<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Return stroke current during Shandong artificially triggered lightning from 2005–2009
2
Return stroke current remote sensing, based on solving an inverse ill-posed problem
3
Return stroke currents of triggered lightning in Guangdong, China
4
Return to cambridge
5
Return to engineering: Education reform to foster applied innovative software talents
6
Return to Europa: Overview of the Jupiter Europa Orbiter mission
7
Return to humanity, reproduce harmony—to analysis the methods of humanity of innovative product design
8
Return to Mercury: the MESSENGER spacecraft and mission
9
Return to rock [Power Geothermal]
10
Return to service time evaluation model
11
Return to the emergence of an early man civilization: Thinking skills approach
12
Return to the tradition: DIY design
13
Return to work behavior of people with disabilities: A multi-method approach
14
Return via connections for extending signal link path bandwidth of via transitions
15
Return via location optimization to minimize mode conversion in differential via transitions
16
Return Voltage Measurements - a good tool for the diagnosis of paper-oil insulations
17
Return voltage measurements - the step from experimental data to a relevant diagnostic interpretation
18
Return voltage measurements of oil impregnated paper insulated transformers
19
Return voltage measurements on metal oxide surge arresters
20
Return voltage measurements on paper insulation of windings and cables
21
Return voltage measurements: Theory and applications to charge injection monitoring
22
Return voltage-a reliable diagnosis for water treed cables?
23
Return-beam-induced oscillations in self-coupled semiconductor lasers
24
Return-difference and return-ratio matrices and their use in analysis and design of multivariable feedback control systems
25
Return-difference and return-ratio matrices and their use in analysis and design of multivariable feedback control systems
26
Return-difference matrix properties for optimal stationary Kalman-Bucy filter
27
Return-difference measurement in transistor feedback amplifiers
28
Return-difference-matrix properties for optimal stationary discrete Kalman filter
29
Returning Clustered Results for Keyword Search on XML Documents
30
Returning Home: A New Chapter in Semahat Demir’s Career
31
Returning to My Inner Nerd: Following the "Social" Disruption of Computing
32
Returning to the Baltic Proper: More questions than answers?
33
Return-limited inductances: a practical approach to on-chip inductance extraction
34
Return-limited inductances: a practical approach to on-chip inductance extraction
35
Return-Link Code Acquisition for 1-D and 2-D With DS-CDMA for High-Capacity Multiuser Systems
36
Return-loss investigation of the equivalent width of substrate-integrated waveguide circuits
37
Return-loss minimization of package interconnects through input space mapping using FEM-based models
38
Return-loss-suppressed electroabsorption modulator with novel transmission line electrodes on conductive substrate
39
Return-map for semiconductor lasers with optical feedback
40
Return-map-based approaches for noncoherent detection in chaotic digital communications
41
Return-on-Investment (ROI) for Electronic Prognostics in High Reliability Telecom Applications
42
Return-on-investment (ROI) for electronic prognostics in mil/aero systems
43
Return-on-Investment potential for US Army missile health monitoring
44
Return-Oriented Programming
45
Return-Oriented Programming Attack on the Xen Hypervisor
46
Return-oriented vulnerabilities in ARM executables
47
Return-Path Extraction Technique for SSO Analysis of Low-Cost Wire-Bonding BGA Packages
48
Return-roll stacker
49
Returns Acquiring and HRRP Imaging for Radar Ship Target Recognition
50
Returns Management Information System: A Case of Paint Manufacturers
51
Returns on 1954 employment questionnaire
52
Returns policy in supply chain with fuzzy demand
53
Returns to College Education in China
54
Return-Stroke Model Segmentation and its Application to Lightning-Induced Surges Calculation
55
Return-to-base navigation of robotic swarms in Mars exploration using DoA estimation
56
Return-to-center control of electric power steering
57
Return-to-One DIMS logic on 4-phase m-of-n asynchronous circuits
58
Return-to-one protocol for reducing static power in C-elements of QDI circuits employing m-of-n codes
59
Return-to-site of an AUV using terrain-relative navigation: Field trials
60
Return-to-the-origin probability imaging as indicator of local necrosis
61
Return-to-zero modulation with electrically continuously tunable duty cycle using single NRZ modulator
62
Return-to-zero modulator using a single NRZ drive signal and an optical delay interferometer
63
Return-to-Zero Pulse Generators Using Overdriven Amplitude Modulators at One Fourth of the Data Rate
64
Return-to-zero quaternary differential-phase amplitude-shift-keying for long-haul transmission
65
Return-to-zero technique for eliminating wavelength abnormalities in high-power DBR lasers
66
Return-to-zero transmitter for WDM-PONs using incoherent-light-injected fabry-perot laser diodes
67
Retweet Behavior Prediction in Twitter
68
Retweet Modeling Using Conditional Random Fields
69
ReTweeting analysis and prediction in microblogs: An epidemic inspired approach
70
Re-tweeting and the Theory of Middle-Status Conformity in the Post-adoption Use of Twitter
71
Retweeting: A study of message-forwarding in twitter
72
RETWINE: a new distributed environment for microelectronics instrumentation learning and measurement
73
Reuben Frederick Winder
74
Reuben Marchant Sayers
75
ReUML: a UML Profile for Modeling and Verification of Reactive Systems
76
RE-UML: An Extension to UML for Specifying Component-Based Software System
77
Reunderstanding slice sampling as parallel MCMC
78
Reunion of “eighty-niners”
79
Reunion: Complexity-Effective Multicore Redundancy
80
REUNITE: a recursive unicast approach to multicast
81
Reusability and Interoperability in Mobile Learning: A Study of Current Practices
82
Reusability and requirements engineering in intelligent systems
83
Reusability as a strategic management practice in the computer industry
84
Reusability assessment of financial card readers´ security mechanisms in process control devices
85
Reusability assessment of test collections with multi-levels of judgments
86
Reusability before and after reuse: a Darwin case study
87
Reusability Comes of Age
88
Reusability Framework, Assessment, and Directions
89
Reusability hypothesis verification using machine learning techniques: a case study
90
Reusability in AOSD - The aptness, assessment and analysis
91
Re-usability in complex event pattern monitoring
92
Reusability in e-Assessment: Towards a Multifaceted Approach for Managing Metadata of e-Assessment Resources
93
Reusability in practice for Remote Laboratories
94
Reusability in Programming: A Survey of the State of the Art
95
Reusability Issues and Ada
96
Reusability metrics for software components
97
Reusability of FEA software: A program family approach
98
Reusability of mathematical software: a contribution
99
Reusability of spectrum in Cognitive radio network using threshold
100
Reusability techniques in load-flow analysis computer program
101
Reusability Through Program Transformations
102
Reusability: a technique for the design of HUMS architectures
103
Reusability: The Case for Object-Oriented Design
104
Reusability-based Semantics for Grasp Evaluation in Context of Service Robotics
105
Reusability-the major promise and challenge of the object oriented approach
106
Reusable active learning system for improving the knowledge retention and better knowledge management
107
Reusable Ada avionics software packages library system
108
Reusable alkaline battery system from Rayovac (Renewal)
109
Reusable and design independent memory controller scoreboard using memory data hazard checks
110
Reusable and Extensible Fault Tolerance for RESTful Applications
111
Reusable and flexible design of communication gateways
112
Reusable and flexible verification methodology from architecture to RTL design
113
Reusable and interoperative specifications for OERs based on Standards
114
Reusable and mobile content at the multicultural school of Athens
115
Reusable Architectural Decision Models for Quality-Driven Decision Support: A Case Study from a Smart Cities Software Ecosystem
116
Reusable Architecture and Complexity-Controllable Algorithm for the Integer/Fractional Motion Estimation of H.264
117
Reusable architecture for data-centric network management systems
118
Reusable architecture for embedded software of Smart Energy HAN devices
119
Reusable architecture templates and automatic specification mapping for the efficient implementation of ATM protocols
120
Reusable Architectures And Intellectual Property
121
Reusable aspect components for web applications
122
Reusable avionics software. Evolution of the flight management system
123
Reusable Bacteriophage Adhesin-Coated Long-Period Grating Sensor for Bacterial Lipopolysaccharide Recognition
124
Reusable binary-paired partitioned neural networks for text-independent speaker identification
125
Reusable burn-in carrier system for cut die
126
Reusable business tier architecture driven by a wide typed service
127
Reusable CNTs-based chemical sensors
128
Reusable common module software for embedded systems
129
Reusable Component Analysis for Component-Based Embedded Real-Time Systems
130
Reusable component IP design using refinement-based design environment
131
Reusable component retrieval for real-time applications
132
Reusable Components Design for Embedded Digital Instrumentation Software Systems
133
Reusable components for artificial intelligence in computer games
134
Reusable components for developing security-aware applications
135
Reusable components for evolving systems
136
Reusable components in a health care information system
137
Reusable Components Retrieval Based on Faceted Classification with Sem-library in Domain Component Library
138
Reusable context pipelining for low power coarse-grained reconfigurable architecture
139
Re-usable cores for DSP systems-on-chip applications
140
Reusable Cost-Based Scheduling of Grid Workflows Operating on Higher-Order Components
141
Reusable cryptographic VLSI core based on the SAFER K-128 algorithm with 251.8 Mbit/s throughput
142
Reusable data structures for C [Book Review]
143
Reusable DCT architecture for parallel processing of Y, U and V transforms in HEVC
144
Reusable design of run length coder for image compression application
145
Reusable dialog component for content selection from large data sets
146
Reusable dynamic programming:Updating sequence alignment
147
Reusable e-learning development: case studies, practices and issues of awareness for knowledge-based organisations
148
Reusable electronics and adaptable communication as implemented in the odin modular robot
149
Reusable embedded debugger for 32 bit RISC processor using the JTAG boundary scan architecture
150
Reusable embedded in-circuit emulator
151
Reusable embedded software platform for versatile camera systems
152
Reusable event types for models at runtime to support the examination of runtime phenomena
153
Re-usable features in a hierarchical concept network for autonomous learning in complex games
154
Reusable Formal Models for Secure Software Architectures
155
Reusable Formal Specification for Embedded Systems
156
Reusable framework for the development of adaptive games
157
Reusable functional composition patterns for Web services
158
Reusable hardware and software model for remote supervision of industrial Automation Systems using web technologies
159
Reusable high-frequency electrodeless QCM biosensor with a bare quartz resonator embedded in a silicon microchannel
160
Reusable hybrid force-velocity controlled motion specifications with executable Domain Specific Languages
161
Reusable industrial control systems
162
Reusable integrated components of inter-related patterns for software development
163
Reusable integrity management services for embedded systems
164
Reusable intellectual property cores in PC data protection ASIC design
165
Reusable interactions for animation
166
Reusable IO technique for improved utility of IC test circuit area
167
Reusable IP cores library for EV propulsion systems
168
Re-usable kinematic models and algorithms for manipulators and vehicles
169
Reusable knowledge by linkage-classifier in Accuracy-based Learning Classifier System
170
Reusable knowledge for satisficing usability requirements
171
Reusable Knowledge from Symbolic Regression Classification
172
Reusable launch vehicle attitude control using a time-varying sliding mode control technique
173
Reusable Launch Vehicle lateral control design on suborbital reentry
174
Reusable launch vehicle trajectory control in sliding modes
175
Re-usable launch vehicles based on high velocity mass capture
176
Reusable Libraries for Safety-Critical Java
177
Reusable low-error compressive sampling schemes through privacy
178
Reusable message passing components
179
Reusable mobile agents for cluster computing
180
Reusable Model Transformation Patterns
181
Reusable modeling capabilities for simulating high volume electronics manufacturing systems
182
Reusable models: Making your models more user-friendly
183
Reusable modules for high-content 3D and 4D image analysis
184
Reusable multimedia content in Web based learning systems
185
Reusable Multimedia Course in Electronics Case Study
186
Reusable Objects: Learning Object Creation Cycle
187
Reusable On-chip Communication architecture of Modular Hardware Accelerator (HA)
188
Reusable On-Chip System Level Verification for Simulation Emulation and Silicon
189
Reusable online learning resources: problems, solutions and opportunities
190
Re-usable packaging [for magnet wires]
191
Reusable platform design methodology for SoC integration and verification
192
Reusable process patterns for collaborative work environments in AEC
193
Reusable project-specific software for industrial control
194
Re-Usable Resources in Wireless Sensor Networks: A Linear Optimization for a Novel Application Overlay Paradigm over Multiple Networks
195
Reusable rule patterns of model transformation in QVT Operational Mappings language
196
Reusable Security Requirements for Healthcare Applications
197
Reusable security use cases for mobile grid environments
198
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
199
Reusable silicon IP cores for discrete wavelet transform applications
200
Reusable SOA Assets Identification Using E-Business Patterns
201
Reusable software components based on an agent model
202
Reusable Software Framework for Electronic Power Load Management Based on Components
203
Reusable SOLS structures for DSRC Communications
204
Reusable Specification of Agent-Based Models
205
Reusable strategies for software agents via the subsumption architecture
206
Reusable SW Requirements Development Process: Embedded SW Industry Experiences
207
Reusable SystemVerilog-UVM design framework with constrained stimuli modeling for High Energy Physics applications
208
Reusable template for product database development
209
Reusable templates of human performance in space shuttle procedures
210
Reusable test environments for digital designs
211
Reusable test executive and test programs methodology and implementation comparison between HP VEE and LabView
212
Reusable Test Models and Application Based on Z Specification
213
Reusable tool for 300mm intrabay AMHS modeling and simulation
214
Reusable Tools for Metadata Management - Pie in the Sky?
215
Reusable Ultrasonic Tissue Mimicking Hydrogels Containing Nonionic Surface-Active Agents for Visualizing Thermal Lesions
216
Reusable VHDL Architectures for Induction Motor PWM Vector Control, targeting FPGAs
217
Reusable XGFT interconnect IP for network-on-chip implementations
218
Reusable, Interactive, Multilingual Online Avatars
219
Reusable, Low-cost, and Flexible Multidrop System JTAG Architecture
220
Reusable, modular, and scalable flight software
221
Reuse and cooperation in e-learning systems
222
Re-use and exchange of an Opensim platform based learning environment among different medical specialties for clinical scenarios
223
Reuse and integration of healthcare information for subjects in a clinical trial for treatment of recurrent respiratory papillomatosis
224
Reuse and lifetime extension strategies in the context of technology innovations, global markets, and environmental legislation [electronics]
225
Reuse and protection of intellectual property in the SpecC system
226
Reuse and recycling for sustainability (research on Product Life-Cycle Management using Cognitive Info-communications)
227
Reuse and reengineering of multitasking real-time applications in LACATRE
228
Reuse and Refactoring of GPU Kernels to Design Complex Applications
229
Reuse at the enterprise, national and international level
230
Reuse cluster size selection for a mobile packet radio system
231
Reuse concepts and a reuse support repository
232
Reuse distance analysis for locality optimization in loop-dominated applications
233
Reuse Distance Based Circuit Replacement in Silicon Photonic Interconnection Networks for HPC
234
Reuse Distance for an Ofdma-Based Cellular System
235
Reuse economics: a comparison of seventeen models and directions for future research
236
Reuse economy under inter-regional perspective: Model, economic efficiency and policy implications
237
Reuse efficiency for non-uniform traffic distributions in CDMA systems
238
Reuse efficiency in a quasi-real CDMA network
239
Reuse efficiency in urban microcellular networks
240
Reuse efficiency in urban microcellular networks
241
Reuse Efficiency of Point-To-Point Connections in Ad Hoc Networks
242
Reuse engineering: software construction from reusable components
243
Reuse environments for software artifacts: Analysis framework
244
Reuse factors in embedded systems design
245
Reuse facts and myths
246
Reuse historic costs in dynamic programming to reduce computational complexity in the context of model predictive optimization
247
Reuse in Command-and-Control Systems
248
Reuse in Digital Game Development
249
Reuse in model-based systems engineering
250
Reuse in replaying database design
251
Reuse in reverse engineering
252
Reuse in Safety Critical Systems: Educational Use Case
253
Reuse in Safety Critical Systems: Educational Use Case Final Results
254
Reuse in Safety Critical Systems: Educational Use Case First Experiences
255
Reuse in software engineering: an object-oriented perspective
256
Reuse in system-level stimuli-generation
257
Reuse in Systems Engineering
258
Reuse in the eye of its beholder: cognitive factors in software reuse
259
Reuse Interaction Protocols to Develop Interactive Agents
260
Reuse issues in SoC verification platform
261
Reuse issues on the verification of embedded MCU cores
262
Reuse level metrics
263
Reuse Library Interoperability and The World Wide Web
264
Reuse Metrics for Object-Oriented Method
265
Reuse of a geometric model for shape approximation
266
Reuse of a HW/SW coverification environment during the refinement process of a functional C model down to an executable HW/SW specification
267
Reuse of addressable system bus for SOC testing
268
Re-use of an ontology for modelling urban energy systems
269
Reuse of analogous specifications during requirements analysis
270
Reuse of architecturally derived Standards Requirements
271
Reuse of bibliography in a database using customized output rule
272
Reuse of CAN-Based Legacy Applications in Time-Triggered Architectures
273
Reuse of Coagulation Sludge: Removal of Color and COD from Soy Sauce Wastewater by Coagulation
274
Reuse of common elements of a corrector power supply design to develop a dissipative shunt regulator design
275
Reuse of components in formal modeling and verification of distributed control systems
276
Reuse of conceptual requirement specifications
277
Reuse of design integration tests for factory testing
278
Reuse Of Design Objects In Cad Frameworks
279
Reuse of design processes based on domain analysis
280
Reuse of EEE/WEEE in UK: Review on functionality of EEE/WEEE at the point of disposal
281
Reuse of embedded software in small and medium enterprises
282
Re-use of end-of-life electronic equipment and components-logistic aspects
283
Reuse of Europeana metadata for geo-location services
284
Reuse of existing design information in the development of new electronic PTC devices via a neural network approach
285
Reuse of existing resources for analog BIST of a switch capacitor filter
286
Re-use of existing simulation models for DCS engineering via the Functional Mock-up Interface
287
Re-use of existing system protection concerns and interconnection rules for integration of future Distributed Generation
288
Reuse of flexible hardware modules for practical implementation of intra H.264/SVC video encoder
289
Re-use of formatted requirements specifications
290
Reuse of fractional waveform libraries for MIMO radar and electronic countermeasures
291
Re-use of GaAs substrates for epitaxial lift-off III-V solar cells
292
Reuse of GSM White Space Spectrum for Cognitive Femtocell Access
293
Reuse of high-level information requests: leveraging the investment
294
Reuse of HiL simulation models in the operation phase of production plants
295
Reuse of homework and test questions: when, why, and how to maintain security?
296
Re-use of IEC 61131-3 Structured Text for IEC 61499
297
Reuse of information as a base for development and verification of control programs for flexible manufacturing cells
298
Re-use of instruction manual in an automated intermediary system
299
Reuse of macro frequencies in a micro cell system
300
Reuse of mathematical problems and answers with e-learning system
301
Reuse of models and testbenches at different levels of abstraction
302
Reuse of models in the lifecycle of production plants using HiL simulation models for diagnosis
303
Reuse of modular software with automated comment analysis
304
Reuse of Motion Processing for Camera Stabilization and Video Coding
305
Reuse of multimedia components in the development of distance learning applications
306
Reuse of Off-the-Shelf Components in C2-Style Architectures
307
Reuse of paths in light source animation
308
Reuse of Plans As a Tool for Development of remote Sensing Expert Systems
309
Reuse of Post-Consumer E-Waste for Low Cost Micropower Distribution
310
Reuse of process elements-one company´s experience
311
Reuse of Process Knowledge in Enterprise Systems Development
312
Reuse of Product Design Knowledge in Space Industry
313
Reuse of Reconstructed Model of Human Skull for Anthropological and Anthropoid Morphological Model Estimation
314
Reuse of Requirements Reduces Time to Market
315
Re-Use of Resources for Adapted Formation to the Learner
316
Reuse of scenario specifications using an automated relational learner: a lightweight approach
317
Reuse of Semantic Business Process Patterns
318
Reuse of SMI 2.0 scripts in dividable dynamic timeline-based authoring
319
Reuse of software assets for the NASA Earth science decadal survey missions
320
Re-use of software components in the IEC-61508 certification process
321
Reuse of software engineering assets in a production environment
322
Reuse of software process and product through knowledge-based adaptation
323
Reuse of software process fragments is reuse of software too
324
Reuse of software through generation of partial systems
325
Reuse of spatial concerns based on aspectual requirements analysis patterns
326
Reuse of Structural Volume Test Methods for In-System Testing of Automotive ASICs
327
Reuse of submarine cable for seismic and geoelectrical measurements
328
Re-Use of the anode exhaust gas of a PEM fuel cell to improve the efficiency and lower the running cost
329
Reuse of the mobile communication antenna for FM reception
330
Reuse of verification efforts and incomplete specifications in a formalized, iterative and incremental software process
331
Reuse of video annotations based on low-level descriptor similarity
332
Reuse of VLSI layout topology by parametric BSG
333
Reuse One Frequency Planning for Two-hop Cellular System with Fixed Relay Nodes
334
Re-use or re-invent? Understanding and supporting learning from experience of peers in a product development community
335
Reuse or rewrite: Combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date
336
Reuse oriented group maintenance scheduling based on Hybrid Genetic Algorithm and Tabu Search
337
Reuse Partitioning Based Frequency Planning for Cellular Network with two-HOP Fixed Relay Nodes
338
Reuse Partitioning Based Frequency Planning for Relay Enhanced Cellular System with NLOS BS-Relay Links
339
Reuse Partitioning in Cellular Network with Two-Hop Fixed MIMO-OFDMA Relay Nodes
340
Reuse partitioning in cellular networks with dynamic channel allocation
341
Reuse partitioning in cellular systems
342
Reuse partitioning in fixed two-hop cellular relaying network
343
Reuse Readiness Levels as a Measure of Software Reusability
344
Reuse reengineering and validation via concept assignment
345
Reuse sensitive process models: are process elements software assets too?
346
Reuse so far: phasing in a revolution
347
Reuse state of the art and state of the practice report card
348
Reuse strategies and objectives for J-MASS
349
Reuse Strategies For Success
350
Reuse Strategies in Distributed Complex Event Detection
351
Reuse Strategy based on Quality Certification of Reusable Components
352
Reuse Technique in Hardware Design
353
Reuse technologies and their niches
354
Reuse that pays
355
Reuse through genericity in SUAVE
356
Reuse through Requirements Traceability
357
Reuse time based caching policy for video streaming
358
Reuse vs. maintainability: revealing the impact of composition code properties
359
Reuse within a cell-interference rejection or multiuser detection?
360
Reuse within a cell-interference rejection or multiuser detection?
361
Reuse, validation and verification of system development processes
362
Reuse: what´s wrong with this picture?
363
Re-useable hardware/software co-verification of IP blocks
364
Reuseable interface in multimedia hardware environment
365
Reuseable memories in the light of the old arbitrarily varying and a new outputwise varying channel theory
366
Reuse-Attack Mitigation in Wireless Sensor Networks
367
Reuse-aware modulo scheduling for stream processors
368
Reuse-based layering: a strategy for architectural frameworks for learning technologies
369
Reuse-based Methodology in Developing System-on-Chip (SoC)
370
Reuse-Based Optimization for Prebond and Post-Bond Testing of 3-D-Stacked ICs
371
Reuse-based software engineering: techniques, organizations, and controls [Book Review]
372
Reuse-based test access and integrated test scheduling for network-on-chip
373
Re-use-centric architecture for a fully accelerated testbench environment
374
Reuse-driven interprocedural slicing
375
Reuse-driven interprocedural slicing in the presence of pointers and recursion
376
ReuseECOS: An Approach to Support Global Software Development through Software Ecosystems
377
Reuse-in-the-large: modeling, specification and management
378
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction
379
Reuse-Oriented Deployment of Software Components: Congregation in Service-Oriented Development
380
Reuse-oriented design of embedded systems
381
Reuse-Oriented Information Model of Product Design Process Module
382
Reuse-oriented process component representation and retrieval
383
Reuse-Oriented Test Case Management Framework
384
Reuse-oriented two phases development methodology for simulation model
385
Reuse-partitioning combined with traffic adaptive channel assignment for highway microcellular radio systems
386
REUSES: Questionnaire-driven design for the automatic generation of web-based collaborative applications
387
Reusing (shrink wrap) schemas by modifying concept schemas
388
Reusing a compound-based infrastructure for searching video stories
389
Reusing a Data-Erased ASE Carrier in a Weak-Resonant-Cavity Laser Diode for Noise-Suppressed Error-Free Transmission
390
Reusing a distributed object domain framework
391
Reusing a System Testing Process Using with a Model
392
Reusing Adaptation Strategies in Adaptive Educational Hypermedia Systems
393
Reusing analogous components
394
Reusing and converting code clones to aspects - An algorithmic approach
395
Reusing and Interconnecting Software Components
396
Reusing and rerating older rectifiers with new DC/DC choppers
397
Re-using and re-rating older rectifiers with new DC/DC choppers
398
Reusing and Retargeting On-Chip Instrument Access Procedures in IEEE P1687
399
Reusing antenna radiator and amplifier for FM and other complementary bands in mobile terminals
400
Reusing Automated Regression Tests for Multiple Variants of a Software Product Line
401
Reusing automatic speech recognition platform for resource deficient languages
402
Re-using Auxiliary Variables for MaxSAT Preprocessing
403
Reusing base product features to develop product line architecture
404
Reusing basic semiconductor region models in power device bond graph definition
405
Re-using BIST for circuit aging monitoring
406
Reusing black box test paths for white box testing of websites
407
Reusing Building Blocks of Extracted Knowledge to Solve Complex, Large-Scale Boolean Problems
408
Reusing cached schedules in an out-of-order processor with in-order issue logic
409
Reusing CAD tools in object oriented based framework
410
Reusing certified, safety-critical avionics software
411
Reusing certified, safety-critical avionics software
412
Re-using chip level DFT at board level
413
Re-Using Clock Management Unit to implement Power Gating and Retention for Leakage Reduction at the 65-nm Technology Node
414
Reusing Code for Modernization of Legacy Systems
415
Reusing Common Uncoded Experimental Data in Performance Estimation of Different FEC Codes
416
Reusing Component Test Cases for Integration Testing of Retarding Embedded System Components
417
Reusing coordination and negotiation strategies in multi-agent systems for ubiquitous network environment
418
Reusing cultural heritage digital resources in teaching
419
Reusing Data During Speech Pauses in an NLMS-based Acoustic Echo Canceller
420
Reusing database queries in analogical domains
421
Reusing designs for rapid application development
422
Re-using DFT logic for functional and silicon debugging test
423
Reusing Disposable Medical Devices: Legal and Economic Consequences
424
Reusing domains for the construction of reverse engineering tools
425
Reusing Dormant Distributed Legacy Data for Evidence Based Medicine
426
Reusing Downstream Carrier in Colorless Laser Diode for Full-Duplex 64-QAM OFDM
427
Reusing Educational Contents in M-learning
428
Reusing electric vehicle battery for demand side management integrating dynamic pricing
429
Reusing existing object-oriented code as web services in a SOA
430
Reusing Existing Test Cases for Security Testing
431
Re-Using Generators of Complex Test Data
432
Reusing Genetic Programming for Ensemble Selection in Classification of Unbalanced Data
433
Reusing heterogeneous software process models
434
Reusing information repositories for flexibly generating adaptive presentations
435
Reusing Knowledge by Multi Agent System and Ontology
436
Reusing knowledge on delivering privacy and transparency together
437
Reusing Learned Information in SAT-based ATPG
438
Reusing Learning Resources based on Semantic Web Technologies
439
Re-using legacy Atlas TPS´s
440
Reusing legacy COBOL code with UML collaboration diagrams via a Wide Spectrum Language
441
Reusing makes it easier: manufacturing process design by CBR with KnowledgeWare
442
Reusing mechanical engineering design
443
Reusing motor commands to learn object interaction
444
Reusing MS-Windows software applications under CORBA environment
445
Reusing NoC-infrastructure for test data compression
446
Reusing non-functional patterns in i∗ modeling
447
Reusing OE-Scheduler in Aperiodic Environments
448
Reusing of information constructed in HTML documents: A conversion of HTML into OWL
449
Reusing of Properties after Discretization of Hybrid Automata
450
Reusing open data for learning database design
451
Reusing operational requirements: a process-oriented approach
452
Reusing OWL-S to model knowledge intensive tasks performed by Knowledge Based Systems
453
Reusing Pedagogical Scenarios at a Knowledge Level: a Model Driven Approach
454
Reusing personal computer devices - good or bad for the environment?
455
Reusing Program Investigation Knowledge for Code Understanding
456
Reusing proofs of program correctness in ENCOMPASS
457
Re-using Refresh for Self-Testing DRAMs
458
Reusing Relational Queries for Intuitive Decision Optimization
459
Reusing reused code
460
Reusing Risk Analysis Results -- An Extension for the CORAS Risk Analysis Method
461
Reusing safety-critical software in aviation
462
Reusing scenario based approaches in requirement engineering methods: CREWS method base
463
Re-using schematic grasping policies
464
Reusing Search Tree for Incremental SAT Solving of Temporal Induction
465
Reusing Service Process Fragments with a Linguistic Approach for User Qualitative Preferences
466
Reusing single system requirements from application family requirements
467
Reusing smaller optimized FFT blocks for the realization of larger power-efficient radix-2 FFTs
468
Re-using software architecture in legacy transformation projects
469
Reusing software architectures: a formal basis
470
Reusing software process models in E
3
471
Reusing Software to Build Data Processing Systems: NPP Science Data Segment Case Study
472
Reusing software to produce broadband services
473
Reusing software with ESTRO (Evolving Software Repository)
474
Reusing software: issues and research directions
475
Reusing specifications in OO applications
476
Reusing Speech Techniques for Video Semantic Indexing [Applications Corner]
477
Reusing structured models via model integration
478
Reusing supposed benign systemic data to achieve greater security
479
Reusing Symbolic Observation Graph for Efficient Model Checking
480
Reusing temporal properties of real-time software
481
Reusing Terminology for Requirements Specifications from WordNet
482
Reusing testing of reusable software components
483
Reusing the H.264/AVC deblocking filter for efficient spatio-temporal prediction in video coding
484
Reusing the IEEE 1500 design for test infrastructure for security monitoring of Systems-on-Chip
485
Reusing Three-Phase Power-Flow Object Components for Unbalanced Harmonic Analysis
486
Reusing traces in a dynamic conditional execution architecture
487
Reusing Tubular Fluorescent Lamps by Short Pulsed Voltage Dielectric Barrier Discharge
488
Reusing UML specifications in a constrained application domain
489
Reusing use case descriptions for requirements specification: towards use case patterns
490
Reusing User Interface across Devices with Different Design Guidelines
491
Reusing web learning portfolios by case-based reasoning technology to scaffold problem solving
492
Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective
493
Re-Using Workflow Fragments across Multiple Data Domains
494
Reuters "Air Mail"
495
Reuters experience of vision over SDH or how comms and television got together and stepped into the future
496
Reutilization of Waste Chicken Bone as Nutrients Source
497
Reutilization Potential of Accelerator Components: A Decommissioning Perspective
498
REV: Valuation and price adjustment in a fuzzy logic framework
499
Revalidation during the software maintenance phase
500
Revalidation Program for Nuclear Standby Diesel Generators
501
Revaluation of Bundles by Bidders in Combinatorial Auctions
502
Revamp of eNodeB for 5G networks: Detracting spectrum scarcity
503
Revamp social neural network application of Reality Mining
504
Revamped fly-over for accurate colon visualisation in virtual colonoscopy
505
Revamped P & E job services geared to engineering industry
506
Revamping a corporate Web site: strategies and implementation
507
Revamping a lab course for the education of students in electronic engineering
508
Revamping NSF
509
Revamping signal processing for adaptive, real time, bi-directional Brain Machine Interface systems
510
Revamping the Nontechnical Part of the Curriculum
511
Revamping the OSCAR database: a flexible approach to cluster configuration data management
512
Revc: Computationally Reliable Video Coding on unreliable hardware platforms: A case study on error-tolerant H.264/AVC CAVLC entropy coding
513
REV-cycle: A MATLAB-based tool for large-data analysis of real-life driving cycles for electric vehicles
514
Reveal Gene Expression Dynamics Via State-Space Model Based on the Decomposition of Functional Modules
515
REVEAL intermediate report
516
Reveal the organizational substitution anomalies using network analysis methods
517
Reveal the Relationships among Students Participation and Their Outcomes on E-Learning Environments: Case Study
518
Reveal the threading dislocation pits of AlGaAs related epitaxial layer by wet oxidation
519
REVEAL THIS: retrieval of multimedia multilingual content for the home user in an information society
520
Reveal Your Faults: It´s Only Fair!
521
Reveal: An Extensible Reduced-Order Model Builder for Simulation and Modeling
522
REVEAL: One future for heritage documentation
523
Revealed causal mapping as an evocative method for information systems research
524
Revealer: a lexical pattern matcher for architecture recovery
525
Revealing Action Representation Processes in Audio Perception Using Fractal EEG Analysis
526
Revealing and analysing modem malware
527
Revealing and enhancing engineering undergraduate students´ motivation for the communication of professional practice through creation of communication preparedness portfolios in a studio setting
528
Revealing and solving the TCP instability problem in 802.11 based multi-hop mobile ad hoc networks
529
Revealing Associations between Events and Their Characteristic Items
530
Revealing Bioelectric Muscle Activity Corrupted by Superimposed Magnetic Resonance Field
531
Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph
532
Revealing class structure with concept lattices
533
Revealing Cluster Formation over Huge Volatile Robotic Data
534
Revealing control mechanism from multifractal analysis on physiological signals
535
Revealing critical channels and frequency bands for emotion recognition from EEG with deep belief network
536
Revealing Critical Loads and Hidden Data Locality in GPGPU Applications
537
Revealing Crosscutting Concerns in Textual Requirements Documents: An Exploratory Study with Industry Systems
538
Revealing cross-disciplinary information through formal knowledge representation — A proposed Metadata for ancient Cypriot inscriptions
539
Revealing Density-Based Clustering Structure from the Core-Connected Tree of a Network
540
Revealing encrypted WebRTC traffic via machine learning tools
541
Revealing Ensemble State Transition Patterns in Multi-Electrode Neuronal Recordings Using Hidden Markov Models
542
Revealing Feasibility of FMM on ASIC: Efficient Implementation of N-Body Problem on FPGA
543
Revealing fire survivors hidden behind smoke and flames by IR active imaging systems
544
Revealing gaps in the material flow of inland port container terminals alongside the Danube with simulation
545
Revealing Hidden Community Structures and Identifying Bridges in Complex Networks: An Application to Analyzing Contents of Web Pages for Browsing
546
Revealing hierarchical structure through simultaneous community detection across multiscale networks
547
Revealing image forgery through image manipulation detection
548
Revealing Intraday Market Efficiency -- Estimating Diurnal Price Densities in Limit Order Books
549
Revealing Intra-Urban Features using Optical and SAR Images
550
Revealing intricate properties of communities in the bipartite structure of online social networks
551
Revealing Key Non-financial Factors for Online Credit-Scoring in e-Financing
552
Revealing loads having the biggest influence on power system small disturbance stability
553
Revealing Metal Corrosion Failures Using Wafer Level Temperature Cycle Stress Testing
554
Revealing miRNA Regulation and miRNA Target Prediction Using Constraint-Based Learning
555
Revealing Mistakes in Concern Mapping Tasks: An Experimental Evaluation
556
Revealing multiphoton resonant ionization in solid density plasmas with an x-ray free electron laser
557
Revealing nonlinear plasmon-photon interactions using k-space spectroscopy
558
Revealing of optimum modes of ultrasonic coagulation of submicron particles and determining of the shape of the aggregates by mathematical modeling
559
Revealing Packed Malware
560
Revealing patterns of opportunistic contact durations and intervals for large scale urban vehicular mobility
561
Revealing potential changes of significant terms in streams of textual data written in natural languages using windowing and text mining
562
Revealing Potential Performance Improvements by Utilizing Hybrid Work-Sharing for Resource-Intensive Seismic Applications
563
Revealing relationships between folksonomy and social popularity score in image/video sharing services
564
Revealing Research Themes and their Evolutionary Trends Using Bibliometric Data Based on Strategic Diagrams
565
Revealing Rival Marginal Offer Prices Via Inverse Optimization
566
Revealing runtime features and constituent behaviors within software
567
Revealing sales trends through data mining
568
Revealing secrets regarding success
569
Revealing Service Commitments in Service-Oriented Enterprise Architecture
570
Revealing shape semantics from morphological similarities of a collection of architectural elements: The case study of the columns of Saint-Michel de Cuxa
571
Revealing shunt origins by temprerature dependence of elctroluminescence under reverse-bias
572
Revealing side-channel issues of complex circuits by enhanced leakage models
573
Revealing Significant Biological Knowledge via Gene Ontologies and Pathways
574
Revealing Significant Medial Structure in Polyhedral Meshes
575
Revealing skull identity through a fusion of Viola-Jones and CCA
576
Revealing Social Networks of Spammers Through Spectral Clustering
577
Revealing Software Engineering Theory-in-Use through the Observation of Software Engineering Apprentices´ Course-of-Action
578
Revealing spatio-temporal regimes of generation in raman fiber lasers
579
Revealing spectral amplitude and phase correlations of an optical frequency comb with ultrafast pulse-shaping
580
Revealing stability limitations in power system vulnerability analysis
581
Revealing stealthy attacks in control systems
582
Revealing structure within clustered parallel coordinates displays
583
Revealing Students´ UML Class Diagram Modelling Strategies with WebUML and LogViz
584
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
585
Revealing subsurface defects in semiconductors using near-field fluorescence lifetime imaging
586
Revealing synthetic facial animations of realistic characters
587
Revealing system of GSM mobile phone operations aboard aircraft
588
Revealing TCP incompatibility problem in 802.11-based wireless multi-hop networks
589
Revealing TCP unfairness behavior in 802.11 based wireless multi-hop networks
590
Revealing temporal features of attacks against smart grid
591
Revealing temporal genetic regulatory networks from steady-state distributions
592
Revealing the “spirit of the place”: Genius Loci, a spatial augmented reality performance based on 3D data and historical hypotheses
593
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
594
Revealing the Causes of Dynamic Change in Protein-Protein Interaction Network
595
Revealing the Celt: Digitilising Irish Placenames in Australia
596
Revealing the copy and paste habits of end users
597
Revealing the dark side of a subjective study: Learnings from noise and sharpness ratings
598
Revealing the dynamic correlation between neural and muscular signals using time-dependent granger causality analysis
599
Revealing the dynamic modularity of composite biological networks in breast cancer treatment
600
Revealing the Effect of Coding Practices on Software Maintainability
601
Revealing the eukaryocyte response pathway to a cold plasma jet using S.cerevisiae single deletion mutants
602
Revealing the fog-of-war: A visualization-directed, uncertainty-aware approach for exploring high-dimensional data
603
Revealing the functional modularity of yeast transcriptional regulatory network by using a novel topological measurement
604
Revealing the giant resonance in Xe via HHG with sub-two cycle 1.8 µm laser pulses
605
Revealing the hidden Markov recognizer
606
Revealing the high room and low temperature mobilities of 2D holes in a strained Ge quantum well heterostructures grown on a standard Si(001) substrate
607
Revealing the Influence of Leadership on Software Process Improvement Initiatives
608
Revealing the innersanctum of the standards process
609
Revealing the MAPE loop for the autonomic management of Cloud infrastructures
610
Revealing the metabolic profile of brain tumors for diagnosis purposes
611
Revealing the neural response to imperceptible peripheral flicker with machine learning
612
Revealing the obvious?: A retrospective artefact analysis for an ambient assisted-living project
613
Revealing the optimality gap for Traffic Engineering algorithms
614
Revealing the relationship network behind link spam
615
Revealing the research themes and trends in Knowledge Management studies
616
Revealing the retail black box by interaction sensing
617
Revealing the role of excited state nuclear coherence in the photoisomerisation of bacteriorhodopsin by population assisted impulsive Raman
618
Revealing the Role of Topological Transitivity in Efficient Trust and Reputation System in Smart Metering Network
619
Revealing the Secrets of RUN and QPS: New Trends for Optimal Real-Time Multiprocessor Scheduling
620
Revealing the significance of using E-commerce in the organisations of the electric sector in Turkey
621
Revealing the structural details of huntingtin fibrils using small-angle neutron scattering
622
Revealing the Structure and Function of P. Pastoris Metabolic Network Using Petri Nets
623
Revealing the Structure and the Cause-Effect Relations in Partly Observable Systems
624
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
625
Revealing the Traces of JPEG Compression Anti-Forensics
626
Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns
627
Revealing the true achievable rates of scalar Costa scheme
628
Revealing the truth about project change
629
Revealing the urban features of the ancient greek city of Mantineia through the employment of ground penetrating radar
630
Revealing the Visually Unknown in Ancient Manuscripts with a Similarity Measure for IR-Imaged Inks
631
Revealing transmit diversity mechanisms and their side-effects in commercial IEEE 802.11 cards
632
Revealing Trends Based on Defined Queries in Biological Publications Using Cosine Similarity
633
Revealing true subspace clusters in high dimensions
634
Revealing VELA
635
Revealing viber communication patterns to assess protocol vulnerability
636
Revealing visual details via high dynamic range gigapixels spherical panorama photography: The Tempurung Cave natural heritage site
637
Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A
638
Revectoring society and business: the new order for electronic commerce
639
Reveiling Complexity-Related Time-Series Features with the Monotonic Aggregation Transform
640
Reveiwers
641
Reveiws
642
Reveiws
643
Revel8or: Model Driven Capacity Planning Tool Suite
644
Revelation and Evaluation on Generation and Application of Empirical Rules with Semantics
645
Revelation from the U.S Tennessee Valley management legislation on Yangtze Valley legislation
646
Revelation of Couples of Semiconductor Materials Without the Band Offsets and with the Differing Elctron Effective Masses
647
Revelation of ecological socialism to the construction of socialist harmonious society
648
Revelation of optimum modes of ultrasonic influence for atomization of viscous liquids by mathematical modelling
649
Revelation of soft-switching operation for isolated DC to single-phase AC converter with power decoupling
650
Revelation strategies in all-pay auctions with an uncertain number of bidders
651
Revelations from the project management of developed market economy government investment
652
Revelations from the Young Consumer Survey [Society News]
653
Reveling the Evolution of Semantic Content through Visual Analysis
654
REVEL-research and education: volcanoes, exploration and life
655
Revelstoke Hydroelectric Project
656
Revenue account for the year 1937
657
Revenue Adequacy Constrained Optimal Transmission Switching
658
Revenue adequacy procedure in congested networks through equivalent bilateral exchanges
659
Revenue adequacy, shortfall allocation and transmission performance incentives in FTR/FGR markets
660
Revenue adequate bidding strategies in competitive electricity markets
661
Revenue and delay control in 3G service network
662
Revenue and Fairness Guaranteed Downlink Adaptive Power Allocation in WiMAX Access Networks
663
Revenue and harmonics: a discussion about new quality-oriented measurement methods
664
Revenue and harmonics: an evaluation of some proposed rate structures
665
Revenue- and network-constrained market clearing via bilevel programming
666
Revenue and production management in a multi-echelon supply chain
667
Revenue and reputation: A stochastic control approach to profit maximization
668
Revenue and utility maximization under centralized dynamic spectrum allocation
669
Revenue Aware Preemption Policy in Multimedia Communication Networks
670
Revenue based maintenance scheduling of a GENCO in restructured power systems
671
Revenue based maintenance scheduling of a GENCO in restructured power systems
672
Revenue Coordination Contract Based on Stackelberg Game in Upsteam Supply Chain
673
Revenue distribution and coordination research of general project contractor based on different strategies
674
Revenue Driven Resource Allocation for Virtualized Data Centers
675
Revenue extraction in overlay macrocell-femtocell system under shared spectrum model
676
Revenue Focused Protection for VOD in DWDM Rings
677
Revenue Improvement for Wireless Service Providers in Hybrid Macrocell–Femtocell Networks
678
Revenue improvement from intelligent metering systems
679
Revenue Management for Cloud Providers--A Policy-Based Approach under Stochastic Demand
680
Revenue management for cognitive spectrum underlay networks: An interference elasticity perspective
681
Revenue Management for Two Quality level Products
682
Revenue Management in the Presence of Self-Similar Alpha-Stable Distributions
683
Revenue Management in the Service Industry: Research Overview and Prospect
684
Revenue management with incomplete information dynamic competition
685
Revenue management: Models and methods
686
Revenue management: Models and methods
687
Revenue maximisation in ATM networks using the CLP capability and buffer priority management
688
Revenue maximising agendas for sequential English auctions
689
Revenue Maximization for Broadband Service Providers Using Revenue Capacity
690
Revenue Maximization for Communication Networks with Usage-Based Pricing
691
Revenue maximization for telecommunications company with social viral marketing
692
Revenue maximization in a CRN using Real Coded Genetic Algorithm
693
Revenue maximization in ATM networks using the CLP capability and buffer priority management
694
Revenue maximization in reservation-based online advertising through dynamic inventory management
695
Revenue Maximization in Time-Varying Multi-Hop Wireless Networks: A Dynamic Pricing Approach
696
Revenue maximization of electricity generation for a wind turbine integrated with a Compressed Air Energy Storage system
697
Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments
698
Revenue maximization with dynamic auctions in IaaS cloud markets
699
Revenue Maximization with Optimal Capacity Control in Infrastructure as a Service Cloud Markets
700
Revenue maximization with quality assurance for composite web services
701
Revenue Maximizing Game and Its Extension for Multicell Wireless Access Networks
702
Revenue metering error caused by induced voltage from adjacent transmission lines
703
Revenue metering error caused by induced voltage from adjacent transmission lines
704
Revenue metering in the presence of distortion and unbalance: myths and reality
705
Revenue Models for Streaming Applications over Shared Clouds
706
Revenue models of inventory management in Guangxi Qingzhou Bounded Port
707
Revenue optimal auction for single-minded buyers
708
Revenue optimization and fairness control of priced guaranteed and best effort services on an ATM transmission link
709
Revenue Optimization Frameworks for Multi-Class PEV Charging Stations
710
Revenue optimization of B-ISDN networks
711
Revenue Optimization of Service Compositions Using Conditional Request Retries
712
Revenue optimization of telecommunication networks
713
Revenue optimization via call admission control and pricing for mobile cellular systems
714
Revenue Optimized IPTV Admission Control Using Empirical Effective Bandwidth Estimation
715
Revenue potential from SOI production
716
Revenue Prediction of Music Concerts Using the Mathematical Model of Hit Phenomena
717
Revenue Prediction Using Artificial Neural Network
718
Revenue protection in a competitive supply environment
719
Revenue reconciled optimum pricing of transmission services
720
Revenue recovery for operational SONET/SDH networks
721
Revenue sharing among ISPs in two-sided markets
722
Revenue Sharing Based Resource Allocation for Dynamic Spectrum Access Networks
723
Revenue Sharing Contract Based on Supply Chain Finance
724
Revenue Sharing Contract Design in Supply Chain under Asymmetric Information
725
Revenue sharing contract in a cloud computing service supply chain with a monopoly AIP and multiple competing asps under asymmetric information
726
Revenue Sharing Contract of Supply Chain with Fuzzy Linear Demand
727
Revenue sharing in the closed-loop supply chain: A new cooperative game theoretic approach
728
Revenue sharing is the optimal contractual form for emerging app economy?
729
Revenue valuation of aggregated electric vehicles participating in V2G power service
730
Revenue-adequate pricing mechanisms in non-convex electricity markets: A comparative study
731
Revenue-based admission control for cognitive radio cellular systems
732
Revenue-based Call Admission Control for MPEG-4 wireless videoconference traffic
733
Revenue-based call admission control for wireless cellular networks
734
Revenue-Based Metrics for Managing the New Product Introduction Process
735
Revenue-driven dynamic resource allocation for network virtualization
736
Revenue-driven virtual network embedding based on global resource information
737
Revenue-generation pattern analysis of mobile social games in Japan
738
Revenue-maximizing pricing and capacity expansion in a many-users regime
739
Revenue-maximizing pricing and resource allocation in a multi-service network
740
Revenue-maximizing pricing and resource allocation of differentiated services
741
Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates
742
Revenue-Optimized Webpage Recommendation
743
Revenue-sharing contract of reverse supply chain with collection effort dependent supply
744
Revenue-Sharing contract of supply chain with waste-averse and stockout-averse preferences
745
Revenue-sharing contract with supplier having loss-averse preferences
746
Revenue-sharing Contracts in Assembly Systems with Fuzzy Demand
747
Reverb: middleware for distributed application forensics
748
Reverb: Recommending code-related web pages
749
Reverberant audio source separation using partially pre-trained nonnegative matrix factorization
750
Reverberant Audio Source Separation via Sparse and Low-Rank Modeling
751
Reverberant cavity loaded with a liquid to reproduce in-vehicle radio propagation environments
752
Reverberant Microwave Propagation in Coupled Complex Cavities
753
Reverberant Neural Network in Optical Technology
754
Reverberant sound field analysis using a microphone array
755
Reverberant speech enhancement by spectral processing with reward-punishment weights
756
Reverberant Speech Enhancement by Temporal and Spectral Processing
757
Reverberant speech enhancement using cepstral processing
758
Reverberant speech recognition: A phoneme analysis
759
Reverberant Speech Segregation Based on Multipitch Tracking and Classification
760
Reverberant speech separation based on audio-visual dictionary learning and binaural cues
761
Reverberated speech enhancement using neural networks
762
Reverberated speech signal separation based on regularized subband feedforward ICA and instantaneous direction of arrival
763
Reverberating Asymmetric TEM Cell For Radiated EMC/V And SE Testing, 10 KHz-18 GHz
764
Reverberating chamber electromagnetic field in presence of an unstirred component
765
Reverberating chamber profile identification
766
Reverberating chambers as sources of stochastic electromagnetic fields
767
Reverberation and Absorption in an Aircraft Cabin With the Impact of Passengers
768
Reverberation and Noise Robust Feature Compensation Based on IMM
769
Reverberation and noise robust feature enhancement using multiple inputs
770
Reverberation artifact rejection and masking in arterial ARFI imaging
771
Reverberation between concentric spheres
772
Reverberation chamber and current injection cable system study in frequency and time domains
773
Reverberation chamber and Indoor measurements for time reversal application
774
Reverberation chamber as a statistical relaxation process: Entropy analysis and fast time domain simulations
775
Reverberation Chamber Calibration: Differences in Results When Using a Slot Instead of a Dipole Antenna
776
Reverberation Chamber Environment for Testing Communication Systems: Applications to OFDM and SC-FDE
777
Reverberation chamber field modeling for application to the source stirring technique
778
Reverberation chamber for accurate antenna measurements within 2–30 GHz
779
Reverberation Chamber for Antenna Measurements: Modeling Using Method of Moments, Spectral Domain Techniques, and Asymptote Extraction
780
Reverberation chamber for efficiency measurement of small antennas
781
Reverberation chamber for testing cable shielding
782
Reverberation chamber immunity testing: A novel methodology to avoid accidental DUT damage
783
Reverberation Chamber Measurement Correlation
784
Reverberation Chamber Modeling Based on Image Theory: Investigation in the Pulse Regime
785
Reverberation chamber modeling using FDTD
786
Reverberation chamber modeling using the FDTD method
787
Reverberation Chamber Performance Varying the Position of the Stirrer Rotation Axis
788
Reverberation chamber relationships: corrections and improvements or three wrongs can (almost) make a right
789
Reverberation Chamber results on 3GPP/CTIA LTE MIMO OTA 2013 round robin tests using different channel models — A comparison of performance
790
Reverberation Chamber Techniques for Determining the Radiation and Total Efficiency of Antennas
791
Reverberation chamber verification procedures, or, how to check if your chamber ain´t broke and suggestions on now to fix it if it is
792
Reverberation chamber: Calibration, evaluation and application in transfer impedance measurement
793
Reverberation chambers at low frequencies
794
Reverberation chambers: Full 3D FDTD simulations and measurements of independent positions of the stirrers
795
Reverberation characteristics of 4 kHz and 20 kHz tone bursts in a water filled tank and their effect on experimental design
796
Reverberation characteristics of a large welded steel shielded enclosure
797
Reverberation characterization and suppression by means of principal components
798
Reverberation compensation for speaker verification
799
Reverberation enhancement from a feedback delay network perspective
800
Reverberation envelope statistics and their dependence on sonar bandwidth and scattering patch size
801
Reverberation features identification from music recordings using the discrete wavelet transform
802
Reverberation fluctuations from a smooth seafloor
803
Reverberation In Non-uniform Environments
804
Reverberation matching for speaker recognition
805
Reverberation Model-Based Decoding in the Logmelspec Domain for Robust Distant-Talking Speech Recognition
806
Reverberation morphing using cepstrum decomposition
807
Reverberation reduction in ultrasonic B-mode images via dual frequency image subtraction
808
Reverberation reduction in vibro-acoustography using channel estimation method
809
Reverberation rejection via modeforming with a vertical line array
810
Reverberation rejection with a dual-line towed array
811
Reverberation robust multi-channel post-filtering using modified signal presence probability
812
Reverberation robust two-microphone Target Signal Detection algorithm with coherent interference
813
Reverberation spectrum modeling and simulation of arbitrary sea bottom shape
814
Reverberation steering and listening area expansion on 3-D sound field reproduction with parametric array loudspeaker
815
Reverberation suppression based on FrFT in the detection of targets on the seabed for moving sonar
816
Reverberation Suppression Using Wideband Doppler-Sensitive Pulses
817
Reverberation tail in power delay profiles: Effects and modeling
818
Reverberation time estimationbased on multidelay acousticecho cancellation
819
Reverberation time measurements in reverberant spaces
820
Reverberation time series generation
821
Reverberation vertical coherence and sea-bottom geoacoustic inversion in shallow water
822
Reverberation-chamber research-then and now: a review of early work and comparison with current understanding
823
Reverberation-Chamber Test Environment for Outdoor Urban Wireless Propagation Studies
824
Reverberation-derived shallow-water bottom scattering strength
825
Reverberation-ray analysis of dispersion of elastic waves in a box-girder
826
Reverberation-ray analysis of orthotropic piezoelectric laminates with imperfect interfaces
827
Reverberations - The SCR-270 Radar
828
Reverberations: peacetime radio astronomical measurements using World War II radio equiptment
829
Reverberation-Time Prediction Method for Room Impulse Responses Simulated with the Image-Source Model
830
Reverence in Ravine: A transparent sculpture in coordinate space for installation art
831
Reverend Bayes´ useful contribution
832
REVERIE: Natural human interaction in virtual immersive environments
833
Reverification of a microprocessor
834
Reversability Assessment on Secure USB Memories
835
Reversal and transposition distance of linear chromosomes
836
Reversal behaviour in perpendicular iron particle array (alumite Media)
837
Reversal behaviour in perpendicular iron particle arrays (alumite media)
838
Reversal currents in dielectric liquids
839
Reversal DNA methylation patterns for cancer diagnosis
840
Reversal dynamics of interacting circular nanomagnets
841
Reversal field versus pulse time: theoretical and experimental comparison
842
Reversal in Bit Patterned Media With Vertical and Lateral Exchange
843
Reversal Learning Based on Somatic Markers
844
Reversal magnetization process in the monocrystalline samples of strontium hexaferrites
845
Reversal mechanism in copper-modified cobalt-rare-earths
846
Reversal Mechanism of Exchange-Biased CoFeB/IrMn Bilayers Observed by Lorentz Electron Microscopy
847
Reversal mechanism of submicron patterned CoNi/Pt multilayers
848
Reversal Mechanisms in Ferromagnetic Nanostructures
849
Reversal modes, thermal stability and exchange length in perpendicular recording media
850
Reversal Nanoimprint for Three Dimensional Fluidic Biosystems
851
Reversal of a Loaded Ferromagnetic Core
852
Reversal of asymmetry of the resonance in the reflectivity of 2-D photonic crystals
853
Reversal of bounds in some dual-bound resistance calculations
854
Reversal of circular magnetization in a thin wall cone by axial translation of a single circumferential domain wall
855
Reversal of Domain Wall Motion in Perpendicular Magnetized Tb-Fe-Co Nanowires
856
Reversal of fortune [engineer career prospects]
857
Reversal of Lower Limb Venous and Lymphatic Pooling by Passive Non-Invasive Calf Muscle Pump Stimulation
858
Reversal of magnetostatic volume waves group velocity in nonstationary magnetic field
859
Reversal of multidrug resistance using poly(L-lactide)-vitamin E TPGS micelles in breast cancer cell
860
Reversal of photon scattering decoherence
861
Reversal of Premature Site-Dependent Ventricular Vulnerability in Simulated Ischemic Tissue
862
Reversal of temperature dependence of integrated circuits operating at very low voltages
863
Reversal of travel time between “zipper” and “non-zipper” merging in traffic flow
864
Reversal Phenomenon in a Simple Motor Task: Evidence for an Indirect Model
865
Reversal Properties of Write Head at Extremely High Density
866
Reversal-bounded multi-pushdown machines
867
Reversals in Electrical Current and Other Anomalies in Insulating Polymers
868
Reverse
I
-
V
characteristics of GaAs cells
869
Reverse A Priori Algorithm for Finding Associations between markers in optical motion capture
870
Reverse acknowledgment (ra) scheme: fast detection of retransmission failures for SR-ARQ
871
Reverse action of on-load tap changer in association with voltage collapse
872
Reverse action of on-load tap changer in association with voltage collapse
873
Reverse active mode current characteristics of SiGe HBTs
874
Reverse Active Operation of 200 GHz SiGe HBTs
875
Reverse active-reactive optimal power flow in ADNs: Technical and economical aspects
876
Reverse Analysis and Vulnerability Detection for Network System Software
877
Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language
878
Reverse analysis of secure communication protocol based on taint analysis
879
Reverse and forward engineering of frequency control in power networks
880
Reverse antenna effect due to process-induced quasi-breakdown of gate oxide
881
Reverse AODV routing protocol extension using learning Automata in ad hoc networks
882
Reverse architecting approach for complex systems
883
Reverse architecting: an industrial experience report
884
Reverse Architecting: seeking the architectonic
885
Reverse auction format choice decision based on supplier attributes
886
Reverse auction mechanism design with quality preference
887
Reverse auction mechanism with punishment and the preset quality interval
888
Reverse Backtracking Research of Chinese Segmentation Based on Dictionary of Hash Structure
889
Reverse Bandwagon Profile Inject Attack against Recommender Systems
890
Reverse BDD-based synthesis for splitter-free optical circuits
891
Reverse bending magnets in a combined-function lattice for the CLIC damping ring
892
Reverse Berlekamp-Massey decoding
893
Reverse Bias [Career Advisor: Experiences from the Real World]
894
Reverse Bias Behavior of Diffused and Screen-Printed n-Type Cz-Si Solar Cells
895
Reverse bias capacitance extraction from finite element semiconductor device models [varactors]
896
Reverse bias characteristics of modules made of solar cells with and without integrated bypass function (IBF)
897
Reverse Bias Induced Metastable Effects in Cu(In,Ga)Se2 Photovoltaic Devices
898
Reverse bias instabilities in bipolar power transistors with cellular layout
899
Reverse bias stress test of GaN HEMTs for high-voltage switching applications
900
Reverse biased PIN diode equivalent circuit parameters at microwave frequencies
901
Reverse biased safe operating area of emitter switched thyristors
902
Reverse biased transistor-diode ringing oscillator
903
Reverse biasing and breakdown behavior of PureB diodes
904
Reverse Bi-orthogonal wavelets & fuzzy classifiers for the automatic detection of spike waves in the EEG of the hypoxic ischemic pre-term fetal sheep
905
Reverse bipolar transistor conduction in high-current PWM inverters
906
Reverse blocking capability of symmetric SCRs at high current and high voltage reversals
907
Reverse blocking IGBT for matrix converter with ultra-thin wafer technology
908
Reverse blocking IGCT optimised for 1 kV DC bi-directional solid state circuit breaker
909
Reverse breakdown characteristics in InGa(Al)P/InGaP p-i-n junctions
910
Reverse breakdown in GaAs MESFET´s
911
Reverse CAD Modeling of Automobile Cam Based on Extended Interpolation Method
912
Reverse casting Taiwan red cypress distribution in central Taiwan from topographic sheltering effects of Taiwan fir in Hohuan Mountains
913
Reverse channel augmented multihop lightwave networks
914
Reverse channel evolutionary analysis for closed-loop supply chain with competing manufacturers and exclusive dominant retailers
915
Reverse channel floating base emitter switched thyristor (RFB-EST)
916
Reverse channel performance for CDPD packet data traffic
917
Reverse channel performance improvements in CDMA cellular communication systems employing adaptive antennas
918
Reverse channel training for reciprocal MIMO systems with spatial multiplexing
919
Reverse characteristics of a snappy recovery diode with the current snubber in comparison with a soft recovery diode and SiC Schottky type diode
920
Reverse characteristics of commercial silicon solar cells-impact on hot spot temperatures and module integrity
921
Reverse characteristics of Mo-Si epitaxial Schottky diodes
922
Reverse Circle Cipher for personal and network security
923
Reverse circulation bit fluid field calculation
924
Reverse code engineering: an in-depth analysis of the Bagle virus
925
Reverse compilation for digital signal processors: a working example
926
Reverse Compilation for Speculative Parallel Threading
927
Reverse compilation of digital signal processor assembler source to ANSI-C
928
Reverse compute and forward: A low-complexity architecture for downlink distributed antenna systems
929
Reverse Concatenated Coded Modulation for High-Speed Optical Communication
930
Reverse concatenated watermark codes
931
Reverse Concatenation of Product and Modulation Codes
932
Reverse Concatenation with Maximum Transition Run (MTR) Codes for High-Density Perpendicular Recording
933
Reverse Conducting Double Gate Lateral Insulated Gate Bipolar Transistor in SOI Based Technology
934
Reverse Conducting IGBT - A new Technology to Increase the Energy Efficiency of Induction Cookers
935
Reverse conducting lateral insulated-gate bipolar transistors with a non-local band-to-band tunnelling junction
936
Reverse conducting–IGBTs initial snapback phenomenon and its analytical modelling
937
Reverse conduction of a 100 A SiC DMOSFET module in high-power applications
938
Reverse conduction properties of vertical SiC trench JFETs
939
Reverse contrast imaging in GaAs
940
Reverse Control for Humanoid Robot Task Recognition
941
Reverse control of solar power converters for modular telecommunications UPS
942
Reverse conversion architectures for signed-digit residue number systems
943
Reverse Converter Design via Parallel-Prefix Adders: Novel Components, Methodology, and Implementations
944
Reverse converters for RNSs with diminished-one encoded channels
945
Reverse converters for the moduli sets {2
2N
-1, 2
N
, 2
2N
+1} and {2
N
-3, 2
N
+1, 2
N
-1, 2
N
+3}
946
Reverse current and arc-back in a single-gap mercury-arc valve
947
Reverse current characteristics in ITO/c-Si anisotype heterojunctions
948
Reverse current control method of synchronous boost converter for fuel cell using a mode boundary detector
949
Reverse current in Ge-GaAs n-n heterojunctions
950
Reverse current instabilities in amorphous silicon Schottky diodes: modeling and experiments
951
Reverse current instability of power silicon diodes (thyristors) at high temperature and the junction surface leakage current
952
Reverse Current of Plasma Doped p
+
/n Ultra-Shallow Junction
953
Reverse current-voltage characteristics of metal silicide Schottky diodes
954
Reverse current-voltage characteristics of metal-silicide Schottky diodes
955
Reverse data engineering of E-R-designed relational schemas
956
Reverse Design and Finite Element Analysis of Tractor Panel Based on CATIA
957
Reverse direction transmissions and network coding for energy-efficient Wi-Fi networks
958
Reverse Discrimination: What Can Managers Do?
959
Reverse Domain Propagation in Fe-Co Base Amorphous Wires
960
Reverse DRC channel performance analysis for 1xEV-Do: third generation high-speed wireless data systems
961
Reverse edge cut-set bounds for secure network coding
962
Reverse effect of ground electrode on the signal loss of human body communication
963
Reverse Electrical Behavior of N-Channel and P-Channel LTPS-TFTs by N
2
O Plasma Surface Treatment
964
Reverse Elevated Source/Drain (RESD) MOSFET for deep submicron CMOS
965
Reverse Energy Transfer through an AC Line Synchronized Pulse Width Modulated Sinewave Inverter
966
Reverse engineered MPC for tracking with systems that become uncertain
967
Reverse engineering & re-engineering of avionics legacy components
968
Reverse engineering & design recovery: An evaluation of design recovery techniques
969
Reverse engineering `a new definition for the nineties´
970
Reverse engineering a large component-based software product
971
Reverse engineering a medical database
972
Reverse engineering a multivariable controller: a case study
973
Reverse engineering a visual age application
974
Reverse Engineering Abstract Components for Model-Based Development and Verification of Embedded Software
975
Reverse engineering aggregation relationship based on propagation of operations
976
Reverse Engineering Algorithm for Neural Networks Applied to the Subthalamopallidal Network of the Basal Ganglia
977
Reverse Engineering and Analysis of Genome-Wide Gene Regulatory Networks from Gene Expression Profiles Using High-Performance Computing
978
Reverse engineering and design recovery: a taxonomy
979
Reverse Engineering and Its Application in the Mold Manufacturing
980
Reverse Engineering And Knowledge Discovery
981
Reverse engineering and prevention techniques for physical unclonable functions using side channels
982
Reverse engineering and reengineering: after Y2K
983
Reverse Engineering and Software Products Reuse to Teach Collaborative Web Portals: A Case Study With Final-Year Computer Science Students
984
Reverse Engineering and Testing Service Life Cycles of Mobile Platforms
985
Reverse engineering and the computing profession
986
Reverse engineering and visualization of the reactive behavior of PLC applications
987
Reverse Engineering Animal Vision with Virtual Reality and Genetics
988
Reverse engineering as a bridge to CASE
989
Reverse engineering as a bridge to CASE
990
Reverse engineering as a framework for design verification
991
Reverse engineering as a means of improving and adapting legacy finite element code
992
Reverse engineering as an education tool in computer science
993
Reverse engineering as an educational tool for sustainability
994
Reverse engineering B-rep models from multiple point clouds
995
Reverse Engineering by Design : Using History to Teach
996
Reverse engineering by mining dynamic repositories
997
Reverse Engineering CAPTCHAs
998
Reverse engineering circuits using behavioral pattern mining
999
Reverse engineering COBOL through the use of automatically applied program transformations
1000
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code