<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Security testing for Android mHealth apps
2
Security testing for hardware products: the security evaluations practice
3
Security Testing for Intrusion Provention System - The Security Evaluation Practice
4
Security testing in Android networks - A practical case study
5
Security testing in software engineering courses
6
Security testing in the cloud by means of ethical worm
7
Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection
8
Security Testing Methods and Techniques of Industrial Control Devices
9
Security testing of a modular cryptosystem based on continuous cellular automata
10
Security testing of an aerospace launch system
11
Security testing of high impedance fault detectors
12
Security Testing of Internal Tools
13
Security testing of orchestrated business processes in SOA
14
Security testing of the communication among Android applications
15
Security testing of web applications: A research plan
16
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities
17
Security Testing with Fault-Models and Properties
18
Security Testing: Turning Practice into Theory
19
Security tests for mobile applications — Why using TLS/SSL is not enough
20
Security the new frontier [Information Technology Embedded Security]
21
Security Theory and Attack Analysis for Text Watermarking
22
Security Think
23
Security thoughts and solutions for geological environment of Longdong energy base in Gansu province
24
Security threat
25
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation
26
Security Threat Identification and Testing
27
Security Threat Prediction in a Local Area Network Using Statistical Model
28
Security Threats against the Communication Networks for Traffic Control Systems
29
Security threats against the transmission chain of a medical health monitoring system
30
Security Threats Analysis and Considerations for Internet of Things
31
Security threats analysis for Android based Mobile Device
32
Security Threats and Countermeasure Frame Using a Session Control Mechanism on VoLTE
33
Security Threats and Countermeasures for Intra-vehicle Networks
34
Security Threats and Mitigating Risk for USB Devices
35
Security threats and risks with content transformation intermediaries
36
Security threats and solutions in cloud computing
37
Security threats for IPv6 transition strategies: A review
38
Security threats in cloud computing
39
Security threats in cloud computing
40
Security threats in cloud computing
41
Security Threats in Cloud Computing Models: Domains and Proposals
42
Security threats in Cognitive Radio applications
43
Security Threats in Cognitive Radio Networks
44
Security threats in military cognitive radio networks
45
Security Threats in Online Social Networks
46
Security threats in sensor network and their possible solutions
47
Security threats in wireless sensor networks
48
Security Threats in Wireless Sensor Networks
49
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
50
Security threats of wireless networks: A survey
51
Security Threats on EPC Based RFID Systems
52
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones
53
Security Threats to Mobile Service Development in the Age of Digital Convergence
54
Security threats to signal classifiers using self-organizing maps
55
Security Threats to the Platform Identification
56
Security through Diversity: Are We There Yet?
57
Security through Diversity: Leveraging Virtual Machine Technology
58
Security through Information Risk Management
59
Security through obscurity: An approach for protecting Register Transfer Level hardware IP
60
Security through play
61
Security through quantum communication
62
Security through redundant data diversity
63
Security Toolbox for Detecting Novel and Sophisticated Android Malware
64
Security topology in wireless sensor networks with routing optimisation
65
Security track chairs welcome message
66
Security traffic image transmission based on EZW and AES
67
Security transition roadmap to 4G and future generations wireless networks
68
Security transmission of FTP data based on IPSec
69
Security transmission routing protocol for MIMO-VANET
70
Security transmission with modulator structure hopping in cooperative system with untrusted relay
71
Security Trend Analysis with CVE Topic Models
72
Security triage: A report of a lean security requirements methodology for cost-effective security analysis
73
Security upgrades at the Lawrence Livermore National Laboratory
74
Security upgrades for SNM processing facilities at LLNL
75
Security Usability
76
Security Usability Principles for Vulnerability Analysis and Risk Assessment
77
Security using colors and Armstrong numbers
78
Security using Shannon-Fano-Elias codes
79
Security Validation of Continuous-Time Chaotic Communication Systems by Error Function Attack
80
Security Variability Design and Analysis in an Aspect Oriented Software Architecture
81
Security vendor CTOs: perspectives, opinions, and lessons learned
82
Security verification for authentication and key exchange protocols
83
Security Verification for Authentication and Key Exchange Protocols, Revisited
84
Security Verification of 802.11i 4-Way Handshake Protocol
85
Security verification of hardware-enabled attestation protocols
86
Security Verification of Location Estimate in Wireless Sensor Networks
87
Security Verification of Trust-Based Authentication Handover in IP Networks
88
Security Verification Techniques Applied to PatchLink COTS Software
89
Security versus Bandwidth: The Support of Mechanisms WEP e WPA in 802.11g Network
90
Security Versus Reliability Analysis of Opportunistic Relaying
91
Security visualization tools and IPv6 addresses
92
Security visualization: Cyber security storm map and event correlation
93
Security Vs cost: An issue of multi-objective optimization for choosing PGP algorithms
94
Security vs Performance: Tradeoffs using a Trust Framework
95
Security vs. safety: Why do people die despite good safety?
96
Security vs. test quality: are they mutually exclusive?
97
Security vs. test quality: can we really only have one at a time?
98
Security vs. test quality: fully embedded test approaches are the key to having both
99
Security Vulnerabilities - From Data Analysis to Protection Mechanisms
100
Security Vulnerabilities and Mitigation Strategies for Application Development
101
Security vulnerabilities and protection mechanisms of mobility management protocols
102
Security vulnerabilities and risks in industrial usage of wireless communication
103
Security vulnerabilities and solutions for packet sampling
104
Security vulnerabilities assessment of the X.509 protocol by syntax-based testing
105
Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols
106
Security vulnerabilities in command and control interoperability
107
Security vulnerabilities in DNS and DNSSEC
108
Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access Control
109
Security vulnerabilities in IEEE 802.11 and adaptive encryption technique for better performance
110
Security vulnerabilities in modern web browser architecture
111
Security vulnerabilities in open source projects: An India perspective
112
Security vulnerabilities in physical layer of cognitive radio
113
Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives
114
Security vulnerabilities of an remote password authentication scheme with smart card
115
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
116
Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures
117
Security vulnerabilities of the Mexican digital invoices by internet
118
Security Vulnerabilities of the NDEF Signature Record Type
119
Security Vulnerabilities: From Analysis to Detection and Masking Techniques
120
Security Vulnerability and Considerations in Mobile RFID environment
121
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems
122
Security Vulnerability Assessment of OpenStack Cloud
123
Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network
124
Security vulnerability in coherence modulation communication systems
125
Security weakness in a dynamic program update protocol for wireless sensor networks
126
Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang
127
Security weakness of two identity-based multiple key agreement protocols
128
Security Weaknesses Detection by Symbolic Analysis of Scenarios
129
Security Weaknesses in Chang and Wu´s Key Agreement Protocol for a Multi-Server Environment
130
Security weaknesses of an improved biometrics-based user authentication scheme without concurrency system
131
Security weaknesses of song´s advanced smart card based password authentication protocol
132
Security weaknesses of two-parity ID-based authenticated key agreement protocols
133
Security weaknesses of WEP protocol IEEE 802.11b and enhancing the security with dynamic keys
134
Security Welcome Message
135
Security with holographic barcodes using Computer generated holograms
136
Security with privacy - A research agenda
137
Security with Privacy -- Opportunities and Challenges: Panel Position Paper
138
Security with Quality-of-Services optimization in Wireless Sensor Networks
139
Security within space data systems
140
Security within TINA accounting architecture management
141
Security wrappers and power analysis for SoC technology
142
Security XACML access control model based on SOAP encapsulate
143
Security, cost, and operational benefits of EC-61850
144
Security, Group Size, and the Human Brain
145
Security, Internet connectivity and aircraft data networks
146
Security, Internet Connectivity and Aircraft Data Networks
147
Security, Internet connectivity and aircraft data networks
148
Security, interoperability, and quality of service aspects in designing a telecommunications platform for virtual laboratories
149
Security, payment, and privacy for network commerce
150
Security, privacy and efficiency of Internet banking transactions
151
Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems
152
Security, privacy and trust in cloud computing: A comparative study
153
Security, privacy and trust oriented requirements modeling for examination system
154
Security, privacy, and accountability in wireless access networks
155
Security, privacy, and health
156
Security, Privacy, and Policy Roundup
157
Security, Privacy, and Policy Roundup
158
Security, Privacy, and Policy Roundup
159
Security, Privacy, and Policy Roundup
160
Security, Privacy, and Policy Roundup
161
Security, Privacy, and the Built Environment
162
Security, Privacy, and the Role of Law
163
Security, Privacy, Policy, and Dependability Roundup
164
Security, Privacy, Policy, and Dependability Roundup
165
Security, Privacy, Policy, and Dependability Roundup
166
Security, Privacy, Policy, and Dependability Roundup
167
Security, Privacy, Policy, and Dependability Roundup
168
Security, privacy, policy, and dependability roundup
169
Security, Privacy, Policy, and Dependability Roundup
170
Security, Privacy, Policy, and Dependability Roundup
171
Security, Privacy, Policy, and Dependability Roundup
172
Security, Privacy, Policy, and Dependability Roundup
173
Security, Privacy, Policy, and Dependability Roundup
174
Security, Reliability in the Networks 4G, Using Elliptic Curve, Irregular LDPC Code and Interleavers of Block
175
Security, trust and privacy (STP) framework for federated single sign-on environment
176
Security, trust and risk in Digital Rights Management ecosystem
177
Security, user experience, acceptability attributes for the integration of physical and virtual identity access management systems
178
Security, wiretapping, and the Internet
179
Security/Policy [breaker page]
180
Security/privacy of wearable fitness tracking IoT devices
181
Security: A major threat for web services
182
Security: a new clinical engineering paradigm
183
Security: Active Authentication
184
Security: Bridging the Academia-Industry Gap Using a Case Study
185
Security: Cross Layer Protocol in Wireless Sensor Network
186
Security: technical, social, and legal challenges
187
Security? What security?
188
Security--A Perpetual War: Lessons from Nature
189
Security-as-a-Service for Microservices-Based Cloud Applications
190
Security-as-a-service in big data of civil aviation
191
Security-auditing in a softswitch
192
Security-aware adaptive dynamic source routing protocol
193
Security-aware beacon based network monitoring
194
Security-aware functional modeling of Cyber-Physical Systems
195
Security-aware mapping for CAN-based real-time distributed automotive systems
196
Security-aware mapping for TDMA-based real-time distributed systems
197
Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink
198
Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems
199
Security-aware optimal resource allocation for virtual network embedding
200
Security-Aware Real-Time Scheduling for Hypervisors
201
Security-Aware Refactoring Alerting its Impact on Code Vulnerabilities
202
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes
203
Security-Aware Resource Allocation for Mobile Cloud Computing Systems
204
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
205
Security-Aware Resource Allocation in Clouds
206
Security-aware resource management for real-time applications on clusters
207
Security-aware routing and localization for a directional mission critical network
208
Security-Aware Scheduling of Mission Tasks under Temporal Constraints
209
Security-Aware Service Composition with Fine-Grained Information Flow Control
210
Security-aware service migration for tactical mobile micro-clouds
211
Security-aware signal packing algorithm for CAN-based automotive cyber-physical systems
212
Security-aware SoC test access mechanisms
213
Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools
214
Security-Aware Topology Control for Wireless Ad-Hoc Networks
215
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
216
Security-aware virtual network embedding
217
Security-aware VLSI design for speaker identification based on efficient SMO architecture
218
Security-Awareness in Network Virtualization: A Classified Overview
219
Security-based approach to data consistency in a virtual enterprise
220
Security-based circuit breaker maintenance management
221
Security-based congestion management by means of Demand Response programs
222
Security-based demand response allocation
223
Security-based rescheduling of transactions in a deregulated power system
224
Security-based transmission system planning using transmission line performance indices
225
Security-centric FPGA CAD tools to balance dual-rail routing INWDDL designs
226
Security-Constrained Adequacy Evaluation of Bulk Power System Reliability
227
Security-Constrained Co-Optimization Planning of Electricity and Natural Gas Transportation Infrastructures
228
Security-constrained dispatch with controllable loads for integrating stochastic wind energy
229
Security-constrained economic dispatch using semidefinite programming
230
Security-Constrained Economic Scheduling of Generation Considering Generator Constraints
231
Security-Constrained Generation and Transmission Outage Scheduling With Uncertainties
232
Security-constrained generation scheduling with feasible energy delivery
233
Security-Constrained MIP Formulation of Topology Control Using Loss-Adjusted Shift Factors
234
Security-constrained multiobjective generation dispatch using bicriterion global optimisation
235
Security-constrained nodal-based clearing of the European day-ahead electricity market formulated as a MILP model
236
Security-constrained OPF: influence of fixed tap transformer fed loads
237
Security-Constrained Optimal Coordination of Generation and Transmission Maintenance Outage Scheduling
238
Security-constrained optimal generation scheduling for GENCOs
239
Security-constrained optimal generation scheduling for GENCOs
240
Security-constrained optimal generation scheduling in large-scale power systems
241
Security-Constrained Optimal Power and Natural-Gas Flow
242
Security-constrained optimal power flow by mixed-integer genetic algorithm with arithmetic operators
243
Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling
244
Security-Constrained Optimal Power Flow with Post-Contingency Corrective Rescheduling
245
Security-constrained optimal rescheduling of real power using Hopfield neural network
246
Security-constrained price-based unit commitment in the deregulated power market
247
Security-constrained reactive power dispatch
248
Security-constrained reactive power dispatch
249
Security-Constrained Resource Planning in Electricity Markets
250
Security-constrained transmission expansion planning: A multi-objective approach
251
Security-constrained transmission expansion planning: A multi-objective approach
252
Security-constrained unit commitment based on hybrid benders decomposition and mixed integer non-linear programming
253
Security-constrained unit commitment considering wind farms
254
Security-constrained unit commitment for simultaneous clearing of energy and ancillary services markets
255
Security-constrained unit commitment in a system with wind generation and compressed air energy storage
256
Security-constrained unit commitment reaction to load and price forecasting errors
257
Security-constrained unit commitment using Mixed-Integer Programming with Benders Decomposition
258
Security-Constrained Unit Commitment using Particle Swarms
259
Security-constrained unit commitment with AC constraints
260
Security-Constrained Unit Commitment With AC Constraints*
261
Security-Constrained Unit Commitment With AC/DC Transmission Systems
262
Security-constrained unit commitment with dynamic gas constraints
263
Security-constrained unit commitment with large-scale cross-region wind penetration
264
Security-Constrained Unit Commitment With Linearized System Frequency Limit Constraints
265
Security-Constrained Unit Commitment With Natural Gas Transmission Constraints
266
Security-Constrained Unit Commitment with Stochastic Constraints
267
Security-constrained unit commitment with uncertain wind generation: The loadability set approach
268
Security-Constrained Unit Commitment With Uncertain Wind Generation: The Loadability Set Approach
269
Security-Constrained Unit Commitment With Volatile Wind Power Generation
270
Security-constrained unit commitment with volatile wind power generation
271
Security-constrained unit commitment with wind generation and compressed air energy storage
272
Security-constrained unit commitment with wind power generation by using interval linear programming
273
Security-critical system development with extended use cases
274
Security-critical versus safety-critical software
275
Security-driven exploration of cryptography in DSP cores
276
Security-Driven Fault Tolerant Scheduling Algorithm for High Dependable Distributed Real-Time System
277
Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling
278
Security-Driven Scheduling Algorithms Based on EigenTrust in Grid
279
Security-Driven Task Scheduling Based on Evolutionary Algorithm
280
Security-effective fast authentication scheme for PMIPv6-based NEMO with global mobility support
281
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography
282
Security-enhanced 3D communication structure for dynamic 3D-MPSoCs protection
283
Security-Enhanced Callback URL Service in Mobile Device
284
Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid
285
Security-enhanced energy-efficient data aggregation for cluster-based wireless sensor networks
286
Security-enhanced key establishment schemes using network coding
287
Security-enhanced mailing lists
288
Security-enhanced network coding through public-key cryptography
289
Security-Enhanced OFDM-PON Using Hybrid Chaotic System
290
Security-Enhanced OSGi Service Environments
291
Security-enhanced quality of service (SQoS) design and architecture
292
Security-enhanced quality of service (SQOS): a network analysis
293
Security-Enhanced SPECTS O-CDMA Demonstration Across 150 km Field Fiber
294
Security-Enhanced Virtual Channel Rendezvous Algorithm for Dynamic Spectrum Access Wireless Networks
295
Security-functionality tradeoffs in IP transition phase
296
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System
297
Security-Monitoring using Microphone Arrays and Audio Classification
298
Security-Oriented Cloud Platform for SOA-Based SCADA
299
Security-oriented cooperation scheme in wireless cooperative networks
300
Security-Oriented Design for Web-Based Systems: A Critical Review
301
Security-Oriented Service Composition and Evolution
302
Security-oriented transmission based on cooperative relays in cognitive radio
303
Security-Oriented Workflows for the Social Sciences
304
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware
305
Security-related active imaging of dielectric objects attached to human bodies
306
Security-related comments regarding McEliece´s public-key cryptosystem
307
Security-related vulnerability life cycle analysis
308
Security-Reliability Analysis for Cloud Radio Networks with Channel Estimation Error
309
Security-Reliability Tradeoff for Relay Networks in the Presence of Channel Estimation Error
310
Security-reliability tradeoff for relay selection in cooperative amplify-and-forward relay networks
311
Security-reliability tradeoff for secure wireless communications with channel estimation error
312
SecurityViews: A Dynamic Security for View-Oriented Programming
313
SecurSight: an architecture for secure information access
314
SECUSAB Organization Committee
315
SECUSAB Program Committee
316
SECUSAB reviewers
317
SecVLC: Secure transmission over multimedia Wireless Ad hoc Networks with energy-awareness
318
SecWSN 2010 Organizing Committee
319
SecX: A Framework for Collecting Runtime Statistics for SoCs with Multiple Accelerators
320
SEDA4BPEL: A staged event-driven architecture for high-concurrency BPEL engine
321
SEDA4SC: A staged event-driven architecture for adaptive service computing runtime
322
SEDACS-a client/server approach to TPS development
323
SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks
324
SeDas: A Self-Destructing Data System Based on Active Storage Framework
325
SeDas: A self-destructing data system based on active storage framework
326
Sedative and hypnotic effects of Schisandra Chinensis baill lignans
327
SeDAX: A Scalable, Resilient, and Secure Platform for Smart Grid Communications
328
SEDBRS: A Secure and Efficient Desktop Backup and Recovery System
329
SEDC´s Ability to Stabilize SSR: A Case Study on a Practical Series-Compensated Power System
330
SEDCF: seasonal enhanced service differentiation for IEEE 802.11 wireless ad-hoc networks based on seasonal processes
331
SEDE: an environment for 1750 inference
332
SEDES 2007 Workshop
333
SEDGE: Symbolic example data generation for dataflow programs
334
Sediment accretion associated with surgebreaker offshore reef, a low cost shore protection device: An update on the Corps of Engineers Section 54 Program
335
Sediment and Water Quality Response to Climate Change in Bai River Basin
336
Sediment as a Cause of MACROCYSIS Gametophyte Non-Survival
337
Sediment budget of the Vistula Lagoon: The equilibrium or evolution?
338
Sediment Classification Based on Least-Squares Support Vector Machine and Phase-Plane Analysis
339
Sediment classification based on repetitive multibeam bathymetry surveys of an offshore disposal site
340
Sediment Classification by Seismic Reflectivity
341
Sediment Compaction below Iceberg Furrows
342
Sediment Contaminants And Bioaccumulation Of Pollutants In Santa Monica Bay
343
Sediment distribution in El Tablazo Bay, Maracaibo system, Venezuela
344
Sediment modeling based on radar observed surface hydrodynamics
345
Sediment Modeling based on Radar Observed Surface Hydrodynamics
346
Sediment Problem Related to the Expansion Project of Tianwan Nuclear Power Plant
347
Sediment Profile Imaging: An Efficient Method of Remote Ecological Monitoring of the Seafloor (REMOTS
TM
SYSTEM)
348
Sediment Properties as Tracers of Dredged Material Disposed in Open Ocean
349
Sediment quality assessment in Latvia water bodies
350
Sediment Quality Criteria-Developmental Approaches
351
Sediment Sampling at a Depth of 10,131m in the Challenger Deep by ROV Kaiko
352
Sediment Temperature and Redox Potential As Confound Factors Controlling CO2 Flux Between Sediment and the Atmosphere in an Intertidal Zone
353
Sediment transport balance investigations for the Saaremaa harbour with mike 21 models
354
Sediment transport in Hurricane Sandy
355
Sediment Transport Pathways Along The Louisiana Coast
356
Sediment, Soil and Environment Linkages in the Yellow River Delta: A Search for Sustainable Sediment Resource Management
357
Sedimentary architecture and ground penetrating radar (GPR) analysis of sandy-gravel esker deposits in Kozlow, Central Poland
358
Sedimentary basin - A petroleum digital ecosystem
359
Sedimentary evolution of northeastern Guanabara Bay, RJ, revealed by sismoestratigraphic analysis
360
Sedimentary fluxes in the marine-lagoon (Baltic sea-Curonian lagoon) connection
361
Sedimentary Microfacies Identification Using Principal Component Analysis and Neural Network Based on Genetic Algorithm
362
Sedimentary Sequence Feature of the Half Graben Rift-lake Basin: A Case Study of the East Sag, Liaohe Basin
363
Sedimentary structure of the Nazaré coastal dunes (Portugal)
364
Sedimentation characteristics study on the confluence of two rivers using Meshless Local Petrov-Galerkin Method
365
Sedimentation of Activated Sludge Under Different Shear Conditions
366
Sedimentation of colloids in high magnetic fields
367
Sedimentation of non-spherical particles
368
Sedimentation rate and flux in the intertidal wetlands of Luoyang River and Jinjiang River
369
Sedimentological studies of western swiss lakes with high-resolution reflection seismic and amphibious GPR profiling
370
Sedimentophysical Features of the High Sound Velocity and Low Sound Velocity Seabed Areas in the South China Sea
371
Sediments in the East China Sea
372
SeDiS 2011 Message from the International Workshop Organizers
373
SeDiS 2011 Organizing Committee
374
SeDiS 2011 Reviewers
375
SeDiS 2012 Organizing Committee
376
SeDiS 2012 Reviewers
377
SeDiS 2013: Message from the Workshop Chairs
378
SeDiS 2013: Organizing Committee
379
SeDiS 2013: Reviewers
380
SeDiTeC-testing based on sequence diagrams
381
sEditor: A Prototype for a Sign Language Interfacing System
382
SeDL-C: A Language for Modeling Business Terms in Service Descriptions
383
SEDLO: Software engineering for developing learning objects
384
SEDLRF: A New Door Detection System for Topological Maps
385
SEDM 2011 Message from the International Workshop Organizers
386
SEDM 2011 Organizing Committee
387
SEDM 2011 Reviewers
388
SEDNA - Bioacoustic analysis toolbox
389
Sedna: A Memory Based Key-Value Storage System for Realtime Processing in Cloud
390
Se-doped AlGaAs/GaAs HEMTs for stable low-temperature operation
391
SEDOS: designing open distributed systems
392
Sedra and Smith Receive Lifetime Achievement Awards from the Information Technology Association of Canada [People]
393
SEDRIS as a Standard for Interchange Virtual World Data Sets
394
SEDS MIL-STD-1773 fiber optic data bus: Proton irradiation test results and spaceflight SEU data
395
SEDSAT solar array output power analysis
396
SEDUM: Exploiting Social Networks in Utility--Based Distributed Routing for DTNs
397
SEDUMI INTERFACE 1.02: a tool for solving LMI problems with SEDUMI
398
SEE - a new challenge to the MOD [Paper Unavailable]
399
See 5.EMO and Paris with us
400
See a computer talk
401
See a computer talk
402
See all by looking at a few: Sparse modeling for finding representative objects
403
SEE analysis and mitigation for FPGA, and digital ASIC devices
404
SEE analysis of digital InP-based HBT circuits at gigahertz frequencies
405
SEE and TID Characterization of an Advanced Commercial 2Gbit NAND Flash Nonvolatile Memory
406
SEE and TID of emerging non-volatile memories
407
SEE and TID Response of Spansion 512Mb NOR Flash Memory
408
SEE and TID results for a commercially fabricated radiation hardened field programmable gate array
409
SEE and TID results for a commercially fabricated radiation-hardened clock generator circuit
410
SEE and TID Results for a RadHard-by-Design 16Mbit SRAM with Embedded EDAC
411
SEE and TID Results for Commercial Non-Optogalvanic Isolators for Space Application
412
SEE and TID test results of 1 Gb flash memories
413
SEE and TID Test Results of Candidate Electronics for LHC Power Converter Control
414
See applications run and throughput jump: The case for redundant computing in HPC
415
SEE characterization and mitigation in ultra-deep submicron technologies
416
SEE characterization of the AMS 0.35 μm CMOS technology
417
SEE Characterization of the New RTAX-DSP (RTAX-D) Antifuse-Based FPGA
418
SEE characterization of vertical DMOSFETs: an updated test protocol
419
SEE data from the APEX Cosmic Ray Upset experiment: predicting the performance of commercial devices in space
420
SEE data from the APEX Cosmic Ray Upset Experiment: predicting the performance of commercial devices in space
421
See Europe´s biggest machine tool show
422
SEE evaluation of a low-power 1μm-SOI 80C51 for extremely harsh environments
423
SEE evaluation of digital analog converters for space applications
424
SEE flight data from Japanese satellites
425
See how they run: modeling evacuations in VR
426
See if you can Find our Limits. [advertisement]
427
SEE in a 0.15 μm fully depleted CMOS/SOI commercial Process
428
SEE in-flight data for two static 32KB memories on high earth orbit
429
SEE in-flight measurement on the MIR orbital station
430
SEE integration to support megaprogramming
431
See It Fast to Keep Calm: Real-Time Voltage Control Under Stressed Conditions
432
SEE Laser Testing at Different Temperatures
433
See Me, Teach Me: Facial Expression and Gesture Recognition for Intelligent Tutoring Systems
434
SEE Measurements and Simulations Using Mono-Energetic GeV-Energy Hadron Beams
435
See no evil, hear no evil, speak no evil [enterprise resource planning]
436
SEE on Different Layers of Stacked-SRAMs
437
See one, do one, teach one . . . two faculty member´s path through student-centered learning
438
See Paris and 5.EMO with us
439
SEE programme
440
SEE rate calculations using the effective flux approach and a generalized figure of merit approximation
441
SEE regional wholesale market design: Recommendations, available options and implementation
442
SEE relative probability maps for space operations
443
SEE Results for a 4-Port SpaceWire Router
444
SEE Results of a Next Generation LEON 3FT Microprocessor
445
SEE results using high energy ions
446
SEE sensitivities of selected advanced flash and first-in-first-out memories
447
SEE sensitivity determination of high-density DRAMs with limited-range heavy ions
448
SEE sensitivity determination of high-density DRAMs with limited-range heavy ions
449
SEE sensitivity of a COTS GaN transistor and silicon MOSFETs
450
SEE sensitivity trends in non-hardened high density SRAMs with sub-micron feature sizes
451
SEE test and modeling results on 45nm SRAMs with different well strategies
452
SEE Test Results for P2020 and P5020 Freescale Processors
453
SEE Test Results of 256k RAM with Preliminary TID Irradiation
454
SEE Test Results of Electronic Components Performed on Roscosmos Test Facilities
455
SEE test results of the LVDS Driver and Receiver
456
SEE test results on a commercially designed and manufactured NOR FLASH
457
SEE testing for exposure of space ionizing radiation on radio-electronic equipment
458
SEE Testing of National Semiconductor´s LM98640QML System on a Chip for Focal Plane Arrays and Other Imaging Systems
459
SEE Testing of the DDC BU-61583 Advanced Communication Engine
460
SEE Testing of the Intersil ISL71840SEH 16-Channel Analog Multiplexer
461
SEE Testing Results for RF and Microwave ICs
462
SEE tests for commercial off-the-shelf DSPs to be used in a space experiment
463
SEE Tests of the NAND Flash Radiation Tolerant Intelligent Memory Stack
464
See the Difference: Direct Pre-Image Reconstruction and Pose Estimation by Differentiating HOG
465
See the forest before the trees: fine-tuned learning and its application to the traveling salesman problem
466
See the forests with different eyes
467
See the world as others see you [Web site accessibility]
468
See the world as the astronauts see it
469
See through HMD type MF 3D display for AR
470
SEE transient response of Crane Electronics Single Output Point of Load DC-DC Converters
471
See us on the web ...
472
See us on the web ...
473
See us on the web ...
474
See us on the web...
475
See us on the web...
476
See us on the web...
477
See what i mean-Probabilistic optimization of robot pointing gestures
478
See what you can do
479
See What You Want, Feel What You See: The personalized re-recommendation framework using hybrid strategies for field trip plan
480
See You at the Chicago Spring Conference on Broadcast and Television Receivers
481
See You in Edmonton
482
See your true colours
483
See Yourself In The Digital Economy: CES [advertisement]
484
See, walk, and kick: Humanoid robots start to play soccer
485
See, weld
486
SEE: a service execution environment for edge services
487
SEE: a Spatial Exploration Environment based on a direct-manipulation paradigm
488
SEE_ME: Software Engineering Education Methodology Exploration
489
Seeable visual but not sure of it
490
See-and-avoid comparison of performance in manned and remotely piloted aircraft
491
See-and-avoid quadcopter using fuzzy control optimized by cross-entropy
492
Seebeck coefficient and resistivity measurement of polycrystalline Bi in a magnetic field
493
Seebeck coefficient of Bi-Sb samples grown by mechanical alloying
494
Seebeck coefficient of p-type PbTe/PbEuTe quantum well structures
495
Seebeck coefficients near a spin ordering temperature
496
Seebeck difference - temperature sensors integrated into smart power technologies
497
Seebeck nanoantennas for infrared detection and energy harvesting applications
498
Seebeck ozone sensors
499
seeCell: Visualization and tracking dedicated to cell analysis
500
SEECH: Scalable Energy Efficient Clustering Hierarchy Protocol in Wireless Sensor Networks
501
SeeCoast: Automated Port Scene Understanding Facilitated by Normalcy Learning
502
SEED — A DBMS for software engineering applications based on the entity-relationship approach
503
Seed and Grow: An attack against anonymized social networks
504
Seed based fuzzy decision reduct for hybrid decision systems
505
Seed based oil as an alternative to mineral oil
506
Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
507
Seed encoding with LFSRs and cellular automata
508
SEED Framework of Early Language Development: The Dynamic Coupling of Infant–Caregiver Perceiving and Acting Forms a Continuous Loop during Interaction
509
Seed function combination selection for chained function filters
510
Seed Germination and Seedling Establishment of Ficus microcarpa L.
511
Seed graph expansion for construction of structured LDPC codes
512
Seed Image Selection in interactive cosegmentation
513
SEED inauguration workshop: Building a digital ecosystem for societal empowerment
514
Seed laser for space borne LIDAR applications
515
Seed layer controlled deposition of ZnO films with a tilted c-axis for shear mode resonators
516
Seed Layer Effect on the Magnetic Properties of Ultrathin Co/Pt Multilayers With Perpendicular Magnetic Anisotropy
517
Seed layer effects on the magnetoresistive properties of NiFe films
518
Seed layer effects on the magnetoresistive properties of NiFe films
519
Seed localization in Ultrasound and Registration to C-Arm Fluoroscopy Using Matched Needle Tracks for Prostate Brachytherapy
520
Seed Localization Using Trus and Gre Based Gaussian Fil Tering For Brachytherapy Applications
521
SEED masking implementations against power analysis attacks
522
Seed node deployment for wireless mesh networks with uncertain subscription
523
Seed Ordering and Selection for High Quality Delay Test
524
Seed point selection for seed-based region growing in segmenting microcalcifications
525
Seed point selection method for triangle constrained image matching propagation
526
Seed pre-treatment of grain and vegetable crops by microwave energy
527
Seed pruning using a multi-resolution approach for automated segmentation of breast cancer tissue
528
Seed pulse optimization for saturated fiber-amplifiers
529
Seed Scheduling for Peer-to-Peer Networks
530
Seed selection in LFSR-reseeding-based test compression for the detection of small-delay defects
531
Seed selection procedure for LFSR-based BIST with multiple scan chains and phase shifters
532
SEED smart pixel devices
533
Seed Throwing Optimization: A Probabilistic Technique for Multimodal Function Optimization
534
Seed treatment and water purification by the synergical effect of gliding arc plasma and photocatalytic film
535
Seed workshop: Building a digital ecosystem for societal empowerment
536
Seed™, shield effectiveness evaluation device
537
SEED: A Statically Greedy and Dynamically Adaptive Approach for Speculative Loop Execution
538
Seed: An Easy-to-Use Random Generator of Recursive Data Structures for Testing
539
SEED: Hands-On Lab Exercises for Computer Security Education
540
SEED2002 support of educational course for electronic design
541
SEEDA: Secure end-to-end data aggregation in Wireless Sensor Networks
542
Seed-based authentication
543
Seed-based Distributed Group Key Selection Algorithm for Ad Hoc Networks
544
Seed-based genomic sequence comparison using a FPGA/FLASH accelerator
545
Seed-based region growing study for brain abnormalities segmentation
546
Seeded amplification of colored conical emission via spatiotemporal modulational instability
547
Seeded erbium/ytterbium codoped fibre amplifier source with 87 W of single-frequency output power
548
Seeded Failure Testing and Analysis of an Electro-Mechanical Actuator
549
Seeded Fault Testing and In-situ Analysis of Critical Electronic Components in EMA Power Circuitry
550
Seeded fault testing in support of mechanical systems prognostic development
551
Seeded femtosecond supercontinuum in Kr gas
552
Seeded Infiltration and Growth of Bulk YBCO Nano-Composites
553
Seeded Laplacian: An interactive image segmentation approach using eigenfunctions
554
Seeded lateral epitaxial SOI using (01¯5) substrate
555
Seeded Magneto Rayleigh-Taylor instability driven by a 1-MA Linear Transformer Driver
556
Seeded Magneto-Rayleigh Taylor experiments on planar foils using a 1-MA Linear Transformer Driver
557
Seeded Magneto-Rayleigh-Taylor instability experiments on A 1-MA LTD
558
Seeded mega-Gauss turbulence in dense fusion target plasmas
559
Seeded parametric four-wave mixing for sensitive detection of atoms and molecules
560
Seeded region growing
561
Seeded region growing based detection of cells in fish blood stained with Natt-Herrick
562
Seeded region growing on multi-core system
563
Seeded region growing segmentation on ultrasound image using particle swarm optimization
564
Seeded segmentation based on object homogeneity
565
Seeded text auto-summarization: An experience with simplified statistical and fuzzy ranking algorithm
566
Seeded Tree Alignment
567
Seeded VISA: A 1064nm laser-seeded FEL amplifier at the BNL ATF
568
Seeded watershed cut uncertainty estimators for guided interactive segmentation
569
SeederTrading: Trading Swarm Capacity for Improving Content Distribution
570
Seeding Cluster Centers of K-means Clustering through Median Projection
571
Seeding dynamics of nonlinear polariton emission from a microcavity
572
Seeding effect of SrBi
2
Ta
2x
O
9
thin buffer layer on crystallization and electric properties of SrBi
2
Ta
2
O
9
thin films
573
SEEDing evidence-based educational practices into economic development
574
Seeding of ambient electrons in critical velocity ionization
575
Seeding of an eleven femtosecond optical parametric chirped pulse amplifier and its Nd/sup 3+/ picosecond pump laser from a single broadband Ti:Sapphire oscillator
576
Seeding of extreme ultraviolet free electron laser with high-order harmonic
577
Seeding of Large Areas with Biological Soil Crust Starter Culture Formulations: Using an Aircraft Disbursable Granulate to Increase Stability, Fertility and CO2 Sequestration on a Landscape Scale
578
Seeding prosperity and revitalizing corridors decision tools for community engagement and urban vacant land remediation
579
Seeding Texture Synthesis Algorithm
580
Seeding the cloud in a secured way: Cloud adoption and security compliance assessment methodologies
581
Seeding the initial population of a multi-objective evolutionary algorithm using gradient-based information
582
Seed-invariant region growing: its properties and applications to 3-D medical CT images
583
Seedlayer and pre-heatfng effects on crystallography and recording performance of CoCrPtB perpendicular media
584
Seedlayer and preheating effects on crystallography and recording performance of CoCrPtB perpendicular media
585
Seedless laser velocimetry using heterodyne laser-induced thermal acoustics
586
SeedMe: A cyberinfrastructure for sharing results
587
Seed-oil-based coolants for transformers
588
SEED-PA. A practical instrument for assessing individual ethics initiatives
589
Seed-Relative Segmentation Robustness of Watershed and Fuzzy Connectedness Approaches
590
SEEDrive -- An Adaptive and Rule Based Driving System
591
SEEDrive — Using in-car serial-bus systems for safe and energy efficient driving
592
Seeds algorithm in vehicle license plate location system
593
Seeds and weeds [From the Editor]
594
Seeds for a Heterogeneous Interconnect
595
Seeds of change: can replicating model projects work? [engineering education]
596
Seeds of Evidence: Integrating Evidence-Based Software Engineering
597
Seeds optimization algorithm of SIC test sequences in low power BIST
598
Seeds sorting by electrostatic separation: an experimental study
599
Seeds, soils, stem cells, and cancer
600
SEEDS: A Solar-Based Energy-Efficient Distributed Server Farm
601
SEEDS: Scalable Energy Efficient Deployment Scheme for homogeneous Wireless Sensor Network
602
Seeds4Green - Free collaborative internet platform for LCA studies
603
SEEDS¿Simulation Exercise in Electricity Distribution Systems
604
Seed-weighted random walks ranking method and its application to leukemia cancer biomarker prioritizations
605
SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks
606
SeeGL: Software tool for learning the OpenGL graphics library
607
SeeGroove: Supporting Groove Learning through Visualization
608
SEE-Hardened-by-Design Area-Efficient SRAMs
609
SeeHear System: A New Implementation
610
SEEHOC: scalable and robust end-to-end header compression techniques for wireless ad hoc networks
611
SEE-inducing effects of cosmic rays at the High-Altitude Research Station Jungfraujoch compared to accelerated test data
612
Seeing [u] aids vocal learning: Babbling and imitation of vowels using a 3D vocal tract model, reinforcement learning, and reservoir computing
613
Seeing 3D Chairs: Exemplar Part-Based 2D-3D Alignment Using a Large Dataset of CAD Models
614
Seeing 3D objects in a single 2D image
615
Seeing actions through scene context
616
Seeing an explosive way of NSF/SNAP-mediated SNARE-complex disassembly using single-molecule measurements
617
Seeing anew: Paradigm shifting across the virtuality continuum
618
Seeing Around Occluding Objects
619
Seeing as it happens: Real time 3D video event visualization
620
Seeing behind the scene: analysis of photometric properties of occluding edges by the reversed projection blurring model
621
Seeing beyond occlusions (and other marvels of a finite lens aperture)
622
Seeing Beyond Statistics: Visual Exploration of Productivity on a Construction Site
623
Seeing beyond the perimeter: the Advanced Exterior Sensor (AES)
624
Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
625
Seeing by drawing: use of a force-feedback device for conveying basic geometric visual information
626
Seeing clearly and moving forward [artificial intelligence]
627
Seeing Clearly Through Ink in Computer Science Courses
628
Seeing data: new methods for understanding information
629
Seeing development strategies of Zhejiang leisure agriculture tourism from the perspective of travel motivations—Taking shanghai market as an example
630
Seeing double
631
Seeing double without confusion: Structure-from-motion in highly ambiguous scenes
632
Seeing eye to eye: a shared mediated reality using EyeTap devices and the VideoOrbits gyroscopic head tracker
633
Seeing eye-to-eye: supportive transdisciplinary environments for interactive art
634
Seeing faces in noise: Exploring machine and human face detection processes by the reverse correlation method
635
Seeing global power system states with compact visualization techniques
636
Seeing in the dark
637
Seeing in three dimensions: correlation and triangulation of Mars Exploration Rover imagery
638
Seeing inside chips and cells: high-resolution subsurface imaging of integrated circuits, quantum dots and subcellular structures
639
Seeing inside: Using social network analysis to understand patterns of collaboration and coordination in global software teams
640
Seeing into the past: creating a 3D modeling pipeline for archaeological visualization
641
Seeing into the Quantum World
642
Seeing is believing
643
Seeing is believing
644
Seeing is Believing and Vice Versa: Investigation of the Altered Perception during Subjective Assessment of Streaming Multimedia
645
Seeing is believing so beware
646
Seeing is Believing—Enhancing Message Dissemination in Vehicular Networks Through Visual Cues
647
Seeing is believing: the importance of visualization in manufacturing simulation
648
Seeing is Believing: Using Computer Graphics to Enthuse Students
649
Seeing Is Believing: Video Classification for Computed Tomographic Colonography Using Multiple-Instance Learning
650
Seeing is not believing
651
Seeing Is Slicing: Observation Based Slicing of Picture Description Languages
652
Seeing More Clearly with Glasses?: The Impact of Glasses and Technology on Unfamiliar Face Matching and Identification of Facial Composites
653
Seeing more of the world [requirements engineering]
654
Seeing Mt. Rainier: Lucky imaging for multi-image denoising, sharpening, and haze removal
655
Seeing objects as face modulates visual search performance
656
Seeing on the fly [News]
657
Seeing People in Different Light-Joint Shape, Motion, and Reflectance Capture
658
Seeing physics, or: physics is for prediction [computer vision]
659
Seeing radio [Reflections]
660
Seeing Red
661
Seeing Remote Team Members as Leaders: A Study of US-Scandinavian Teams
662
Seeing results in a full graphics environment
663
Seeing Sleep: Dynamic imaging of upper airway collapse and collapsibility in children.
664
Seeing sound: real-time sound visualisation in visual feedback loops used for training musicians
665
Seeing speech in space and time: psychological and neurological findings
666
Seeing speech: Capturing vocal tract shaping using real-time magnetic resonance imaging [Exploratory DSP]
667
Seeing Stars of Valence and Arousal in Blog Posts
668
Seeing stars with digital eyes
669
Seeing systolic computations in a video game world
670
Seeing the Arrow of Time
671
Seeing the bigger picture: Context-aware regulations
672
Seeing the Bigger Picture: How Nodes Can Learn Their Place Within a Complex Ad Hoc Network Topology
673
Seeing the character images that an OCR system sees-analysis by genetic algorithm
674
Seeing the Difference between Cosmological Simulations
675
Seeing the Difference in IP Traffic: Wireless Versus Wireline
676
Seeing the Earth in the Cloud: Processing one petabyte of satellite imagery in one day
677
Seeing the Equitable Colorings in a Different View
678
Seeing the Forest and the Trees: Steiner Wirelength Optimization in Placement
679
Seeing the forrest for the trees
680
Seeing the Movement through Sound: Giving Trajectory Information to Visually Impaired People
681
Seeing the music can animated lyrics provide access to the emotional content in music for people who are deaf or hard of hearing?
682
Seeing the next iphone coming your way: How to anticipate converging industries
683
Seeing the obvious [robot vision]
684
Seeing the Real World: Sharing Protected Data in Real Time
685
Seeing the shrink - [electronics foundry]
686
Seeing the Sound: A New Multimodal Imaging Device for Computer Vision
687
Seeing the trees before the forest [natural object detection]
688
Seeing the Unobservable: Channel Learning for Wireless Communication Networks
689
Seeing the unseen: What can we learn from polarization-sensitive eyes in nature and how can we design better imaging systems?
690
Seeing the world
691
Seeing the world by hearing: Virtual Acoustic Space (VAS) a new space perception system for blind people.
692
Seeing through a mask
693
Seeing through clutter: Snake computation with dynamic programming for particle segmentation
694
Seeing through opaque materials with light: advances in adaptive photodetectors for laser based ultrasound sensing
695
Seeing through the appearance: Body shape estimation using multi-view clothing images
696
Seeing through the blur
697
Seeing through the expression: Bridging the gap between expression and emotion recognition
698
Seeing through the fence: Image de-fencing using a video sequence
699
Seeing through the package of a 0.3 μm GaAs MESFET
700
Seeing through the weather: enhanced/synthetic vision systems for commercial transports
701
Seeing through walls with a self-injection-locked radar to detect hidden people
702
Seeing through water: Image restoration using model-based tracking
703
Seeing typeface personality: Emotional responses to form as tone
704
Seeing what others don´t, Gary Klein [Book Interview]
705
Seeing What You´re Told: Sentence-Guided Activity Recognition in Video
706
Seeing with Paper: Government Documents and Material Participation
707
Seeing with sound and touch
708
Seeing with your hands: A better way to obtain perception capabilities with a personal robot
709
Seeing, understanding and doing human task
710
Seeing: machine vision
711
Seeing-eye Cane Steers The Blind
712
Seeing-is-believing: using camera phones for human-verifiable authentication
713
Seek and decode: Random multiple access with multiuser detection and physical-layer network coding
714
Seek and Show
715
Seek and Track-Follow for Scanning Probe Microscopy-Based Data Storage
716
Seek control and settling control taming actuator resonance of hard disk drives
717
Seek control and settling control taming actuator resonance of HDD
718
Seek control of hard disk drives based on final-state control taking account of the frequency components and the magnitude of control input
719
Seek control of hard disk drives using reference governor under input saturation
720
Seek Control to Suppress Vibrations of Hard Disk Drives Using Adaptive Filtering
721
Seek distance in disks with multiple independent heads per surface
722
Seek durability for CoCrTa perpendicular flexible disks
723
Seek durability for CoCrTa perpendicular flexible disks
724
Seek for Distinction and Create Excellence: Promote the Art Design Education Quality of Higher Education with the Scientific Spirit
725
Seek reliability enhancement in optical and magneto-optical disk data storage devices
726
Seek Reliability Enhancement in Optical Disk Data Storage Devices
727
Seek time and trajectories of time optimal control for a dual stage optical disk drive actuator
728
Seek, and ye shall find [Web search engines comparison]
729
Seekable Compressed Traces
730
Seekable sockets: a mechanism to reduce copy overheads in TCP-based messaging
731
SeekBin: An automated tool for analyzing thread level speculative parallelization potential
732
Seek-Efficient I/O Optimization in Single Failure Recovery for XOR-coded Storage Systems
733
Seeker allocation and target assignment of multiple hetero-seeker missile formation using genetic algorithms
734
Seeker and data-processing modeling for the Strategic Defense Initiative
735
Seeker gyro calibration via model-based fusion of visual and inertial data
736
Seeker optimisation algorithm: application to the design of linear phase finite impulse response filter
737
Seeker optimisation algorithm: application to the solution of economic load dispatch problems
738
Seeker Optimization Algorithm
739
Seeker Optimization Algorithm for Beamforming of Linear Antenna Arrays
740
Seeker Optimization Algorithm for Digital IIR Filter Design
741
Seeker Optimization Algorithm for Optimal Reactive Power Dispatch
742
Seeker: A serious game for improving cognitive abilities
743
Seeker: Autonomous maze-navigating and ball-potting robot
744
Seeker-Optimized Guidance Integrated Fuzing
745
Seeking a "Race to the Top" in Genomic Cloud Privacy?
746
Seeking a balance
747
Seeking a model for study of arrhythmia induction by nonuniform polarization
748
Seeking ABET accreditation for technical communication programs
749
Seeking an Effective Program to Improve Communication Skills of Non-English-Speaking Graduate Engineering Students: The Case of a Korean Engineering School
750
Seeking an energy-efficient modular data center: impact of pressure loss on the server fan power
751
Seeking better web search technologies
752
Seeking black lining in cloud
753
Seeking chances through interface design the role of abduction
754
Seeking closure
755
Seeking clues to promote the participation of women in electrical engineering studies
756
Seeking community on the Internet: ethnocultural use of information communication technology
757
Seeking Concert Hall Acoustics
758
Seeking concurrency in rule-based programming
759
Seeking Consensus in Networks of Linear Agents: Communication Noises and Markovian Switching Topologies
760
Seeking Editor in Chief
761
Seeking Editor in Chief - IEEE Security & Privacy
762
Seeking for a living in the revolution of cost
763
Seeking for an Optimal Route in IEEE 802.11e Ad-Hoc Networks
764
Seeking for decomposition of a Boolean function in the reed-müller spectral domain by Means of permutation between function variables
765
Seeking global harmony in standards
766
Seeking group consensus in networks of dynamic agents under directed topology
767
Seeking IEEE Security & Security Editor in Chief
768
Seeking improvement in bioengineering education: academic and organizational concerns
769
Seeking information in specific domain using domain name, crop characteristic and ontology
770
Seeking Justice: Lapsed reputation-based cooperative spectrum sensing with lasting trusted nodes assistance
771
Seeking new social networking models
772
Seeking Nominations for IEEE Medals and Recognitions
773
Seeking nuclear safeguards. I. How Iraq reverse-engineered the bomb
774
Seeking nuclear safeguards. II. Working to halt proliferation
775
Seeking open-ended evolution in Swarm Chemistry
776
Seeking opportunities to reduce life cycle impacts of consumer goods-An economy-wide assessment
777
Seeking pattern recognition principles for intelligent detection of FSK signals
778
Seeking perceptual-based metrics to assess the visuo-motor loop in mobile robot teleoperation
779
Seeking Potential Biological Network Shared in Rheumatoid Arthritis and Ulcerative Colitis through Text Mining
780
Seeking Quality of Web Service Composition in a Semantic Dimension
781
Seeking Quality through User-Goal Monitoring
782
Seeking reform paths in medical education from the revelation of Global Commission Report on Lancet
783
Seeking Reusability of Computer Games Designs for Informal Learning
784
Seeking safer standards
785
Seeking Shelter: Towards a Multi-Agent Based Simulation of a School Lockdown Scenario
786
Seeking signal integrity sign-off?
787
Seeking signals in data bases using neural networks
788
Seeking solutions in configurable computing
789
Seeking sustained development in the "infrastructure of infrastructures"
790
Seeking the appropriate level of automation
791
Seeking the Strongest Rigid Detector
792
Seeking Time-Composable Partitions of Tasks for COTS Multicore Processors
793
Seeking User´s Query Concept Dynamically Based on Region in Relevance Feedback
794
Seeking world peace
795
Seeking Your Insights
796
SEELA: maintenance and documenting by reverse-engineering
797
SEEMd -security enabled energy efficient middleware for WSN
798
Seemingly unrelated regression modeling of urban air quality by direct Monte Carlo algorithm
799
SEEMLESS: distributed algorithm for topology control of survivable energy efficient multihop wireless sensor networks using adjustable transmission power
800
SEEMORE: a view-based approach to 3-D object recognition using multiple visual cues
801
SeeMote: In-Situ Visualization and Logging Device for Wireless Sensor Networks
802
Seen and missed traffic objects: A traffic object-specific awareness estimation
803
Seen and missed traffic objects: A traffic object-specific awareness estimation
804
Seen as stable marriages
805
Seen at the Conference
806
Seen impedance by impedance type relays during power system sequential disturbances
807
Seen in Monterey
808
SeeNSearch: A Context Directed Search Facilitator for Home Entertainment Devices
809
SEE-OFDM: Spectral and energy efficient OFDM for optical IM/DD systems
810
Seepage Stability Evaluation for Dams of Fuhuashan Reservoir
811
Seepage-stress coupled model of heterogeneous coal seams based on double-media model
812
SEEPI: Scalable Energy Efficient Position Independent Node Scheduling in Wireless Sensor Networks
813
SEEPTOOL — A remote demo for small scale seepage problems
814
SEEQ
™
MCT wearable sensor performance correlated to skin irritation and temperature
815
SE-EQUAM - An Evolvable Quality Metamodel
816
SEER, A SEquence Extrapolating Robot
817
Seer: a graphical retrieval system for reusable Ada software modules
818
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks
819
SEER: charting a roadmap for software engineering education
820
SEER: Metropolitan-Scale Traffic Perception Based on Lossy Sensory Data
821
Seer: Trend-Prediction-Based Geographic Message Forwarding in Sparse Vehicular Networks
822
SEER-I: The Semantic EEG Evaluation Regimen
823
Seers and Craftspeople
824
SEEs Induced by High-Energy Protons and Neutrons in SDRAM
825
SEES—A Software testing Environment Support System
826
SEES: Concept and design of a smart environment explorer stick
827
Seesaw method for combining parameter estimates
828
Seesaw method for combining parameter estimates
829
Seesaw Relay Logic and Memory Circuits
830
See-saw Type RF MEMS Switch with Fine Gap Vertical Comb
831
Seesaw: An Area-Optimized FPGA Viterbi Decoder for PUFs
832
Seesaw: Performance Guarantee for RAID Reconstruction
833
SEESIM-a fast synchronous sequential circuit fault simulator with single event equivalence
834
SeeSite: Characterizing Relationships between Splice Junctions and Splicing Enhancers
835
Seesoft-a tool for visualizing line oriented software statistics
836
SeeStar: A low-cost, modular and open-source camera system for subsea observations
837
SEETEST: a system dedicated to the characterisation of memory sensitivity to SEE
838
See-Through
Solar-Blind Photodetectors for Use in Harsh Environments
839
See-through cartridge for real time monitoring of tumor cells capturing on microfilters
840
See-through Hand [virtual environment]
841
See-through Image Enhancement through Sensor Fusion
842
See-through microstrip antennas constructed on a transparent substrate
843
See-through Passive Antiferroelectric Helmet-Mounted Liquid Crystal Display
844
See-through plan [Electronics Transparent]
845
See-Through Si Thin-Film Tandem Solar Cell Module With Hardener
846
See-Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks
847
See-through window vs. magic mirror: A comparison in supporting visual-motor tasks
848
See-through, multi-pixel organic emissive display
849
See-through-wall imaging using ultra wideband pulse systems
850
See-through-wall imaging using ultra wideband short-pulse radar system
851
SEEUP 2009: Workshop on software engineering foundations for end-user programming
852
SEFAP: An Email System for Anti-Phishing
853
SE-FCA: A Model of Software Evolution with Formal Concept Analysis
854
SeFER: secure, flexible and efficient routing protocol for distributed sensor networks
855
SEFF: A scalable and efficient distributed file sharing technique in Vehicular Ad Hoc Networks
856
Seff-organizing pattern base and its application in the complex industrial process
857
SEFIS 2 launched
858
Seflab: A lab for measuring software energy footprints
859
SeFLOOD: A secure network discovery protocol for Underwater Acoustic Networks
860
SEFOP: A novel approach to data path module placement
861
SEFOS: Semantic enriched fuzzy based ontological integration of web data tables
862
SEG/ELO material characterization using silicon bipolar transistors
863
Sega Dreamcast: creating a unified entertainment world
864
SEGA: Semiglobal Graph Alignment for Structure-Based Protein Comparison
865
SeGAE: A Serious Game Authoring Environment
866
SeGAH 2011 programme
867
SeGAH 2014 Sponsors [Front cover]
868
Segal Condition Meets Computational Effects
869
SegBOMP: An efficient algorithm for block non-sparse signal recovery
870
Segcast: Segment-based broadcasting for delay tolerant data dissemination in intermittent VANETs
871
SeGCom: A secure group communication mechanism in cluster-tree wireless sensor networks
872
SeGCom: Secure Group Communication in VANETs
873
segDeepM: Exploiting segmentation and context in deep neural networks for object detection
874
SEGEM: a simulation approach for electric generation management
875
SEG-MELT (electric glass melting)
876
Segmenetation based design of serial parallel multipliers
877
Segment Adaptive Gradient Angle Interpolation
878
Segment an image by looking into an image corpus
879
Segment and Combine Approach for Biological Sequence Classification
880
Segment and Feature Extraction of Optical Coherence Tomography Image of Mouse´s Skin In Vivo Using Mathematical Morphology
881
Segment and organize irregular shaped Sensor Networks by importing a virtual scalar field
882
Segment and recognize expression phase by fusion of motion area and neutral divergence features
883
Segment and Semi Circle Based Geometric Characters of Bangla and An Efficient Relevant Method of Character Recognition
884
Segment and track neurons in 3D by repulsive snake method
885
Segment arbiter as action system
886
Segment based 3D object shape priors
887
Segment based classification using IRS-1C, LISS-III data
888
Segment Based Decision Tree Induction With Continuous Valued Attributes
889
Segment Based Diffusion - A Post-Processing Step (Not Only) for Background Subtraction
890
Segment Based Etch Algorithm And Modeling
891
Segment Based Stereo Matching Using Cooperative Hopfield Networks
892
Segment based stereo matching using shape description and hierarchical maximal clique
893
Segment based traffic information estimation method using cellular network data
894
Segment based X-Filling for low power and high defect coverage
895
Segment classification in continuous speech
896
Segment Clustering Radar Signal Sorting
897
Segment Compression Steganographic Algorithm
898
Segment delay faults: a new fault model
899
Segment Delay Learning From Quantized Path Delay Measurements
900
Segment directory enhancing the limited directory cache coherence schemes
901
Segment DPCA Motion Compensation for SAS
902
Segment duration for rate adaptation of adaptive HTTP streaming
903
Segment filtering iterative learning control for motor servo systems
904
Segment gating for static energy reduction in networks-on-chip
905
Segment Graph Based Image Filtering: Fast Structure-Preserving Smoothing
906
Segment guidance and control on non-cooperative ground target tracking for Unmanned Aerial Vehicles
907
Segment Hough Transform -- a Novel Hough-based Algorithm for Curve Detection
908
Segment image with depth in a bayesian framework
909
Segment Level Authentication: Combating internet source spoofing
910
Segment linear network coding in wireless sensor networks
911
Segment matching using a neural network approach
912
Segment matrix vector quantization and fuzzy logic for isolated-word speech recognition
913
Segment Model Based Vehicle Motion Analysis
914
Segment Optimization and Data-Driven Thresholding for Knowledge-Based Landslide Detection by Object-Based Image Analysis
915
Segment Oriented Search (SOS) Method for TV Repeats Detection
916
Segment p-cycle design with full node protection in WDM mesh networks
917
Segment phase-shifted carrier PWM to reduce common-mode-voltage
918
Segment pre-selection in decision-tree based speech synthesis systems
919
Segment procedure neural networks
920
Segment Protection Algorithm with Load Balancing for Multicasting WDM Mesh Networks
921
Segment quantization for very-low-rate speech coding
922
Segment reduction in disyllabic words with tones in standard Chinese
923
Segment reencoding of buffer constrained variable bit rate video streams
924
Segment restoration scheme with QoT-guarantees in GMPLS-controlled translucent networks
925
Segment routing based traffic engineering for energy efficient backbone networks
926
Segment selection considering local degradation of naturalness in concatenative speech synthesis
927
Segment selection method based on tonal validity evaluation using machine learning for concatenative speech synthesis
928
Segment shared protection for differentiated reliable WDM mesh networks
929
Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels
930
Segment shared protection in WDM networks with partial wavelength conversion
931
Segment specific enhancement of speech characteristics for improving speech intelligibility under adverse listening conditions
932
Segment streaming for efficient pipelined televisualization
933
Segment the metallograph images using Gabor filter
934
Segment training based channel estimation and training design in cloud radio access networks
935
Segment training based individual channel estimation for one-way relay network
936
Segment Training Based Individual Channel Estimation in One-Way Relay Network with Power Allocation
937
Segment velocities in normal and transtibial amputees: prosthetic design implications
938
Segment vocoder based on reconstruction with natural segments
939
Segment Weighted Random BIST (SWR-BIST): A Low Power BIST Technique
940
Segment wise communication delay measurement for Smart Grid applications
941
Segmental acoustic indexing for zero resource keyword search
942
Segmental analyse and numerical verification on radar scattering characteristics of reentry capsule
943
Segmental Analysis and Evaluation of User Focused Search Process
944
Segmental analysis of Color Kinesis: new echocardiographic technique for objective assessment of regional LV endocardial motion
945
Segmental analysis of the transmission in CSK systems based on the Euclidean distance
946
Segmental corrective training for hidden Markov model parameter estimation in speech recognition
947
Segmental downsampling intra coding based on spatial locality for HEVC
948
Segmental duplications containing tandem repeated genes encoding putative deubiquitinating enzymes
949
Segmental Duration Modeling for Greek Speech Synthesis
950
Segmental eigenvoice with delicate eigenspace for improved speaker adaptation
951
Segmental GPD training of HMM based speech recognizer
952
Segmental Hidden Markov Models for View-based Sport Video Analysis
953
Segmental HMM-based Part-of-speech tagger
954
Segmental intensity and HMM modeling
955
Segmental K-Means initialization for SOM-based speaker clustering
956
Segmental LVQ3 training for phoneme-wise tied mixture density HMMS
957
Segmental minimum Bayes-risk decoding for automatic speech recognition
958
Segmental Modeling for Audio Segmentation
959
Segmental modeling using a continuous mixture of nonparametric models
960
Segmental phoneme recognition using piecewise linear regression
961
Segmental phonetic features recognition by means of neural-fuzzy networks and integration in an N-best solutions post-processing
962
Segmental preclassification for improved objective speech quality measures
963
Segmental probability distribution model approach for isolated Mandarin syllable recognition
964
Segmental prototype interpolation coding
965
Segmental quantitative analysis of myocardial contrast echocardiography images using a bullseye representation
966
Segmental quantization of speech spectral information
967
Segmental quasi-Bayesian learning of the mixture coefficients in SCHMM for speech recognition
968
Segmental reconstruction of myocardial perfusion from biplane angiographic projections by regularized iterative matrix inversion
969
Segmental reliability weighting for robust recognition of partly corrupted speech
970
Segmental rotor axial field switched reluctance motor with single teeth winding
971
Segmental rotor switched reluctance motors with single-tooth windings
972
Segmental search for continuous speech recognition
973
Segmental Selection Path Planning method for mobile sensor network
974
Segmental sinusoidal model for speech coding
975
Segmental Stator Switched Reluctance Machine for Safety-Critical Applications
976
Segmental structure of EEG more likely reveals the dynamic multistability of the brain tissue than the continual plasticity one
977
Segmental tonal modeling for phone set design in Mandarin LVCSR
978
Segmental transmission line: Its practical application the optimized PCB trace design using a genetic algorithm
979
Segmental vocoder-going beyond the phonetic approach
980
Segmental-rotor linear reluctance motors with large airgaps
981
Segmentation According to Natural Examples: Learning Static Segmentation from Motion Segmentation
982
Segmentation algorithm for Arabic handwritten text based on contour analysis
983
Segmentation Algorithm for Multiple Face Detection for Color Images with Skin Tone Regions
984
Segmentation algorithm of brain vessel image based on SEM statistical mixture model
985
Segmentation Algorithm of Fingerprint Image Basing on Markov Model
986
Segmentation algorithm of high resolution remote sensing images based on LBP and statistical region merging
987
Segmentation algorithm of the infrared laser beam reflection in noisy environments. Characterization and modeling for its application in mobiles guidance
988
Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System
989
Segmentation algorithm with several dominant directions
990
Segmentation algorithms for abdominal computerized tomography scans
991
Segmentation algorithms for automatic detection of retinal images using CVIP tools
992
Segmentation algorithms for detecting microcalcifications in mammograms
993
Segmentation algorithms of chromosome images
994
Segmentation algoritm for touching round grain image
995
Segmentation Analysis for Effective Usage of Network Resources in Video Streaming
996
Segmentation and 2D motion estimation by region fragments
997
Segmentation and 2-D motion estimation of noisy image sequences
998
Segmentation and 3-D reconstruction of histological sections of the heart
999
Segmentation and 3D Reconstruction of Microbial Biofilms
1000
Segmentation and 3D reconstruction of MRI images for breast cancer detection