<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Section
2
Section
3
Section
4
Section
5
Section
6
Section
7
Section
8
Section
9
Section
10
Section
11
Section
12
Section
13
Section 1
14
Section 1 Advanced manufacturing technology
15
SECTION 1 Technological design problems
16
Section 1: Electronic Circuits and Functional Parts of Radio Electronic Means Mathematical Modelling
17
Section 1: Fundamentals of the telecommunication systems theory
18
Section 1: Plenary Papers
19
Section 1: Signal theory and simulation of electronic circuits
20
Section 1: Technology of the active media of electronic engineering
21
Section 1: Technology of the active media of electronic engineering
22
Section 10: Archeology
23
Section 10: Chemical sensors, catalysis, solid-state ionics
24
Section 11: Hydrology
25
Section 12: Geological applications
26
Section 13: Sedimentology
27
Section 14: Concrete / Pavement Evaluation
28
Section 15: UXO / Mine Detection
29
Section 16: Soil Characterisation
30
Section 17: Ice and Permafrost
31
Section 18: EURO GPR
32
Section 2
33
Section 2 — Automatic protection — Balanced relays and flashover control
34
Section 2 Automation technology & robotics
35
SECTION 2 Models and methods for radioelectronics device and system design
36
SECTION 2: 2A Switcing in Vacuum [Breaker Page]
37
Section 2: Active media fundamentals: Crystal structure, defects
38
Section 2: Control, adaptation, self-organization in infocommunication systems, software-defined networking
39
Section 2: Mathematical Modelling of Electromagnetic Fields and High-Frequency Devices
40
Section 2: Modelling
41
Section 2: Nanoparticles, nano-ceramics and nano-composites
42
Section 2: Radio-electronic system and divices
43
Section 3
44
SECTION 3 Design of specialized system and devices
45
Section 3 energy saving, environmental protection and sustainable development in the manufacturing industry
46
Section 3: Active media fundamentals: crystal structure, micro- and nanostructure, phase transitions
47
Section 3: Antenna systems and microwave devices
48
Section 3: Infocommunication technologies and networks
49
Section 3: Nanoparticles, nano-ceramics and nano-composites
50
Section 3: Signal and Image Processing
51
Section 3A — Economic studies of transmission line design with particular reference to the mechanical features
52
Section 4
53
SECTION 4 Optimal design problems
54
Section 4 Others
55
Section 4: Antennas
56
Section 4: Biotechnical and medical electronic devices and systems
57
Section 4: Methods and Means of Information Acquisition, Transformation, Processing and Protection
58
Section 4: Resistivity switching and transport phenomena
59
Section 4: Simulation of processes and phenomena in oxides
60
Section 4: Wireless infocommunication systems
61
Section 4-vibration of conductors and overhead ground wires
62
Section 5
63
SECTION 5 CAD modern information technology
64
Section 5: Computer, Information and Telecommunication Systems and Networks
65
Section 5: Defects, impurities and transport phenomena in oxide crystal
66
Section 5: Materials for quantum and optoelectronics
67
Section 5: Radar systems and technology
68
Section 5: Signal processing in infocommunication systems
69
Section 5: Telecommunication and information networks and systems
70
Section 5-location and right of way
71
Section 6
72
SECTION 6 Models and methods for microelectromechanical systems
73
Section 6: Borehole radar
74
Section 6: Information and communication technologies
75
Section 6: Information security in infocommunication systems
76
Section 6: Magnetic materials, multiferroics, superconductors
77
Section 6: Radio Electronic Equipment and Telecommunication Devices
78
Section 6: Theory, design and modelling of electronic devices
79
Section 7
80
Section 7 - EMC related to PCB´s and electronic components [breaker page]
81
SECTION 7 Applied and computer linguistics
82
Section 7: Data Processing and Analysis
83
Section 7: Digital signal processing
84
Section 7: Ensuring of Quality and Reliability of Radio Electronic and Telecommunication Devices
85
Section 7: Materials for quantum and optoelectronics
86
Section 7: Materials for sensing and catalysis
87
Section 8 - EMC monitoring, measurements, certification, test equipment [breaker page]
88
Section 8: Computer simulation of electro-technical and electro-energetic systems
89
Section 8: Imaging and image processing
90
Section 8: Modern Problems of Training Specialists in the Field of Radio Electronics, Telecommunications and Computer Technology
91
Section 8: Phosphors, scintillators and transformers of radiation
92
Section 8: Scintillators and detectors of radiation
93
Section 9 - natural EMC radiation: sources and influence [breaker page]
94
Section 9: Economic problems of design and performance of radioelectronic, telecommunication and computer networks [Breaker page]
95
Section 9: electronics: Micro- and nanotechnologies, systems and devices
96
Section 9: Magnetic and magnetooptical transducers and devices
97
Section 9: NDT - Geo-technical utilities detection
98
Section A: Methods, algorithms and means of navigation and motion control systems
99
Section A: UAV design: Advanced methods of computer-aided design, aerodynamics, flight-technical characteristics, durability of UAV
100
Section activities
101
Section activities
102
Section activities for fiscal year summarized
103
Section and branch activities — Annual report for 1942–43
104
Section and branch activities — Annual report for 1943–44
105
Section and branch activities — Annual report for 1945–46
106
Section and branch activities — Annual report for 1947–1948
107
Section and branch activities — Annual report for 1948–1949
108
Section and branch activities — Annual report for 1949–50
109
Section and branch activities annual report for 1935–36
110
Section and branch activities annual report for 1937–38
111
Section and branch activities annual report for 1938–39
112
Section and branch activities annual report for 1939–40
113
Section and branch activities summarized in annual report for 1932–33
114
Section and branch activities summarized in annual report for 1934–35
115
Section and branch conference at Portland
116
Section and branch joint meetings continue successful
117
Section and branch meetings
118
Section and branch meetings
119
Section and branch meetings
120
Section and branch meetings
121
Section and branch meetings
122
Section and branch meetings
123
Section and branch meetings
124
Section and branch meetings
125
Section and branch meetings
126
Section and branch meetings
127
Section and branch meetings
128
Section and branch meetings
129
Section and branch meetings
130
Section and branch meetings
131
Section and branch meetings
132
Section and branch meetings
133
Section and branch meetings
134
Section and branch meetings
135
Section and branch meetings
136
Section and branch meetings
137
Section and branch meetings
138
Section and branch meetings
139
Section and Design of the Electrification of the San Francisco-Oakland Bay Bridge Railway
140
Section Automation devices and control systems
141
Section B: Methods and algorithms of adaptive, robust and optimal motion control systems synthesis
142
Section B: UAV production and service: Maintenance, methods and syatems of navigation and flight control equipment testing
143
Section based hybrid routing protocol for WSN using artificial bee colony
144
Section C: UAV equipment: Data transmission channels, adaptive, robust and optimal control systems, useful load, air traffic control centre, navigation systems and sensors, motion control systems, ground equipment of UAV
145
Section Carrying Capacity Management System of High-Speed Railway in China
146
Section Chairmen´s addresses
147
Section Crossing Drive with Fuzzy-PI Controller for the Long Stroke Electromagnetic Launcher
148
Section Crossing Drive With Fuzzy-PI Controller for the Long Stroke Electromagnetic Launcher
149
Section database management system for intelligent design of concept vehicle body
150
Section delegates and sections committee confer at meeting held June 28, 1955
151
Section delegates conference considers many important problems
152
Section delegates conference considers problems and operational procedures
153
Section delegates conference provides exchange of views on various activities
154
Section delegates hear about progress toward new United engineering center
155
Section delegates meet during Summer and Pacific general meeting
156
Section delegates meet June 20 during AIEE Summer general meeting
157
Section delegates to Annual Convention
158
Section delegates´ conferences
159
Section electron-physical
160
Section events
161
Section Feature Based Modeling Strategy of Reverse Engineering
162
Section growth award plan
163
Section holds prize paper competition
164
Section I Power engineering
165
Section I: Centennial of the Institute of Electrical and Electronics Engineers
166
Section I: Fundamental problems of physics and technology of micro- and nanostructuires [breaker page]
167
Section I: Physics of micro- and nanostructuires
168
Section I: Physics of micro- and nanostructures
169
Section I: Semiconductor physics and technology [breaker page]
170
Section I: Semiconductor physics and technology. Photovoltaics
171
Section I: Semiconductor physics and technology. Photovoltaics
172
Section I: Surface, films, layers
173
Section I-1946: Index to Abstracts and References
174
Section II Instrument making
175
Section II: Design and technology of micro- and nanostructures
176
Section II: Fundamental problems of designing and circuitry of electronic devices and systems [breaker page]
177
Section II: Papers and discussions
178
Section II: Practical problems of designing and technology of micro- and nanostructures
179
Section II: Radio- and Microwave technology. Computer science and telecommunications
180
Section II: Radio- and telecommunications. Microwave technology
181
Section II: Radio- and telecommunications. Microwave technology [breaker page]
182
Section II: Reliability discipline and technology in historical perspective 1930–1984
183
Section II-1947: Index to Abstracts and References
184
Section III IEEE reliability society in historical perspective 1949–1984
185
Section III Technology, equipment and machine-building production automation
186
Section III: Fundamental problems of radio- and television systems, radiolocation and telecommunications
187
Section III: Fundamental problems of radio- and television systems, radiolocation and telecommunications [breaker page]
188
Section III: Radio- and telecommunications
189
Section III: Sonic and ultrasonic devices: Physics, electronics, application
190
Section III: Sonic and ultrasonic devices: Physics, electronics, application
191
Section III: Sonic and ultrasonic devices: Physics, electronics, application [breaker page]
192
Section III-1948: Index to Abstracts and References
193
Section interpolation algorithm of line in CNC system and generalized periodicity
194
Section IV Electromechanics
195
Section IV: Microwave theory and technologies
196
Section IV: Optoelectronic devices and systems: Physics, electronics, application
197
Section IV: Optoelectronic devices and systems: Physics, electronics, application
198
Section IV: Optoelectronic devices and systems: Physics, electronics, application [breaker page]
199
Section IV: Sonic and ultrasonic devices: Physics, electronics, applications
200
Section IV: Sonic and ultrasonic devices: Physics, electronics, applications [breaker page]
201
Section IV-1949: Index to Abstracts and References
202
Section IX Quality management control
203
Section Lasers and their application. Medical electronic instrumentation
204
Section meetings
205
Section meetings
206
Section meetings
207
Section meetings
208
Section meetings
209
Section meetings
210
Section meetings
211
Section meetings
212
Section meetings
213
Section meetings
214
Section meetings
215
Section meetings
216
Section meetings
217
Section meetings
218
Section meetings
219
Section meetings
220
Section meetings
221
Section meetings
222
Section meetings
223
Section meetings
224
Section meetings
225
Section meetings
226
Section meetings
227
Section meetings
228
Section meetings
229
Section meetings
230
Section meetings
231
Section meetings
232
Section meetings
233
Section meetings
234
Section meetings
235
Section meetings
236
Section Meetings
237
Section meetings
238
Section meetings
239
Section meetings
240
Section meetings
241
Section meetings
242
Section meetings
243
Section meetings
244
Section meetings
245
Section meetings
246
Section meetings
247
Section meetings
248
Section meetings
249
Section meetings
250
Section meetings
251
Section meetings
252
Section meetings
253
Section meetings
254
Section meetings
255
Section meetings
256
Section meetings
257
Section meetings
258
Section meets with AIEE student branch
259
Section Metrology and metrological instrumentation
260
Section Modeling and computing techniques
261
Section news
262
Section news
263
Section news
264
Section news
265
Section news
266
Section news
267
Section news
268
Section news
269
Section news
270
Section news
271
Section news
272
Section news
273
Section news
274
Section news
275
Section notes
276
Section notes
277
Section notes
278
Section notes
279
Section Notes ´against´
280
Section Notes ´for´
281
Section Notes ´for´ and recruitment
282
Section notes and format
283
Section notices
284
Section optimization design of discrete structure with improved genetic algorithms
285
Section papers
286
Section performance of submerged floating tunnel using steel composite hollow RC structure
287
Section power electronics and mechanotronics
288
Section processing of broadband signal
289
Section Radio-Engineering
290
Section reports
291
Section representatives discuss problems of merger at annual meeting
292
Section representatives review activities at Winter general meeting
293
Section rules
294
Section Survey of IRE Editorial Policies
295
Section Survey of IRE Editorial Policies
296
Section technical committee activities of the Portland, Ore., section
297
Section Telecommunications, design and technology of radio-engineering devices
298
Section territory
299
Section V The use of modern technical and information means in health services
300
Section V: Optical and thermal devices: Physics, electronics, applications
301
Section V: Optical and thermal devices: Physics, electronics, applications [breaker page]
302
Section V: Power electronics, mechatronics and automation
303
Section V: Power electronics, mechatronics and automation
304
Section V: Power electronics, mechatronics and automation [breaker page]
305
Section V: Sonic and ultrasonic devices: Physics, electronics, application
306
Section V-1950: Index to Abstracts and References
307
Section variable frequency speed regulation control applied in pump energy saving
308
Section VI Material science
309
Section VI: Medical electronics
310
Section VI: Optoelectronic devices and systems: Physics, electronics, applications
311
Section VI: Power electronics, mechatronics and automation
312
Section VI: Power electronics, mechatronics and automation [breaker page]
313
Section VI-1951: Index to Abstracts and References
314
Section VII Informatics and control in engineering systems
315
Section VII: Power electronics, mechatronics and automation
316
Section VII-1952: Index to Abstracts and References
317
Section VIII Modern physical methods in science, engineering and medicine
318
Section VIII-1953: Index to Abstracts and References
319
Section X Heat and power engineering
320
Section XI Design and technology of art processing of materials
321
Section X-ray topography applied to power device materials problems
322
Section: Aircraft group being formed by Los Angeles section
323
Section: Chicago section sponsors student-paper contest
324
Section: El Paso, South Carolina Sections authorized
325
Section: Illinois valley section schedules year´s meetings
326
Section: Joint georgia meeting of AIEE and IAEI
327
Section: New technical groups formed at Kansas city
328
Section: Philadelphia section holds meeting at Princeton
329
Section: Programs contribute to community life
330
Section: Quiet trolley described before Michigan section
331
Section: Record of achievement by Schenectady section
332
Section: St. Louis section host to AIEE presidents
333
Section: Subsection in Lake Charles, La.
334
Section: Use of magnesium in planes topic of Milwaukee section meeting
335
Section: Washington section holds joint meeting with ASCE and ASME
336
Section: Well-planned service for veterans offered by New York section
337
Section-agent-based simulation and analysis of urban ring road traffic stream
338
Sectional Approximation of the Flickermeter Transformation Characteristic for a Sinusoidal Modulating Signal
339
Sectional committee on illuminating engineering nomenclature organized
340
Sectional Compensation Parallel Power System Stabilizer with Two Independent Channels
341
Sectional contour interpolation using Fourier descriptor
342
Sectional electric drive for paper machines
343
Sectional Electric Drive for Paper Machines
344
Sectional image reconstruction in optical scanning holography using compressed sensing
345
Sectional image restoration of sintering machine tail based on dark primary prior
346
Sectional interests
347
Sectional lumped parameter model of fluid-structure interaction in fluid-filled pipes
348
Sectional meander microstrip delay line: interconnection modelling
349
Sectional optimization of oxygen content in flue gas based on PSO
350
Sectional Ultrasonic Irradiator for Intracavitary Treatment
351
Sectional Ultrasonic Irradiator for Intracavitary Treatment
352
Sectionalising methodology for parallel system restoration based on graph theory
353
Sectionalization of the minimal trellis module for convolutional codes
354
Sectionalized explosive current opening switch
355
Sectionalized PWM (S-PWM): A new multilevel modulation strategy
356
Sectionalized tracking control and experiment of AGV
357
Sectionalizing adapting to high growth on a rural system
358
Sectionalizing and Internal Transformer Fusing on Rural Power Circuits
359
Sectionalizing improves rectifier efficiency
360
Sectionalizing of low-voltage overhead grids in low load density areas as the method for supply quality improvement
361
Section-based Digital Habitat Ecosystem Architecture for the built-up environments
362
Section-based object tracking
363
Sectioned core doping effect on higher-order mode amplification in Yb-doped rod-type photonic crystal fibers
364
Sectioned digital filtering for nonlinear Bayesian signal deconvolution
365
Sectioned Images of the Cadaver Head Including the Brain and Correspondences With Ultrahigh Field 7.0 T MRIs
366
Sectioned implementation of regularized image interpolation
367
Sectioned implementation of two-dimensional symmetric half-plane recursive filters
368
Sectioned methods for image restoration
369
Sectioned Microstrip Antennas of Minimized Dimensions
370
Sectioned spectrum processing for wideband signals
371
Sectioned vacuum insulator of “GAMMA-4” facility module
372
Sectioning and fault analysis of junction transistors
373
Sectioning implementation of two-dimensional symmetric half-plane filters
374
Sectioning of a High-Current Superconducting Cable
375
Sectioning property of long logical convolution
376
Sectioning techniques for processing signals with signal-dependent noise
377
Section-level modeling of musical audio for linking performances to scores in Turkish makam music
378
Section-Map Stability Criterion for Biped Robots Part I: Theory
379
Section-Map Stability Criterion for Biped Robots Part II: Applications and Experiments
380
Section-representation scheme for evolutionary analog filter synthesis and fault tolerance design
381
Sections
382
Sections
383
Sections
384
Sections
385
Sections
386
Sections
387
Sections
388
Sections
389
Sections
390
Sections
391
Sections
392
Sections
393
Sections
394
Sections
395
Sections
396
Sections
397
Sections
398
Sections
399
Sections
400
Sections
401
Sections
402
Sections
403
Sections
404
Sections
405
Sections
406
Sections
407
Sections
408
Sections
409
Sections
410
Sections
411
Sections
412
Sections
413
Sections
414
Sections
415
Sections
416
Sections
417
Sections
418
Sections
419
Sections
420
Sections
421
Sections
422
Sections
423
Sections
424
Sections
425
Sections and branches
426
Sections and branches
427
Sections and branches
428
Sections and branches
429
Sections and branches
430
Sections and branches
431
Sections and branches
432
Sections and branches
433
Sections and branches
434
Sections and branches
435
Sections and branches
436
Sections and branches
437
Sections and branches
438
Sections and branches
439
Sections and branches
440
Sections and branches
441
Sections and branches
442
Sections and branches
443
Sections and branches
444
Sections and branches
445
Sections and branches
446
Sections and branches
447
Sections and branches
448
Sections and branches
449
Sections and branches
450
Sections and branches
451
Sections and branches
452
Sections and branches
453
Sections and branches
454
Sections and branches
455
Sections and Branches of the Institute
456
Sections and branches of the Institute
457
Sections and Subsections
458
Sections and Subsections
459
Sections and university branches
460
Sections and university branches
461
Sections and university branches
462
Sections and university branches
463
Sections and university branches
464
Sections committee and representatives discuss operational procedure
465
Sections committee discusses student branches, membership growth, at meeting on January 20
466
Sections committee presents 1940 survey of local activities
467
Sections contemplating joint action with other societies are advised on policy
468
Sections Representatives at 1947 IRE National Convention
469
Section-spherical dielectric loaded circular microstrip patch antennas
470
Section-wise modeling of traffic flow and its application in traffic state estimation
471
Sectionwise piecewise polynomial functions: Applications to the analysis and synthesis of nonlinear n- port networks
472
Section-wise piecewise-linear functions: Canonical representation, properties, and applications
473
Section-wise-exact coupled-mode theory of waveguide quasi-phase-matched second-harmonic generation
474
Sectjunction: Wi-Fi indoor localization based on junction of signal sectors
475
Sector and polarisation dependent wideband indoor propagation channel measurement at 5.1 GHz for HIPERLAN
476
Sector antenna and DFE modems for high speed indoor radio communications
477
Sector antenna in plain waveguide technology
478
Sector array mapping: transformation matrix design for minimum MSE
479
Sector Based Clustering Hierarchy (SBCH) protocol for clustered homogenous wireless sensor networks
480
Sector Based Flooding Method for Mobile Ad Hoc Networks
481
Sector beam from slot array
482
Sector beam synthesis for cellular systems using phased antenna arrays
483
Sector beam synthesis for cellular systems using phased antenna arrays
484
Sector beam synthesis using antenna arrays
485
Sector beamforming with uniform circular array antennas using phase mode transformation
486
Sector cache design and performance
487
Sector coded transmission protocol for Cognitive Radio Networks
488
Sector conditions for the global stability of high-speed communication networks
489
Sector coverage antennas for broadcast applications in the millimetre wave region
490
Sector Driven Variations on E-commerce Adoption Barriers in Regional Small Businesses: An Australian Study
491
Sector error rate estimation of concatenated codes in magnetic recording
492
Sector interpolation for 3D SAR imaging with baseline diversity data
493
Sector interpolation of non-uniform arrays for efficient high resolution bearing estimation
494
Sector magnets for the RIKEN superconducting ring cyclotron
495
Sector offset configuration with static vertical beam-forming for LTE
496
Sector passification via dynamic feedback compensation
497
Sector PCS-EBG Antenna for Low-Cost High-Directivity Applications
498
Sector Projection Fourier Descriptor for Chinese character recognition
499
Sector rotation under partial information
500
Sector Scanning Attempts for Non-Isolation in Directional 60 GHz Networks
501
Sector servo system for high speed seeking and high track density
502
Sector Sliding Mode Design Based on Tensor Product Model Transformation
503
Sector specific
504
Sector specific
505
Sector specific
506
Sector specific
507
Sector specific
508
Sector specific
509
Sector specific
510
Sector specific
511
Sector specific - briefing contracts
512
Sector specific [Briefing Contracts]
513
Sector throughput using frequency-and-time domain channel-dependent packet scheduling with channel prediction in OFDMA downlink packet radio access
514
Sector Transmit Power Pooling on Real CDMA Networks
515
Sectoral band-gap of planar corrugated surfaces by asymptotic corrugations boundary conditions
516
Sectoral Conical Beam Former for a 2
2 Array Antenna
517
Sectoral hoghorn: a new form of line feed for spherical reflector aerials
518
Sectoral metallic EBG antenna for high data rate wireless terrestrial communications with vehicles using mobile WiMAX technology
519
Sectoral pattern synthesis with primary feeds
520
Sectoral patterns of technological change, technology diffusion and global competition: Comparison of the semiconductor and the pharmaceutical industries
521
Sectoral phase modes from circular antenna arrays
522
Sectoral phase-mode beams from circular arrays
523
Sectoral sweepers for sensor node management and location estimation in adhoc sensor networks
524
Sectoral Systems of Innovation in Asia: The Case of Software Research Activities
525
Sector-antenna diversity reception for a multipath fading channel
526
Sector-based diffusion filtering
527
Sector-based optic cup segmentation with intensity and blood vessel priors
528
Sector-Based Parametric Sound Field Reproduction in the Spherical Harmonic Domain
529
Sector-based policy generation and enforcement for cognitive radios
530
Sector-based Radio Resource Management for SC-FDMA cellular systems
531
Sector-based resource allocation for broadband fixed wireless networks
532
Sector-based routing for secure energy efficient communications
533
Sector-Based Routing with Destination Location Prediction for Underwater Mobile Networks
534
Sector-based RTS/CTS access scheme for high density WLAN sensor networks
535
Sector-based SVG image contour analysis algorithm
536
Sector-disk codes and partial MDS codes with up to three global parities
537
Sectored antenna array for indoor mono-station UWB positioning applications
538
Sectored Cyclotrons
539
Sectored Random Projections for Cancelable Iris Biometrics
540
Sectored receivers for indoor wireless optical communication systems
541
Sectored receivers to combat the multipath dispersion of the indoor optical channel
542
Sectored renaming for superscalar microprocessors
543
Sectored snakes: evaluating learned-energy segmentations
544
Sectored snakes: evaluating learned-energy segmentations
545
Sectored-beam multi-signal TWT analysis
546
Sectored-beam reflectarray antenna with pattern reconfiguration by using RF-MEMS switches
547
Sector-focused cyclotrons
548
Sector-focused stability for high resolution array processing
549
Sectorial Coverage in a Deployment of a WMN Backbone Based on Directional Antennas
550
Sectorial cylindrical patch antenna for broadband at sea wireless nodes installed on vessels
551
Sectorial direction finding antenna array with a MLP beamformer
552
Sectorial-Beam Dielectric Resonator Antenna for WiMAX With Bent Ground Plane
553
Sectoring in WiMAX relay 802.16j to enhance the system throughput
554
Sectoring of a locally centralized communication system in an indoor environment
555
Sectorised antenna array and measurement methodology for indoor ultra-wideband applications
556
Sectorised horn antenna array using an RF MEMS rotary switch
557
Sectorised radio channel characterisation for ultra wideband body-centric wireless communications
558
Sectorised WiMAX antenna for future vehicular communications systems
559
Sectorization and Intra-Site CoMP: Comparison of Field-Trials and System-Level Simulations
560
Sectorization gain in CDMA cellular systems
561
Sectorization of UHF RFID tags using a steerable phased antenna array
562
Sectorization with beam pattern design using 3D beamforming techniques
563
Sectorized antenna system for CDMA cellular networks
564
Sectorized Antenna-based DoA Estimation and Localization: Advanced Algorithms and Measurements
565
Sectorized calibration of an ESPAR antenna for CUBA-MUSIC direction of arrival estimation
566
Sectorized channel borrowing scheme with resource pooling
567
Sectorized Location Dependent Key Management
568
Sectorized proximity location management
569
Sectorized space-time adaptive processing for CDMA systems
570
Sectorized space-time multiuser detection for CDMA systems
571
Sectorless ATM — A concept to increase en-route efficiency
572
Sectorless ATM and advanced SESAR concepts: Complement not contradiction
573
Sector-mode beamforming of a 2.4-GHz electronically steerable passive array radiator antenna for a wireless ad hoc network
574
Sectors of nonexistence of surface acoustic waves in potassium niobate
575
Sectors on sectors (SonS): A new hierarchical clustering visualization tool
576
Sector-scanning sonar for ocean engineering
577
Sector-shaped dual-polarized patch antenna for UMTS/WIMAX applications
578
Sector-Switching Sonication Strategy for Accelerated HIFU Treatment of Prostate Cancer:
In Vitro
Experimental Validation
579
Sector-vortex scanning for hyperthermia with a large square ultrasound phased array aperture
580
Sectretary´s Western tour
581
SECTrust: A Secure and Effective Distributed P2P Trust Model
582
Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security
583
SECUAREA: Security in physical and logical areas
584
Secuirty storage in the Cloud Computing: A RSA-based assumption data integrity check without original data
585
Secular behavior and breakdown of chaotic ray solutions
586
Secular change in characteristics of thyristors used in HVDC valve
587
Secular vs. Islamist polarization in Egypt on Twitter
588
SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks
589
Securable Personal Health Records using ciphertext policy attribute based encryption
590
SECURCOM - the security solution for Ethernet LANs
591
Secure & Rapid Composition of Infrastructure Services in the Cloud
592
Secure & agile wide-area virtual machine mobility
593
Secure & robust RED (SR-RED)
594
Secure & trusted communication in emergency situations
595
Secure 2.5 Gbit/s, 16-Ary OCDM Block-Ciphering With XOR Using a Single Multi-Port En/Decoder
596
Secure 2.5Gbit/s, 16-ary OCDM block-ciphering with XOR using a single multi-port en/decoder and its transmission experiment with true clock recovery
597
Secure 2ACK routing protocol in Mobile Ad Hoc Networks
598
Secure 3G user authentication in adhoc serving networks
599
Secure 3GPP-WLAN authentication protocol based on EAP-AKA
600
Secure 77GHz Vivaldi antenna for millimeter wave communication
601
Secure AAA and Mobility for Nested Mobile Networks
602
Secure AAA by Means of Identity Tokens in Next Generation Mobile Environments
603
Secure abstraction views for scientific workflow provenance querying
604
Secure Abstraction with Code Capabilities
605
Secure access & authentication for collaborative intercloud exchange service
606
Secure access and management of smart objects with SNMPv3
607
Secure access control by means of human stress detection
608
Secure Access Control for Health Information Sharing Systems
609
Secure Access Control for Location-Based Applications in WLAN Systems
610
Secure access control for multi-cloud resources
611
Secure access control in a TINA environment containing mobile agents
612
Secure Access Control Model for Business Process
613
Secure access control protocol for WSNs with inter-network roaming
614
Secure Access Control Scheme of RFID System Application
615
Secure Access Control Schemes for RFID Systems with Anonymity
616
Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption
617
Secure access for MANET using authorization enforcement facility
618
Secure Access of Smart Cards Using Elliptic Curve Cryptosystems
619
Secure access system using signature verification over tablet PC
620
Secure Access to Cloud Resources
621
Secure access to corporate resources in a multi-access perspective: needs, problems, and solutions
622
Secure access to data over the Internet
623
Secure access to electronic newspaper
624
Secure Access to Grid Information Service Using Shibboleth and PERMIS
625
Secure access to medical information by smart cards
626
Secure access to personalized Web services
627
Secure access wrapper: mediating security between heterogeneous databases
628
Secure active network prototypes
629
Secure ad hoc networking
630
Secure ad hoc networks [Message from the Editor-in-Chief]
631
Secure Ada Target: Issues, System Design, and Verification
632
Secure Adaptive Filtering
633
Secure adaptive transmission in two-way relay wiretap channels
634
Secure address auto-configuration for mobile ad hoc networks
635
Secure ADS-B design & evaluation
636
Secure ADS-B usage in ATC tracking
637
Secure advanced video coding based on selective encryption algorithms
638
Secure AES Coprocessor Against Power Analysis for Wireless Sensor Networks
639
Secure AES engine with a local switched-capacitor current equalizer
640
Secure agent-based management for pervasive environments
641
Secure agent-mediated online auction framework
642
Secure Aggregation and Attack Detection for Smart Grid System
643
Secure aggregation for wireless networks
644
Secure aggregation in hybrid mesh/sensor networks
645
Secure Aggregation in Sensor Networks Using Neighborhood Watch
646
Secure Aggregation with Malicious Node Revocation in Sensor Networks
647
Secure agreement scheme for g
xy
via password authentication
648
Secure aircraft communications addressing and reporting system (ACARS)
649
Secure alert tracking in supply chain
650
Secure Allocation of Reguiating Reserve in the Presence of Bus-Demand Uncertainty
651
Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation
652
Secure and adaptive state estimation for a PMU-equipped smart grid
653
Secure and anonymous electronic commerce protocol over a public network
654
Secure and anonymous mobile ad-hoc networks
655
Secure and anonymous TTP-based Electronic Payment Systems and making anonymity and security via multi-user interfaces and passwords
656
Secure and authentic communication on existing in-vehicle networks
657
Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption
658
Secure and Authenticated Communication in Chip-Level Microcomputer Bus Systems with Tree Parity Machines
659
Secure and Authenticated Key Agreement protocol with minimal complexity of operations in the context of identity-based cryptosystems
660
Secure and bandwidth-on-demand full-service access network
661
Secure and constant cost public cloud storage auditing with deduplication
662
Secure and continuous management of heterogeneous ad hoc networks
663
Secure and Controlled Sharing of Data in Distributed Computing
664
Secure and cost effective transaction model for financial services
665
Secure and cost-effective exchange of cardiac images over the electronic highway in the Netherlands
666
Secure and customizable software applications in embedded networks
667
Secure and dependable patterns in organizations: an empirical approach
668
Secure and distributed conference-key distribution
669
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
670
Secure and distributed data in wireless sensor network
671
Secure and distributed knowledge management in pervasive environments
672
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge
673
Secure and DoS-Resistant Network Reprogramming in Sensor Networks Based on CPK
674
Secure and Dynamic Cooperation of Personal Networks in a Fednet
675
Secure and Easy Internet Voting
676
Secure and easy-to-use registration of mobile and stationary devices to wireless ad-hoc CE networks
677
Secure and effective anonymization against re-publication of dynamic datasets
678
Secure and effective image storage for cloud based e-healthcare systems
679
Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications
680
Secure and efficient authentication in Wireless Mesh Networks using merkle trees
681
Secure and Efficient Authentication Scheme for Remote Systems
682
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks
683
Secure and Efficient Capability-Based Power Management in the Smart Grid
684
Secure and Efficient Cloud Computing Framework
685
Secure and efficient coding of biomedical signals, periodic measurements and contextual data in body area networks
686
Secure and efficient constructions of hash, MAC and PRF for mobile devices
687
Secure and efficient context data collection using Content-Centric Networking
688
Secure and efficient cryptosystem for smart grid using homomorphic encryption
689
Secure and Efficient Data Aggregation for Wireless Sensor Networks
690
Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
691
Secure and efficient data replay in distributed eHealthcare information system
692
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks
693
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
694
Secure and Efficient Data-Sharing in Clouds
695
Secure and efficient design and implementation of out-of-band storage virtualization
696
Secure and efficient digital coins
697
Secure and Efficient Dynamic Group Key Agreement Protocol for an Ad Hoc Network
698
Secure and Efficient Framework for High-Resolution, Short-Term Numerical Simulations of Weather Phenomena on Mobile Platforms
699
Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA
700
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
701
Secure and efficient handover protocols for WMNs
702
Secure and Efficient Handover Schemes for Heterogeneous Networks
703
Secure and efficient in-network processing of exact SUM queries
704
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator split
705
Secure and Efficient Key Agreement Protocols for Wireless Communication
706
Secure and efficient key distribution for collaborative applications
707
Secure and efficient key management in mobile ad hoc networks
708
Secure and Efficient Key Management Protocol in Ad Hoc Networks
709
Secure and efficient key management scheme for wireless sensor networks
710
Secure and efficient key management technique in quantum cryptography network
711
Secure and efficient LBIST for feedback shift register-based cryptographic systems
712
Secure and Efficient LCMQ Entity Authentication Protocol
713
Secure and efficient medium access in wireless networks
714
Secure and Efficient Membership Control for Ad Hoc Groups
715
Secure and efficient metro-access network using network coding
716
Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments
717
Secure and efficient MPEG delivery in wireless residential networks
718
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation
719
Secure and Efficient Multi-Hop Mobile IP Registration Scheme for MANET-Internet Integrated Architecture
720
Secure and efficient multitenant database for an ad hoc cloud
721
Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard
722
Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture
723
Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
724
Secure and efficient protocol for position-based routing in VANETs
725
Secure and efficient range queries on outsourced databases using Rp-trees
726
Secure and Efficient Recommendation Service of RFID System Using Authenticated Key Management
727
Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networks
728
Secure and efficient schemes to entrust the use of private keys
729
Secure and Efficient Search Technique in Cloud Computing
730
Secure and efficient sharing aggregation scheme for data protection in WSNs
731
Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment
732
Secure and efficient source location privacy-preserving scheme for wireless sensor networks
733
Secure and efficient support of internet multicast transmission over satellite DVB
734
Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks
735
Secure and efficient transmission in wireless network using key authentication based secured multicasting technique
736
Secure and Efficient Trust Opinion Aggregation for Vehicular Ad-Hoc Networks
737
Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme
738
Secure and efficient two-party certificateless authenticated key agreement protocol
739
Secure and Efficient Video Surveillance in Cloud Computing
740
Secure and efficient Web metering scheme
741
Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks
742
Secure and Energy Aware Routing Against Wormholes and Sinkholes in Wireless Sensor Networks
743
Secure and Energy Efficient Key Management Scheme Using Authentication in Cluster Based Routing Protocol
744
Secure and energy efficient routing algorithm for wireless sensor networks
745
Secure and energy-efficient data aggregation in Wireless Sensor Networks
746
Secure and Energy-Efficient Disjoint Multipath Routing for WSNs
747
Secure and Energy-Efficient Image Transmission for Wireless Sensor Networks
748
Secure and energy-efficient multicast routing in smart grids
749
Secure and fast encryption using chaotic Kolmogorov flows
750
Secure and fast handover scheme based on pre- authentication method for 802.16/WiMAX infrastructure networks
751
Secure and fast missing RFID tags identification with lightweight MAC and rateless coding
752
Secure and Fast Multimedia Digital Content Distribution System Based on a Partial Encryption and Group-Key
753
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
754
Secure and fault-tolerant voting in distributed systems
755
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode
756
Secure and flexible framework for decentralized social network services
757
Secure and flexible grid computing based intrusion detection system using mobile agents and cryptographic traces
758
Secure and flexible method for SBC/firewall management
759
Secure and flexible model for firewall policy management
760
Secure and Flexible Monitoring of Virtual Machines
761
Secure and flexible support for visitors in enterprise Wi-Fi networks
762
Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity
763
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
764
Secure and high-performance Web server system for shared hosting service
765
Secure and HVS-adaptive exhibition Spread Transform Dither Modulation watermarking for Digital Cinema
766
Secure and image retrieval based on multipurpose watermarking for oracle images databases
767
Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client
768
Secure and integrated handover authentication scheme with FMIPv6
769
Secure and invisible data hiding in 2-color images
770
Secure and Lightweight Authentication Protocol for NFC Tag Based Services
771
Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks
772
Secure and lossless data hiding by histogram shifting and scan paths using integer wavelet transform
773
Secure and Low Cost Selective Encryption for JPEG2000
774
Secure and low-power authentication for resource-constrained devices
775
Secure and manageable virtual private networks for end-users
776
Secure and Mobile VoIP
777
Secure and Multihomed Vehicular Femtocells
778
Secure and Oblivious Information Hiding in Binary Image
779
Secure and Observable Auditing of Electronic Voting Systems using Stock Indices
780
Secure and Optimal Content-centric Networking Caching Design
781
Secure and optimal operation of a power generation and transmission system-application to the Moroccan system
782
Secure and optimal operation of hybrid AC/DC grids with large penetration of offshore wind
783
Secure and Optimal Routing Protocol for Multi-Hop Cellular Networks
784
Secure and optimized data storage for IoT through cloud framework
785
Secure and Policy-Compliant Source Routing
786
Secure and Policy-Private Resource Sharing in an Online Social Network
787
Secure and practical identity-based encryption
788
Secure and practical outsourcing of linear programming in cloud computing
789
Secure and privacy aware RFIDs
790
Secure and privacy enhanced authentication framework for cloud computing
791
Secure and privacy enhanced email system as a cloud service
792
Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique
793
Secure and privacy preserving keyword searching cryptography
794
Secure and privacy preserving protocol for cloud-based vehicular DTNs
795
Secure and privacy-enhanced e-mail system based on the concept of proxies
796
Secure and Privacy-Enhancing Vehicular Communication: Demonstration of Implementation and Operation
797
Secure and Privacy-Friendly Logging for eGovernment Services
798
Secure and Privacy-Friendly Public Key Generation and Certification
799
Secure and privacy-preserving AMI-utility communications via LTE-A networks
800
Secure and privacy-preserving biometrics based active authentication
801
Secure and privacy-preserving database services in the cloud
802
Secure and Privacy-Preserving Proxy Voting System
803
Secure and privacy-preserving querying of content in MANETs
804
Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems
805
Secure and Private Collaborative Linear Programming
806
Secure and Private Management of Healthcare Databases for Data Mining
807
Secure and Progressive image transmission through shadows generated by multiwavelet transform
808
Secure and Provable Service Support for Human-Intensive Real-Estate Processes
809
Secure and QoS aware architecture for cloud using software defined networks and Hadoop
810
Secure and QoS-aware communications for smart home services
811
Secure and QoS-aware SIP handover for VoIP communication in vehicular adhoc networks
812
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments
813
Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth
814
Secure and reliable cloud networks for smart transportation services
815
Secure and reliable decentralized peer-to-peer Web cache
816
Secure and Reliable Distributed Health Records: Achieving Query Assurance across Repositories of Encrypted Health Data
817
Secure and reliable Java-based middleware - challenges and solutions
818
Secure and Reliable Prediction Based Target Tracking for Wireless Sensor Networks
819
Secure and reliable remote access for the European XFEL control system
820
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
821
Secure and reliable transmission mechanism for orthogonal frequency-division multiple access worldwide interoperability for microwave access systems
822
Secure and reliable VM-vTPM migration in private cloud
823
Secure and reliable wide-area power-line communication for soft-real-time applications within REMPLI
824
Secure and resilient clock synchronization in wireless sensor networks
825
Secure and resilient data printed on paper
826
Secure and resilient distributed machine learning under adversarial environments
827
Secure and resilient peer-to-peer e-mail design and implementation
828
Secure and revocable node authentication in Vehicular Ad-Hoc Networks
829
Secure and robust audio watermarking scheme based on discrete fractional transform
830
Secure and robust audio watermarking system for copyright protection
831
Secure and robust automatic service creation in multicarrier Ethernet networks
832
Secure and robust clustering for quantized target tracking in wireless sensor networks
833
Secure and Robust Error Correction for Physical Unclonable Functions
834
Secure and robust high quality DWT domain audio watermarking algorithm with binary image
835
Secure and Robust Iris Recognition Using Random Projections and Sparse Representations
836
Secure and Robust Localization in a Wireless Ad Hoc Environment
837
Secure and robust sift with resistance to chosen-plaintext attack
838
Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach
839
Secure and robust steganography using side information at the encoder
840
Secure and Robust Two-Phase Image Authentication
841
Secure and robust watermarking technique
842
Secure and robust Wi-Fi fingerprinting indoor localization
843
Secure and safety-critical vs. insecure, non safety-critical embedded systems: do they require completely different design approaches?
844
Secure and Scalable Aggregation in the Smart Grid
845
Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks
846
Secure and Scalable Fault Localization under Dynamic Traffic Patterns
847
Secure and scalable inter-domain group key management for N-to-N multicast
848
Secure and scalable optical access network using PLZT high-speed optical switches
849
Secure and scalable replication in Phalanx
850
Secure and Scalable Video Streaming over IEEE 802.11e Based Home Networks
851
Secure and seamless handover solution for Real-time applications
852
Secure and seamless mobility support in heterogeneous wireless networks
853
Secure and Serverless RFID Authentication and Search Protocols
854
Secure and simplified access to home appliances using Iris recognition
855
Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model
856
Secure and survivable software systems
857
Secure and testable scan design using extended de Bruijn graphs
858
Secure and time efficient hash-based message authentication algorithm for wireless sensor networks
859
Secure and traceable online image sharing
860
Secure and trusted algorithm for cognitive radio network
861
Secure and trusted cloud of things
862
Secure and Trusted SoC: Challenges and Emerging Solutions
863
Secure and usable monitoring in body area network for ubiquitous healthcare and medical system
864
Secure and Usable Requirements Engineering
865
Secure and user friendly PIN entry method
866
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations
867
Secure and Verifiable P2P Card Games
868
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
869
Secure and verifiable vector space secret sharing scheme
870
Secure anonymous authentication protocol with unlinkability for mobile wireless environment
871
Secure Anonymous Broadcasting in Vehicular Networks
872
Secure Anonymous Donation Protocol
873
Secure anonymous group infrastructure for common and future Internet applications
874
Secure Anonymous Routing in Clustered Multihop Wireless Ad Hoc Networks
875
Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks
876
Secure Anonymous Routing in Wireless Mesh Networks
877
Secure Anonymous Threshold Subliminal Channel for Ad Hoc Environments
878
Secure Anonymous Union Computation Among Malicious Partners
879
Secure Antenna Subset Modulation with Coordinate Interleaved Orthogonal Designs
880
Secure AODV against maliciously packet dropping
881
Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc
882
Secure AODV to combat black hole attack in MANET
883
Secure application access to IMS via 4G GAA architecture
884
Secure application of transformer differential relays for bus protection
885
Secure applications — Hack-proofing your app
886
Secure applications need flexible operating systems
887
Secure applications of RSA system in the electronic commerce
888
Secure Approximate Nearest Neighbor Search over Encrypted Data
889
Secure Architecture and Protocols for Robust Perceptual Hashing
890
Secure architecture dedicated for VANET alarm messages authentication through semantic verification
891
Secure architecture for embedded systems
892
Secure architecture for healthcare Wireless Sensor Networks
893
Secure architecture for multicasting on active virtual private
894
Secure architecture for RFID enabled supply chain hierarchy
895
Secure Arithmetic Coding
896
Secure Arithmetic Coding Using Interval Splitting
897
Secure Array Synthesis
898
Secure arrays for digital watermarking
899
Secure Association for the Internet of Things
900
Secure ATC surveillance for military applications
901
Secure atomic multicast primitives for distributed information assurance applications
902
Secure audio teleconferencing
903
Secure Audit Logs Server to support computer forensics in criminal investigations
904
Secure authenticated key agreement protocol for WMEN based on protocol composition logic
905
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks
906
Secure Authenticated Key Exchange protocol based on EC using Signcryption Scheme
907
Secure authenticated key exchange with revocation for smart grid
908
Secure authentication and authorization scheme for mobile devices
909
Secure authentication and communication in ubiquitous healthcare middleware
910
Secure authentication and key establishment in the SIP architecture
911
Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN
912
Secure authentication for DNP3
913
Secure Authentication for Face Recognition
914
Secure Authentication for Structured Smart Grid System
915
Secure Authentication in Wireless Sensor Networks Using RF Fingerprints
916
Secure authentication model for online health monitoring system
917
Secure Authentication on WiMAX with Neural Cryptography
918
Secure authentication protocol for mobile
919
Secure Authentication Protocol for RFID Systems
920
Secure Authentication Protocols Used for Low Power Wireless Sensor Networks
921
Secure authentication scheme for Long Term Evolution-Advanced
922
Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks
923
Secure authentication scheme in wireless networks
924
Secure authentication system incorporating hand shapes verification and cryptography techniques
925
Secure authentication using biometric templates in Kerberos
926
Secure Authentication using Image Processing and Visual Cryptography for Banking Applications
927
Secure authentication watermarking for binary images
928
Secure authorization for controlling access via key management scheme
929
Secure authorization, access control and data integrity in Bluetooth
930
Secure autoconfiguration and public-key distribution for Mobile Ad-hoc Networks
931
Secure automated document delivery
932
Secure automatic generation control. Principle, simulation models and results
933
Secure automotive gateway ??? Secure communication for future cars
934
Secure automotive telematics system (SATS)
935
Secure Autonomic Communication using RSA Algorithm
936
Secure backup protection of transmission line using WAMS
937
Secure Bandwidth Reservation Routing Mechanism for Mobile Ad-Hoc Wireless Networks
938
Secure Battery Supported Power Supplies
939
Secure beamforming and artificial noise design in interference networks with imperfect ECSI
940
Secure beamforming based on sparsity in multiple amplify-and-forward MIMO relay networks
941
Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way Relaying
942
Secure Beamforming Design in Wiretap MISO Interference Channels
943
Secure beamforming design in wiretap MISO interference channels
944
Secure beamforming for cognitive radio networks with artificial noise
945
Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer
946
Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay
947
Secure beamforming for MIMO two-way transmission with an untrusted relay
948
Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages
949
Secure Behavior of Web Browsers to Prevent Information Leakages
950
Secure big data storage and sharing scheme for cloud tenants
951
Secure binary embeddings for privacy preserving nearest neighbors
952
Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture
953
Secure Bindings of SAML Assertions to TLS Sessions
954
Secure Biometric Recognition method in Home Network
955
Secure Biometric System Design
956
Secure biometric system for accessing home appliances via Internet
957
Secure biometric template protection via randomized dynamic quantization transformation
958
Secure Biometric Templates from Fingerprint-Face Features
959
Secure biometric-key generation with biometric helper
960
Secure biometrics
961
Secure Biometrics: Concepts, Authentication Architectures, and Challenges
962
Secure Bit Commitment From Relativistic Constraints
963
Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow Protection
964
Secure Bit: Transparent, Hardware Buffer-Overflow Protection
965
Secure bits through queues
966
Secure blind image steganographic technique using discrete Fourier transformation
967
Secure Block Device -- Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems
968
Secure Blue: an architecture for a scalable, reliable high volume SSL Internet server
969
Secure boot process for wireless sensor node
970
Secure Boot Revisited
971
Secure bootstrapping and routing in an IPv6-based ad hoc network
972
Secure Bootstrapping of Distributed Hash Tables in Dynamic Wireless Networks
973
Secure bootstrapping of nodes in a CoAP network
974
Secure Border Gateway Protocol (S-BGP)
975
Secure bridging in large scale deployment of Ethernet
976
Secure Broadcast in Wireless Sensor Networks
977
Secure Broadcast with One-Time Signatures in Controller Area Networks
978
Secure broadcasting : The secrecy rate region
979
Secure broadcasting in cooperative cognitive radio networks
980
Secure broadcasting of a common message with independent secret keys
981
Secure Broadcasting Over Fading Channels
982
Secure Broadcasting over Fading Channels with Statistical QoS Constraints
983
Secure broadcasting using multiple antennas
984
Secure broadcasting using the secure lock
985
Secure browser architecture based on hardware virtualization
986
Secure Browser-Based Access to Web Services
987
Secure burst control packet scheme for Optical Burst Switching networks
988
Secure Business Content Delivery Service
989
Secure business process management: a roadmap
990
Secure Business Processes defined through a UML 2.0 extension
991
Secure Business Processes in Service-Oriented Architectures -- A Requirements Analysis
992
Secure buyer-seller watermarking protocol
993
Secure by design approach to improve security of object oriented software
994
Secure Byzantine Fault Tolerant LDAP System
995
Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication
996
Secure caching with non-uniform demands
997
Secure cancelable fingerprint key generation
998
Secure candidate access router discovery
999
Secure capability-based access control in the M2M local cloud platform
1000
Secure capacity of multi-hop wireless networks with random key pre-distribution