<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Who Engages in Mergers and Acquisitions: Evidence from Chinese Listed Companies
2
Who enrolls in electrical engineering? A quantitative analysis of U.S.A. student trajectories
3
Who Explains it? Avoiding the feeling of third-person helpers in auditory instruction for older people
4
Who Framed Roger User? Problem Frames as a User Interaction Design Tool
5
Who Gains Most?
6
Who Gets Blamed When Your Applications Grow and Your Single Board Computer Doesn´t? [advertisement]
7
Who gets laid off?
8
Who goes there?
9
Who goes there? [personal identity systems]
10
Who graduates in mechanical engineering?
11
Who has ‘the right stuff’? human capital, entrepreneurship and institutional change in China
12
Who has the fastest internet?
13
Who has the keys to the vault? Protecting secrets on Laptops
14
Who interrupted me? Analyzing the effect of PU activity on cognitive user performance
15
Who introduced the tetrapolar method for measuring resistance and impedance?
16
Who Invented the Transformer? [Historical]
17
Who Invents What
18
Who is Accountable for Asynchronous Exceptions?
19
Who is afraid of the big bad ANN?
20
Who is an engineer?
21
Who is appropriate? A robot, human and mascot perform three troublesome tasks
22
Who Is Calling Which Page on the Web?
23
Who is collecting your Java garbage?
24
Who is doing what? Simultaneous recognition of actions and actors
25
Who is enfranchised by remote voting?
26
Who Is Going to Be the Next BitTorrent Peer Idol?
27
Who is going to buy the darn thing? [marketing]
28
Who Is Gordon Moore, and Why Is There a Law Named for Him?
29
Who is in charge, the physician or the patient?
30
Who is in control?
31
Who is Interacting With me? Identification of an Interacting Person Through Playful Interaction With a Small Robot
32
Who Is It? Context Sensitive Named Entity and Instance Recognition by Means of Wikipedia
33
Who is IT? Inferring role and intent from agent motion
34
Who is liable for insecure systems?
35
Who is Listening? Security in Wireless Networks
36
Who is more expressive during child-robot interaction: Pakistani or dutch children?
37
Who is my parent? Reconstructing video sequences from partially matching shots
38
Who is Next? E-Commerce Strategy for the Development of an Apparel Manufacturer
39
Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
40
Who is really concerned?
41
Who is really responsible for quality throughout the design process?
42
Who Is Responsible for Communication?
43
Who is responsible for the design for manufacturability issues in the era of nano-technologies? [Panel I]
44
Who is the adopter? organizational acceptance of customer loyalty programs in supermarket chains and the potential role of a community of practice
45
Who is the advocate? Stakeholders for sustainability
46
Who is the DFSS Black Belt?: An investigation of the competence profile of the role in theory and practice
47
Who is the expert? Analyzing gaze data to predict expertise level in collaborative applications
48
Who is the fairest of them all?
49
Who is the fairest?
50
Who is the fairest?
51
Who is the hero? semi-supervised person re-identification in videos
52
Who is the leader in a multiperson ensemble? — Multiperson human-robot ensemble model with leaderness —
53
Who Is the True Inventor?
54
Who is Using Personal Computers?
55
Who is who at different cameras: people re-identification using depth cameras
56
Who is who in IFAC
57
Who is who: On visualizing organizational models in Collaborative Systems
58
Who is whois? An analysis of results consistence
59
Who Is Your Neighbor: Net I/O Performance Interference in Virtualized Clouds
60
Who Joins the Platform? The Case of the RFID Business Ecosystem
61
Who killed Gopher? An extensible murder mystery
62
Who killed the directed model?
63
Who killed the virtual case file? [case management software]
64
Who knew this "experiment" would be so successful?
65
Who knows who - Inverting the Social Force Model for finding groups
66
Who leaves and when do they go? Retention and attrition in engineering education
67
Who like androids more: Japanese or US Americans?
68
Who links to whom: mining linkage between Web sites
69
Who logged out my terminal?
70
Who makes engineering knowledge? Changing identities of technical writers in the 20th century United States
71
Who makes the box?
72
Who manages the manager? Identity management and user ownership in the age of data
73
Who Might Help With Research And Development Costs?
74
Who missed the class? — Unifying multi-face detection, tracking and recognition in videos
75
Who Move the Treasures: A RFID-based Approach for the Treasures
76
Who moved my chalk? A toolbox for language teachers
77
Who Moved?! An Investigation into Distribution of Actions and Behaviors in a Multi Agent System
78
Who needs a 20 cm precision farming system?
79
Who Needs a Publisher … or a Retailer or a Marketer?
80
Who needs a technical editor?
81
Who needs addresses?
82
Who Needs Broadband Services And Why?
83
Who needs electromagnetism? (or an exercise in masochism in UK universities)
84
Who Needs Evidence, Anyway?
85
who needs learning?
86
Who needs people?
87
Who needs software engineering?
88
Who Needs Strategy?
89
Who Needs Tablets? We Do
90
Who needs to learn what from whom? Understanding quality management by differentiating organisations and practices
91
Who needs tools? (project management)
92
Who needs tools? (project management)
93
Who needs video summarization anyway?
94
Who Owns Applications?
95
Who Owns Capacity Who the World [Associate Editors´ View]
96
Who owns performance measurement?
97
Who owns streaming media? [patent issues]
98
Who owns the home network?
99
Who owns the Internet?
100
Who owns the living room?
101
Who owns the living room?
102
Who owns the living room?
103
Who owns the living room?
104
Who owns the platform?
105
Who Owns What Sofware Produces?
106
Who owns what? Earth law for space
107
Who Owns What? The Social Media Quagmire
108
Who owns your computer? [digital rights management]
109
Who owns... ...you? [Engineering Ownership]
110
Who owns... everything? [Editorial]
111
Who owns... intellectual property? [Manufacturing Ownership]
112
Who owns... outer space? [Engineering Ownership]
113
Who owns... the brand? [Manufacturing Ownership]
114
Who owns... the water supply? [Power Ownership]
115
Who owns... your genes? [Electronics Ownership]
116
Who owns... your invention?
117
Who owns... Your personal data? [Consumer Tech Ownership]
118
Who owns... your thoughts? [Management Ownership]
119
Who Pays For Artificial Hearts?
120
Who Pays for Characterization?: The Final Dilemma for MESFET Modeling
121
Who pays for E-waste? [electronic waste recycling]
122
Who pays more for wireless? it depends on whom you ask [The data]
123
Who plans wins
124
Who plays the blind watchmaker now?
125
Who profits from knowledge management?: a case of experience versus expertise
126
Who profits from peer-to-peer file-sharing? Traffic optimization potential in BitTorrent swarms
127
Who put the sugar in Sydney Harbor? [biosensors]
128
Who qualifies as a software engineer? [Letters]
129
Who Reads and Writes the Social Web? A Security Architecture for Web 2.0 Applications
130
Who Reads This Stuff Anyway?
131
Who Really Did It? Controlling Malicious Insiders by Merging Biometric Behavior with Detection and Automated Responses
132
Who Really Spoke When? Finding Speaker Turns and Identities in Broadcast News Audio
133
Who Refuses to Wash Hands? Privacy Issues in Modern House Installation Networks
134
Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission
135
Who represents healthcare engineers?
136
Who runs the internet? [Reflections]
137
Who Said That? Privacy at Link Layer
138
Who Said That? The Crossmodal Matching Identity for Inferring Unfamiliar Faces from Voices
139
Who said we couldn´t replace the postman? [Royal Mail robotic systems]
140
Who says what to whom? Assessing the alignment of content and audience between scholarly and professional publications in technical communication (1996–2013)
141
Who Says You Can´t be Creative?!
142
Who serves whom? Dynamic resource matching in an activity-scanning simulation system
143
Who shall I share my knowledge with? A receiver perspective of knowledge sharing behavior
144
Who should be responsible for generation capacity addition?
145
Who should be responsible for precipitation change, natural variation or human activities? — Characteristics of precipitation in South China and its surrounding area as viewed by TRMM PR and MODIS
146
Who Should I Blame? Effects of Autonomy and Transparency on Attributions in Human-Robot Interaction
147
Who Should Own In-the-Body Medical Data in the Age of eHealth? [Viewpoint]
148
Who Should Pay For Biomedical Engineering Technology Development?
149
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review
150
Who should review this change?: Putting text and file location analyses together for more accurate recommendations
151
Who Should Review this Pull-Request: Reviewer Recommendation to Expedite Crowd Collaboration
152
Who solved the optimal software release problems based on Markovian software reliability model?
153
Who solves the variability problem?
154
Who Speaks For Maintainability?
155
Who Speaks for Reliability?
156
Who speaks for whom? Towards analyzing opinions in news editorials
157
Who Talk More? The Impact of Relational Attributes on Mobile Phone Users´ Communication Behavior
158
WHO technical specifications of medical devices to improve planning, procurement and acquisition process
159
Who Thinks Who Knows Who? Socio-cognitive Analysis of Email Networks
160
Who to blame when YouTube is not working? detecting anomalies in CDN-provisioned services
161
Who updates wins
162
Who Uses Bitcoin? An exploration of the Bitcoin community
163
Who Votes For What? A Visual Query Language for Opinion Data
164
Who wants modular courses?
165
Who Wants Reliable Plastic Semiconductors?
166
Who wants soi sauce?
167
Who Wants to "Share Weather"? The Impacts of Off-Line Interactions on Online Behavior
168
Who wants to be an engineer?
169
Who wants to be an engineer?
170
Who Wants to Be An Ethical Engineer?
171
Who was Benjamin Dasher?
172
Who was James Clerk Maxwell and what is/was his electromagnetic theory
173
Who Was James Clerk Maxwell and What Was and Is His Electromagnetic Theory?
174
Who was Shakespeare? [Geek Life]
175
Who was the first genetic engineer?
176
Who was Where, When? Spatiotemporal Analysis of Researcher Mobility in Nuclear Science
177
Who watches the security educators?
178
Who were you talking to - Mining interpersonal relationships from cellphone network data
179
Who Wfites BASIC Standards?
180
Who Will Answer My Question on Stack Overflow?
181
Who Will Attend? -- Predicting Event Attendance in Event-Based Social Network
182
Who will get China´s 3G dowry?
183
Who will join and who will decline: An analysis of factors influencing a firm´s decisions to join cooperative research centers
184
Who Will Remain? An Evaluation of Actual Person-Job and Person-Team Fit to Predict Developer Retention in FLOSS Projects
185
Who Will Stay in the FLOSS Community? Modeling Participant’s Initial Behavior
186
Who will win at apprenticeships?
187
Who wrote this paper? Learning for authorship de-identification using stylometric featuress
188
Who Wrote This? Textual Modeling with Authorship Attribution in Big Data
189
Who ya gonna call! You´re on your own (Point) [on software usability design]
190
Who ya gonna call? [technical support]
191
Who You Are With [Grier on CE]
192
Who you gonna call ... ... an interim manager?
193
Who’s your Tiger? Using simulation to optimize the lineup of the Detroit Tigers offense
194
Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing
195
Who, what, and how: a survey of informal and professional Web developers
196
Who, What, When, Where and How: Semantics Semantics Help Connect the Dots
197
Who, what, when, where, why and how in video analysis: an application centric view
198
Who, What, Why, Where - and When
199
Who, When, Where: Timeslot Assignment to Mobile Clients
200
Who, when, where: Timeslot assignment to mobile clients
201
WHO: Stakeholder Analysis
202
Who? Where? What? Examining distributed development in two large open source projects
203
Who´d be a memory maker? - analysis
204
Who´s Afraid of Big Data?
205
Who´s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness
206
Who´s against Productivity?
207
Who´s ahead in hi-tech?
208
Who´s behind your network?
209
Who´s better? PESA or NSGA II?
210
Who´s Contributing: Do Personality Traits Influence the Level and Type of Participation in Online Communities
211
Who´s Doing What? Three Perspectives in Online Graduate Technical Communication Programs
212
Who´s Driving the Bus: The Importance of Interdisciplinary Awareness on the Road to Sustainability
213
Who´s eating your lunch? A practical guide to determining the weak points of any system
214
Who´s for the Moon?
215
Who´s in charge?; intermediate levels of control for robots we can live with
216
Who´s in the driving seat?
217
Who´s in the house? - [notebook: identity]
218
Who´s intelligent? Wheelchair, driver or both?
219
Who´s interpreting the truth-the human brain or technology
220
Who´s next in line?
221
Who´s Playing Well with Others: Determining Collegiality in Text
222
Who´s politically biased?
223
Who´s Right and Who Writes: People, Profiles, Contacts, and Replies in Online Dating
224
Who´s stupid?
225
Who´s stupid?
226
Who´s that hacking at my door?
227
Who´s that hacking at my door?
228
Who´s watching the unattended substation [substation television system]
229
Who´s Watching You Now?
230
Who´s who
231
Who´s who
232
Who´s who
233
Who´s who
234
Who´s who
235
Who´s who
236
Who´s who
237
Who´s who
238
Who´s who
239
Who´s who
240
Who´s who
241
Who´s who
242
Who´s who
243
Who´s who
244
Who´s who
245
Who´s who
246
Who´s who
247
Who´s who
248
Who´s who
249
Who´s who
250
Who´s who
251
Who´s Who in a Sports Video? An Individual Level Sports Video Indexing System
252
Who´s Who in CHMT
253
Who´s Who in CHMT
254
Who´s Who in CHMT
255
Who´s Who in CHMT
256
Who´s Who in CHMT
257
Who´s Who in CHMT
258
Who´s Who in CHMT
259
Who´s Who in CHMT
260
Who´s who in Gnome: Using LSA to merge software repository identities
261
Who´s Who in G-PHP
262
Who´s Who in G-PHP
263
Who´s Who in G-PHP
264
Who´s Who in G-PHP
265
Who´s Who in G-PHP
266
Who´s Who in G-PHP
267
Who´s Who in G-PHP
268
Who´s Who in G-PHP
269
Who´s Who in G-PHP
270
Who´s Who in G-PHP
271
Who´s Who in G-PHP
272
Who´s Who in G-PHP
273
Who´s Who in G-PHP
274
Who´s Who in G-PHP
275
Who´s Who in G-PHP
276
Who´s Who in G-PHP
277
Who´s Who in G-PHP
278
Who´s Who in G-PHP
279
Who´s Who in G-PHP
280
Who´s Who in G-PHP
281
Who´s Who in G-PHP
282
Who´s Who in G-PHP
283
Who´s Who in G-PHP: Henry C. Littlejohn
284
Who´s Who in G-PMP
285
Who´s Who in G-PMP
286
Who´s Who in G-PMP
287
Who´s Who in G-PMP
288
Who´s Who in G-PMP
289
Who´s Who in G-PMP
290
Who´s Who in G-PMP
291
Who´s Who in G-PMP
292
Who´s Who in G-PMP
293
Who´s Who in G-PMP
294
Who´s Who in G-PMP
295
Who´s who in G-PMP
296
Who´s Who in G-PMP
297
Who´s Who in G-PMP
298
Who´s Who in G-PMP
299
Who´s Who in G-PMP: Alfred Levy [Member, Administrative Committee G-PMP]
300
Who´s Who in G-PMP: Arthur P. Kramer
301
Who´s Who in G-PMP: Bernard Schwartz
302
Who´s who in G-PMP: Charles A. Eldon
303
Who´s Who in G-PMP: George G. Litman
304
Who´s Who in G-PMP: Gustave Shapiro
305
Who´s Who in Our Society [Message from the President]
306
Who´s who in the singularity
307
Who´s Who with Big-Five: Analyzing and Classifying Personality Traits with Smartphones
308
Who´s who? Identifying concepts and entities across multiple documents
309
Who´s winning? [From the Editor´s Desk]
310
Who´s writing Linux? [Data Flow]
311
Who-and where-are the new media gatekeepers?
312
WHOBBS: An Object-Based Distributed Hybrid Storage Providing Block Storage for Virtual Machines
313
WHOI Cable: time domain numerical modeling of moored and towed oceanographic systems
314
Whois Based Geolocation: A Strategy to Geolocate Internet Hosts
315
Whole angle approximations of aerodynamic coefficients
316
Whole angle force rebalance control for coriolis vibratory gyroscopes
317
Whole arm grasping control for redundant robot manipulators
318
Whole arm manipulation planning based on grasp dynamic properties and sampling-based algorithms with kinematic analysis
319
Whole arm manipulation with effects of static and dynamic friction on body surface
320
Whole arm obstacle avoidance for teleoperated robots
321
Whole arm planning for a soft and highly compliant 2D robotic manipulator
322
Whole body adapting behavior with muscle level stiffness control of tendon-driven multijoint robot
323
Whole body adhesion: hierarchical, directional and distributed control of adhesive forces for a climbing robot
324
Whole body cooperative tasks and static stability evaluations for a humanoid robot
325
Whole body dampening properties of a wheelchair rider
326
Whole body emotion expressions for KOBIAN humanoid robot — preliminary experiments with different Emotional patterns —
327
Whole body humanoid control from human motion descriptors
328
Whole body hyperthermia with an RF electric field system
329
Whole body imaging with dynamic volume 320-row CT
330
Whole body imitation of human motion with humanoid robot via ZMP stability criterion
331
Whole body joint load reduction control for high-load tasks of humanoid robot through adapting joint torque limitation based on online joint temperature estimation
332
Whole body kinesthetic displays for immersive virtual reality applications
333
Whole Body Locomotion Planning of Humanoid Robots based on a 3D Grid Map
334
Whole body manipulation
335
Whole body motion controller with long-term balance constraints
336
Whole body motion pattern generation for biped humanoid robots
337
Whole body motion primitive segmentation from monocular video
338
Whole body nonrigid CT-PET registration using weighted demons
339
Whole body personnel monitoring via ionization detection
340
Whole body personnel monitoring via ionization detection
341
Whole body PET based on an RPC system
342
Whole body PET image compression
343
Whole Body PET Imaging Using Variable Acquisition Times
344
Whole Body PET imaging using variable acquisition times
345
Whole body PET using overlapped 3D acquisition and weighted image summation
346
Whole body posture controller based on inertial forces
347
Whole body SAR measurement technique by using Wheeler cap method for human head size phantom
348
Whole body teleoperation of a humanoid robot - a method of integrating operator´s intention and robot´s autonomy
349
Whole body teleoperation of a humanoid robot - development of a simple master device using joysticks
350
Whole body teleoperation of a humanoid robot integrating operator´s intention and robot´s autonomy: an experimental verification
351
Whole Body Vibration training: analysis and characterization
352
Whole brain atrophy based on iterative principal component analysis and MRI techniques in the study of Alzheimer´s disease
353
Whole Brain CT Perfusion Maps
354
Whole brain EEG synchronization likelihood modulated by long term evolution electromagnetic fields exposure
355
Whole brain group network analysis using network bias and variance parameters
356
Whole building operation optimal control system based on an occupancy sensor network
357
Whole cancer genome analysis using an I/O aware job scheduler on high performance computing resource
358
Whole C-band, repetition rate tunable optical pulse generation using a high-resolution arrayed-waveguide grating and an optical comb generator
359
Whole Cell Biosensors
360
Whole cell electrical impedance spectroscopy for studying ion channel activity
361
Whole Cell Impedance Analysis of Metastatic and Non-Metastatic Cancer Cells
362
Whole chip ESD protection for 2.4 GHz LNA
363
Whole chromosome features of genomic signals
364
Whole cortex, 64 channel SQUID biomagnetometer system
365
Whole course fault diagnosis based on fuzzy dynamical model
366
Whole emergence analysis of coal mine emergent accidents
367
Whole emergence model of coal mine emergent accidents
368
Whole Execution Traces
369
Whole fiber switched p-cycles
370
Whole field displacement measurement technique using speckle interferometry
371
Whole field living cell mapping using diffraction moiré sensor
372
Whole Field Out-of-plane Displacement Measurement on Curved Surface Using a Single Camera in Buckling Experiment
373
Whole field vapor pressure modeling of QFN during reflow with coupled hygro-mechanical and thermo-mechanical stresses
374
Whole Frame Loss Recovery Algorithm for H.264 Decoders
375
Whole Frame Loss Recovery for H.264/AVC in Wireless Low Bit-Rate Video Transmisson
376
Whole Genome Alignment with BLAST on Grid Environment
377
Whole Genome Comparison on a Network of Workstations
378
Whole genome identification of target genes of transcription factors
379
Whole genome phylogeny based on clustered signature string composition
380
Whole genome sequencing, comparative genomics, and systems biology
381
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
382
Whole Heart Region Segmentation from CT and MRI Images Using a Hybrid Model
383
Whole House Control Utilizing a True Computer Network
384
Whole is Greater than Sum of Parts: Recognizing Scene Text Words
385
Whole life asset management maximising the lifecycle value of infrastructure assets
386
Whole life cost modelling in infrastructure asset management
387
Whole life costing: Completing the analysis: Asset investment strategies, business planning and financing for infrastructure companies 2011
388
Whole life costing: Towards a sustainable built environment
389
Whole Life-Cycle Cost Study Model of Urban Rail Transit
390
Whole life-cycle of superfilament in water from femtoseconds up to microseconds
391
Whole machine modelling and dynamic characteristic analysis of 1.5MW wind turbine
392
Whole mathematics competences assessment at aerospace engineering sophomore
393
Whole nerve recordings with the spiral nerve cuff electrode
394
Whole organ decellularization - a tool for bioscaffold fabrication and organ bioengineering
395
Whole packet forwarding: Efficient design of fully adaptive routing algorithms for networks-on-chip
396
Whole population management of patients with diabetes
397
Whole Process Electromagnetic Heating System Design for Extracting Crude Oil with Frequency Converter
398
Whole process wind characteristics field measurements of typhoon Morakot
399
Whole program compilation for embedded software: the ADSL experiment
400
Whole program data dependence profiling to unveil parallel regions in the dynamic execution
401
Whole program path-based dynamic impact analysis
402
Whole quadruped manipulation
403
Whole Sale Price Index, Financial Indicators and Its Effect on Market and Different Sectors
404
Whole sample holder filled method in time-domain measurement
405
Whole Science and creation
406
Whole Sensory Nerve Recordings In Human - An Application For Neural Prostheses
407
Whole sensory nerve recordings with spiral nerve cuff electrode
408
Whole Shape Measurement System Using a Single Camera and a Cylindrical Mirror
409
Whole simulation of storm surge for Pearl River estuary
410
Whole slide images stitching for osteosarcoma detection
411
Whole space subclass discriminant analysis for face recognition
412
Whole spectrum fluorescence detection with ultrafast white light excitation
413
Whole system approach
414
Whole system approach to future power operations comprising a majority of distributed generation
415
Whole system compatibility measurements of the autotransformer supplied 50 kV railway in New Zealand
416
Whole system modelling of V2G power network control, communications and management
417
Whole system simulator for AC railways
418
Whole Test Suite Generation
419
Whole transcriptome mRNA secondary structure analysis using distributed computation
420
Whole transformer station protection and automation-a local area network approach
421
Whole wafer characterization of large size GaAs-AlGaAs semiconductor materials prepared by MOCVD TurboDiscTM technology
422
Whole word discriminative point process models
423
Whole word recognition in facsimile images
424
WHOLE: A low energy I-Cache with separate way history
425
Whole-angle-mode micromachined fused-silica birdbath resonator gyroscope (WA-BRG)
426
Whole-arm impedance of a serial-chain manipulator
427
Whole-arm reactive collision avoidance control of kinematically redundant manipulators
428
Whole-Arm Rehabilitation Following Stroke: Hand Module
429
Whole-arm tactile sensing for beneficial and acceptable contact during robotic assistance
430
Whole-body and localized SAR and dose prediction tool for indoor wireless network deployments
431
Whole-body and Thoracic Bioimpedance Measurement: Hypertension and hyperhydration in Hemodialyisis patients
432
Whole-body average SARs in Korean male models
433
Whole-body averaged SAR measurement based on electric field distributions on external cylindrical boundary
434
Whole-body averaged SAR measurement method using cylindrical scanning of external electromagnetic fields
435
Whole-body averaged SAR measurements for small phantom by calorimetric method
436
Whole-body averaged SAR measurements of postured phantoms exposed to E-/H-polarized plane-wave using cylindrical field scanning
437
Whole-body averaged SAR measurements using cylindrical-external field scanning for 2 GHz plane wave irradiation of human models
438
Whole-Body Averaged Specific Absorption Rate Estimation Using a Personal, Distributed Exposimeter
439
Whole-body contact manipulation using tactile information for the nursing-care assistant robot RIBA
440
Whole-body cooperative balanced motion generation for reaching
441
Whole-body cooperative balancing of humanoid robot using COG Jacobian
442
Whole-body cooperative force control for a two-armed and two-wheeled mobile robot using Generalized Inverse Dynamics and Idealized Joint Units
443
Whole-Body Counter for Neutron Activation Analysis
444
Whole-body covering tactile interface for human robot coordination
445
Whole-body dual-ring OpenPET for in-beam particle therapy imaging
446
Whole-body Fluorescent Optical Imaging Based on Power Light Emitting Diode
447
Whole-body force sensation by force sensor with end-effector of arbitrary shape
448
Whole-Body Force Sensation by Force Sensor With Shell-Shaped End-Effector
449
Whole-body force sensation by robot with outer shell
450
Whole-body holding manipulation by humanoid robot based on transition graph of object motion and contact
451
Whole-body humanoid balance control with dynamically loading/unloading objects
452
Whole-body humanoid control from upper-body task specifications
453
Whole-body human-to-humanoid motion transfer
454
Whole-body imitation of human motions with a Nao humanoid
455
Whole-body model-predictive control applied to the HRP-2 humanoid
456
Whole-body monitoring¿the direct determination of radioisotopes within the human body
457
Whole-body motion control for a rescue robot using robust task-priority based CLIK
458
Whole-body motion control for capturing a tumbling target by a free-floating space robot
459
Whole-Body Motion Generation Integrating Operator´s Intention and Robot´s Autonomy in Controlling Humanoid Robots
460
Whole-body motion imitation using human modeling
461
Whole-body motion input method for bipedal humanoid robot with support leg detection
462
Whole-body motion integrating the capture point in the operational space inverse dynamics control
463
Whole-body motion of a humanoid robot for passing through a door - opening a door by impulsive force -
464
Whole-body motion planning for manipulation of articulated objects
465
Whole-body motion planning for pivoting based manipulation by humanoids
466
Whole-body motion planning with centroidal dynamics and full kinematics
467
Whole-body MRI for analysis of body composition
468
Whole-body multi-modal semi-autonomous teleoperation of mobile manipulator systems
469
Whole-body PET-MR imaging system initial calibration results
470
Whole-body pose estimation in physical rider-bicycle interactions with a monocular camera and a set of wearable gyroscopes
471
Whole-body pregnant woman modeling by digital geometry processing with detailed uterofetal unit based on medical images
472
Whole-body pushing manipulation with contact posture planning of large and heavy object for humanoid robot
473
Whole-body robot sensing and human-robot interaction
474
Whole-body SAR in spheroidal adult and child phantoms in realistic exposure environment
475
Whole-body self-calibration via graph-optimization and automatic configuration selection
476
Whole-body single-bed time-of-flight RPC-PET: Simulation of axial and planar sensitivities with NEMA and anthropomorphic phantoms
477
Whole-Body Single-Bed Time-of-Flight RPC-PET: Simulation of Axial and Planar Sensitivities With NEMA and Anthropomorphic Phantoms
478
Whole-body task planning for a humanoid robot: a way to integrate collision avoidance
479
Wholebody Teleoperation for Humanoid Robot by Marionette System
480
Whole-Body Touch Sensors for Tracked Mobile Robots Using Force-sensitive Chain Guides
481
Whole-body trajectory optimization for humanoid falling
482
Whole-body vibration during manual wheelchair propulsion with selected seat cushions and back supports
483
Whole-Book Recognition
484
Whole-brain dynamics of neuronal circuits enabled by sculpted light and light field microscopy
485
Whole-Cell Conductometric Biosensor for Determination Heavy-Metals in Water
486
Whole-cell flagellum-based motility studied using back focal plane interferometry in a laser trap transducer
487
Whole-Cell Impedance Analysis for Highly and Poorly Metastatic Cancer Cells
488
Whole-cell MEMS biosensors for toxicity detection
489
Whole-cell ROS rise in HepG2 cells induced by localized fs laser irradiation
490
Whole-Cell Sensing for a Harmful Bloom-Forming Microscopic Alga by Measuring Antibody&#8211;Antigen Forces
491
Whole-chip ESD protection design for submicron CMOS VLSI
492
Whole-chip ESD protection design verification by CAD
493
Whole-chip ESD protection design with efficient VDD-to-VSS ESD clamp circuits for submicron CMOS VLSI
494
Whole-chip ESD protection for CMOS VLSI/ULSI with multiple power pins
495
Whole-chip ESD protection scheme for CMOS mixed-mode IC´s in deep-submicron CMOS technology
496
Whole-chip ESD protection strategy for CMOS IC´s with multiple mixed-voltage power pins
497
Whole-chip ESD protection strategy for CMOS integrated circuits in nanotechnology
498
Whole-field board strain and displacement characterization during drop impact using a single camera DIC technique
499
Whole-field fluorescence lifetime imaging with picosecond resolution for biomedicine
500
Whole-Field Fluorescence Lifetime Imaging with Picosecond Resolution for Biomedicine
501
Whole-field fluorescence lifetime imaging with picosecond resolution using ultrafast 10-kHz solid-state amplifier technology
502
Whole-field intensity-modulated radiation therapy (IMRT) combined with replanning split-field IMRT for nasopharygeal carcinoma
503
Whole-field visualisation and velocity measurement of an instantaneous transonic turbine flow
504
Whole-frame Error concealment with improved backward motion estimation for H.264 decoders
505
Whole-function vectorization
506
Whole-genome DNA sequencing
507
Whole-Genome Phylogeny by Virtue of Unic Subwords
508
Whole-hand kinesthetic feedback and haptic perception in dextrous virtual manipulation
509
Whole-hands multiple-instances finger vein biometric system
510
Whole-HDD structure airflow-simulation by voxel mesh method
511
Whole-heart Modeling and Computer Simulation for Electrophysiology Study
512
Whole-ingot annealed semi-insulating GaAs substrates for low-noise microwave amplifiers
513
Whole-Life Environmental Impacts of ICT Use
514
Whole-microwave system modeling for brain imaging
515
Wholeness as well as leanness
516
Whole-painting canvas analysis using high- and low-level features
517
Whole-part based composition approach: a case study
518
Whole-part relationships for software component combination
519
Whole-product usability: integrating documentation and rest-of-product usability testing
520
Wholes and parts-a systems approach
521
Wholesale banking information systems restructuring
522
Wholesale electricity market failure and the new market design
523
Wholesale Electricity Market Systems at the Western Australia Independent Market Operator
524
Wholesale energy market in a smart grid: Dynamic modeling and stability
525
Wholesale energy market monitoring: ACER and the technical implementation of REMIT
526
Wholesale marginal prices in competitive generation markets
527
Wholesale power exchange via internet
528
Wholesale Power Price Dynamics Under Transmission Line Limits: A Use of an Agent-Based Intelligent Simulator
529
Wholesale price contract when the retailer´s capital constraint is considered
530
Wholesale Trading Arrangements
531
Wholesale/retail specification in resource sharing networks
532
Wholesale-price Contract Model of Supply Chain with Credit Sale
533
Wholesaler Multi-retailer Coordination Policy with Quantity Discount, Price Dependent Demand and Deteriorating Items
534
Whole-space ambiguity removal in DOA estimation by AWPC antenna
535
Whole-spacecraft active vibration isolation using piezoelectric stack actuators
536
Whole-spacecraft vibration isolation for broadband attenuation
537
Whole-System Electromagnetic Modeling for Microwave Tomography
538
Whole-Systems Assessment of the Value of Energy Storage in Low-Carbon Electricity Systems
539
Whole-vehicle radiated EMI immunity tests in automotive EMC: establishing and calibrating the test field
540
Whole-vehicle susceptibility correlation with laboratory test techniques
541
Whole-word phonetic distances and the PGPfone alphabet
542
Wholistic processing of uncertainty in synergetic computing systems
543
Wholistic recognition of handwriting using structural features
544
Wholly estimating direction of arrival of convolutively mixed sources using independent component analysis
545
Wholly Owned Offshore Subsidiaries for IT Development: A Program of Research
546
Wholly synthesised fluorine-doped silica optical fibres by sol-gel method
547
Wholly synthesised VAD single-mode fibre
548
Whom (or what) do you (mis)trust?: historical reflections on the psychology and sociology of information technology
549
Whom Does Your Android App Talk To?
550
Whom to Ask for What knowledge? A Comparison of Exchange Partners and Their Impact on Knowledge Types
551
Whom to Follow on social trading services? A system to support discovering expert traders
552
Whom to remove? Breaking the covert network
553
Whom to talk to? Estimating user interest from movement trajectories
554
Whom to Trust? Generating WS-Security Policies Based on Assurance Information
555
Whoops!: a clustered Web cache for DSM systems using memory mapped networks
556
Whoops... did I use the wrong concept to predict e-commerce trust? Modeling the risk-related effects of trust versus distrust concepts
557
WHOP: Wormhole attack detection protocol using hound packet
558
WhoPay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments
559
Whorf: a visualization tool for software maintenance
560
Whos´s liable for insecure networks?
561
Whose Album Is This?
562
Whose bits are they, anyway?
563
Whose bug is it anyway? The battle over handling software flaws
564
Whose CO2 is it anyway?
565
Whose data is it, anyway? [Compliance]
566
Whose design is it anyway? [product inclusive design]
567
Whose Fault?
568
Whose Journal Is This?
569
Whose Name Is It, Anyway? Decentralized Identity Systems on the Web
570
Whose Opinion to Follow in Multihypothesis Social Learning? A Large Deviations Perspective
571
Whose sky is it? [Control - Aircraft Control]
572
Whose software is it, anyway?
573
Whose story is it, anyway? An ethnographic answer
574
Whose turf is this, anyway? Technical communicators and the impact of technology
575
WhoseFault: Automatic developer-to-fault assignment through fault localization
576
wHospital: a web-based application with digital signature for drugs dispensing management
577
Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in Enterprises
578
WhozThat? evolving an ecosystem for context-aware mobile social networks
579
WHPCF´14 Program Committee Members
580
WHPCF´14 Steering Committee Welcome
581
WHT/OFDM - an improved OFDM transmission method for selective fading channels
582
WHT-based composite motion compensated NTSC interframe direct coding
583
WHU-XML: An XML based digital library system
584
Why "C" armatures work (and why they don\´t!)
585
Why "no worse off" is worse off
586
Why “dark thoughts” aren´t really dark: A novel algorithm for metaphor identification
587
Why (n + 1)th-hop neighbours are more important than nth-hop ones for localisation in multi-hop WSNs
588
Why (meta-)theories of automated software design are essential: A personal perspective
589
Why (not) ORM?
590
Why `traditional´ HCI techniques fail to support desktop VR
591
Why ´Associate´?
592
Why ´Associate´?
593
Why ´Associate´?
594
Why ´Associate´?
595
Why ´Associate´?
596
Why ´Associate´?
597
Why ´Associate´?
598
Why ´Associate´?
599
Why ´Associate´?
600
Why ´Associate´?
601
Why ´Associate´?
602
Why ´corrigendum´?
603
Why ´what´ isn´t ´how´: a new approach to procedure writing (nuclear power stations)
604
Why 1149.1 (JTAG) really works
605
Why 4-Motor Multiple-Unit Car Equipments?
606
Why 500VA for hipot testers? A TC66 investigation to explore the necessity of the 500VA hipot tester
607
Why 64 bit computers in the control room? [Power industry]
608
Why a ´gut feeling´ can be essential in justifying CAE
609
Why a 120-credit engineering degree is now possible
610
Why a circuit sever affects traveling-wave tube efficiency
611
Why a cognitive trustier performs better: simulating trustbased Contract Nets
612
Why a Competitive Europe needs FTTH?
613
Why a Complex Valued Solution for a Real Domain Problem
614
Why a laser is better than EDM for drilling
615
Why a low resistance to remote Earth is desirable and how to obtain it
616
Why a new parts selection and management program?
617
Why a nonlinear solution for a linear problem? [channel equalization]
618
Why a Project in Europe?
619
Why a quality system and SPC?
620
Why a R&M Program?
621
Why a Real Non-Uniform Electric Field in Nuclear Detector Arrays Can Improve the Energy Resolution
622
Why a Reverberation Chamber Works at Low Modal Overlap
623
Why a single aisle miniload system is not simple to model
624
Why a standard for fiber optics in premises networks?
625
Why a super micro?
626
Why a unique causality in the elementary commutation cell bond graph model of a power electronics converter
627
Why a window-based learning algorithm using an Effective Boltzmann machine is superior to the original BM learning algorithm
628
Why Absorptive Capacity is More Essential in Some Situations? The Contingency View of Supply Chain Knowledge Sharing
629
Why acronyms are not always helpful
630
Why acronyms are not always helpful. Part 2
631
Why adopting UML to model hybrid manufacturing systems?
632
Why advanced manufacturing is optional
633
Why affordability is a systems engineering metric
634
Why AFIPS Invested in History
635
Why africa can feed itself- and help feed the world too
636
Why all the talk about CATV?
637
Why am I here? [Reflections]
638
Why America Must Innovate: A Call to Action
639
Why an Air Force centralized integrated diagnostics office?
640
Why an applications and practice magazine? [Message from the Editor-in-Chief]
641
Why an applications and practice magazine? [Message from the Editor-in-Chief]
642
Why an EWS Group?
643
Why an IEEE IRA?
644
Why an increase in motor operating temperature doesn´t result in higher torque output
645
Why Analog-to-Information Converters Suffer in High-Bandwidth Sparse Signal Applications
646
Why and How Controlling Power Consumption during Test: A Survey
647
Why and how do surge protective devices (SPD) fail: a safety article
648
Why and how high-sensitivity GNSS receivers will make parking the dominant new transport demand management tool
649
Why and how of requirements tracing
650
Why and how prefiltering for discrete multiwavelet transforms
651
Why and How Should High-Speed Aircraft Electronics Be Liquid Cooled?
652
Why and How Should Open Source Projects Adopt Time-Based Releases?
653
Why And How Should Students In Technical Programs Be Exposed To Ethical And International Issues
654
Why and how to establish a private code on a public network
655
Why and How to Perform Fraud Experiments
656
Why and How to Use Arbitrary Precision
657
Why and howto design a generic and efficient image processing framework: The case of the Milena library
658
Why and What is Waveform Diversity, and How Does it Affect Electromagnetics?
659
Why and when must the preventive maintenance be performed?
660
Why and when to test an induction motor
661
Why Anti-Virus Products Slow Down Your Machine?
662
Why apply science?
663
Why applying standards to Web services is not enough
664
Why are accurate computations of mode fields in rectangular dielectric waveguides difficult?
665
Why are Bug Reports Invalid?
666
Why are continuous-time signals and systems courses so difficult? How can we make them more accessible?
667
Why are continuous-time signals and systems courses so difficult? How can we make them more accessible?
668
Why are dense WDM transparent networks more tolerant than expected to in-band crosstalk ?
669
Why are errors-in-variables problems often tricky?
670
Why are ferroelectric polymers difficult to find — and difficult to verify
671
Why are innovations in the health field needed?
672
Why are ISDN standards important?
673
Why are low-temperature MBE grown semiconductors important for an all-solid-state ultrafast laser technology?
674
Why Are Memristor and Memistor Different Devices?
675
Why Are Modalities Good for Interface Theories?
676
Why are Mutual Funds Closed to Investors?
677
Why are neural networks sometimes much more accurate than decision trees: an analysis on a bio-informatics problem
678
Why are NFPA 70E and CSA Z462 different?
679
Why are nonlinear microwave systems measurements so involved?
680
Why are Non-Linear Microwave Systems Measurements so Involved?
681
Why Are Organisations Unique
682
Why Are Our Teachers Taking It on the Chin? [State of the Art]
683
Why are relays not always good for you? Performance of different relay deployment configurations in a heterogeneous network
684
Why are SCE overestimated in FD-SOI MOSFETs?
685
Why are small R&D organizations more productive?
686
Why are so few students becoming engineers?
687
Why are so many lines still reserved for emergency telephone calls in emergency situations?
688
Why are so many patents pending?
689
Why are software projects moving from centralized to decentralized version control systems?
690
Why are some hysteresis loops shaped like a butterfly?
691
Why are some science and engineering concepts so difficult to learn? identifying, assessing, and "repairing" student misunderstanding of important concepts
692
Why are Swiss trains always on time? [After All]
693
Why are TEng grousing?
694
Why are there fewer women in engineering?
695
Why are these people there? An analysis based on Twitter
696
Why are they hiding? Study of an anonymous file sharing system
697
Why are TLR´s inefficient and how to correct them with locational prices
698
Why Are Voronoi Diagrams so Fruitful in Application?
699
Why are we doing this?
700
Why are we doing this? [Simulation]
701
Why are we meeting?
702
Why are we so out of STEP?
703
Why Are We Still Measuring Blood Pressure by Ear?
704
Why are we waiting?
705
Why are you smiling? In a strategic context, people´s affective responses reflect the meaning of android´s facial expressions
706
Why area might reduce power in nanoscale CMOS
707
Why Aren&#146;t We Using 3D User Interfaces, and Will We Ever?
708
Why aren´t SE techniques being used by KBS systems developers already?
709
Why Aren´t the Stars Aligned? An Analysis of Online Review Content and Star Ratings
710
Why ARM processors are the best choice for embedded low-power applications?
711
Why aspect graphs are not (yet) practical for computer vision
712
Why asymmetrical nanoscale plasmonic waveguides are guiding plasmons?
713
Why attend IMS?
714
Why Automate Instruction?
715
Why automate optical inspection?
716
Why automation needs error avoidance guidelines and evaluation?
717
Why Awards
718
Why bad forecasts can be good for business...[demand forecasting]
719
Why bad things happen to good projects
720
Why Benefits Realization from ERP in SMEs Doesn´t Seem to Matter?
721
Why bernstein polynomials are better: Fuzzy-inspired justification
722
Why Better Industrial/Academic Links Are Needed If There is to Be an Effective Software Engineering Workforce
723
Why big companies can´t invent
724
Why Biomedical Engineers Should Study Biology [State of the Art]
725
Why Biphoton But Not Two Photons?
726
Why blind source separation for blind equalization of multiple channels?
727
Why bother auditing? Why not just let the system run?
728
Why Bother Becoming Sustainable? Do We Really Care About The Future?
729
Why bother with MMI?
730
Why B-pictures work: a theory of multi-hypothesis motion-compensated prediction
731
Why breakwaters break
732
Why bridge the digital divide with satellites if nobody crosses the bridge?
733
Why Britain lags behind
734
Why Britain´s electronic components industry needs help
735
Why British industry needs more production engineers
736
Why british machine tool manufacturers should be optimistic
737
Why BSP computers? [bulk-synchronous parallel computers]
738
Why budgetary control systems fail
739
Why buyer-supplier chains differ: a strategic framework for electronic network organizations
740
Why cable cleats are vitally important in the protection of a cable installation
741
Why cable type testing is essential
742
Why Can Some Advanced Ethernet NICs Cause Packet Reordering?
743
Why can\´t they create architecture models like "Developer X"? An experience report
744
Why Can´t a Computer be more Like a Brain?
745
Why Can´t A Computer Be More Like A Brain? Or What To Do With All Those Transistors?
746
Why can´t hardware be more like software?
747
Why can´t I buy a mercedes PC? [Letters]
748
Why Can´t I Find My Data the Way I Find My Dinner?
749
Why can´t I start my motor: Lessons learned from bad motor protective settings
750
Why Can´t People Estimate: Estimation Bias and Strategic Mis-estimation
751
Why Can´t We All Play Nice?
752
Why can´t we do it alone? - Why are so few companies succeeding in constructing effective external R&D innovation networks?
753
Why can´t we implement this SDM? [systems development methodology]
754
Why car companies are looking at programmable tags
755
Why Career Development Programs Fail: and What You Can Do About It
756
Why caring about leading-edge software engineering in healthcare and assistive technology applications?
757
Why CASE tools do not support co-ordination
758
Why cellular automata are better than LFSRs as built-in self-test generators for sequential-type faults
759
Why certain subgraph computations requite only linear time
760
Why CESoc TV? [Society News]
761
Why charge for mailed papers?
762
Why Checkins: Exploring User Motivation on Location Based Social Networks
763
Why chips fail: electrostatic discharge
764
Why classifying search algorithms is essential
765
Why clone horses and mules?
766
Why Clouds Give Me a Case of the Vapors
767
Why co-evolution beats temporal difference learning at Backgammon for a linear architecture, but not a non-linear architecture
768
Why collaborate? exploring industry´s strategic objectives for establishing industry-university technology relationships
769
Why collaborate? Exploring industry´s strategic objectives for establishing industry-university technology relationships
770
Why collisions happen: A pathology of CSMA for wireless sensor networks in high contention
771
Why combinatorial testing works: Analyzing minimal failure-causing schemas in logic expressions
772
Why Companies Fail
773
Why companies go BOP: An exploratory study in Chinese context
774
Why Companies Succeed
775
Why complex-valued fuzzy? Why complex values in general? A computational explanation
776
Why Computer Architecture Matters
777
Why Computer Architecture Matters: Memory Access
778
Why Computer Architecture Matters: Thinking through Trade-offs in Your Code
779
Why computer-based systems should be autonomic
780
Why computerised production control systems continue to disappoint
781
Why Computers are Computers. The SWAC and the PC, Review
782
Why Computers Are Not Displaying Intelligence
783
Why condition monitoring? The infrastructure owner´s viewpoint
784
Why connecting theories together may not work: How to address complex paradigm-spanning questions
785
Why consider EMC testing in a reverberation chamber
786
Why Consider Screening, Burn-In, and 100-Percent Testing for Commercial Devices?
787
Why consumer characteristics have an impact on attitude
788
Why Consumers (Don´t) Adopt Smart Wearable Electronics
789
Why context matters - and what can we do about it?
790
Why Context, Content and Contract are Key for Dynamic Service Selection
791
Why conventional EMC testing is insufficient for functional safety (and what to do about it)
792
Why Corporations Won´t Play Ball
793
Why correctly engineered cable cleats are vital for effective power system protection
794
Why CPU Frequency Stalled
795
Why Creating Web Page Objects Manually If It Can Be Done Automatically?
796
Why Critical Systems Need Help to Evolve
797
Why CRM Efforts Fail? A Study of the Impact of Data Quality and Data Integration
798
Why cross-platform security
799
Why current decay on a wire causes radiation
800
Why Customers Behave Badly? The Review of Antecedent Research on Customer Misbehavior
801
Why customers reluctant to buy from your website?
802
Why Customers Stay: An Analysis of Service Quality and Switching Cost on Choice Behavior using a Catastrophe Model
803
Why cyber-insurance contracts fail to reflect cyber-risks
804
Why data broadcast may take over the world
805
Why Data Needs more Attention in Architecture Design - Experiences from Prototyping a Large-Scale Mobile App Ecosystem
806
Why database AND expert systems?
807
Why Delay in Adoption of New Technology in the Presence of Network Effect
808
Why Dempster´s fusion rule is not a generalization of Bayes fusion rule
809
Why Dempster´s rule doesn´t behave as Bayes rule with informative priors
810
Why Design a New City?
811
Why Design for Maintainability?
812
Why design must change: Rethinking digital design
813
Why design must change: Rethinking digital design
814
Why design reliable chips when faulty ones are even better
815
Why design spreading codes for multiuser CDMA channels?
816
Why deterministic traffic shows the highest reordering ratio
817
Why develop "in-house" simulator for transmission design?
818
Why developers don´t pair more often
819
Why Developers Insert Security Vulnerabilities into Their Code
820
Why did california electricity crisis occur? A view of multi-agent intelligent simulator
821
Why Did the California Electricity Crisis Occur?: A Numerical Analysis Using a Multiagent Intelligent Simulator
822
Why did the environmental problem occur?-a discussion that focuses on defect
823
Why did this code change?
824
Why did we add LabVIEW applications to our ATLAS TPSs?
825
Why did you record this video? An exploratory study on user intentions for video production
826
Why didn´t the president visit our section?
827
Why didn´t we spot that? [Practical Security]
828
Why digital entertainment drives the need for speed
829
Why direction-giving is hard: the complexity of using landmarks in one-dimensional navigation
830
Why do airport security screeners sometimes fail in covert tests?
831
Why Do Automated Builds Break? An Empirical Study
832
Why Do Block Length and Delay Behave Differently if Feedback Is Present?
833
Why Do Chinese Users Use Pirated Software: An Integrative Perspective?
834
Why Do Companies Migrate Towards Cloud Enterprise Systems? A Post-Implementation Perspective
835
Why Do Complementors Participate? An Analysis of Partnership Networks in the Enterprise Software Industry
836
Why do computer methods for grounding analysis produce anomalous results?
837
Why do computer methods for grounding analysis produce anomalous results?
838
Why do drivers change route? effect of graphical route information panels
839
Why do employees resist change?
840
Why do engineers think?
841
Why do firms acquire external technologies? Understanding the motivations for technology acquisitions
842
Why Do Firms Adopt E-Procurement Systems? Using Logistic Regression to Empirically Test a Conceptual Model
843
Why Do I Keep Checking My Facebook? The Role of Urge in the Excessive Use of Social Networking Sites
844
Why Do Incremental Encoders Do a Reasonably Good Job in Electrical Drives with Digital Control?
845
Why do incumbents sometimes succeed? investigating the role of interorganizational trust on the adoption of disruptive technology
846
Why Do Listed Companies Choose Private Equity Placements?-Empirical Evidence from Chinese Stock Market
847
Why do many firms still miss the competitive advantage of virtual teams?
848
Why do mobile phones need a different opreating system?
849
Why do multi-stream, multi-band and multi-modal approaches work on biometric user authentication tasks?
850
Why do newcomers abandon open source software projects?
851
Why do organizations keep funding projects in the face of repeated failure?
852
Why do people blog? Exploration of motivations for blogging
853
Why Do People Play Games? A Review of Studies on Adoption and Use
854
Why Do People Use Social Media? Agent-Based Simulation and Population Dynamics Analysis of the Evolution of Cooperation in Social Media
855
Why do programmers make security errors?
856
Why do public sector IT projects fail
857
Why do R&D investments differ in different high-tech enterprises? The role of board background
858
Why do Retailers End Price Promotions: A Study on Duration and Profit Effects of Promotion
859
Why do simple wafer fab models fail in certain scenarios?
860
Why do so few computer people join professional bodies?
861
Why do so many industrial collaborations fail?
862
Why do so many reuse programs fail?
863
Why do software methods fall down?
864
Why do software packages conflict?
865
Why do software projects fail? Reasons and a solution using a Bayesian classifier to predict potential risk
866
Why do some engineering students study alone?
867
Why Do Some Firms Outsource IT More Aggressively Than Others? The Effects of Organizational Characteristics on IT Outsourcing Decisions
868
Why do speech-enhancement algorithms not improve speech intelligibility?
869
Why Do Street-Smart People Do Stupid Things Online?
870
Why do students prefer search engines over academic databases
871
Why Do Teachers Use Game-Based Learning Technologies? The Role of Individual and Institutional ICT Readiness
872
Why Do Users Employ the Same System in So Many Different Ways?
873
Why do users trust the wrong messages? A behavioural model of phishing
874
Why do verification approaches in automation rarely use HIL-test?
875
Why do we care about measurement?
876
Why Do We Exist? [Hands on]
877
Why do we have an ocean?
878
Why do we have practicals anyway?-a focus on the essential engineering skills
879
Why do we measure blood pressure in millimeters of mercury? [Retrospectroscope]
880
Why do We Need a High Performance Position Sensitive Detector in Atom Probe Tomography?
881
Why do we need a Sparse Global Time-Base in Dependable Real-time Systems?
882
Why do we need an international standard for control rooms?
883
Why do we need capacity markets?
884
Why do we need computer hardware description languages?
885
Why do we need elastic optical path networking in the 1 Tb/s era?
886
Why Do We Need Intelligent Systems?
887
Why Do We Strive? [President´s Message]
888
Why do wire-array Z-pinches give such a sharp and efficient X-ray pulse?
889
Why do you get out of bed in the morning?
890
Why does a GSS fail to enhance group consensus and satisfaction? An investigation from an influence process perspective
891
Why does a power assist robot system reduce the weight of an object lifted with it? the preliminary results
892
Why does Britain want Quality Circles?
893
Why does business involve in Corporate Responsibility?
894
Why does Digital participate in standards?
895
Why does direct-MUSIC on sparse-arrays work?
896
Why does histogram packing improve lossless compression rates?
897
Why does it need velocity?
898
Why does it pay to be selfish in a MANET?
899
Why does it take that long? Establishing Product Lines in the Automotive Domain
900
Why does language matter to fuzzy logic?
901
Why does life start, what does it do, where will it be?
902
Why does linear phase shift cause mode locking?
903
Why Does Mutual-Information Work for Image Registration? A Deterministic Explanation
904
Why Does my Spreadsheet Compute Wrong Values?
905
Why does one need fault-tolerant control systems anyway?
906
Why does output normalization create problems in multiple classifier systems?
907
Why does PHAT work well in lownoise, reverberative environments?
908
Why does PHM matter? - Nvidia´s GPU problems reviewed
909
Why Does Rebalancing Class-Unbalanced Data Improve AUC for Linear Discriminant Analysis?
910
Why Does Reflector Enhance the Gain of Helical Antennas?
911
Why Does State Government Contract Out Their E-Government Services?
912
Why does surplus DOF of robot fingers enhance dexterity of object manipulation: analysis and simulation of overall fingers-object dynamics
913
Why does the FDA concern itself with ESD?
914
Why does the government intervene the market? — An analysis of compulsory trading and compulsory non-trading phenomenon
915
Why Does the Kronecker Model Result in Misleading Capacity Estimates?
916
Why Does Your Vote Matter? [President´s Message]
917
Why doesn´t healthcare embrace simulation and modeling? What would it take?
918
Why Don´t Companies Borrow? Evidence from China´s Listed Companies
919
Why don´t engineers and clinicians talk the same language — And what to do about it?
920
Why don´t engineers write performance specifications?
921
Why don´t satisfied consumers show reuse behavior? The context of online games
922
Why don´t software developers use static analysis tools to find bugs?
923
Why don´t they understand what they know? What to do about it!
924
Why Don´t We Encrypt Our Email?
925
Why don´t we use free 868 MHz band for geolocation?
926
Why Downlink Cyclic Delay Diversity Helps Uplink Transmit Diversity
927
Why Dynamic-Element-Matching DACs Work
928
Why early implementation of a Knowledge Management System can support the growth of R&D-driven SMEs
929
Why EDM is expanding from the toolroom on to the shopfloor
930
Why Effectiveness of Robot-Mediated Neurorehabilitation Does Not Necessarily Influence Its Adoption
931
Why electromagnetic compatibility (EMC)?
932
Why electronic and not electromechanical ELCBs ?
933
Why electronics in China - a business perspective
934
Why Eliciting and Managing Legal Requirements Is Hard
935
Why EMC immunity testing is inadequate for functional safety
936
Why EMC Testing is Inadequate for Functional Safety - and What Should be Done Instead
937
Why EMC testing is inadequate for functional safety-and what should be done instead
938
Why emissivity standards and what characteristics?
939
Why emisspvity standards and what characteristics?
940
Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives
941
Why engineers and scientists write as they do — Twelve characteristics of their prose
942
Why engineers and scientists write as they do-twelve characteristics of their prose
943
Why engineers don´t always learn good planning practices and how they can be helped
944
Why engineers must know and manage organizational culture
945
Why Engineers Need A "Papers Program"
946
Why engineers should consider formal methods
947
Why engineers should know and use Fitts´ law
948
Why engineers should write technical papers
949
Why enterprises need more than firewalls and intrusion detection systems
950
Why equity is a pipedream: Analysis of the dynamics of overscheduled NAS resources
951
Why ERP systems will keep failing
952
Why Error Correction Methods Realize Fast Computations
953
Why error measures are sub-optimal for training neural network pattern classifiers
954
Why ethernet WAN transport?
955
Why ethics and compliance programs can fail
956
Why evaluate ontology technologies? Because it works!
957
Why evaluating CASE environments is different from evaluating CASE tools
958
Why even successful teams sometimes fail-self-directed team catalysts
959
Why even successful teams sometimes fail-self-directed team catalysts [manufacturing]
960
Why every engineering student should study system dynamics
961
Why existing utility metrics do not work for industrial reliability analysis
962
Why Expert Systems Do Not Exhibit Expertise
963
Why Explore Object Mathods, Patterns, and Architectures?
964
Why Facebook Should Hire Astronomers
965
Why failure rates observe Zipf´s law in operational software
966
Why fast packet switching?
967
Why feature dependencies challenge the requirements engineering of automotive systems: An empirical study
968
Why ferroelectric polyvinylidene fluoride is special
969
Why few (if any) medical devices comply with their EMC standard, and what can be done about it
970
Why Field Test?
971
Why fight grid current in class B modulators?
972
Why filter recursively in two dimensions?
973
Why focus on building-in reliability
974
Why Fortran?
975
Why friction welding has gained acceptance
976
Why FSK and CPFSK have identical linewidth requirements
977
Why functional languages really need parallelism
978
Why funny money will have the last laugh
979
Why fusion? A discussion of energy alternatives
980
Why Fuzzy Decision Trees are Good Rankers
981
Why fuzzy in data mining?
982
Why Fuzzy Sequential Patterns can Help Data Summarization: An Application to the INPI Trade Mark Database
983
Why Gabor frames? Two fundamental measures of coherence and their role in model selection
984
Why Gaussianity?
985
Why girls with an interest in IT in high-school do not choose an IT career
986
Why glass sometimes breaks
987
Why go green?: The effects of internationalization, path-dependency, and environmental uncertainty
988
Why go online?
989
Why go the way of Britain?
990
Why Go to Conferences? [MicroBusiness]
991
Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality
992
Why good headlighting is difficult
993
Why Good Software Sometimes Dies – And How to Save It
994
Why Google Analytics cannot be used for educational web content
995
Why Google Cannot Beat Baidu in China Search Engine Market
996
Why Graphics Power Is Revolutionizing Physics
997
Why grinding has becoming ´abrasive cutting´
998
Why ground?
999
Why groups are not always the same-an assessment of twelve briefs in GDSS
1000
Why Groups are Used in Software System Modernization Decisions? Comparing Group Decision-Making in Private and Public Sector
بازگشت