<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Cost-Wait Trade-Offs in Client-Side Resource Provisioning with Elastic Clouds
2
Cost-Xensitive XCS Classifier System Addressing Imbalance Problems
3
COSVAM: a technique for assessing software variability in software product families
4
COSY - A Cooler Synchrotron and Storage Ring
5
COSY communication IP´s
6
COSY data acquisition system for physical experiments
7
COSY Data Acquisition System for Physical Experiments
8
COSY INFINITY version 7
9
Cosyn: Hardware-software Co-synthesis Of Embedded Systems
10
COSYN: Hardware-software co-synthesis of heterogeneous distributed embedded systems
11
COSYNA, an integrated coastal observation system for Northern and Arctic Seas
12
Co-synthesis of a configurable SoC platform based on a network on chip architecture
13
Co-synthesis of custom on-chip bus and memory for MPSoC architectures
14
Co-synthesis of data paths and clock control paths for minimum-period clock gating
15
Cosynthesis of energy-efficient multimode embedded systems with consideration of mode-execution probabilities
16
Co-synthesis of heterogeneous multiprocessor systems using arbitrated communication
17
Cosynthesis on multiprocessor architectures with high availability
18
Co-synthesis with custom ASICs
19
COSY-SCL, the superconducting injector linac for COSY
20
CosyVerif: An Open Source Extensible Verification Environment
21
COT - customer owned trouble
22
COT flow imposes added requirements for debug
23
COT-ANN-PWM single-phase synchronous rectifiers without line-voltage sensors
24
Co-Taverna: A Tool Supporting Collaborative Scientific Workflows
25
COTDR performance optimization for amplified transmission systems
26
COTE: A Clustering Scheme with Optimal Tiers and Energy Efficiency in Wireless Sensor Networks
27
CoTe: A Software Tool for Compression Benchmarking
28
Coterie join algorithm
29
Coterie join operation and tree structured k-coteries
30
Coterie templates: a new quorum construction method
31
Coterminous locality and coterminous group data prefetching on chip-multiprocessors
32
Co-tier uplink power control in femtocell networks by Stackelberg game with pricing
33
CoTiO3 high-κ dielectrics on HSG for DRAM applications
34
COTIPMO: A COnstructive Team Improvement Process MOdel
35
CO-tolerant operation of platinum-loaded PEM fuel cells
36
CO-TORA on-demand routing protocol for cognitive radio ad-hoc networks
37
CoTrack: A Framework for Tracking Dynamic Features with Static and Mobile Sensors
38
Co-Tracking Using Semi-Supervised Support Vector Machines
39
CoTracks: A New Lossy Compression Schema for Tracking Logs Data Based on Multiparametric Segmentation
40
CoTrade: Confident Co-Training With Data Editing
41
Co-training algorithm based on on-line boosting for vehicle tracking
42
Co-training and ensemble based duplicate detection in adverse drug event reporting systems
43
Co-training Approach for Label-Minimized Audio Classification
44
Co-training based algorithm for datasets without the natural feature split
45
Co-training based semi-supervised classification of Alzheimer´s disease
46
Co-training based semi-supervised Web spam detection
47
Co-training by Committee: A New Semi-supervised Learning Framework
48
Co-training for Handwritten Word Recognition
49
Co-training framework of generative and discriminative trackers with partial occlusion handling
50
Co-training non-robust classifiers for video semantic concept detection
51
Co-training of context models for real-time vehicle detection
52
Co-training over Domain-independent and Domain-dependent features for sentiment analysis of an online cancer support community
53
Co-Training Semi-Supervised Active Learning Algorithm Based on Noise Filter
54
Co-training succeeds in Computational Paralinguistics
55
Co-training using RBF Nets and Different Feature Splits
56
Co-training with a Single Natural Feature Set Applied to Email Classification
57
Co-training with adaptive Bayesian classifier combination
58
Co-training with noisy perceptual observations
59
COTraMS: A Collaborative and Opportunistic Traffic Monitoring System
60
Co-Transduction for Shape Retrieval
61
Cotransfer Learning Using Coupled Markov Chains with Restart
62
Cotransformation Provides Area and Accuracy Improvement in an HDL Library for LNS Subtraction
63
COTraSE: Connection Oriented Traceback in Switched Ethernet
64
COTS (commercial off the shelf) distributed system for critical application
65
COTS acquisition process: incorporating business factors in COTS vendor evaluation taxonomy
66
COTS ADC & DAC selection and qualification for the GLAST mission
67
COTS And Costs In Safety Critical Systems
68
COTS and high assurance: an oxymoron?
69
COTS based high data throughput acquisition system for a real-time reflectometry diagnostic
70
COTS based multichannel FM receiver and recorder using SDR concept
71
COTS Based On-Board-Computer on South Africa´s Sumbandilasat: A Radiation and In-Orbit Performance Analysis
72
COTS based open systems for military avionics
73
COTS based open systems for military avionics
74
COTS characterization model in a COTS-based development environment
75
COTS cluster-based sort-last rendering: performance evaluation and pipelined implementation
76
COTS Clusters vs. the Earth Simulator: An Application Study Using IMPACT-3D
77
COTS communications technologies for DoD applications: challenges and limitations
78
COTS component acquisition in an emerging market
79
COTS contribution to the ERS success story
80
COTS CPU Selection Guidelines for Safety-Critical Applications
81
COTS developers lead best practice adoption
82
COTS electronics & the naval shock environment
83
COTS embedded Internet platform and Blimp UAV for educational purposes
84
COTS evaluation and selection
85
COTS fiber optic applications in military and aerospace
86
COTS fiber optic interconnect solutions for mobile platforms
87
COTS fibre channel network technology insertion into avionics systems
88
COTS for military applications: been there, done that, got the PC cards
89
COTS FPGA Computing - Ready for Take Off?
90
COTS FPGA/SRAM irradiations using a dedicated testing infrastructure for characterization of large component batches
91
COTS GPS C/A-code receivers with pseudolites for range PLS application
92
Cots hardware and software in high-availability systems
93
COTS Hardware for Software Radar
94
Cots Hardware Performance Vs the PC
95
COTS implementation of a Sensor Planning Service GetFeasibility operation
96
COTS implementation of a Sensor Planning Service GetFeasibility operation - Interim status
97
COTS Implementation of a Sensor Planning Service GetFeasibility operation - Interim status #2
98
COTS implementation of a Sensor Planning Service GetFeasibility operation — Final status
99
COTS implementation of satellite-based, full-mesh multimedia networks
100
COTS in Military Avionics and Related Applications - A Customer Perspective
101
Cots in space: Developing an Environmental Control System for Balloon-Borne Air-Cooled Electronics
102
Cots initiative and cost of S/W for aging avionics upgrades
103
COTS integration and evaluation: introduction
104
COTS integration: essential for network engineering
105
COTS integration: plug and pray?
106
COTS Integrations: Effort Estimation Best Practices
107
COTS middleware for real-time distributed interactive simulations - fact or fiction?
108
COTS PLC technology in rail signalling LX PLC project
109
COTS Products in Air Traffic Control
110
COTS SAR processing software
111
COTS satellite-terrestrial broadcast system for deployed communications
112
COTS Score: an acceptance methodology for COTS software
113
COTS Selection: Past, Present, and Future
114
COTS Simulation Package (CSP) Interoperability -A Solution to Synchronous Entity Passing
115
COTS software design minimizes ATS lifecycle cost
116
COTS software evaluation and selection: A pilot study based in Jordan firms
117
COTS software failures: can anything be done?
118
COTS Software Selection Process
119
COTS software: the economical choice?
120
COTS Technologies for Integrating Development Environment, Remote Monitoring and Control of Livestock Stable Climate
121
COTS technologies for radar sensors at millimeter-wave bands
122
Cots technologies in MILSATCOM terminals: An assessment of benefits, considerations, and needs
123
COTS tenders and integration requirements
124
COTS VXI hardware combats obsolescence and reduces cost
125
COTS, integration and critical systems
126
COTS, workflow, and software process management: an exploration of software engineering tool development
127
CoTS: A Scalable Framework for Parallelizing Frequency Counting over Data Streams
128
COTS: the expensive solution?
129
COTS-based applications in space avionics
130
COTS-based development process meta-modeling
131
COTS-Based Embedded Diagnostics Solutiona
132
COTS-based fault tolerance in deep space: Qualitative and quantitative analyses of a bus network architecture
133
COTS-based hardware support to timeliness in CAN networks
134
COTS-Based High-Data-Throughput Acquisition System for a Real-Time Reflectometry Diagnostic
135
COTS-Based High-Performance Computing for Space Applications
136
COTS-based modules for far-field radio frequency energy harvesting at 900MHz and 2.4GHz
137
COTS-based OO-component approach for software inter-operability and reuse (software systems engineering methodology)
138
COTS-Based Real Time System for Following Ancillary Services and Generation Schedule in a Deregulated Electricity Market
139
COTS-based stick-on electricity meters for building submetering
140
COTS-Based Stick-On Electricity Meters for Building Submetering
141
COTS-based System´s Obsolescence Risk Evaluation
142
COTS-based systems top 10 list
143
COTS-Based Systems: A Methodology for Evaluating Data and Output Misfits
144
COTS-Based Wireless Magnetic Sensor for Small Satellites
145
CotsBots: an off-the-shelf platform for distributed robotics
146
COTS-like generic medical image repository
147
COTSRE: A COmponenTs Selection Method Based on Requirements Engineering
148
Cotton area estimation using muti-sensor RS data and big plot survey in Xinjiang
149
Cotton Area Mapping Using Multitemporal Satellite Data Integrated Within A Geographical Information System Applied To A Cotton Boll Weevil Control Programme In Paraguay
150
Cotton Gin Efficiency Monitoring System
151
Cotton growth monitoring and yield estimation based on assimilation of remote sensing data and crop growth model
152
Cotton leaf disease identification using pattern recognition techniques
153
Cotton top feature identification based on machine vision&image processing
154
Cotton Variety Selection Model and Application Design
155
Cotton-Mouton Spectrum in Cobalt-Substituted Magnetic Garnet
156
Co-tunneling effects on transport in the spin blockade regime
157
Cotunneling errors in the three-junction R-pump
158
Cotunneling rate on harmonic drive and triangle drive
159
Couapled cavities in one-dimensional photonic crystal based on horizontal slot waveguide structure with Si-nc
160
CouchFS: A High-Performance File System for Large Data Sets
161
Couette charger for measurement of equilibrium and energization flow electrification parameters: application to transformer insulation
162
Cougaar: A Robust Configurable Multi Agent Platform
163
Cougaar: a scalable, distributed multi-agent architecture
164
Cough detection algorithm for monitoring patient recovery from pulmonary tuberculosis
165
Cough detection through mechanomyographic signal in synchronized respiratory electrical stimulation systems
166
Cough detection using deep neural networks
167
Cough detection using speech analysis
168
Cough signal recognition with Gammatone Cepstral Coefficients
169
Cough Sound Analysis - A new tool for diagnosing Pneumonia
170
Cough Sound Analysis for Pneumonia and Asthma Classification in Pediatric Population
171
Cough sound discrimination in noisy environments using microphone array
172
Cough sound recognition based on Hilbert marginal spectrum
173
Could a Caveman Do It? The Surprising Potential of Simple Attacks
174
Could ADHD symptoms make individuals susceptible for Internet addiction?
175
Could Asymmetric Regulation of Access Charges Improve the Competition between Mobile Networks?
176
Could Automatic Metadata Generation be a digital solution for speedier and easier document publishing?
177
Could Belgian diode lead to printable RFIDs?
178
Could bistatic observations contribute to forest biomass monitoring?
179
Could Bitcoin transactions be 100x faster?
180
Could british industry be investing too much?
181
Could chaotic dynamics knock at the door of intelligent control?
182
Could China get to Mars First?
183
Could compliant external leads reduce the strength of a surface-mounted device?
184
Could computer game design become a core subject for engineering?
185
Could cooperative MAC protocols improve performance in multi-hop wireless ad hoc networks?
186
Could cortical signals control intraspinal stimulators? A theoretical evaluation
187
Could cost in a TQM environment
188
Could Decision Trees Improve the Classification Accuracy and Interpretability of Loan Granting Decisions?
189
Could detection provide a dynamic path to the safe use of electrical equipment in hazardous areas?
190
Could determination of equivalent dipoles from 12 lead ECG help in detection of misplaced electrodes
191
Could do better
192
Could early visual processes be sufficient to label motions?
193
Could energy efficiency save our planet?
194
Could engineers be better mathematicians?
195
Could enough samples be more important than better designs for computer experiments?
196
Could European eGovernment Policy Initiatives, in Effect, be Stifling the Development of Learning Technologies?
197
Could fatigue be used as a paradoxical intervention to improve motor learning after stroke?
198
Could feedback-based self-learning help solve networked Prisoner´s Dilemma?
199
Could Global Software Development Benefit from Agile Methods?
200
Could Hemodynamic Analyses Be Helpful In Predicting Blood Flow Signal Levels In MRI?
201
Could HR practices help to foster sustainable employee energy in the work?
202
Could LDAP be the next killer DAP?
203
Could micro patterns be used as software stability indicator?
204
Could next generation androids get emotionally close? `Relational closeness´ from human dyadic interactions
205
Could OKAN be an objective indicator of the susceptibility to visually induced motion sickness?
206
Could olfactory displays improve data visualization?
207
Could power properties of three-phase systems be described in terms of the Poynting vector?
208
Could Proactive Link-State Routed Wireless Networks Benefit from Local Fast Reroute?
209
Could satisfaction be compared across customers? Some opposite evidences from China
210
Could Shakespeare have tweeted Hamlet? [The Data]
211
Could shock tests adequately mimic drop test conditions?
212
Could shock tests adequately replace drop tests?
213
Could simple mixed materials make flat lenses cheap?
214
Could simulation optimization have prevented 2012 central Florida election lines?
215
Could Skype be more satisfying? a QoE-centric study of the FEC mechanism in an internet-scale VoIP system
216
Could supercomputing turn to signal processors (again)?
217
Could the antenna pattern be in energy instead of in power?
218
Could the Internet fragment? [domain name system]
219
Could the KANBAN production control system work here?
220
Could the new high interrupting capacity circuit breaker change your distribution system?
221
Could Traditional Chinese Medicine Used for Curing Erectile Dysfunction?
222
Could trapping tiny ions crack the toughest codes?
223
Could UML and Contract tackle heterogeneity?
224
Could vision sensors make redundant?
225
Could We Infer Unordered API Usage Patterns Only Using the Library Source Code?
226
Could we obtain closer co-operation towards standardisation than already exists?
227
Could we really determine the duration of the T-wave? An answer comes from T-wave triggered signal averaged ECG
228
Could we use UWB sensing for breast cancer detection?
229
Could What Happened to Sony Happen to Us?
230
Could you be clearer? An examination of the multiple perspectives of clarity
231
Coulomb and carrier dynamics of 1.3 /spl mu/m quantum dots in tunable two-color pump-probe experiments
232
Coulomb and viscous friction fault detection with application to a pneumatic actuator
233
Coulomb attraction effects in CdZnSe quantum well lasers
234
Coulomb blockade and higher order tunneling effect on magnetoresistance in ultrasmall ferromagnetic tunnel junctions
235
Coulomb Blockade distribution for a disordered ensemble of Quantum Dots
236
Coulomb blockade in a granular material made of gold nanowires
237
Coulomb blockade in PtSi/porous Si Schottky barrier as a two-dimensional multi-tunnelling junction
238
Coulomb Blockade in Thin SOI Nanodevices
239
Coulomb blockade memory using integrated single-electron transistor/metal-oxide-semiconductor transistor gain cells
240
Coulomb blockade oscillations in biological ion channels
241
Coulomb Blockade Oscillations in Silicon Single-electron Transistor with a Strong Gate-dot Coupling
242
Coulomb blockade phenomena in low-dimensional Si MOSFETs fabricated using focused-ion beam implantation
243
Coulomb blockade systems fabricated by atomic force microscopy
244
Coulomb Collisional Relaxation Process of Ion Beams in Magnetized Plasmas
245
Coulomb control of a triangular three-body satellite formation using nonlinear model predictive method
246
Coulomb correlation and tunneling effects in single and double V-groove quantum wire LEDs
247
Coulomb counting state-of-charge algorithm for electric vehicles with a physics-based temperature dependent battery model
248
Coulomb Damped Relaxation Oscillations in Semiconductor Quantum Dot Lasers
249
Coulomb Damped Relaxation Oscillations in Semiconductor Quantum Dot Lasers
250
Coulomb drag: a probe of electron interactions in coupled quantum wells
251
Coulomb effects on bipolarons and polarons in non degenerate conjugate polymers
252
Coulomb enhancement in InGaAs-GaAs quantum-well lasers
253
Coulomb Enhancement Of Ultrafast Nonlinearities In Quantum Well Structures
254
Coulomb explosion dynamics of N2O in intense laser fields probed by coincidence momentum imaging
255
Coulomb explosion of benzene in high-intensity laser fields
256
Coulomb explosion of benzene induced by an intense laser field
257
Coulomb friction effects on the dynamics of bearings and transmissions in precision robot mechanisms
258
Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs
259
Coulomb friction in feedback control systems
260
Coulomb friction in feedback control systems
261
Coulomb friction joint and drive effects in robot mechanisms
262
Coulomb interaction effect correction in e-beam block exposure lithography
263
Coulomb interaction in semiconductor lasers
264
Coulomb interactions between dust particles in plasma etching reactors
265
Coulomb memory effects in the ultrafast dynamics of quantum well magnetoexcitons
266
Coulomb oscillations in 100 nm and 50 nm CMOS devices
267
Coulomb scattering cross sections for accelerator design
268
Coulomb Scattering induced mobility degradation in Ultrathin-body SOI MOSFETs with high-k gate stack
269
Coulomb scattering within a spherical beam bunch in high current linear accelerators
270
Coulomb´s Law Discretization Method: a New Methodology of Spatial Discretization for the Radial Point Interpolation Method
271
Coulomb-blockade in nanometric Si-film silicon-on-nothing (SON) MOSFETs
272
Coulomb-driven convection in electrohydrodynamics
273
Coulomb-enhanced shift currents from symmetry reduction in GaAs/AlGaAs quantum wells
274
Coulombic efficiency of a sealed, thin plate, spiral lead-acid battery
275
Coulomb-induced structure in the intersubband spectra of quantum wells
276
Coulometric detection of an analyte in a liquid plug formed in a microflow channel
277
Coulometric determination of metal carbonates in battery electrodes by destructive analysis
278
Coulter Translational Research Awards
279
Coulumb Fluid, Painlevé Transcendents, and the Information Theory of MIMO Systems
280
Council 1974-75
281
Council appoints committee on engineering and allied technical professions
282
Council committee to confer on Aeronautics
283
Council counsel
284
Council discussion on - Organisation of the engineering profession
285
Council elections
286
Council elections
287
Council elections
288
Council elections-an exercise in random democracy?
289
Council elections-who are these people?
290
Council fills casual vacancies
291
Council gives notice of withdrawal from CEI
292
Council Meeting on the 21st July 1960
293
Council nominations
294
Council Notices
295
Council Notices
296
Council Notices
297
Council notices
298
Council of engineering institutions
299
Council of Engineering Institutions Register of Chartered Engineers
300
Council of engineering institutions register of chartered engineers
301
Council of engineering institutions. Annual report for the year ended the 30th september 1965
302
Council of engineering institutions´ charter
303
Council of engineering institutions´ register of chartered engineers
304
Council urges early publication of U. S. G. S. data
305
Couner-Propagation Neural Networks Optimization Based on Rough Set
306
CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications
307
Counseling Methods For Professors Workshop - Part I
308
Counselor Tutorial Program
309
Counselors and vice-presidents meet to discuss student branch activities
310
Count Data Clustering Using Unsupervised Localized Feature Selection and Outliers Rejection
311
Count Data Modeling and Classification Using Finite Mixtures of Distributions
312
COUNT Forest: CO-Voting Uncertain Number of Targets Using Random Forest for Crowd Density Estimation
313
Count Models for Software Quality Estimation
314
Count of annihilators of Boolean functions with given algebraic immunity
315
Count Of Brazilian Parana Pine Crowns In 35 Mm Aerial Color Photographs
316
Count passengers based on Haar-like feature in elevator application
317
Count rate analysis of PET scanner designs based on a GSO depth of interaction detector with a large area PS-PMT
318
Count rate analysis of PET scanner designs based on a GSO depth of interaction detector with a large-area PS-PMT
319
Count rate capability considerations and results for a positron emission tomograph
320
Count rate dependence of local signal to noise ratio in positron emission tomography
321
Count rate dependence of local signal-to-noise ratio in positron emission tomography
322
Count Rate Performance and Dead Time in Singles Transmission Scanning for the microPET Focus 220 Scanner
323
Count Rate Performance of a Microchannel Plate Photomultiplier
324
Count Rate Performance of the MicroPET Focus 220 Animal Scanner in Singles Transmission Scanning Mode
325
Count rate performances of TTVO3: the CEA-LETI time-of-flight positron emission tomograph
326
Count rate statistics for drift detectors
327
Count Sort for GPU Computing
328
Count the Value of R&D, Not Just Its Cost
329
Count three for wearable computers
330
Count up, cost down
331
Countable Failures
332
Countable Intervals of Partial Clones
333
Countable Nested Sets and Fuzzy Series
334
Countable SSP-compactness and the SSP-Lindelöf property of L-fuzzy sets
335
Countably Infinite Networks that Need not be Locally Finite
336
Count-based BIST compaction schemes and aliasing probability computation
337
Count-based listmode respiratory motion detection for quantitative PET
338
Count-based quantitation of functional renal volume by SPECT imaging
339
Count-based quantitation of functional renal volume by SPECT imaging
340
Countdown for RADARSAT-2 system operations
341
Countdown graph: Estimating completion of testing
342
Countdown to D-day: eurovision´s digital debut
343
Countdown to October! [IAS 2004 annual meeting preview]
344
Countdown to survival [manufacturing IT]
345
Countdown to the end [digital TV]
346
Countdown to Y2Gray
347
Counted cycles method to quantify the onset response in high-frequency peripheral nerve block
348
COUNTER - TERRORISM - Protecting the Nation´s Infrastructure
349
Counter attack detection with machine learning from log files of RoboCup simulation
350
Counter attack to free-riders: Filling a security hole in BitTorrent protocol
351
Counter availability and characteristics for feed-forward based synchronization
352
Counter based adaptation for CAVLC in HEVC
353
Counter based approach to intellectual property protection in sequential circuits and comparison with existing approach
354
Counter based CMOS temperature sensor for low frequency applications
355
Counter based superscalar instruction issuing
356
Counter botnet activities in the Netherlands a study on organisation and effectiveness
357
Counter Braids
358
Counter Braids: Asymptotic optimality of the message passing decoding algorithm
359
Counter circularly-polarized curl antenna with a lossy structure
360
Counter circularly-polarized loop antenna
361
Counter designs in quantum-dot cellular automata
362
Counter dipole layer formation in SiO2/high-k/SiO2/Si gate stacks
363
Counter doping into uniformly and heavily doped channel region of sub-0.1 μm SOI MOSFETs
364
Counter Embedded Memory architecture for trusted computing platform
365
Counter examples to Stearn´s conjecture on error surfaces of adaptive IIR filters
366
Counter Extraction of Ventricular Wall Based on Fuzzy-C-Means Algorithm for Ultrasound Image in Cardiac Torsion Motion
367
Counter flow microbubble channeling using acoustic radiation force funnel
368
Counter hack: Creating a context for a cyber forensics course
369
Counter inference of intelligent agents
370
Counter measures against evolving search engine spamming techniques
371
Counter mode encryption for FNBDT/MELP
372
Counter play-out: Executing unrealizable scenario-based specifications
373
Counter propagation ANN based massive adaptive array antenna beamforming for mmWave communication system
374
Counter propagation network: an interpretation
375
Counter pulse capacitor bank for 70 kA, 10 kV commutation system
376
Counter pulse capacitor banks for 70 kA, 10 kV commutation systems
377
Counter reduction techniques for Hamming count
378
Counter rotating hydrokinetic turbine arrays for ocean energy conversion
379
Counter streaming beams model in MICHELLE eBEAM
380
Counter streaming charged particle beam model in MICHELLE-Ebeam
381
Counter Synchronization Using the Thue-Morse Sequence and PSK
382
Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism
383
Counter timers - getting the design philosophy right
384
Counter Transfer Oscillator System for Microwave Frequency Measurements
385
Counter Tree Diagrams for design and analysis of fast addition algorithms
386
Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement
387
Counteract DNS Attacks on SIP Proxies Using Bloom Filters
388
Counteracting 16-QAM Optical Fiber Transmission Impairments With Iterative Turbo Equalization
389
Counteracting Byzantine adversaries with network coding: An overhead analysis
390
Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture
391
Counteracting differential power analysis: Hiding encrypted data from circuit cells
392
Counteracting drift of olfactory sensors by appropriately selecting features
393
Counteracting leakage power analysis attack using random ring oscillators
394
Counteracting malicious users in cognitive radio networks over imperfect reporting channels
395
Counteracting modeling errors for sensitive observer-based manipulator collision detection
396
Counteracting Multipath Effects in Gap Measurement of Nuclear Steam Generator Tubes
397
Counteracting of stimulated Brillouin scattering in externally modulated lightwave AM-CATV systems
398
Counteracting power analysis attack using Static Single-ended Logic
399
Counteracting rotor imbalance in a bearingless motor system with feedforward control
400
Counteracting TCP SYN DDoS attacks using automated model
401
Counteracting the quantisation noise from PCM codecs
402
Counteracting the Quantization Effects on Observers Based on a Novel Nonlinear Dead-Zone
403
Counteracting Wireless Congestion in Data Distribution with Adaptive Batching Techniques
404
Counteraction of non-linear distortion in a novel MCM-DS-SS wireless LAN radio subsystem
405
Counterattack detection in broadcast soccer videos using camera motion estimation
406
Counter-Attack Trust Model Based on Vague Set for P2P Networks
407
Counterbalanced Effect of Surface Trap and Auger Recombination on the Transverse Terahertz Carrier Dynamics in Silicon Nanowires
408
Counter-based broadcasting: Modeling and performance analysis in CSMA-based wireless networks
409
Counter-based cache replacement algorithms
410
Counter-Based Cache Replacement and Bypassing Algorithms
411
Counter-based compaction: Delay and stuck-open faults
412
Counter-based Hough transform
413
Counter-Based Output Selection for Test Response Compaction
414
Counter-based residue arithmetic circuit for easily testable VLSI digital signal processing systems
415
Counter-based residue arithmetic circuit for VLSI digital signal processing systems
416
Counterclockwise Dynamics of a Rate-Independent Semilinear Duhem Model
417
Counter-clockwise reflection-coefficient behaviour on a Smith chart
418
Counter-counter-measure methods applied to dispersive arrays
419
Countercurrent Breaking by Vacuum Interrupter Combined in Parallel with Vacuum Switch
420
Countercurrent enhances acceleration sensation in galvanic vestibular stimulation
421
Counter-Deformed Design of Ship Structural Parts Using Geometric Shape Deformation Based on Welding Distortion Estimation
422
Counter-dithering pump scheme for cascaded degenerate FWM based wavelength converter
423
Counter-Doped JTE, an Edge Termination for HV SiC Devices With Increased Tolerance to the Surface Charge
424
Counter-doped MOSFETs of 4H-SiC
425
Counterdoped Pocket Thickness Optimization of Gate-on-Source-Only Tunnel FETs
426
Counterdoped well structure for scaled CMOS
427
Counterdoping of MOS channel (CDC)-a new technique of improving suppression of latching in insulated gate bipolar transistors
428
Counterdoping with patterned ion implantation
429
Counterexample and correction to a recent result on robust stability of a diamond of complex polynomials
430
Counterexample for Timed Probabilistic Reachability in Uniform CTMDP
431
Counterexample generation and representation in model checking for probabilistic timed automata
432
Counterexample Generation for Probabilistic Timed Automata Model Checking
433
Counterexample Generation in Probabilistic Model Checking
434
Counterexample Guided Abstraction Refinement is Better under Equational Abstraction
435
Counter-Example Guided Synthesis of control Lyapunov functions for switched systems
436
Counterexample in the least-squares inverse stabilisation of 2D recursive filters
437
Counterexample of a claim pertaining to the synthesis of a recurrent neural network
438
Counterexample of truncated Costas optical orthogonal codes
439
Counterexample Ranking Using Mined Invariants
440
Counterexample to a conjecture in multiprocessor scheduling
441
Counterexample to a Continuation-Based Algorithm for Finding All Power Flow Solutions
442
Counter-example to ad-hoc off-equilibrium linearisation methods in gain-scheduling
443
Counterexample to the generalized belfiore-solé secrecy function conjecture for l-modular lattices
444
Counterexample-guided abstraction refinement
445
Counterexample-Guided Abstraction Refinement for Component-Based Systems
446
Counterexample-Guided Assume-Guarantee Synthesis through Learning
447
Counterexample-guided choice of projections in approximate symbolic model checking
448
Counterexample-guided permissive supervisor synthesis for probabilistic systems through learning
449
Counterexample-guided simulation framework for formal verification of flexible automation systems
450
Counterexample-guided SMT-driven optimal buffer sizing
451
Counter-examples design to global convergence of maximum likelihood estimators
452
Counterexamples for sufficient and necessary conditions of internal stability
453
Counterexamples in distributed detection
454
Counterexamples in multidimensional system theory
455
Counterexamples to "liveness-enforcing supervision of bounded ordinary Petri nets using partial-order methods"
456
Counterexamples to `On estimating noncausal nonminimum phase ARMA models of non-Gaussian processes´ [and reply]
457
Counterexamples to a conjecture for characterizing higher rank ambiguities
458
Counterexamples to a Method for Identifying Hopf Bifurcations Without Eigenvalue Calculation
459
Counterexamples to a Proposed Stam Inequality on Finite Groups
460
Counterexamples to extremality conjectures on step response analysis of interval plants
461
Counterexamples to Fessas´ conjecture
462
Counterexamples to general convergence of a commonly used recursive identification method
463
Counterexamples to the currently accepted explanation for spurious modes and necessary and sufficient conditions to avoid them
464
Counterfactual Based Innovation: A Galois Lattice Approach of Creative Thinking
465
Counterfactual quantum computation
466
Counterfactual reasoning about intent for interactive navigation in dynamic environments
467
Counterfactuals and other philosophical challenges to machine intelligence: a fuzzy view
468
Counterfeit chips on the rise
469
Counterfeit Currency Detection Technique Using Image Processing, Polarization Principle and Holographic Technique
470
Counterfeit detection using paper PUF and mobile cameras
471
Counterfeit electronics: A rising threat in the semiconductor manufacturing industry
472
Counterfeit gold identification using sound and image processing
473
Counterfeit IC detection using light emission
474
Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain
475
Counterfeit iris detection based on texture analysis
476
Counterfeit mobile devices - the duck test
477
Counterfeit money detection by intrinsic fluorescence lifetime
478
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
479
Counterfeiting and Defending the Digital Forensic Process
480
Counterfeiting and piracy of pharmaceuticals
481
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
482
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
483
Counter-flow in a deregulated power system network and its effect on transmission loss allocation
484
Counterflow pipeline based dynamic instruction scheduling
485
Counterflow Pipelining: Architectural Support for Preemption in Asynchronous Systems using Anti-Tokens
486
COUNTERFOIL: a new high security optical surface technology
487
Counter-forensics of median filtering
488
Counter-HPM window experiments and theory
489
Countering agent security vulnerabilities using an extended SENSE schema
490
Countering ambiguity in exterior intrusion detection
491
Countering anti-forensics of image resampling
492
Countering anti-forensics of median filtering
493
Countering anti-forensics to wavelet-based compression
494
Countering anti-JPEG compression forensics
495
Countering Atmospheric Turbulence in Free Space Optical Links Using Wavelet Based Signal Processing
496
Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics
497
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome
498
Countering byzantine attacks in cognitive radio networks
499
Countering code injection attacks with TLB and I/O monitoring
500
Countering DDoS and XDoS Attacks against Web Services
501
Countering denial-of-service attacks using congestion triggered packet sampling and filtering
502
Countering drift in Visual Odometry for planetary rovers by registering boulders in ground and orbital images
503
Countering early propagation and routing imbalance of DPL designs in a tree-based FPGA
504
Countering entropy measure attacks on packed software detection
505
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
506
Countering feedback sparsity and manipulation in reputation systems
507
Countering IEDS
508
Countering Improvised Explosive Devices through a multi-point haptic teleoperation system
509
Countering Insider Threats in Personal Devices
510
Countering Intelligent Jamming with Full Protocol Stack Agility
511
Countering IPC Threats in Multiserver Operating Systems (A Fundamental Requirement for Dependability)
512
Countering JPEG anti-forensics
513
Countering malware evolution using cloud-based learning
514
Countering median filtering anti-forensics and performance evaluation of forensics against intentional attacks
515
Countering network worms through automatic patch generation
516
Countering Network-Centric Insider Threats through Self-Protective Autonomic Rule Generation
517
Countering non-lethal information warfare: lessons learned on foiling the Information Superhighwayman of the North American public switched telephone network
518
Countering oversegmentation in partitioning-based connectivities
519
Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect
520
Countering phishing threats with trust-by-wire in packet-switched ip networks - a conceptual framework
521
Countering Plagiarism by Exposing Irregularities in Authors´ Grammar
522
Countering Power Analysis Attacks UsingReliable and Aggressive Designs
523
Countering Radio Frequency Interference in Single-Sensor Quadrupole Resonance
524
Countering rogues in wireless networks
525
Countering security information overload through alert and packet visualization
526
Countering security vulnerabilities in agent execution using a self executing security examination
527
Countering selfish misbehavior in multi-channel MAC protocols
528
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management
529
Countering stealth with passive, multi-static, low frequency radars
530
Countering terrorism
531
Countering terrorism through dark web analysis
532
Countering Terrorism through Information and Privacy Protection Technologies
533
Countering Terrorism through Information and Privacy Protection Technologies
534
Countering the Concept-Drift Problem in Big Data Using iOVFDT
535
Countering the effects of silicon aging on SRAM PUFs
536
Countering the false positive projection effect in nonlinear asymmetric classification
537
Countering the gain behavior of Erbium Doped Fiber Amplifiers: A cross layer approach
538
Countering time varying fading in multidwell based cellular CDMA systems
539
Countering trusting trust through diverse double-compiling
540
Counterintelligence and Security: Systemic Weaknesses in the U.S. Approach
541
Counterintelligence and unified technical security programs
542
Counterintuitive behavior of electron temperature in terahertz-driven heterojunctions
543
Counterintuitive properties of two-dimensional photonic crystal structures
544
Counter-intuitive results cast in an electronic warfare framework
545
Counter-intuitive throughput behaviors in networks under end-to-end control
546
Counter-ion induced processibility of polyaniline: conducting melt-processible polymer blends
547
Counter-ion radius dependence of the mixed-valence state on MX chain platinum complexes
548
Counterlet Based Medical Image Compression Using Improved EZW
549
Counter-lightly-doped-drain (C-LDD) structure for Multi-level cell (MLC) NOR flash memory free of drain disturb
550
COUNTERMATCH: a neural network approach to automatic signature verification
551
Countermeasure actions in electronic warfare using fuzzy logic
552
Countermeasure against explosion of gas insulated porcelain bushing
553
Countermeasure Against Explosion of Gas Insulated Porcelain Bushing
554
Countermeasure against SSMA near-far problem using unknown sequence estimator
555
Countermeasure against the SPA attack on an embedded McEliece cryptosystem
556
Countermeasure Analysis on the Framework Construction of Regional Talent Market Integration
557
Countermeasure and cause analysis on urban construction investment and financing
558
Countermeasure Characterizations: building blocks for designing secure information systems
559
Countermeasure for detection of honeypot deployment
560
Countermeasure for electromagnetic screen image leakage based on color mixing in human brain
561
Countermeasure for instability in voltage source inverter fed field oriented synchronous machines without using a position sensor
562
Countermeasure for intelligent cluster-head jamming attack in wireless sensor network
563
Countermeasure for Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
564
Countermeasure for Stop Idling Policy for Automobile Power System
565
Countermeasure for the protection of face recognition systems against mask attacks
566
Countermeasure for Thermo- Mechanical Bending of Load Cycling on 275 KV Pipe-Type Cable
567
Countermeasure for Thermo-Mechanical Bending of Load Cycling on 275 KV Pipe-Type Cable
568
Countermeasure of ECC against Side-Channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure
569
Countermeasure of NFC relay attack with jamming
570
Countermeasure of public key attacks for asymmetric watermarking
571
Countermeasure of re-recording prevention against attack with short wavelength pass filter
572
Countermeasure of TWINE against power analysis attack
573
Countermeasure research of green logistics development in Shandong province
574
Countermeasure research on black earth wind erosion factor and sustainable use
575
Countermeasure Researches on the Data Filtration and Intelligent Agent of Eigenfinite Strip
576
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference
577
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics
578
Countermeasure Study on E-government in China on the View of Public Satisfaction
579
Countermeasure technique to combat greedy behavior in ad-hoc wireless networks
580
Countermeasure Techniques for Deceptive Phishing Attack
581
Countermeasure techniques for SEED hardware modules against differential power analysis
582
Countermeasure to non-linear collusion attacks on spread spectrum fingerprinting
583
Countermeasure to the sustainable development of transportation under energy and environmental restriction
584
Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs
585
Countermeasures against Bernstein´s remote cache timing attack
586
Countermeasures Against Branch Target Buffer Attacks
587
Countermeasures against consistency anomalies in distributed integrated databases with relaxed ACID properties
588
Countermeasures Against Distributed Denial of Service Attacks
589
Countermeasures against EM analysis for a secured FPGA-based AES implementation
590
Countermeasures against energy-efficient jamming on wireless sensor networks
591
Countermeasures against fault attacks: The good, the bad, and the ugly
592
Countermeasures against High-Order Fault-Injection Attacks on CRT-RSA
593
Countermeasures against IRIS spoofing and liveness detection using Electroencephalogram (EEG)
594
Countermeasures against MAC address spoofing in public wireless networks using lightweight agents
595
Countermeasures against Multicast attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs
596
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
597
Countermeasures against traffic congestion caused by the newly opened Saga Airport
598
Counter-measures against traffic congestion in middle-sized cities
599
Countermeasures against voltage collapse based on apparent-power losses and local phasors
600
Countermeasures analysis about how to strengthen the self-innovation capability of the Chinese aviation industry
601
Countermeasures and Suggestions on the Performance Budgeting Reform in University
602
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability
603
Countermeasures Based on the Development of E-government Integration
604
Countermeasures Development for Marine Spills: A Review of Environment Canada´s Contribution
605
Countermeasures development in the physical security design process: an anti-terrorist perspective
606
Countermeasures for Covert Channel-Internal Control Protocols
607
Countermeasures for Human Resource Management under Financial Crisis
608
Counter-measures for relay failures due to dynamic welding: a robust engineering design
609
Countermeasures for self-excited torsional oscillations using reduced order robust control approach
610
Countermeasures for self-excited torsional oscillations using reduced order robust control approach
611
Countermeasures for substation equipment against various special phenomena in Japan´s longest (54 km) 66 kV AC cable transmission system
612
Countermeasures for traffic accidents due to road conditions in China
613
Countermeasures in curbing gambling activities on the Internet in Taiwan
614
Countermeasures in expanding the pioneering enterprises around the refocusing strategy on the core competitive power
615
Countermeasures in longterm spaceflights. Russian experience
616
Countermeasures of Agricultural E-commerce Development
617
Countermeasures of command and control (C2) capabilities in a hostile environment
618
Countermeasures of command and control (C2) capabilities in a hostile environment
619
Countermeasures of fast location of pipe bursts in Guangzhou based on neural network technology
620
Countermeasures on PFI Financing Mode in Urban Infrastructures
621
Countermeasures Research on Credit Problem in C2C E-Business
622
Countermeasures selection and integration: a delicate balancing act for the security designer
623
Countermeasures to Control Agricultural Non-Point Source Pollution in Headwaters of Taihu Lake Basin
624
Countermeasures to cope with waste electrical and electronic equipment in Guangxi
625
Countermeasures to Enhance Cyber-physical System Security and Safety
626
Counter-measures to photo attacks in face recognition: A public database and a baseline
627
Countermeasures to Protect Against Attacks from the Internet
628
Countermeasures to Solve the Obstacles to Enterprise Knowledge-Sharing
629
Countermeasures to Subsynchronous Resonance Problems
630
Countermeasures to threats from agent platform and malicious code check using dynamic policy file
631
Countermeasures to Vulnerability of Certificate Application in u-City
632
CounterMeasures: A game for teaching computer security
633
Countermine operations in very shallow water and surf zone: the role of bottom crawlers
634
Countermine: hand held and vehicle mounted mine detection
635
Counter-mixing mode integrated heterodyne transceivers
636
Countermodels from Sequent Calculi in Multi-Modal Logics
637
Counter-niching for constructive population diversity
638
Counterplanning deceptions to foil cyber-attack plans
639
Counterplanning deceptions to foil cyber-attack plans
640
Counterpoint Harmony Search: An accurate algorithm for the blind deconvolution of binary images
641
Counterpoint: Is Technology Overemphasized?
642
Counterpoise in mobile radiotelephony
643
Counterpoise tests at trafford
644
Counterpoise tests at trafford
645
Counterpoise tests at trafford
646
Counterpoise Tests at Trafford
647
Counterpoises for transmission lines
648
Counterpoises for transmission lines
649
Counterpoises for Transmission Lines
650
Counterpressure: the concept that made the indirect measurement of blood pressure possible
651
Counter-propagating difference frequency mixing in diamond with terahertz waves
652
Counter-propagating difference-frequency generation in diamond with terahertz fields
653
Counterpropagating entangled photons in a periodically poled nonlinear waveguide
654
Counterpropagating geometries in periodically poled crystals
655
Counter-propagating Lamb-wave pair for nondestructive evaluation
656
Counterpropagating photorefractive spatial solitons
657
Counter-propagating soliton interactions in photorefractive InP:Fe semiconductor
658
Counterpropagating Twin Photons in the Telecom Range: a Narrow-Bandwidth Semiconductor Source
659
Counterpropagating wave acoustic particle manipulation device for the effective manufacture of composite materials
660
Counter-propagating waves enhance maneuverability and stability: A bio-inspired strategy for robotic ribbon-fin propulsion
661
Counter-propagating whispering-gallery-modes of InGaAs/GaAs microtubes
662
Counterpropagating Whispering-Gallery-Modes of Rolled-up Semiconductor Microtubes
663
Counter-propagation interaction for contrast-enhanced ultrasound imaging
664
Counterpropagation network and time-frequency shift-tolerant preprocessing for phoneme recognition
665
Counterpropagation network based fault classification for double-circuit lines
666
Counterpropagation network for voltage contingency ranking exploiting coherency for feature selection
667
Counterpropagation Neural Network for Stochastic Conditional Simulation: An Application with Berea Sandstone
668
Counterpropagation neural networks for trademark recognition
669
Counterpropagation with delays for financial prediction
670
Counterpulsation: Theory and Practice
671
Counterreceiving heterodyne detection with an integrated coherent transceiver and its applications in bandwidth-on-demand access networks
672
Counter-Rotating Permanent Magnet Brushless DC Motor for Underwater Propulsion
673
Counter-Set Based PCR Jitter Correction Method for DVB-T System
674
Counter-strategy guided refinement of GR(1) temporal logic specifications
675
Counterstreaming Electron Beam Profile and Position Monitor
676
Counter-terrorism simulation framework
677
Countervailing power and upstream product innovation incentive
678
Counter-vandalism at NDBC
679
Counterweapon Aiming for Defense of a Moving Target
680
Counterweight-navigation of a mobile inspection robot working on the ground wires
681
Counting (on) an Aging Population
682
Counting All Possible Ancestral Configurations of Sample Sequences in Population Genetics
683
Counting all possible simple paths using Artificial Cell division mechanism for directed acyclic graphs
684
Counting and addition cannot express deterministic transitive closure
685
Counting and Classification of Highway Vehicles by Regression Analysis
686
Counting and classification system for ARC welding
687
Counting and cutting cycles of lines and rods in space
688
Counting and generating integer partitions in parallel
689
Counting and integrating readout for direct conversion X-ray imaging concept, realization and first prototype measurements
690
Counting and Integrating Readout for Direct Conversion X-ray Imaging: Concept, Realization and First Prototype Measurements
691
Counting and radius estimation of lipid droplet in intracellular images
692
Counting and Reporting Intersections of d-Ranges
693
Counting and tracking people in a smart room: An IoT approach
694
Counting animals using vocalizations; a case study in dolphins
695
Counting at Large: Efficient Cardinality Estimation in Internet-Scale Data Networks
696
Counting auxiliary pushdown automata and semi-unbounded arithmetic circuits
697
Counting axioms do not polynomially simulate counting gates
698
Counting balanced sequencesw/o forbidden patterns via the betheapproximation and loop calculus
699
Counting Beans
700
Counting bicycles using computer vision
701
Counting bits for distributed function computation
702
Counting bloom filters for pattern matching and anti-evasion at the wire speed
703
Counting Boolean networks are universal approximators
704
Counting bottlenecks to show monotone P≠NP
705
Counting Bugs is Harder Than You Think
706
Counting by DNA Self-Assembly in the Presence of Rotated Tiles
707
Counting Carbon
708
Counting cars by tracking moving objects in the outdoor parking lot
709
Counting cases in marching cubes: toward a generic algorithm for producing substitopes
710
Counting cases in substitope algorithms
711
Counting cells from microscopy videos without tracking individual cells
712
Counting chains, codes, and translations in dial pulse register circuits
713
Counting Circuits Employing Ferroelectric Devices
714
Counting circuits using ferroelectric devices
715
Counting classes are at least as hard as the polynomial-time hierarchy
716
Counting clustered cells using distance mapping
717
Counting Clustered Soybean Seeds
718
Counting collision-free transmissions in common-code SSMA communications
719
Counting complex roots in polynomials with real coefficients
720
Counting Constituents in Molecular Complexes by Fluorescence Photon Antibunching
721
Counting credibility based cooperative spectrum sensing algorithm
722
Counting Crowded Moving Objects
723
Counting cycles in an undirected graph using DFS-XOR algorithm
724
Counting Data Stream Based on Improved Counting Bloom Filter
725
Counting Dependence Predictors
726
Counting distance permutations
727
Counting Distance Permutations
728
Counting distributions and error probabilities for optical receivers incorporating superlattice avalanche photodiodes
729
Counting down to weee-day
730
Counting Down to Zero Software Failures
731
Counting Ear Rows in Maize Using Image Process Method
732
Counting eigenvalues of Schrödinger operator with δ-potential supported by loop
733
Counting electrons one by one - overview of a joint European research project
734
Counting electrons one by one-overview of a joint European research project
735
Counting Evolving Data Stream Based on Hierarchical Counting Bloom Filter
736
Counting Extended Irreducible Binary Quartic Goppa Codes of Length 2^{n}+1
737
Counting Gates, Moving Qubits: Evaluating the Execution Cost of Quantum Circuits
738
Counting Heartbeats at a Distance
739
Counting in Anonymous Dynamic Networks under Worst-Case Adversary
740
Counting in Delay-Tolerant Mobile Networks
741
Counting in Graph Covers: A Combinatorial Characterization of the Bethe Entropy Function
742
Counting in Intracellular Images Using Partial Least Squares Regression and Correlation between Features
743
Counting interface automata and their application in static analysis of actor models
744
Counting intrinsic localized modes in an antiferromagnet
745
Counting lattice points on ellipsoids: application to image coding
746
Counting leukocytes from whole blood using a lab-on-a-chip Coulter counter
747
Counting lightning flashes
748
Counting List Matrix Partitions of Graphs
749
Counting LTL
750
Counting Markov Types, Balanced Matrices, and Eulerian Graphs
751
Counting method of heterotrophic bacteria based on image processing
752
Counting methodologies of Greenhouse Gases (GHG) emission in highway life cycle
753
Counting minimal generator matrices
754
Counting module quantifiers on finite linearly ordered trees
755
Counting moles automatically from back images
756
Counting Moving Bodies Using Sparse Sensor Beams
757
Counting Moving People in Videos by Salient Points Detection
758
Counting multi-colored objects using active search
759
Counting NATted hosts by observing TCP/IP field behaviors
760
Counting network flows in real time
761
Counting neutrons from the spontaneous fission of 238U using scintillation detectors and mixed field analysers
762
Counting number of points for acne vulgaris using UV Fluorescence and image processing
763
Counting number of sweat glands using image processing
764
Counting objects in an image by marker controlled watershed segmentation and thresholding
765
Counting objects with biologically inspired regulatory-feedback networks
766
Counting occurrences of textual words in lecture video frames using Apache Hadoop Framework
767
Counting of cigarettes in cigarette packets using LabVIEW
768
Counting of deep-level traps using a charge-coupled device
769
Counting of Frozen Semen Straws Using Image Processing
770
Counting of satellites with direct GNSS signals using Fisheye camera: A comparison of clustering algorithms
771
Counting of Video Clip Repetitions using a Modified BMH Algorithm: Preliminary Results
772
Counting on a cool Tokyo summer
773
Counting on computers in DSP education
774
Counting on Today´s Students
775
Counting Partial Spread Functions in Eight Variables
776
Counting Paths: Nondeterminism as Linear Algebra
777
Counting Pedestrian in Crowded Subway Scene
778
Counting pedestrians and bicycles in traffic scenes
779
Counting pedestrians and cars with an improved virtual gate method
780
Counting pedestrians in crowded scenes with efficient sparse learning
781
Counting Pedestrians in Video Sequences Using Trajectory Clustering
782
Counting people by clustering person detector outputs
783
Counting people from multiple cameras
784
Counting people in crowd open scene based on grey level dependence matrix
785
Counting People in Crowded Environments by Fusion of Shape and Motion Information
786
Counting people in crowded scenes by video analyzing
787
Counting people in crowds with a real-time network of simple image sensors
788
Counting People in Groups
789
Counting People in the Crowd Using a Generic Head Detector
790
Counting People With Low-Level Features and Bayesian Regression
791
Counting people with support vector regression
792
Counting Predicates, Subset Surjective Functions, and Counting CSPs
793
Counting Problems and Clones of Functions
794
Counting Problems on Graphs: GPU Storage and Parallel Computing Techniques
795
Counting prognostication technique and results at 2.048 Mbit/s desynchronizer output for SDH equipment
796
Counting quanta: The physics of photon statistics
797
Counting quantifiers, successor relations, and logarithmic space
798
Counting rate performance measurement of newly developed Si/CdTe Compton camera for biological and medical applications
799
Counting Rates Modeling for PET Scanners With GATE
800
Counting rational points on curves over finite fields
801
Counting Responders in an Associative Memory
802
Counting RFID Tags Efficiently and Anonymously
803
Counting Schemes for Nuclear Data Acquisition on Small Computers
804
Counting sequences
805
Counting sequences obtained from the synchronization channel
806
Counting Sequences with Large Local Distance
807
Counting SFQ analog to digital converter results
808
Counting Short Cycles of Quasi Cyclic Protograph LDPC Codes
809
Counting single electrons in a CMOS circuit
810
Counting sort for the live migration of virtual machines
811
Counting Sounds: An ICT Musical Approach for Teaching the Concept of the Angle in Kindergarten
812
Counting ssDNA on a single nanoparticle
813
Counting stable equilibria of cellular neural networks-A graph theoretic approach
814
Counting stable states and sizes of attraction domains in Hopfield nets is hard
815
Counting statistics of single electron transport through a double quantum dot
816
Counting Steel Rods Online Using LQV Neural Network in Real-time Images
817
Counting steps using impact oscillator model
818
Counting stream registers: An efficient and effective snoop filter architecture
819
Counting surrounding nodes using DS-SS signals and De Bruijn sequences in blind environment
820
Counting targets with MHT and CPHD
821
Counting the cost - [manufacturing offshore]
822
Counting the cost [enterprise resource planning]
823
Counting the cost of a.t.e.
824
Counting the cost of IT projects
825
COUNTING THE COST OF MISINFORMATION - TRADITIONAL ECONOMIC COUNTING METHODS CAN OFTEN CREATE THE WRONG IMPRESSION OF PERFORMANCE
826
Counting the cost of rf system-on-chip
827
Counting the costs of going green - [power renewables]
828
Counting the cycles of light with an optical microresonator
829
Counting the cycles: a comparative study of NFS performance over high speed networks
830
Counting the degrees of freedom when using AIC and MDL to detect signals
831
Counting the line
832
Counting the number of blobs in an image
833
Counting the number of cells in immunocytochemical images using genetic algorithm
834
Counting the number of classes in a fuzzy set
835
Counting the number of minimum cuts in undirected multigraphs
836
Counting the Number of Perfect Matchings in K5-Free Graphs
837
Counting the number of spanning trees of generalization Farey graph
838
Counting the primes using entropy
839
Counting the real cost of disputes
840
Counting the weapons: Many top secret eyes in the skies keep vigil over Soviet weponry: Just how sharp are they?
841
Counting to ten and reaching out
842
Counting traffic using optical flow algorithm on video footage of a complex crossroad
843
Counting triangles in real-world graph streams: Dealing with repeated edges and time windows
844
Counting twig matches in a tree
845
Counting two types of quadrangulations: Rooted near quadrangulations on the disc and nonseparable outerplanar quadrangulations
846
Counting two-state transition-tour sequences
847
Counting up of linear lumped parameter systems and their unified representation
848
Counting Vehicles from Semantic Regions
849
Counting Vehicles in Highway Surveillance Videos
850
Counting vehicles: Learning from animal population estimation
851
Counting volcanoes on Venus: comparison between humans, computers and theory
852
Counting with Feedback Shift Registers by Means of a Jump Technique
853
Counting with Fuzzy Sets
854
Counting with Majority-Logic Networks
855
Counting with Nonlinear Binary Feedback Shift Registers
856
Counting with Population Protocols
857
Counting with Relays
858
Counting with relays
859
Counting with TinyTable: Every bit counts!
860
Count-Rate Dependent Component-Based Normalization for the HRRT
861
Count-rate dependent event mispositioning and NEC in PET
862
Count-rate dependent event mispositioning and NEC in PET
863
Count-rate dependent resolution degradation from pulse pile-up on the HRRT
864
Count-rate dependent sensitivity in position-sensitive photomultiplier tubes
865
Count-Rate Performance of the Discovery STE PET Scanner Using Partial Collimation
866
Countrate Performances Of TTV03, The CEA-LETI Time-of-flight Positron Emission Tomograph.
867
Count-rate statistics for drift detectors
868
Count-Regulated OSEM reconstruction
869
Countries Co-citation Network and Research Fronts of International Energy Technology
870
Country characteristics: effects on process and technology decisions of selected Western firms in China and the Philippines
871
Country girl makes good
872
Country image and service quality of the higher education industry - Chinese students´ enrollment in an offshore program
873
Country is always hungry for more electric power
874
Country land-use planning mapping based on Mapgis
875
Country of origin determination via Web mining techniques
876
Country of origin estimation from composite faces using Kernel Principal Compenent Analysis
877
Country report
878
Country risk premium development — Case study Croatia
879
Country specific developments: the Norwegian network for IT-research and competence in education: semantic web and wireless networks in teacher education
880
Country study on renewable energy sources in Turkey
881
Countryside elder care system
882
County economic spatial autocorrelation research of Wanjiang Urban Belt in Anhui, China
883
County emergency medical communications in a high density urban area with dynamic frequency assignments
884
County Innovation System Efficiency Prediction Based on Support Vector Machine: Evidence from China
885
County Level of Basic Public Services Classification Based on Support Vector Machine: Taking Guanzhong Urban Agglomeration as the Example
886
County level of urbanization quality classification based on support vector machine
887
County Level Prime Farmland Plot Evaluating and Planning in China: A Case Study in Shunyi District, Beijing
888
County Magistrate Leadership Behaviors and County Government Performance: Mediating Effect of Subordinate Trust
889
County Sustainable Development and Management in Gansu Loess Plateau Based on Emergy Analysis--Taking Zhengning County in Gansu Province as an Example
890
County-wide communications systems utilizing simulcasting technique
891
Coup de fouet based VRLA battery capacity estimation
892
CoUPE: Continuous Query Processing Engine for Evolving Graphs
893
Couplant free UT of laser weld joints of thin sheets using guided waves and EMAT´s
894
Couple passive voltage contrast with scanning probe microscope to identify invisible defect out
895
Couple satellite sensor web service with WRF model for weather decision service
896
Coupled 2-D and 3-D Eddy Current Analyses for Evaluating Eddy Current Loss of a Permanent Magnet in Surface PM Motors
897
Coupled 2D Telegrapher´s equations for PDN analysis
898
Coupled 2D/3D transport: Analysis of graphene-SiC devices
899
Coupled 3-D Analysis Employing FEM and Particle Method—Experimental Verification of Cold Crucible Induction Melting
900
Coupled 3D electromagnetic, structural, and thermal finite element analysis as integral components of electronic product design
901
Coupled 3D opto-mechanically study of a free-space optical intra-chip interconnect module
902
Coupled 3D thermo-electro-mechanical simulations of microactuators
903
Coupled 3D tracking and pose optimization of rigid objects using particle filter
904
Coupled 3D-2D model for heat equation
905
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation
906
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation
907
Coupled accelerated stress tests for comprehensive field reliability — Synergistic effects of moisture and temperature cycling
908
Coupled acoustic mode propagation through continental-shelf internal solitary waves
909
Coupled active and reactive power flow: a scheduling and despatch tool
910
Coupled active power dispatch with FACTS devices and specified power flow control constraints
911
Coupled adaptive filters for acoustic echo control and noise reduction
912
Coupled adaptive prediction and system identification: a statistical model and transient analysis
913
Coupled add-drop ring resonator for highly sensitive sensing
914
Coupled AGC-Costas Loops with AM/PM Conversion
915
Coupled Analysis and Protection of the HTS DC Magnet for DC Induction Heater in Dynamic Disturbance
916
Coupled Analysis Method for High-Field Magnet Coil Using Coated Conductor Based on J\\hbox {-}E Characteristics as a Function of Temperature, Magnetic Field Vector and Mecha
917
Coupled Analysis Method for Linear Oscillatory Actuator Driven by Motor
918
Coupled Analysis Method of Electromagnetic Wave Propagation and Heat Conduction with Temperature-Dependent Nonlinear Permittivity
919
Coupled Analysis Method of Temperature, Voltage and Magnetic Field for Motors Using 3-D Finite Element Method
920
Coupled analysis of a 3-phase linear actuator
921
Coupled analysis of brushless DC motor using finite elements method & back electromotive force detecting electrical circuits
922
Coupled Analysis of Electromagnetic Vibration Energy Harvester With Nonlinear Oscillation
923
Coupled Analysis of Quasi-static and Full-Wave Solution towards IC, Package and Board Co-design
924
Coupled analysis of the film-cooling and infrared characteristics of an axisymmetric vectoring exhaust nozzle
925
Coupled analysis on multi-physics of turbo-generator used in IGCC power station
926
Coupled analytical and 3D numerical thermal analysis of a TEFC induction motor
927
Coupled and decoupled actuation of robotic mechanisms
928
Coupled and Decoupled Nonlinear Control of Generator Excitation and SVC
929
Coupled and decoupled super absorbing metasurfaces depending on spacer thickness
930
Coupled and Energy Trapped Thickness Vibrations in Piezoelectric Crystal Plates
931
Coupled antenna arrays with enhanced angular resolutions
932
Coupled antenna scheme using filter design techniques and tunable resonators to show simultaneous transmit and receive
933
Coupled Antennas
934
Coupled Antennas and Transmission Lines
935
Coupled antennas in a dissipative medium
936
Coupled Approach for Reliability Study of Fully Self Aligned SiGe: C 250GHz HBTs
937
Coupled Approach for Reliability Study of Fully Self Aligned SiGe:C 250GHz HBTs
938
Coupled arc discharge models in the TLM method
939
Coupled atomistic 3D process/device simulation considering both line-edge roughness and random-discrete-dopant effects
940
Coupled Attribute Similarity Learning on Categorical Data
941
Coupled Auto-Associative Neural Networks for Heterogeneous Face Recognition
942
Coupled axisymmetric analytical and finite element analysis for induction devices having moving parts
943
Coupled azimuthal potentials for electromagnetic field problems in inhomogeneous axially symmetric media
944
Coupled back-strapped bar-line analysis for low-noise CFA´s
945
Coupled bars in rectangular coaxial
946
Coupled basis learning and regularized reconstruction for BCG artifact removal in simultaneous EEG-FMRI studies
947
Coupled Bayesian Framework for Dual Energy Image Registration
948
Coupled Behavior Analysis with Applications
949
Coupled BEM and FEM analysis of functionally graded underfill layers in electronic packages
950
Coupled Bias–Variance Tradeoff for Cross-Pose Face Recognition
951
Coupled Binary Embedding for Large-Scale Image Retrieval
952
Coupled bipolar transistors as very robust ESD protection devices for automotive applications
953
Coupled Bloch-phonon modes in superlattices
954
Coupled Bloch-phonon oscillations in biased InGaAs/InAlAs superlattices
955
Coupled Brownian motors: The entropic mechanism
956
Coupled B-snake grids and constrained thin-plate splines for analysis of 2-D tissue deformations from tagged MRI
957
Coupled B-spline active geometric functions for myocardial segmentation: A localized region-based approach
958
Coupled bulk acoustic wave resonator filters: key technology for single-to-balanced RF filters
959
Coupled bunch dipole mode measurements of accelerating beam in the Fermilab Booster
960
Coupled Bunch Instability Caused by Electron Cloud
961
Coupled bunch motion in large size rings
962
Coupled canonical grid/discrete dipole approach for computing scattering from objects above or below a rough interface
963
Coupled carrier-field Monte-Carlo analysis of mid-IR quantum cascade lasers
964
Coupled carrier-phonon dynamics in light emitting quantum-dot heterostructures: switch on dynamics and carrier heating
965
Coupled cavities by rods (TWTs)
966
Coupled cavity InGaAsP/InP laser for synthetic optical coherence tomography and other applications
967
Coupled cavity laser with Michelson-interferometer
968
Coupled cavity lasers incorporating Bragg mirrors
969
Coupled cavity modelocking of a Nd:YAG laser using second harmonic generation
970
Coupled cavity modes in photonic molecules
971
Coupled cavity phenomena within MEMS-tunable long-wavelength VCSELs
972
Coupled cavity tunable semiconductor diode lasers incorporating multi-layer mirrors
973
Coupled Cavity Waveguides Consisting of Two-Dimensional Electromagnetic Crystals Formed by Rectangular Cylinders
974
Coupled Cavity Waveguides of Photonic Crystal Consisting of Magnetized Ferrite Medium
975
Coupled chaotic dynamical system and the solution for gambling game problems
976
Coupled chaotic simulated annealing processes
977
Coupled Chaotic Tent Map Lattices System with Uniform Distribution
978
Coupled Characteristics of A Sapphire Quasioptical Dielectric Resonator to the Microstrip Line
979
Coupled charge-spin correlations in the pyrochlore Tl2Mn2O7 probed by ultrafast mid-infrared spectroscopy
980
Coupled circuit, field and temperature model of an induction plasma installation
981
Coupled circuit-electromagnetic simulation using time domain integral equation
982
Coupled circuit-electromagnetic simulation with time domain integral equations
983
Coupled Circuits Time and Frequency Analysis
984
Coupled Circuits," Published in the "Proceedings of the Institute of Radio Engineers," June, 1924
985
Coupled Circular Cavities for Transit-Time Microwave Tubes
986
Coupled Circular Cylindrical Rods Between Parallel Ground Planes
987
Coupled Clocks, Or Pulse-to-pulse Instabilities Of Modelocked Lasers
988
Coupled clustering ensemble: Incorporating coupling relationships both between base clusterings and objects
989
Coupled coil sensor for detecting surface corrosion on steel reinforcement
990
Coupled Command Generator For A Tethered AUV System
991
Coupled Composite Right/Left-Handed Leaky-Wave Transmission Lines Based on Common/Differential-Mode Analysis
992
Coupled Computation of Electric Motor Design and Control Parameters Based on Ant Colonies Speed Trajectory Optimization
993
Coupled Computational Fluid Dynamics and Heat Transfer Modeling of the Effects of Wind Speed and Direction on Temperature Increase of an Ice-Covered FRP Live-Line Tool
994
Coupled computational intelligence and time-domain method for design of the microwave devices
995
Coupled Contour and Thickness Shear Vibrations
996
Coupled control between pH and level of a process with multititrated concentrations by input/state linearization
997
Coupled control of human-exoskeleton systems: An adaptative process
998
Coupled controller for energy saving in building automation based on a thermodynamic and illumination model
999
Coupled Controls-Computational Fluids Approach for the Estimation of the Concentration From a Moving Gaseous Source in a 2-D Domain With a Lyapunov-Guided Sensing Aerial Vehicle
1000
Coupled coplanar waveguide with anisotropic substrate
بازگشت