Approach on a Crossroads Priority Problem
603
When seeing isn´t believing [multimedia authentication technologies]
604
When self-consistency makes a difference
605
When Sensitive IT Information Crosses Borders
606
When sensor Webs start being taken seriously
607
When serializability comes without cost
608
When Service Computing Meets Software Engineering
609
When shared plans go wrong: From atomic- to composite actions and back
610
When sharing fails
611
When should a learning machine ask for help?
612
When should a speech coding quality increase be allowed within a talk-spurt?
613
When should an Inventor apply for a patent? [Patents]
614
When should animated agents give additional instructions to users? - Monitoring user’s understanding in multimodal dialogues -
615
When should i make preservation copies of myself?
616
When should intermittent failure detection routines be part of the legacy re-host TPS?
617
When should on-chip inductance modeling become necessary for VLSI timing analysis?
618
When should smoothing cease?
619
When Should We Teach Microprocessors?
620
When silence is gold
621
When simplicity meets optimality: Efficient transmission power control with stochastic energy harvesting
622
When small cell networks meet FiWi or like deserts miss the rain
623
When smaller is better [Book Review]
624
When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response
625
When Smart Phone Meets Vehicle: A New On-Board Unit Scheme for VANETs
626
When Social Media Meet the Enterprise
627
When Social Network Meets Mobile Device! - An Efficient and Collaborative Framework for Mobile Application
628
When social networking meets the next generation network
629
When Social Software Meets Business Process Management
630
When Software Architecture Leads to Social Debt
631
When Software is Treated Much Too Lightly
632
When solutions of parametric complementarity problem are monotone with respect to the parameters
633
When Specifying ... a name to remember Ideal Therm-XTM
634
When Specifying ... a name to remember Ideal Therm-XTM
635
When spectrum auctions fail
636
When Spectrum Meets Clouds: Optimal Session Based Spectrum Trading under Spectrum Uncertainty
637
When Specular Object Meets RGB-D Camera 3D Scanning: Color Image Plus Fragmented Depth Map
638
When speed is everything
639
When standards and best practices are ignored
640
When standards are used as a weapon
641
When strongly disordered medium meets compressive super-resolution imaging
642
When Structure Meets Function in Evolutionary Dynamics on Complex Networks
643
When students choose competencies: Insights from the competency-specific engineering portfolio studio
644
When students´ self regulation of learning in peer group encounters novel knowledge at university
645
When Supply Meets Demand: The Case of Hourly Spot Electricity Prices
646
When surveillance sensors disagree
647
When Switches Became Programs: Programming Languages and Telecommunications, 1965-1980
648
When system boundaries dissolve: research opportunities in software architectures for ubiquitous computing and communication
649
When systems engineering fails-toward complex systems engineering
650
When systems thinking is not a natural act
651
When Taguchi meets water treeing [power cables]
652
When target motion matters: Doppler coverage in radar sensor networks
653
When TCP Breaks: Delay- and Disruption- Tolerant Networking
654
When TCP Friendliness Becomes Harmful
655
When technicians use computer programs: approaches to procedure writing
656
When technologies converge
657
When technology alone is not enough: A discussion of a struggling telepsychiatry project and lessons from model programs
658
When technology is mandatory-factors influencing users satisfaction
659
When technology prevails and pedagogy survives
660
When telecommunications networks meet energy grids: cellular networks with energy harvesting and trading capabilities
661
When Texas Instruments and Tektronix team up, brilliant ideas take shape. [advertisement]
662
When the balloon goes up
663
When the basics aren´t enough: finding a comprehensive editor
664
When the Bough Breaks: Managing Extreme Weather Events Affecting Electrical Power Grids
665
When the chickens come home to roost: the licensed foundry defense in patent cases
666
When the chips are down
667
When the Cloud Goes Local: The Global Problem with Data Localization
668
When the Corporate Form Doesn´t Make Cents: Alternative Forms of Business Organization
669
When the cure is worse than the disease: The impact of graceful IGP operations on BGP
670
When the designer needs technically qualified market research help
671
When the engineering has to stop
672
When the Factory-of-the-Future is the Factory-of-Today, will you be Able to Say "I was There"? [advertisement]
673
When the fingers do the talking: A study of group participation with varying constraints to a tabletop interface
674
When the games industry and academia collide: How we impact each other
675
When the going gets tough - [management book review]
676
When the grid becomes pervasive to save the day, even Mitch Buchannon needs decision-making support
677
When the grid goes out: Backup power in disaster areas
678
When the heat´s on - Varglas - * performs!
679
When the herd is smart: Aggregate behavior in the selection of job request
680
When the Lights Go Out: Getting Power Systems Running Again [Guest Editorial]
681
When the Lights Went Out (Nye, D.; 2010) [Book Review]
682
When the lines go down (telecommunications)
683
When the medium is (much of) the message: the domain of structured document processors
684
When the pair programming should be adopted in a business environment
685
When the Password Doesn´t Work: Secondary Authentication for Websites
686
When the playing fields aren´t even: personalised attention in the multilingual, varied-ability classroom
687
When the Plus Strategy Outperforms the Comma Strategyand When Not
688
When the problem is stress: Every area of a student´s life provides its own type of stress. Coping tactics range from “flight” through drugs to “fight” through various therapies
689
When the project absolutely must get done: marrying the organization chart with the precedence diagram
690
When the pursuit of quality destroys value [software development]
691
When the robot criticizes you… Self-serving bias in human-robot interaction
692
When the robot puts itself in your shoes. Managing and exploiting human and robot beliefs
693
When the Sensors Hit the Roads (Invited Talk)
694
When the Shift Hits the (Television) Fan: A Growing Opportunity for Companion Devices
695
When the Smart Grid Meets Energy-Efficient Communications: Green Wireless Cellular Networks Powered by the Smart Grid
696
When the Software Goes Beyond its Requirements -- A Software Security Perspective
697
When the System Is an Enterprise: At the Cutting Edge
698
When the User Is Instrumental to Robot Goals: First Try – Agent Uses Agent
699
When the VP is a Scrum Master, You Hit the Ground Running
700
When the welding load outgrows the distribution power supply
701
When the welding load outgrows the distribution power supply
702
When the Welding Load Outgrows the Distribution Power Supply
703
When the wind blows over Europe a simulation analysis and the impact of grid extensions
704
When the World of Computer Graphics Required Standards, the World of Standards Acquired NOVA*GKS [advertisement]
705
When the writer isn´t a technical person
706
When theory meets practice: A case report on conceptual modeling for XML
707
When theory meets practice: enriching the CS curriculum through industrial case studies
708
When thermal control meets sensor noise: analysis of noise-induced temperature error
709
When they are not listening: Harvesting power from idle sensors in embedded systems
710
When things go wrong-an arbitrator´s view of how to minimise conflict
711
When Timing Matters: Enabling Time Accurate and Scalable Simulation of Sensor Network Applications
712
When to add another dimension when communicating over MIMO channels
713
When to apply the fifth commandment: the effects of parenting on genetic and learning agents
714
When to assess knowledge, skills and competences: Is there an optimum point in time for assessment?
715
When to Combine Two Visual Cognition Systems
716
When to commit to a prior technological entry: A multi-theoretical view on follow-up patenting
717
When to Control the Ramps on Freeway Corridors? A Novel Stability-and-MFD-Based Approach
718
When to do your own thing: Analysis of cost uncertainties in multi-robot task allocation at run-time
719
When to engage in interaction — And how? EEG-based enhancement of robot´s ability to sense social signals in HRI
720
When to engage video resilience options
721
When to explicitly replan paths for mobile robots
722
When to filter what, or prediction isn´t explanation
723
When to forget: A system-level perspective on STT-RAMs
724
When to inherit and when not to
725
When to initiate HIV therapy: a control theoretic approach
726
When to interrupt global software engineers to provide them with what information?
727
When to introduce objects in teaching Java
728
When to island in the controlled islanding scheme to prevent imminent wide-area blackouts
729
When to make a type [programming]
730
When to make nouns go into action
731
When to Migrate Software Testing to the Cloud?
732
When to quit for a new job: Quickest detection of spectrum opportunities in multiple channels
733
When to replace aging transformers
734
When to Replace Aging Transformers: Guidelines to Replace Older Transformers Before Failure
735
When to Schedule an Application? An Energy-Aware Decision
736
When to sell premium digital contents through the rival platform?
737
When to start second language teaching or learning in an EFL context
738
When to stop testing for large software systems with changing code
739
When to stop testing software? A fuzzy interval approach
740
When to stop testing under warranty using SRGM with change-point
741
When to stop testing: A study from the perspective of software reliability models
742
When to stop verification?: Statistical trade-off between expected loss and simulation cost
743
When to synchronize in uplink CDMA
744
When to Test Less
745
When to trust mobile objects: access control in the JiniTM Software System
746
When to type, talk, or Swype: Characterizing energy consumption of mobile input modalities
747
When to use bit-wise neutrality
748
When to use lasers
749
When to use partitioned signature files for retrieving information in multimedia systems
750
When to Use Random Testing
751
When to Use Standards-Based APIs (Part 1)
752
When to Use Standards-Based APIs (Part 2)
753
When Too Much Usage is Too Much: Exploring the Process of IT Addiction
754
When traceroute Met BGP… How to reveal hidden internet as-level connectivity with Portolan and Isolario
755
When Transportation Meets Communication: V2P over VANETs
756
When trees are not green: Recent developments in an off-the-shelf system for robust color and multispectral based recognition and robot control
757
When TV Dies, Will It Go to the Cloud?
758
When Two Bosses Are Better than One
759
When two worlds merge [test issues for system-level ICs]
760
When two-hop meets VoFi
761
When uncertainty is irrelevant to expected utility decision making
762
When underwater imagery analysis meets deep learning: A solution at the age of big visual data
763
When Users Cannot Verify Digital Signatures: On the Difficulties of Securing Mobile Devices
764
When users drive the network
765
When users generate music playlists: When words leave off, music begins?
766
When Users Interfere with Protocols: Prospect Theory in Wireless Networks using Random Access and Data Pricing as an Example
767
When value engineering pays off
768
When vehicles meet TV white space: A QoS guaranteed dynamic spectrum access approach for VANET
769
When virtual is better than real [operating system relocation to virtual machines]
770
When virtual roberts race, science wins
771
When Watchdog Meets Coding
772
When Web 2.0 Becomes Web Uh-Oh
773
When web 2.0 sneezes ...everyone gets sick
774
When whales are cast ashore: the conversion to relevancy of American universities and basic science
775
When will a consumer consider buying another car?
776
When will electric vehicles capture the German market? And why?
777
When Will Employees with High Impact Quit? The Interactive Effect of Impact and Supervisor´s Monitoring on Chinese Employees´ Turnover Intention
778
When will energy prices recover?
779
When will information systems grow up? Ego development and IT
780
When will it be done? Machine learner answers to the 300-billion-dollar question
781
When will it change the lane? A probabilistic regression approach for rarely occurring events
782
When will people regard robots as morally competent social partners?
783
When will smart antennas be ready for the market? Part I
784
When will smart antennas be ready for the market? Part II - results
785
When will software have the right stuff?
786
When will spares run-out?
787
When will the analog design flow catch up with digital methodology?
788
When Will the Internet Monitor and Manage Itself?
789
When will we have an exascale supercomputer? [News]
790
When will zeros of time-delay systems cross imaginary axis?
791
When Work Becomes Bliss
792
When work is fun and games
793
When worlds collide
794
When worlds collide: Applying art and design to robotics
795
When worlds combine [Information Technology Hybrid History]
796
When would this bug get reported?
797
When you are young, (robot´s) looks matter. Developmental changes in the desired properties of a robot friend
798
When You Can´t Justify New Test Equipment
799
When You Choose Leaders - Beware of The Smile Factor!
800
When You Don´t Know, Say So
801
When You Don´t Trust Clients: Byzantine Proposer Fast Paxos
802
When You Doubt, Abstain: From Misclassification to Epoché in Automatic Text Categorisation
803
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
804
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
805
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
806
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
807
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
808
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
809
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
810
When you Get Down to the Wire, Phelps Dodge Comes Through [advertisement]
811
When you have to get up and speak
812
When you have to retrofit 15 kV switchgear
813
When You Look Under the Hood of an Electric Vehicle [Viewpoint]
814
When You Need a Dependable Partner, We´ll be There [advertisement]
815
When you Need Answers, Refer to Elsevier North Holland [advertisement]
816
When you see What we´re doing with Fine Wire... you´ll wind up with ESSEX [advertisement]
817
When You Want a Graphics Terminal that Lets you Move in all Directions, We´ll be There [advertisement]
818
When You Want a Graphics Terminal that Lets you Move in all Directions, We´ll be There [advertisement]
819
When You Want the Best of Both Worlds in Graphics, We´ll be There [advertisement]
820
When You Want the of Best of Both Words in Graphics We´ll be There [advertisement]
821
When you write for the air force
822
When You´re Ready for the Brilliance of Color We´ll Be There [advertisement]
823
When You´re Ready for the Brilliance of Color, We´ll be There [advertisement]
824
When you´re up to your Bytes in Alligators [advertisement]
825
When your PDM/EDM/KM gets on top of you! [product data management/electronic document management/knowledge management]
826
When YouTube Does not Work—Analysis of QoE-Relevant Degradation in Google CDN Traffic
827
When zero picoseconds edge placement accuracy is not enough
828
WHEN: Triage & Prioritisation
829
Whence networking
830
When-to-Release Decisions in Consideration of Technical Debt
831
Where (who, what) are the drivers for the new model of learning?
832
Where AI/KB techniques fit into software development/engineering
833
Where algebra meets signal processing: Generating SW/HW implementations of algorithms
834
Where am I: Place instance and category recognition using spatial PACT
835
Where am I? An NDT-based prior for MCL
836
Where am I? Scene Recognition for Mobile Robots using Audio Features
837
Where am I? What am I looking at? (cinematography)
838
Where Analog meets Digital and Beyond
839
Where Analog Meets Digital: Analog?to?Information Conversion and Beyond
840
Where and How Duplicates Occur in the Web
841
Where and how to make an emphasis? - L2 distinct prosody and why
842
WHERE and WHAT: object perception for autonomous robots
843
Where and when to look: how to extend the myopic planning horizon
844
Where and when to use which data converter: A broad shopping list of monolithic, hybrid, and discrete-component devices is available; the author helps select the most appropriate
845
Where and why local shading analysis works
846
Where Are All the Intelligent Agents?
847
Where are bottlenecks in NK fitness landscapes?
848
Where Are Cache Memories Going?
849
Where are linear feature extraction methods applicable?
850
Where are modems going?
851
Where are My Colleagues and Why? Tracking Multiple Persons in Indoor Environments
852
Where Are My On-Wafer Reference Planes?
853
Where are power supplies headed?
854
Where are the async millionaires?
855
Where Are the Average Engineers? [MicroBusiness]
856
Where Are the Benefits in CRM Technology Investment?
857
Where are the challenges in speaker diarization?
858
Where are the circuit breakers?
859
Where are the customers?-marketing GIS
860
Where Are the Frontiers in Education?
861
Where are the government industries heading in a world of commercialization of EMC?
862
Where are the industrial power engineers?
863
Where are the Kuroko deposits forming? Tectonic setting of the hydrothermal systems in the Izu-Bonin Arc
864
Where Are the Niches? Dynamic Fitness Sharing
865
Where are the nuclear engineers?
866
Where are the opportunities for self-employment?
867
Where are the students: modeling and improving basketball attendance
868
Where are the thresholds for biological effects of non-endogenous low frequency, low intensity electric and magnetic: Fields?: Introduction to a "Mini Symposium": Definition of the problem
869
Where Are the Zeros of xi of t? [On the Lighter Side]
870
Where are those research dollars?
871
Where Are Today´s Signal Processing Heroes? [From the Editor]
872
Where Are We After Five Editions?: Robot Vision Challenge, a Competition that Evaluates Solutions for the Visual Place Classification Problem
873
Where are we going, Phil Morse? Changing agendas and the rhetoric of obviousness in the transformation of computing at MIT, 1939-1957
874
Where are we Going?
875
Where Are We Going?
876
Where Are We Going?
877
Where are we going?
878
Where are we going?
879
Where are we Going? (and how fast!) IEE Seminar Exploring Speed and Positioning Systems for the Transport Sector (Ref. No.1997/395)
880
Where Are We Going? (and How Fast?)
881
Where are we going? Product scaling in the system on chip era
882
Where Are We Headed With Technology Transfer?
883
Where Are We Headed? [Leader´s Corner]
884
Where are we in global E-Commerce?
885
Where are we on the "fend off the alligators - drain the swamp" continuum?
886
Where are we with dust classification?
887
Where are we with Haptic Visualization?
888
Where Are We? Handling Context
889
Where are we? what comes next [certification corner]
890
Where are WEEE in Africa?
891
Where are WEEE now? Lessons from WEEE: Will EPR work for the US?
892
Where Are You From?
893
Where Are You Looking At? - Feature-Based Eye Tracking on Unmodified Tablets
894
Where are you, now that I need you: Or societal communication concepts: A PSYCHOM ´72 paper
895
Where are you? A location awareness system
896
Where are you? wireless WAY´s to enhance collaboration
897
Where Art Thou? [From the Editor]
898
Where binary code imbalance decreases DC bias sensitivity
899
Where buses cannot go
900
Where CMOS is Going: Trendy Hype vs. Real Technology
901
Where CMOS is going: trendy hype vs. real technology
902
Where did all the money go?
903
Where did electrical engineering begin?
904
Where Did EM Simulation Tools Go?: A Comparison of How EM Tools Were Used in Circuit Simulators 25 Years Ago to Today
905
Where did I put that switch? Perspectives in asset management
906
Where Did My Battery Go? Quantifying the Energy Consumption of Cloud Gaming
907
Where did my signal go? A discussion of signal loss between the ATE and UUT
908
Where did the big E come from?
909
Where did the Internet go? [user census]
910
Where did the U.S. patent laws come from?
911
Where Did We Come From and Where Are We Going? Examining Authorship Characteristics in Technical Communication Research
912
Where did WEEE go wrong in Europe? Practical and academic lessons for the US
913
Where differences persist: Robotic vs. human movement control
914
Where do AEIC cable specifications come from?
915
Where do biomedical engineering students find work in Flanders?
916
Where do breakthrough ideas come from? Characteristics of scientists´ research behaviors
917
Where Do Configuration Constraints Stem From? An Extraction Approach and an Empirical Study
918
Where do goals come from: the underlying principles of goal-oriented requirements engineering
919
Where do good ideas come from? - Editor´s Letter
920
Where do hot electrons come from? (MOSFETs)
921
Where Do I Look For Good Ideas For My New Device?
922
Where do i look now? Gaze allocation during visually guided manipulation
923
Where do ideas come from? [Retrospectroscope]
924
Where do inventors get their ideas?
925
Where Do Models Get Their Values? (review of "Nonlinear Transistor Model Parameter Extraction Techniques " (Rudolph, M., Eds, et al; 2011) [Book/Software Reviews]
926
Where do operations come from? A multiparadigm specification technique
927
Where do requirements come from?
928
Where do special issues come from? [from the Editor]
929
Where do Students Learn about Engineering Design?
930
Where Do Students Look for Information?
931
Where do thewords come from? Learning models for word choice and ordering from spoken dialog corpora
932
Where do they look at? Analysis of gaze interaction in children while playing a puzzle game
933
Where do wavelets come from? A personal point of view
934
Where do we find safety? [Electrical Safety]
935
Where do we fit quality science in engineering courses?
936
Where Do We Go from Here?
937
Where Do We Go from Here?
938
Where do we go from here?
939
Where do we go from here? - A proposal for restructuring
940
Where do we go from here? [bioelectromagnetic effects]
941
Where do we go from here? [world class manufacturing]
942
Where do we go from here?: Analysis by the experts reveals steps to be undertaken in nuclear plant design, operating procedures, and institutional matters
943
Where do we stand and where are we heading in making NG-PONs more energy efficient ?
944
Where do we stand on cable standards?
945
Where do we stand on high resolution in low-angle tracking radar?
946
Where do we stand? (Edtl.)
947
Where Do You "Tube"? Uncovering YouTube Server Selection Strategy
948
Where do you go when you´re through the turnstile? [telecommunication software development]
949
Where do you read yours? [photo competition]
950
Where do you read yours? [Time Out Competition]
951
Where do you sample? - An autonomous underwater vehicle story
952
Where do you want to fly today? A user interface travel genre based on flight simulators
953
Where Do You Want to Go in Your SOA Adoption Journey?
954
Where do you want to use a robotic arm? And what do you want from the robot?
955
Where does broadband fit in the marketplace?
956
Where does computational media aesthetics fit?
957
Where does computational modeling of climate-induced migration stand and what challenges still need to be overcome
958
Where does experience matter in software process education? An experience report
959
Where does human factors fit in R&D organizations?
960
Where does human factors fit in R&D organizations?
961
Where does memory go in the 21C? (Evolution and revolution of memory technology)
962
Where Does Security Stand? New Vulnerabilities vs. Trusted Computing
963
Where does that harmonic voltage come from?
964
Where does the control theorist fit into the transportation picture?
965
Where does the hardware end and the software begin?
966
Where does the money come from? [President´s Message]
967
Where Does the Money Go? [President´s Message]
968
Where does the power go in a computer system: Experimental analysis and implications
969
Where does the radio spectrum end?
970
Where does the time go? characterizing tail latency in memcached
971
Where does this code come from and where does it go? — Integrated code history tracker for open source systems
972
Where does transport layer fit into space DTN architecture?
973
Where Does Your Conference Registration Fee Go? [President´s Message]
974
Where else can you go to Bounce Ideas off a Giant? [advertisement]
975
Where Else Do You See Cheering Crowds in a Classroom? [Education]
976
Where Engineers Come Together [Conference News]
977
Where evolvable production systems meet complexity science
978
Where First-Order and Monadic Second-Order Logic Coincide
979
Where future robots should go and should not go
980
Where genetic drift, crossover and mutation play nice in a free mixing single-population genetic algorithm
981
Where goes industrial robot technology?
982
Where has all our helium gone? [Basic Metrology]
983
Where has All the Hardware Gone? [advertisement]
984
Where has all the spectrum gone?
985
Where has my battery gone? Finding sensor related energy black holes in smartphone applications
986
Where have all the comets gone?
987
Where have all the engineers gone?
988
Where have all the engineers gone? [engineering education]
989
Where have all the inventors gone? Fostering creativity in engineering education with remote lab learning environments
990
Where have all the inventors gone?: Is there a lack of spirit of research in engineering education curricula?
991
Where Have All the Stencils Gone?
992
Where have all the students gone?
993
Where have all the tickets gone?
994
Where have we come from, and where are we going? [digital TV studio]
995
Where ideas come together in publications... IEEE
996
Where in SONET?
997
Where in the Curriculum Is the Right Place for Teaching Agile Methods?
998
Where in the world are we? radionavigation
999
Where in the World Is Carmen Sandiego (and Is She a Software Engineer)?
1000
Where in the World Is My Information?: Giving People Access to Their Data
بازگشت