<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Using Concolic Testing to Refine Vulnerability Profiles in FUZZBUSTER
2
Using Concrete Scales: A Practical Framework for Effective Visual Depiction of Complex Measures
3
Using concrete visual notations as first class citizens for model transformation specification
4
Using concurrent and semi-concurrent on-line testing during HLS: an adaptable approach
5
Using concurrent engineering technology to design a satellite assembly
6
Using Concurrent Multipath Transfer to Improve the SCTP Startup Behavior for PSTN Signaling Traffic
7
Using concurrent multipath transmission for Transport Virtualization: Analyzing path selection
8
Using Concurrently Executing Mechanism to Provide Secure Handoff Optimization for IPv6-Based Wireless Networks
9
Using CONDENSATION Tracking to Recover Stroke Order of Chinese Calligraphic Handwritings with CCM
10
Using condition flag prediction to improve the performance of out-of-order processors
11
Using condition monitoring systems to improve the reliability of overhead electrified railway operations
12
Using conditional random fields to validate observations in a 4W1H paradigm
13
Using Condor Glideins for Distributed Testing of Network Facing Services
14
Using conduction modes basis functions for efficient electromagnetic analysis of on-chip and off-chip interconnect
15
Using conductive plastic for EMI cover shielding
16
Using cone beam CT with image processing in detecting the bone mineral density of jaw
17
Using cone structures for circuit partitioning into FPGA packages
18
Using confidence factor to improve reliability of wide frequency range impedance measurement. Application to H.F. transformer characterization
19
Using confidence interval of a regularization network
20
Using confidence intervals to assess the reliability of instantaneous heart rate and respiratory rate
21
Using confidence measures to evaluate the speaker turns in speaker segmentation
22
Using confidence values in multi-label classification problems with semi-supervised learning
23
Using Configurable Bit-Width Voters to Mask Multiple Errors in Integrated Circuits
24
Using configurable computing to accelerate Boolean satisfiability
25
Using configuration and force sensing in assembly task planning and execution
26
Using configuration management and product line software paradigms to support the experimentation process in software engineering
27
Using configuration space for the haptic rendering of assemblv tasks
28
Using configured directories to solve software maintenance problems
29
Using Conflict-Based On-line Learning to Accelerate the Backtrace Algorithm Implemented in HW
30
Using conformal mapping for analysis of beam-field interaction in planar corrugated periodic structures
31
Using conformal shape, separate and dynamical apodization to improve characteristics of multibeam active phased array
32
Using ConFuP in modeling of concurrent fuzzy systems
33
Using confusing characters to improve character recognition rate
34
Using Confusion Matrices to Estimate Mutual Information between Two Categorical Measurements
35
Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands
36
Using congestion graphs to analyze the stability of network congestion control
37
Using conic correspondences in two images to estimate the epipolar geometry
38
Using Conical and Spherical Mirrors with Conventional Cameras for 360° Panorama Views in a Single Image
39
Using conjugate symmetries to enhance gate-level simulations
40
Using connect and collect to achieve the KM endgame
41
Using Consensus Clustering for Multi-view Anomaly Detection
42
Using consensus for solving conflict situations in fault-tolerant distributed systems
43
Using consensus measures for atlas construction
44
Using Consensus to Measure Weighted Targeted Agreement
45
Using conservation of flow as a security mechanism in network protocols
46
Using consistency and abduction based indices in possibilistic causal diagnosis
47
Using Consistency Management Protocols Over a Communication Management Protocol
48
Using consistency of depth gradient to improve visual tracking in RGB-D sequences
49
Using consistent global checkpoints to synchronize processes in distributed simulation
50
Using Consolidated Covariance Image for Discrimination of Habitats
51
Using constancy of distance to estimate position and displacement in space
52
Using constant base current as a boundary condition for one-dimensional AlGaAs/GaAs heterojunction bipolar transistor simulation
53
Using constant magnets in elektrovacuum devices
54
Using constant switching frequency control in linear-assisted DC-DC switching converters
55
Using constant switching frequency in a linear-assisted DC-DC switching regulator
56
Using constant traffic to specific IP destinations for detecting spoofed MAC addresses in Local Area Networks
57
Using Constellation Shaping to Reduce the Peak and Average Power of OFDM Signals
58
Using constitutive information in neural networks for control
59
Using constrained cubic spline instead of natural cubic spline to eliminate overshoot and undershoot in Hilbert Huang Transform
60
Using Constrained Intuitionistic Linear Logic for Hybrid Robotic Planning Problems
61
Using constrained snakes for feature spotting in off-line cursive script
62
Using constraint geometry to determine maximum rate pipeline clocking
63
Using constraint graphs to improve embedded systems design
64
Using constraint hierarchies to support QoS-guided service composition
65
Using constraint inequality on estimated correlation for rapid image search
66
Using constraint logic programming in memory synthesis for general purpose computers
67
Using Constraint Matrices for the Conceptual Design of Mechanisms
68
Using constraint programming for split delivery scheduling in scarce resource environment
69
Using Constraint Programming to Achieve Optimal Prefetch Scheduling for Dependent Tasks on Run-Time Reconfigurable Devices
70
Using Constraint Programming to Manage Configurations in Self-Adaptive Systems
71
Using Constraint Programming to Plan Efficient Data Movement on the Grid
72
Using constraint programming to schedule an operating theatre
73
Using Constraint Programming to solve Sudoku Puzzles
74
Using constraint propagation and domain reduction for the generation phase in declarative modeling
75
Using constraint propagation in blackboard systems: a flexible software architecture for reactive and distributed systems
76
Using Constraint Satisfaction and Optimization for Pattern-Based Software Design
77
Using constraint satisfaction in genetic algorithms
78
Using constraint sets to achieve delay bounds in CIOQ switches
79
Using constraint technology to mine frequent datasets
80
Using constraints filtering and evolutionary algorithms for interactive configuration and planning
81
Using constraints for distributed query processing
82
Using constraints for efficient query processing in nondeterministic databases
83
Using constraints to describe source contents in data integration systems
84
Using constraints to manage long duration transactions in spatial information systems
85
Using constraints to protect personal location information
86
Using Constraints to Verify Properties of Rule Programs
87
Using constructive evolutionary programming to optimise multi-storage electrical power supply systems operation
88
Using constructive learning in embedded systems engineering
89
Using Constructivism as a Basic Idea to Design Multi-situated Game-Based Learning Platform and ITS Application
90
Using constructivist learning strategies in figure courses
91
Using Consumer Behavior Data to Reduce Energy Consumption in Smart Homes: Applying Machine Learning to Save Energy without Lowering Comfort of Inhabitants
92
Using contact centers in tele-management and home care of congestive heart failure patients: The CHS experience
93
Using contact points to integrate discipline spanning real-time requirements in modeling Networked Automation Systems for manufacturing systems
94
Using contact-based inducement for efficient navigation in a congested environment
95
Using containment information for view evolution in dynamic distributed environments
96
Using content analysis and Web design heuristics to evaluate informational Web sites: an exploratory study
97
Using Content Analysis Technique to Enhance Content Adaptation System
98
Using content analysis to analyze the trend of information technology toward the academic researchers at the design departments of universities in Taiwan
99
Using Content and Process Scaffolds to Support Collaborative Discourse in Asynchronous Learning Networks
100
Using Content and Text Classification Methods to Characterize Team Performance
101
Using content based image retrieval techniques for the indexing and retrieval of Thai handwritten documents
102
Using Content Management System Joomla! to Build a Website for Research Institute Needs
103
Using content-aware bitcells to reduce static energy dissipation
104
Using contests to teach design to EE juniors
105
Using context and semantic resources for cross-domain word Segmentation
106
Using context based methods for test data compression
107
Using context blocks to implement Node-attached Modules in genetic programming
108
Using context dependent distributions for coding prediction residuals of companded audio signals
109
Using context descriptions and property definition patterns for software formal verification
110
Using Context Distance Measurement to Analyze Results across Studies
111
Using context for supporting users efficiently
112
Using context history to personalize a resource recommender via a genetic algorithm
113
Using context information and local feature points in face clustering for consumer photos
114
Using Context Information and Probabilistic Classification for Making Extended Long-Term Trajectory Predictions
115
Using Context Information to Improve Computation of Trust in Ad Hoc Networks
116
Using context knowledge to improve the accuracy of recognition in voice browsing
117
Using context models in defining intelligent environment information
118
Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc Networks
119
Using context overlays to analyse the role of a priori information with Process Mining
120
Using context prediction for self-management in ubiquitous computing environments
121
Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments
122
Using context saliency for movie shot classification
123
Using Context Similarity for Service Recommendation
124
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
125
Using context to detect underwater objects
126
Using context to improve cascaded pedestrian detection
127
Using Context to Improve Predictive Modeling of Customers in Personalization Applications
128
Using Context to Understand User Intentions in Image Retrieval
129
Using context transfer mechanisms to Improve Mobile IMS-IPv6 Handover Latency and QoS provisioning
130
Using context-aware sub sorting of received signal strength fingerprints for indoor localisation
131
Using Context-Awareness to Support User Interaction withWeb Services
132
Using context-profiling to aid access control decisions in mobile devices
133
Using contexts to manage system complexity
134
Using contexts to supervise a collaborative process
135
Using contextual information for image retrieval
136
Using Contextual Information for Service Recommendation
137
Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems
138
Using contextual information in joint factor eigenspace MLLR for speech recognition in diverse scenarios
139
Using contextual information in Learning Management Systems: Managing access control and adaptability/adaptativity/ accessibility
140
Using Contextual Information in Transactional Segmentation: An Empirical Study in E-Commerce
141
Using contextual information to clarify Gene Normalization ambiguity
142
Using contextual information to classify nuclei in histology images
143
Using Contextual Information to Decrease the Cost of Incorrect Predictions in On-line Customer Behavior Modeling
144
Using Contextual Information to Guide on-site Analysts
145
Using contextual information to improve retrieval performance
146
Using contextual information to improve SAR CCD: Bayesian contextual coherent change detection (BC CCD)
147
Using contextual information to set control parameters of a vision process
148
Using Contextual Knowledge to Improve Parallel Spoken Language Understanding
149
Using Contextual Link Grammar to Emergency Knowledge Piece Generation
150
Using contextual semantics to automate the Web document search and analysis
151
Using contextual sequences for the control of autonomous robots
152
Using Contextual Topology to discover similarities in modern music
153
Using Continua Health Alliance Standards - Implementation and Experiences of IEEE 11073
154
Using continuation methods to improve convergence of circuits with high impedance nodes
155
Using continuous action spaces to solve discrete problems
156
Using continuous aperture illuminations discretely
157
Using continuous biometric verification to protect interactive login sessions
158
Using Continuous Face Verification to Improve Desktop Security
159
Using continuous function shaping to reduce vibration for flexible systems
160
Using continuous integration and automated test techniques for a robust C4ISR system
161
Using continuous integration of code and content to teach software engineering with limited resources
162
Using Continuous Integration to organize and monitor the annotation process of domain specific corpora
163
Using Continuous Queries for Event Filtering and Routing in Sparse MANETs
164
Using continuous state estimation in grid planning
165
Using continuous state estimation in grid planning
166
Using continuous-time Bayesian networks for standards-based diagnostics and prognostics
167
Using Contour Analysis to Improve Feature Extraction in Thai Handwritten Character Recognition Systems
168
Using contour information for image segmentation
169
Using contours to detect and localize junctions in natural images
170
Using contract and ontology for privacy protection in Service-Oriented Architecture
171
Using contract labour
172
Using contract manufacturing services to assist with design solutions in advanced packaging technologies
173
Using contract-based component specifications for virtual integration testing and architecture design
174
Using contrapositive law in an implication graph
175
Using Contrast and Directional Information for Retinal Vessels Segmentation
176
Using Control And Vision For Space Applications
177
Using Control Capabilities of DER to Participate in Distribution System Operation
178
Using control center technology to solve new utility challenges
179
Using Control Charts for Detecting and Understanding Performance Regressions in Large Software
180
Using control methods to model energy hub systems
181
Using control microfluidic system to enhance the sperm motility sorting efficiency
182
Using control networks for distributed robotic systems
183
Using Control Theory for Load Shedding in Data Stream Management
184
Using control theory to achieve service level objectives in performance management
185
Using Control Theory to Improve Productivity of Service Systems
186
Using control theory to understand management
187
Using Control-Flow Techniques in a Security Context: A Survey on Common Prototypes and Their Common Weakness
188
Using controlled chaos for digital signaling: A physical principle for 1-stage waveform synthesis
189
Using controlled query generation to evaluate blind relevance feedback algorithms
190
Using Controlling Chaos Technique to Suppress Self-Modulation in a Delayed Feedback Traveling Wave Tube Oscillator
191
Using conventional reasoning techniques for self-organising systems
192
Using convergent design processes to surface hidden ambiguity and conflict in requirements
193
Using Converging Technology to Bring Social Networking to Commerce
194
Using Conversational Knowledge Management as a lens for Virtual Collaboration in the course of small group activities
195
Using Convex Optimization for Nonparametric Statistical Analysis of Point Processes
196
Using convex optimization to compute channel capacity in a channel model of cochlear implant stimulation
197
Using convex quadratic approximation as a local search operator in evolutionary multiobjective algorithms
198
Using Convex Set Techniques for Combined Pixel and Frequency Domain Coding of Time-Varying Images
199
Using Convolutional Neural Networks to Discover Cogntively Validated Features for Gender Classification
200
Using Co-occurrence Analysis to Expand Consumer Health Vocabularies from Social Media Data
201
Using Co-Occurrence and Segmentation to Learn Feature-Based Object Models from Video
202
Using co-occurrence features extracted from ripplet I transform in texture classification
203
Using co-op reviews as an assessment tool
204
Using cooperating knowledge-based systems to reduce information overload
205
Using cooperation among peers and interest mixing to protect privacy in targeted mobile advertisement
206
Using cooperation between university and enterprise to improve the comprehensive competitiveness of student in computer science
207
Using cooperation to improve the experience of mobile Web Services consumers
208
Using cooperation to improve the resource utilization in service ecologies
209
Using cooperative learning to activate your simulation classroom
210
Using cooperative learning to enhance critical reflection
211
Using cooperative mediation to solve distributed constraint satisfaction problems
212
Using cooperative MIMO techniques and UAV relay networks to support connectivity in sparse Wireless Sensor Networks
213
Using cooperative multiple paths to reduce file download latency in cellular data networks
214
Using cooperative sharing approach to improve the efficiency of range queries
215
Using cooperative transmission in wireless multihop networks
216
Using cooperative writing and oral presentations as peer teaching - evaluating the effectiveness of elements of inductive teaching and social constructivism on student outcomes
217
Using co-optimization to clear energy and ancillary services in MRTU market
218
Using co-ordinated atomic actions for building complex Web applications: a learning experience
219
Using coordination contracts for flexible adaptation to changing business rules
220
Using coordination to restructure sequential source code into a concurrent program
221
Using Copied Software: Your Work Product At Risk
222
Using copied software: your work product at risk
223
Using coplanar wave guides to excite molecular motions in the frequency range of 10–1000GHz
224
Using Coplink to analyze criminal-justice data
225
Using co-presence communities to enhance social recommendation
226
Using coprime factorizations in partial decoupling of linear multivariable systems
227
Using copulas for modeling stochastic dependence in power system uncertainty analysis
228
Using Copulas for Modeling Stochastic Dependence in Power System Uncertainty Analysis
229
Using Copulas in Data Mining Based on the Observational Calculus
230
Using Copulas in Risk Analysis
231
Using CORBA and Java for PBX management
232
Using CORBA and XML to Deliver Unified NGN Management Interfaces - Rationale and Summary
233
Using CORBA applications in nomadic environments
234
Using CORBA as a distributed extension solution for OSGi
235
Using CORBA notification service and RSVP to provide end-to-end QoS guarantees
236
Using CORBA to support terminal mobility
237
Using CORE with SDL to specify requirements
238
Using coreference and surrounding contexts for entity linking
239
Using coreless hall effect sensor for accurate current measurement in ZigBee based wireless sensor network
240
Using Corner Feature Correspondences to Rank Word Images by Similarity
241
Using corner reflectors and X-band SAR interferometry for slope instability monitoring
242
Using corona inception voltage for motor evaluation
243
Using Coroutines for RPC in Sensor Networks
244
Using corpus and knowledge-based similarity measure in Maximum Marginal Relevance for meeting summarization
245
Using Corpus Linguistics as a Tool for Reform in English Language Teaching and Learning: The Case of Public Schools in Arab Countries
246
Using Correced Criteria to Model Flashover Voltage of Polluted Insulators
247
Using Corrected Criteria to Model Flashover Voltage of Polluted Insulators
248
Using corrective filters to improve the accuracy of seismic data
249
Using correctness results to verify behavioral properties of microprocessors
250
Using correctness, consistency, and completeness patterns for automated scenarios verification
251
Using correlated surprise to infer shared influence
252
Using Correlation Based Subspace Clustering for Multi-label Text Data Classification
253
Using correlation coefficient series to find the pattern of the correlation evolvement
254
Using Correlation Dimension to Analyze the Signal of Microscale Crack Effect Induced Self-Excited Torsional Vibration on the Experimental Platform
255
Using correlation filters to classify aircraft down-range radar profiles
256
Using correlation in wavelet transform coefficients
257
Using correlation signal processing for the extraction of the signals from a noise level in ferromagnetic films
258
Using Correlation to Improve Boosting Technique: An Application for Time Series Forecasting
259
Using Correlation-Based Feature Selection for a Diverse Collection of Bioinformatics Datasets
260
Using Correntropy as a cost function in linear adaptive filters
261
Using corrugated fins to decrease the beamwidth of the radiation pattern from a Vlasov launcher
262
Using cosine filters to improve alias rejection in comb decimation filter
263
Using COSMO-SkyMed data for flood mapping: Some case-studies
264
Using cost benefit analysis for enterprise resource planning project evaluation: a case for including intangibles
265
Using cost measures and model simplicity to extrapolate performance in network intrusion detection systems
266
Using cost of software quality for a process improvement initiative
267
Using costar to assist nurses in hypertension screening and education
268
Using Costas Arrays to Construct Frequency Hop Patterns for OFDM Wireless Systems
269
Using Cost-regularized Kernel Regression with a high number of samples
270
Using Cost-Risk to Connect Cost Estimating and Earned Value Management (EVM)
271
Using CoTraining and Semantic Feature Extraction for Positive and Unlabeled Text Classification
272
Using COTS instruments to produce virtual functions previously supplied by specialised equipment
273
Using COTS software in high assurance control applications
274
Using COTS technologies for battlefield applications
275
Using COTS to Construct a High Performance Robot Arm
276
Using Coulombian approach for Modeling Scalar Potential and Magnetic Field of a Permanent Magnet with Radial Polarization
277
Using Coulombian Approach for Modeling Scalar Potential and Magnetic Field of a Permanent Magnet With Radial Polarization
278
Using count prediction techniques for mining frequent patterns in transactional data streams
279
Using counter example guided abstraction refinement to find complex bugs
280
Using Counter-propagation Neural Network for Robust Digital Audio Watermarking in DWT Domain
281
Using counter-proposal to optimize genetic algorithm based cooperative negotiation
282
Using Coupled Hidden Markov Models to Model Suspect Interactions in Digital Forensic Analysis
283
Using coupled inductors to enhance transient performance of multi-phase buck converters
284
Using coupled lines to produce highly efficient square pulses for VF-TLP
285
Using coupled models to study the effects of river discharge on biogeochemical cycling and hypoxia in the northern Gulf Of Mexico
286
Using coupled simulation for planning of energy efficient production facilities
287
Using coupled subspace models for recovery of reflectance spectra from airborne images
288
Using Coupled Subspace Models for Reflectance/Illumination Separation
289
Using coupled transmission lines to generate impedance-matched pulses resembling charged device model ESD
290
Using Coupled Transmission Lines to Generate Impedance-Matched Pulses Resembling Charged Device Model ESD
291
Using coupled vias for band-pass filters in multilayered printed-circuit boards
292
Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem
293
Using coupling measurement for impact analysis in object-oriented systems
294
Using courseware authoring to mentor faculty of the future
295
Using courteous logic based representations for requirements specification
296
Using covariance matrices for unsupervised texture segmentation
297
Using Coverage for Measuring the Effect of Haptic Feedback in Human Robotic Swarm Interaction
298
Using Coverage Information to Guide Test Case Selection in Adaptive Random Testing
299
Using coverage information to predict the cost-effectiveness of regression testing strategies
300
Using covert channels to evaluate the effectiveness of flow confidentiality measures
301
Using covert timing channels for attack detection in MANETs
302
Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation
303
Using cP
2
BL in Teaching Multi-Core Related Contents
304
Using CPN Modeling and Simulating the Task-Oriented C2 Organization
305
Using CPU Stubs to Optimize Parallel Processing Tasks: An Application of Dynamic Performance Stubs
306
Using Cramer-Rao theory combined with Monte Carlo simulations for the optimization of monolithic scintillator PET detectors
307
Using Cramer-Rao theory for multiple agents
308
Using Cramer-Rao theory for SAR waveform design
309
Using credit scoring technique to evaluate the usefulness of an imagery examination
310
Using creeping wave to size cylindrical defect
311
Using crest lines to guide surface reconstruction from stereo
312
Using crest lines to guide surface reconstruction from stereo
313
Using cricket sensor nodes for Pioneer robot localization
314
Using criteria in the recommendation report: a case study of the Texas A&M university bonfire commission findings
315
Using Criterion-Based Access Control for Multilevel Database Security
316
Using critical incidents to understand the interactions of airline dispatchers with the traffic management system
317
Using critical junctures and environmentally-dependent information for management of tightly-coupled cooperation in heterogeneous robot teams
318
Using Critical Machine Couple Equal Area Criterion to Assess Multi-Machine System Stability
319
Using crop simulation model to study the time lag between precipitation and NDVI and its effect on NDVI based agricultural applications
320
Using cross phase modulation in optical fiber to transfer optical frequency combs to arbitrary center frequencies
321
Using Cross-Correlation Coefficients to Analyze Transformer Sweep Frequency Response Analysis (SFRA) Traces
322
Using cross-correlation function to assess dynamic cerebral autoregulation in response to posture changes for stroke patients
323
Using Crosscorrelation to Mitigate Analog/RF Impairments for Integrated Spectrum Analyzers
324
Using cross-correlations of SEUs and AP8 as a diagnostic tool
325
Using Cross-cultural Features in Web Design Patterns
326
Using cross-decoder phone coocurrences in phonotactic language recognition
327
Using cross-disciplinary collaboration to encourage transformative learning
328
Using Cross-Document Random Walks for Topic-Focused Multi-Document
329
Using Cross-Efficiency Fuzzy Data Envelopment Analysis for Healthcare Facilities Performance Evaluation under Uncertainty
330
Using cross-entropy for polarimetric radar discrimination problem
331
Using cross-entropy for polarimetric SAR image classification
332
Using cross-image spectra in a SAR ocean wave inversion scheme
333
Using Cross-Language Information Retrieval Methods for Bilingual Search of the Web
334
Using cross-layer adaptations for dynamic data management in large scale coupled scientific workflows
335
Using cross-layer design to detect jamming attacks in the CoNSIS scenario
336
Using Cross-layer Heuristic and Network Coding to Improve Throughput in Multicast Wireless Mesh Networks
337
Using cross-layer information to improve TCP performance with vertical handoffs
338
Using Cross-Linked SU-8 to Flip-Chip Bond, Assemble, and Package MEMS Devices
339
Using Cross-Platform Course Management System in English Practicum Course: A Case Study for English Teacher-Candidates
340
Using Crosspoint Faults in Simplifying Toffoli Networks
341
Using cross-property relations between electrical conductivity and compressional wave velocity, obtained from well logs, to estimate the porosity of the rock
342
Using Cross-Task Classification for Classifying Workload Levels in Complex Learning Tasks
343
Using Crowd Funding for Idea Assessment Inside Organizations: Lessons Learned from a Market Engineering Perspective
344
Using crowdsensed information for traffic simulation in the Robocar World Championship framework
345
Using Crowd-Source Based Features from Social Media and Conventional Features to Predict the Movies Popularity
346
Using crowdsourcing for data analytics
347
Using cryptographic and. watermarking algorithms
348
Using Cryptography as Copyright Protection for Embedded Devices
349
Using CSCL to engage pre-service teachers in online collaborative critique of video projects
350
Using CSI and modulation to improve interference cancellation performance for OFDM systems
351
Using CSIM to model complex systems
352
Using CSP to detect errors in the TMN protocol
353
Using CSP to develop trustworthy hardware
354
Using CSP to Model and Analyze TinyOS Applications
355
Using CSP to model and analyze Transmission Control Protocol vulnerabilities within the broadcast network
356
Using CSP to model the synchronisation process of variable length codes
357
Using CTL formulae as component abstraction in a design and verification flow
358
Using C-to-gates to program streaming image processing kernels efficiently on FPGAs
359
Using cubes of non-state variables with Property Directed Reachability
360
Using cubesats as platforms for remote sensing with satellite navigation signals
361
Using cubic B-spline interpolation for efficient ray-tracing-based ultrawideband propagation modeling
362
Using CUDA enabled FDTD simulations to solve multi-gigahertz EMI challenges
363
Using CUDA GPU to Accelerate the Ant Colony Optimization Algorithm
364
Using culd3d design virtual experiment of Camera operation
365
Using cultural algorithms in industry
366
Using cultural algorithms to evolve strategies for recessionary markets
367
Using cultural algorithms to evolve strategies in agent-based models
368
Using Cultural Algorithms to generate models for archaic urban centers: The Monte Alban example
369
Using cultural algorithms to improve performance in semantic networks
370
Using cultural algorithms to support re-engineering of rule-based expert systems in dynamic performance environments: a case study in fraud detection
371
Using cultural metadata for artist recommendations
372
Using culture to help people communication throught computer games in educational and therapeutic environment
373
Using cumulants and spectra to model nuclear radiation detectors
374
Using Current Coefficient to Estimate DC Conductor Corona Onset Voltage
375
Using Current Mode Fuzzy Gain Scheduling Of PI Controller for UPS Inverter
376
Using current signature analysis technology to reliably detect cage winding defects in squirrel cage induction motors
377
Using current steering logic in mixed analogue-digital circuits
378
Using Current Surface Probe to Measure the Current of the Fast Power Semiconductors
379
Using current-based MPPT method in new integrated system of PV module and STATCOM
380
Using current-fed parallel-resonant inverters for electrodischarge applications: a case of study
381
Using current-magnitude measurements in decoupled state estimation
382
Using current-source formulation for dynamic average-value modeling of inverter side HVDC system
383
Using cursor measures to determine appropriate computer input assistance for motion-impaired users
384
Using curve-fitting optimisation technique to estimate power MOSFET model parameters for PECT II system
385
Using curvelet transform to detect breast cancer in digital mammogram
386
Using Curves of Permanence to Study the Contribution of Input Variables in Artificial Neural Network Models: A New Proposed Methodology
387
Using curves to enhance parallel coordinate visualisations
388
Using cusp catastrophe theory to model pick-up point choice behavior for online bookstore shopper
389
Using Custom-designed Vlsi Fuzzy Inferencing Chips For The Autonomous Navigation Of A Mobile Robot
390
Using customer feedback in public transportation systems
391
Using cutaneous neural signals to predict cat forelimb muscle activity during walking
392
Using cut-out features for efficient printed circuit board testing and failure analysis
393
Using cut-through forwarding to retain the real-time properties of Profibus over hybrid wired/wireless architectures
394
Using cutwidth to improve symbolic simulation and Boolean satisfiability
395
Using CVIS to process the concurrent signal priority requirements: A cooperative optimization model and its hardware-in-the-loop field tests
396
Using CVL to Support Self-Adaptation of Fault-Tolerant Service Compositions
397
Using CVSS in Attack Graphs
398
Using CW-CRDS for trace gas detection
399
Using Cyber Defense Competitions to build bridges between community colleges and four year institutions: A footbridge for students into an IT program
400
Using cyber maneuver to improve network resiliency
401
Using cybernetics with Soft Systems Methodology in complex system development
402
Using cybersecurity as an engineering education approach on computer engineering to learn about Smart Grid technologies and the next generation of electric power systems
403
Using cycle stacks to understand scaling bottlenecks in multi-threaded workloads
404
Using CyclePad-an “articulate” software laboratory-in thermodynamics education
405
Using cyclic executives for achieving closed loop co-simulation
406
Using cyclic genetic algorithms to evolve multi-loop control programs
407
Using Cyclic Genetic Algorithms to learn gaits for an actual quadruped robot
408
Using Cyclic Prefix Correlation for DVB-T signals detection
409
Using cyclic prefix for secondary users’ detection
410
Using Cyclic Prefix to Mitigate Carrier Frequency and Timing Asynchronism in Cooperative OFDM Transmissions
411
Using cyclic redundancy check to eliminate key storage for revocable iris templates
412
Using cyclostationarity for timing synchronization and blind equalization
413
Using cyclostationarity in the modulation classification of analogue signals
414
Using Cylindrical Algebraic Decomposition and Local Fourier Analysis to Study Numerical Methods: Two Examples
415
Using DACP (Data Analyzer of Coursera Platform) to Analyze MOOC Platform Data
416
Using DAML+OIL to Enhance Search Semantic
417
Using damping injection and passivity in robotic manipulation
418
Using DASPK on the TMC CM5. Experiences with two programming models
419
Using data abstraction to guide the restructuring of FORTRAN
420
Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems
421
Using data aggregation to prolong the lifetime of wide-area wireless sensor networks
422
Using data analysis by deploying Artificial Neural Networks to increase honeypot security
423
Using data analysis for discovering improvement potentials in production process
424
Using data and knowledge: an architecture for implementing load forecasting systems
425
Using data aquisition systems by pulse sounding for remote sensing
426
Using data center TCP (DCTCP) in the Internet
427
Using Data Clustering to Optimize Scatter Bitmap Index for Membership Queries
428
Using Data Compression for Delay Constrained Applications in Wireless Sensor Networks
429
Using Data Compression for Increasing Memory System Utilization
430
Using data compression for multidimensional distribution analysis [molecular biology]
431
Using data compression in automatic test equipment for system-on-chip testing
432
Using data compression to enhance the security of identification document
433
Using Data Confluences in a Distributed Network with Social Monitoring to Identify Fault Conditions
434
Using data digits to identify fabricated data
435
Using data driven simulation to build inventory model
436
Using data engine in distributed automation system
437
Using Data Envelopment Analysis for Base Station selection in Heterogeneous Wireless Access Networks
438
Using data envelopment analysis for evaluating alternative software development process configurations
439
Using data envelopment analysis for evaluating alternative software development process configurations
440
Using data envelopment analysis for supplier evaluation with environmental considerations
441
Using Data Envelopment Analysis to benchmark logistic performance in Belgian manufacturing companies
442
Using data flow analysis to infer type information in Java bytecode
443
Using Data Flow Patterns for Equivalent Mutant Detection
444
Using Data from Simulation Training in Modelling Emergency Response Outcome
445
Using Data Fusion and Web Mining to Support Feature Location in Software
446
Using data fusion for awareness of intrusion in large-scale network
447
Using data grid technologies to construct a digital library environment
448
Using Data Grid Technology to Build MODIS Data Management and Distribution System Based on Spatial Information Grid
449
Using Data Integrity as an Improvement Characteristic to Assess the Safety of ADS-B-based Systems
450
Using Data Merging Techniques for Generating Multidocument Summarizations
451
Using data migration for heterogeneous databases
452
Using data mining and fingerprinting extension with device orientation information for WLAN efficient indoor location estimation
453
Using data mining and judgment analysis to construct a predictive model of crime
454
Using Data Mining and Recommender Systems to Facilitate Large-Scale, Open, and Inclusive Requirements Elicitation Processes
455
Using data mining and visualization techniques for the reconstruction of ocean paleodynamics
456
Using data mining approach for personalizing the therapy of dyslalia
457
Using Data Mining as a Strategy for Discovering User Roles in CSCL
458
Using data mining for assessing diagnosis of breast cancer
459
Using data mining for improving web-based course design
460
Using data mining for learning path recommendation and visualization in an intelligent tutoring system
461
Using data mining for mobile communication clustering and characterization
462
Using data mining in optimisation of building energy consumption and thermal comfort management
463
Using data mining methods for improvement of product and process quality
464
Using data mining methods to build customer profiles
465
Using data mining predictive models to classify credit card applicants
466
Using Data Mining Technique for Coefficient Tuning of an Adaptive Tabu Search
467
Using data mining technique to diagnosis heart disease
468
Using data mining technique to explore anthropometric data towards the development of sizing system
469
Using Data Mining Techniques for Predicting Future Car market Demand; DCX Case Study
470
Using Data Mining Techniques in Development of MURA Geometric Prediction Module for Large Area Photomask
471
Using data mining techniques in heart disease diagnosis and treatment
472
Using Data Mining Techniques in Web-Based Instruction Data Analysis
473
Using data mining techniques to improve location based services
474
Using data mining techniques to investigate the factors influencing mobile payment adoption in Morocco
475
Using data mining techniques to learn layouts of flat-file biological datasets
476
Using Data Mining Techniques to Promote On-line Shopping Platform
477
Using data mining techniques to support DR programs definition in smart grids
478
Using data mining technology to design an intelligent CIM system for IC manufacturing
479
Using data mining technology to explore Internet addiction behavioral patterns
480
Using Data Mining Technology to improve Manufacturing Quality - A Case Study of LCD Driver IC Packaging Industry
481
Using Data Mining to Accelerate Cross-Selling
482
Using data mining to discover signatures in network-based intrusion detection
483
Using data mining to discover the correlation between web learning portfolios and achievements
484
Using data mining to dissolved gas analysis for power transformer fault diagnosis
485
Using Data Mining to Enhance Automated Planning and Scheduling
486
Using Data Mining to Estimate Equivalent Surface of Broadcasting Effect
487
Using Data Mining to Estimate Missing Sensor Data
488
Using Data Mining to Help Design Sustainable Products
489
Using Data Mining to Help Detect Dysplasia: Extended Abstract
490
Using Data Mining To Improve Feedback From Experience For Equipment In The Manufacturing & Transport Industries
491
Using data mining to improve mutation in a tool for molecular evolution
492
Using data mining to improve supplier release stability
493
Using data mining to investigate cognitive processes by a creativity test-a preliminary study
494
Using data mining to investigate interaction between channel characteristics and hydraulic geometry channel types
495
Using data mining to study the impact of topology characteristics on the performance of wireless mesh networks
496
Using Data Mining to Support Teacher´s Intervention in a Robotics Class
497
Using data mining to support the construction and maintenance of expert systems
498
Using Data Mining Tools To Build Integrated Discrete-Event Simulations
499
Using data mules for sensor network resiliency
500
Using data on communications traffic in a new approach to analyzing large-scale social networks and user-dynamics
501
Using Data Postcompensation and Predistortion to Tolerate Cell-to-Cell Interference in MLC nand Flash Memory
502
Using data quality measures in decision-making algorithms
503
Using Data Recovery Models for Multi-shift Scheduling in Wireless Sensor Networks
504
Using Data Replication for Improving QoS in MANETs
505
Using data replication to reduce communication energy on chip multiprocessors
506
Using data science & big data analytics to make healthcare green
507
Using data science for detecting outliers with k Nearest Neighbors graph
508
Using Data Semantics to Enable Automatic Composition of Web Services
509
Using data similarity to achieve synchronization for free
510
Using Data to Combat Human Rights Abuses [Leading Edge]
511
Using data to design fuzzy system based on Quantum-behaved Particle Swarm Optimization
512
Using data to determine design for environment product goals
513
Using data versioning in database application development
514
Using data visualization to facilitate secure engineering hardening your code through improved next generation softSecVis
515
Using database framework in Web applications
516
Using database technologies in building learning community to improve knowledge exchange
517
Using databases and computational techniques to infer the function of novel proteins
518
Using databases to streamline Test Program Set development
519
Using Datacenter Simulation to Evaluate Green Energy Integration
520
Using datacube aggregates for approximate querying and deviation detection
521
Using Data-driven and Phonetic Units for Speaker Verification
522
Using Data-Extraction Ontologies to Foster Automating Semantic Annotation
523
Using data-flow analysis for resilience and result checking in peer-to-peer computations
524
Using data-flow analysis in MAS for power-aware HPC runs
525
Using dataflow based context for accurate value prediction
526
Using Dataflow Information for Concern Identification in Object-Oriented Software Systems
527
Using Dataflow Information to Improve Inter-Workflow Instance Concurrency
528
Using dataflow principle to exploit restricted AND-parallelism in logic programs
529
Using dataflow traceability between functions in the safety evaluation process
530
Using dataflow traceability between functions in the safety evaluation process
531
Using data-level parallelism to accelerate instruction-level redundancy
532
Using Datalog data model and data mining to solve bill of materials personalization problems
533
Using Data-Mining Approaches for Wind Turbine Power Curve Monitoring: A Comparative Study
534
Using data-mining techniques for PM
10
forecasting in the metropolitan area of Thessaloniki, Greece
535
Using data-mining to allow robots to discover the preferences of humans
536
Using datamining tools in analyzing undergraduate paper results in Computer Science at Óbuda University
537
Using data-oriented storage method to build a high-parallel and high-efficiency disk cluster
538
Using DaVinci Technology for Digital Video Devices
539
Using DBSCAN clustering algorithm in spam identifying
540
Using dc links to enhance ac system performance
541
Using DC nanovoltmeters for low-frequency spectral analysis of voltage reference standards
542
Using DCCP: Issues and improvements
543
Using DCOP to Solve Virtual Network Allocation Problems
544
Using DCT coefficients flipping for information hiding in still images
545
Using DDL to understand and modify SimpleScalar
546
Using DDM Asymmetry Metrics for Wind Direction Retrieval From GPS Ocean-Scattered Signals in Airborne Experiments
547
Using DEA for relative efficiency analysis of wafer fabrication facilities
548
Using DEA to evaluate operation efficiency of top 10 global solar photovoltaic companies
549
Using DEA to measure the relative efficiency of DSM implementation
550
Using DEA to Measure the Relative Efficiency of the Service Center and Improve Operation Efficiency through Reorganization
551
Using DEA to measure the relative efficiency of the service center and improve operation efficiency through reorganization
552
Using DEA window analysis and the Malmquist index to evaluate the operations of Canadian Schedule I banks
553
Using dead drops to improve data dissemination in very sparse equipped traffic
554
Using deadband in packet-based networked control systems
555
Using deadbands to reduce communication in networked control systems
556
Using Debt Mechanism to Achieve Proportional Delay and Loss Differentiation in a Wireless Network with a Multi-state Channel
557
Using deceptive packets to increase base-station anonymity in wireless sensor network
558
Using decision boundary to analyze classifiers
559
Using decision diagrams to compactly represent the state space for explicit model checking
560
Using decision diagrams to design ULMs for FPGAs
561
USING DECISION FEEDBACK EQUALIZATION AND CONVOLUTIONAL CODES TO IMPROVE PERFORMANCE IN SATURATION RE
562
Using decision functions for nonlinear controller design
563
Using decision requirements to guide the design process
564
Using decision support systems for efficient diagnosis of power transmission transformer
565
Using decision theory to formalize emotions in multi-agent systems
566
Using decision tree algorithms as a basis for a heart sound diagnosis decision support system
567
Using decision tree and association rules to predict cross selling opportunities
568
Using decision tree classification to assist in the prediction of Alzheimer´s disease
569
Using decision tree for efficient data classification in Cyber-physical systems
570
Using Decision Tree to Analyze Patient of Aortic Aneurysm with Chronic Diseases in Clinical Application
571
Using decision tree to predict mental health status based on web behavior
572
Using decision trees and a-cuts for solving matrix games with fuzzy payoffs
573
Using Decision Trees for Knowledge-Assisted Topologically Structured Data Analysis
574
Using decision trees in economizer repair decision making
575
Using decision trees to aid algorithm selection in combinatorial interaction tests generation
576
Using decision trees to construct optimal acoustic cues
577
Using Decision Trees to Derive the Complement of a Binary Function with Multiple-Valued Inputs
578
Using decision trees to detect and isolate simulated leaks in the J-2X rocket engine
579
Using decision trees to measure activities in people with stroke
580
Using Decision Trees to Predict the Certification Result of a Build
581
Using decision trees to study the convergence of phylogenetic analyses
582
Using Decision-Tree to Automatically Construct Learned-Heuristics for Events Classification in Sports Video
583
Using DecisionTrees for Real-Time Ischemia Detection
584
Using Declarative Meta Programming for Design Flaws Detection in Object-Oriented Software
585
Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms
586
Using Declarative Workflow Languages to Develop Process-Centric Web Applications
587
Using decomposed theory of Planned Behavior to explain virtual currency use intention
588
Using decomposition techniques for the design of survivable logical topologies
589
Using deconvolution to determine the sphincter strength distribution around the urethra
590
Using deconvolved dispersion parameters for selecting EIT frequencies
591
Using Decoupled Characteristic in the Synthesis of Stabilizers in Multimachine Systems
592
Using Decoupled Characteristic in the Synthesis of Stabilizers in Multimachine Systems
593
Using Dedicated and Opportunistic Networks in Synergy for a Cost-Effective Distributed Stream Processing Platform
594
Using Dedicated Functional Simulator for ASIC Design in Indian Context
595
Using dedicated in-building systems to improve HSDPA indoor coverage and capacity
596
Using deductive databases to facilitate the maintenance process
597
Using deductive knowledge to improve cryptographic protocol verification
598
Using Deep Belief Network to Capture Temporal Information for Audio Event Classification
599
Using Deep Learning for Energy Expenditure Estimation with wearable sensors
600
Using deep learning for robustness to parapapillary atrophy in optic disc segmentation
601
Using deep RIE for micromachining SOI wafers
602
Using Deep Serial Memory for large block data transfers
603
Using deep stacking network to improve structured compressed sensing with Multiple Measurement Vectors
604
Using Deep Web Technology in Scientific Data Sharing Platform
605
Using default ARTMAP for cancer classification with MicroRNA expression signatures
606
Using default logic to enhance default logic: preliminary report
607
Using default reasoning to discover inconsistencies in natural language requirements
608
Using default rules in fuzzy control
609
Using defeasible logic to control selection of a business forecasting method
610
Using defect analysis feedback for improving quality and productivity in iterative software development
611
Using defect density modelling to drive the optimisation of circuit layout, maximising yield
612
Using Defect Reports to Build Requirements Knowledge in Product Lines
613
Using defect taxonomies for requirements validation in industrial projects
614
Using Defect Taxonomies for Testing Requirements
615
Using deferential evolution algorithm for the multi-objective optimization of a switched-current circuit
616
Using deformable models to segment complex structures under geometric constraints
617
Using Deformable Surface Models to Derive a DCT-Like 2D Transform
618
Using deformable templates to infer visual speech dynamics
619
Using deformations for browsing volumetric data
620
Using degraded music quality to encourage a health improving walking pace: BeatClearWalker
621
Using degree theory to determine the minimum number of unstable operating points that a nonlinear circuit must possess
622
Using Degree-Based Strategy for Network Coding in Content Distribution Network
623
Using Delaunay triangulation to construct obstacle detour mobility model
624
Using delay based networks for detecting coherent structures in turbulence from hot-wire anemometer signals
625
Using Delay Tolerant Networks for Car2Car communications
626
Using delayed feedback for antenna selection in MIMO systems
627
Using Delayed Observations for Long-Term Vehicle Tracking in Large Environments
628
Using delay-gradient TCP for multimedia-friendly ‘background’ transport in home networks
629
Using deliberate-delay decentralized controllers to stop spread dynamics in canonical network models
630
Using delta-sigma modulators in visible light OFDM systems
631
Using DEM to quantify spatial variability of soil storage capacity: a semi-distributed hydrological model for Northern China
632
Using Demand Response to Improve the Emission Benefits of Wind
633
Using demand side management in energy-intensive industries for providing balancing power - The Estonian case study
634
Using DEMATEL to explore a casual and effect model of sustainable supplier selection
635
Using DEMATEL to explore the interaction effect of team innovation factors
636
Using DEMATEL to Implement LibQUAL+TM in Evaluating Library Service
637
Using Deming cycle for strengthening cooperation between industry and university in IT engineering education program
638
Using DEMO to Identify IT Services
639
Using Demographic Migration Theory to Explore Why People Switch Between Online Games
640
Using Dempster Shafer theory to aggregate usability study data
641
Using Dempster´s rule of combination to robustly estimate pointed targets
642
Using Dempster-Shafer theory and ontology in XML latent information retrieval
643
Using Dempster-Shafer Theory to Fuse Multiple Information Sources in Region-Based Segmentation
644
Using Dempster-Shafer theory to model uncertainty in climate change and environmental impact assessments
645
Using Dempster-Shafer-based modeling of object existence evidence in sensor fusion systems for advanced driver assistance systems
646
Using denoising at the receiver front-end for frequency-selective channels
647
Using denoising in frequency selective channels
648
Using dense point clouds as environment model for visual localization of mobile robot
649
Using densely recorded scenes for place recognition
650
Using Density based Score Fusion for Multimodal Identification Systems under the Missing Data Scenario
651
Using density functional theory to engineer direct gap germanium-tin alloy
652
Using density invariant graph Laplacian to resolve unobservable parameters for three-dimensional optical bio-imaging
653
Using Density-based d-Hop Connected d-Dominating Sets Routing Scheme to Achieve Load Balancing for Wireless Sensor Networks
654
Using Density-Based Incremental Clustering for Anomaly Detection
655
Using Density-Gradient Theory to Model Sb-Based p-Channel FETs
656
Using deontic logic for knowledge integrity control
657
Using DE-Optimized LFS Processing to Enhance 4G Communication Security
658
Using Dependability Benchmarks to Support ISO/IEC SQuaRE
659
Using Dependability, Performance, Area and Energy Consumption Experimental Measures to Benchmark IP Cores
660
Using dependence analysis to support the software maintenance process
661
Using dependence graphs as a support to document programs
662
Using dependence graphs to assist manual and automated object oriented software inspections
663
Using Dependence Matrix to Support Change Impact Analysis for CBS
664
Using dependencies between attributes to identify and correct the mistakes in SARS data set
665
Using dependencies to pair samples for multi-view learning
666
Using dependency analysis to predict fault dictionary effectiveness
667
Using Dependency Information to Select the Test Focus in the Integration Testing Process
668
Using dependency model to support software architecture evolution
669
Using Dependency Relations to Improve Test Case Generation from UML Statecharts
670
Using Dependency Structures for Prioritization of Functional Test Suites
671
Using Dependency Tracking to Provide Explanations for Policy Management
672
Using Dependent Regions for Object Categorization in a Generative Framework
673
Using Deployed Wi-Fi Access Points to Enhance Asynchronous Wake Up Protocols
674
Using depth and appearance features for informed robot grasping of highly wrinkled clothes
675
Using depth and skin color for hand gesture classification
676
Using Depth Aspect Images for Robust and Efficient Search of Multiple Objects in Optomechatronic Sensing
677
Using depth image processing and human skeleton identification methods to reduce uncomfortable light from a digital projector
678
Using depth in visual simultaneous localisation and mapping
679
Using depth information to improve face detection
680
Using depth maps to find interesting regions
681
Using depth measuring cameras for a new human computer interaction in augmented virtual reality environments
682
Using Depth to Extend Randomised Hough Forests for Object Detection and Localisation
683
Using Derivative Free Approaches for Building Technological Process Optimization Software
684
Using Derivatives of an Implicit Function to Obtain the Stationary Phase of the Two-Dimensional Spectrum for Bistatic SAR Imaging
685
Using describing function to analyze wriggling phenomenon of fuzzy control systems
686
Using Description Logic and Rules to Determine XML Access Control
687
Using Description Logics and extensions of Description Logics to bridge P2P ontologies
688
Using Description Logics for Network Vulnerability Analysis
689
Using Description Logics Reasoner for Ontology Matching
690
Using design - build projects to promote interdisciplinary design
691
Using design based binning to improve defect excursion control for 45nm production
692
Using design fragments to modularize the design of communications in concurrent systems
693
Using design methodology to enhance interaction for a robotic receptionist
694
Using design notebooks to map creativity during team activities
695
Using design of experiment simulation responses to predict thermal performance limits of the heatsink small outline package (HSOP) considering both die bond and heatsink solder voiding
696
Using design of experiment to diagnose analog blocks geometrical defects: Application to current reference circuits
697
Using Design of Experiment to Investigate the Effects of Conducting Polymer Composite Sensor Composition on the Response to an Homologous Series of Alcohols
698
Using Design of Experiments and Virtual Instrumentation to Evaluate the Tribocharging of Pulverulent Materials in Compressed-Air Devices
699
Using design of experiments to improve product and process integrity
700
Using Design of Experiments to Optimise a Decision of Sufficient Testing
701
Using design optimization in radio frequency energy harvesting systems
702
Using design pattern to develop the quality MSC simulator software in performance test for GSM and GPRS system
703
Using Design Patterns & Frameworks to Develop Object-Oriented Communication Systems
704
Using design patterns and constraints to automate the detection and correction of inter-class design defects
705
Using Design Patterns as Usability Heuristics for Mobile Groupware Systems
706
Using design patterns for design of software environment for researches in genetic algorithms
707
Using Design Patterns for Refactoring Real-World Models
708
Using design patterns for safety assessment of integrated modular avionics
709
Using design patterns for safety assessment of integrated modular avionics
710
Using design patterns for type unification and introspection in SystemC
711
Using Design Patterns in a HSDPA System Simulator
712
Using Design Patterns in Mobility Management Protocol Design for Multi-Hop Heterogeneous Wireless Networks
713
Using design patterns in the development of a planner-based courseware system
714
Using design patterns to derive PAC architectures from Object-Z specifications
715
Using design patterns to design and manipulate spatial access structure
716
Using Design Patterns to Improve Web Service Performance
717
Using design patterns to overcome image processing constraints on FPGAs
718
Using design patterns to support migration between different system architectures
719
Using design rationales for agile documentation
720
Using design recovery techniques to transform legacy systems
721
Using Design Structure Matrices to Assess Modularity in Aspect-Oriented Software Product Lines
722
Using Design Structure Matrix for improving Electronic Medical Record usability
723
Using design, build, and test projects to teach engineering
724
Using design-build projects to teach and reinforce engineering skills to first-year engineering students
725
Using designed experiments to improve the quality of concrete products
726
Using designer´s effort for user interface evaluation
727
Using destination set grouping to improve the performance of window-controlled multipoint connections
728
Using destination-set prediction to improve the latency/bandwidth tradeoff in shared-memory multiprocessors
729
Using Deterministic Chaos for Superefficient Monte Carlo Simulations
730
Using deterministic decisions for low-entropy bits in the encoding and decoding of polar codes
731
Using deterministic replay for debugging of distributed real-time systems
732
Using Deterrence to Mitigate Employee Internet Abuse
733
Using deuterium excess to determine water salinization mechanism
734
Using developed transdermal delivery chip to transfer drug for skin permeation
735
Using Developer Information as a Factor for Fault Prediction
736
Using developer interaction data to compare expertise metrics
737
Using Developer-Interaction Trails to Triage Change Requests
738
Using Developers Contributions on Software Vocabularies to Identify Experts
739
Using development history sticky notes to understand software architecture
740
Using developmental principles to design mentoring experiences for graduate students
741
Using developmental principles to plan design experiences for beginning engineering students
742
Using device ATE testers to solve system anomalies
743
Using device characteristics to obtain a low-power temperature-insensitive oscillator for smart dust networks
744
Using device driver software in SCADA systems
745
Using device simulations to optimize ESD protection circuits
746
Using DFT and interpolation to reconstruct narrowband signals buried in noise
747
Using DFT to Obtain the Equivalent Circuit of Aluminum Electrolytic Capacitors
748
Using DG2VHDL to synthesize an FPGA implementation of the 1-D discrete wavelet transform
749
Using DGPS trajectory to evaluate an ortho-rectification method designed for flash radar images
750
Using DHP adaptive critic methods to tune a fuzzy automobile steering controller
751
Using Diagonal and Horizontal Vertical Sobel Operators Spam Detection
752
Using diagram generation software to improve diagram recognition: a case study of music notation
753
Using Diagrams for the Semantic Annotation of Multimedia
754
Using dialogical argument as an interface to complex debates
755
Using dialogue acts to learn better repair strategies for spoken dialogue systems
756
Using dial-up lightpaths for high-speed access
757
Using diamond layout style to boost MOSFET frequency response of analogue IC
758
Using diary to uncover users´ personal information management (PIM) behaviours
759
Using dictionary in a knowledge based algorithm for clustering short texts in Bahasa Indonesia
760
Using Die to chip carrier wire bond transition to build a 4th order differential LP filter for 10 Gpbs O/E receiver
761
Using dielectric losses to de-ice power transmission lines with 100 kHz high-voltage excitation
762
Using difference frequency generation to lock a CW visible laser to a fiber laser frequency comb
763
Using Difference Intervals for Time-Varying Isosurface Visualization
764
Using differences among replications of software engineering experiments to gain knowledge
765
Using differences among replications of software engineering experiments to gain knowledge
766
Using Differencing to Increase Distinctiveness for Phishing Website Clustering
767
Using different communication media in requirements negotiation
768
Using Different Cost Functions to Train Stacked Auto-Encoders
769
Using Different Encryption Techniques for Load Balancing with Cluster-Based Storage
770
Using Different Feature Combination Methods to Study Multisite Protein Sub-cellular Localization Prediction
771
Using different levels of abstraction for parallel program debugging
772
Using different methodologies and technologies to training spatial skill in Engineering Graphic subjects
773
Using different models to label the break indices for mandarin speech synthesis
774
Using different orthogonal code sets for CCK modulation to mitigate co-channel interference among WLANs
775
Using different types of finite elements in electrical machines thin airgaps
776
Using differential carrier phase GPS to control automated vehicles
777
Using differential confocal microscopy to measure the membrane rigidity of a lipid vesicle in optical trap
778
Using differential confocal microscopy to study voltage-induced membrane movements of lipid vesicles
779
Using differential constraints to generate a 3D face model from stereo
780
Using differential constraints to reconstruct complex surfaces from stereo
781
Using Differential Evolution for a Subclass of Graph Theory Problems
782
Using differential evolution for combinatorial optimization: A general approach
783
Using differential evolution for the graph coloring
784
Using Differential Evolution for the Transportation Problem with Fuzzy Coefficients
785
Using differential evolution in the prediction of software effort
786
Using Differential Evolution to Solve the Harmonic Elimination Pulse Width Modulation for Five Level Cascaded Multilevel Voltage Source Inverter
787
Using differential geometry in
R
4
to extract typical features in 3D density images
788
Using differential geometry in
R
4
to extract typical features in 3D images
789
Using difficulty of prediction to decrease computation: fast sort, priority queue and convex hull on entropy bounded inputs
790
Using diffractive optics for tuning custom-designed broadband diode lasers
791
Using Diffuse Coplanar Surface Barrier Discharge for improvement of Felting Properties of Animal Fibres
792
Using diffusion characters for the taxonomy of self-organizing social networks
793
Using diffusion equations for improving performance of wavelet-based image denoising techniques
794
Using Diffusion Geometric Coordinates for Hyperspectral Imagery Representation
795
Using Digilent embedded systems in Internet education
796
Using digital camera as metering device in geometrical, spectral and intensity measurements
797
Using Digital Cameras for Text Input on Mobile Devices
798
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
799
Using Digital Computers in the Design and Maintenance of New Computers
800
Using digital data processing to speed up radar phase noise measurements
801
Using digital electronic design flow to create a Genetic Design Automation tool
802
Using digital forensic readiness model to increase the forensic readiness of a computer system
803
Using digital fountains in future IPTV streaming platforms: a future perspective
804
Using digital information on the shop floor: requirements from the technician´s perspective
805
Using digital libraries to build educational communities: the ChemCollective
806
Using digital library components for biodiversity systems
807
Using digital maps to enhance lane keeping support systems
808
Using Digital Measurement in Raw Mill Control Systems
809
Using Digital Media for Entertainment - The Other Side of the Digital Divide in India
810
Using Digital Mock-Ups Within Simulation Lifecycle Environment for the Verification of ITER Remote Handling Systems Design
811
Using digital multimeters in place of analog null meters for metrological applications
812
Using digital narratives to support the collaborative learning and exploration of cultural heritage
813
USING DIGITAL PHOTOGRAMMETRY FOR THE RAPID GENERATION OF DIGITAL TERRAIN DATABASES
814
Using digital pre-distortion to compensate for analog signal processing errors
815
Using digital signal processing in video measurements
816
Using digital signal processing techniques in light controllers
817
Using digital signal processing to transcribe polyphonic music
818
Using digital signal processor for excitation system of brushless synchronous generator
819
Using Digital Signal Processor singularities to minimize ROM based controller area
820
Using digital signal processor technology to simplify deep space ranging
821
Using Digital Signature Standard Algorithm to Incorporate Non-invertibility in Private Digital Watermarking Techniques
822
Using digital storytelling with infographics in STEM professional writing pedagogy
823
Using digital tools to faciliate writing research and student success in STEM courses
824
Using digital video as an asynchronous method of instruction
825
Using digital video for motion analysis
826
Using digital watermarks with image signatures to mitigate the threat of the copy attack
827
Using Digitally-Modulated Signals to Measure the Gain Compression and Phase Distortion of a Radio Frequency Amplifier
828
Using Dijkstra to Compute Hop-by-Hop QoS Paths
829
Using dimensional analysis to assess scalability and accuracy in molecular communication
830
Using dimensional descriptions to express the emotional content of music
831
Using dimensionality reduction to exploit constraints in reinforcement learning
832
Using dimensionality to achieve a sharp tunneling FET (TFET) turn-on
833
Using DInSAR to Separate Surface and Subsurface Features
834
Using Diploidy Genetic Algorithm for Dynamic OVSF Code Allocation in WCDMA Networks
835
Using Direct Analog Feedback for Multiuser MIMO Broadcast Channel
836
Using Direct and Indirect Neighbours to Predict Protein Function in GO-Evaluated PPI Data Set
837
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing
838
Using direct explanations to validate a multi-layer perceptron network that classifies low back pain patients
839
Using direct force measurements to determine the mechanism of neural cell adhesion molecule (NCAM) function
840
Using direct methods for terminal guidance of autonomous aerial delivery systems
841
Using Direct Radon Transform to Improve Image Reconstructed by Backprojection Method
842
Using directed acyclic graphs to coordinate propagation and search for numerical constraint satisfaction problems
843
Using directed graphs to describe entity dependency in stable distributed persistent stores
844
Using directed hill-climbing for the construction of difference triangle sets
845
Using directed hypergraphs to verify rule-based expert systems
846
Using Direction of Longest Line Segment for Aerodrome Forward-looking Scene Matching
847
Using Directional Antenna for Continuous Moving Object Tracking in WSN with Uncovered Holes
848
Using Directional Antenna to Realize Multi-Relay MAC for Wireless Ad Hoc Networks
849
Using directional antenna to realize multi-relay MAC for wireless Ad Hoc networks
850
Using directional antennas as sensors to assist fire-fighting robots in large scale fires
851
Using Directional Antennas on Stub Wireless Mesh Networks: Impact on Throughput, Delay, and Fairness
852
Using Directional Antennas to Increase the Performance of Data Broadcasting Systems in Environments with Locality of Demand
853
Using directional couplers to overcome the bandwidth limitations of IV-probes in TLP measurements
854
Using directional statistics to learn cast shadows from a multi-spectral light sources physical model
855
Using directionality in mobile routing
856
Using directive antennas to reduce multipath fading in indoor PCN systems
857
Using directly modulated DFBs without power penalty in low-cost and high-power budget coherent access networks
858
Using direct-touch interaction for the visual exploration of profiling sensor data
859
Using direct-tunneling mechanism to suppress hysteresis effect in floating-body partially depleted SOI devices
860
Using dirty signal - how to use or not to use noise corrupted signal -
861
Using discourse analysis to understand "failure modes" of undergraduate engineering teams
862
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
863
Using discovery to create an architecture-based implementation baseline
864
Using Discrete Element Simulation to Design and Evolve Agile Manufacturing Systems in an SME
865
Using discrete event modeling for effective computer animation control
866
Using discrete event qualitative simulation as a knowledge acquisition tool
867
Using Discrete Event Simulation (DES) to Manage Theatre Operations in Healthcare: An Audit-Based Case Study
868
Using discrete event simulation in the teaching of decision analysis
869
Using discrete event simulation to analyze the impact of job priorities on cycle time in semiconductor manufacturing
870
Using discrete event simulation to evaluate housestaff work schedules
871
Using discrete event simulation to evaluate the logistics of medical attention during the relief operations in an earthquake in Bogota
872
Using discrete event simulation to evaluate time series forecasting methods for security applications
873
Using discrete event simulation to examine marine training at the marine corps communication-electronics school
874
Using discrete event simulation to model fluid commodity use by the space launch system
875
Using discrete event simulation to reduce operational expenses for a telecom operator
876
Using discrete event simulation to reduce operational expenses for a telecom operator
877
Using discrete fourier transformation to obtain the complex amplitude of time-harmonic field in FDTD
878
Using discrete fourier transforms to detect operational environments for autonomous nonlinear systems
879
Using Discrete Probabilities With Bhattacharyya Measure for SVM-Based Speaker Verification
880
Using discrete wavelet transform and eigenfaces for recognizing avatars faces
881
Using Discrete Wavelet Transform to analyze quasi-stationary three-phase systems
882
Using Discrete Wavelet Transform to evaluate power quality at highly distorted three-phase systems
883
Using Discrete-Event Computer Simulation To Test Control Systems
884
Using discrete-event simulation for evaluating non-linear supply chain phenomena
885
Using discrete-event simulation to evaluate a new master plan for a sanitary infrastructure
886
Using discrete-event simulation to model human performance in complex systems
887
Using discrete-time controller to globally stabilize a class of feedforward nonlinear systems
888
Using discrete-time hyperchaotic-based asymmetric encryption and decryption keys for secure signal transmission
889
Using discrete-variable optimization for CMOS spiral inductor design
890
Using Discretionary Telecommunications
891
Using discretization and Bayesian inference network learning for automatic filtering profile generation
892
Using discretization to improve E-commerce anomaly detection process
893
Using discriminant analysis for multi-class classification
894
Using discriminant analysis to identify students at risk
895
Using discriminant eigenfeatures for image retrieval
896
Using Discriminative Training Techniques in Practical Intelligent Music Retrieval System
897
Using Discussion Forums to Improve Student Retention Rate: Our Experience with Certificate in Information Technology (CIT) Program
898
Using disjunctive scheduling for a new sequencing method in multiple-conflicts solving
899
Using disjunctive scheduling for optimally solving en-route conflicts [ATC]
900
Using disparity for quality assessment of stereoscopic images
901
Using disparity gradients for robot navigation and registration
902
Using disparity map compensation for stereo image coding
903
Using disparity map for directional adaptive lifting scheme for stereo image residuals
904
Using dispatching rules for job shop scheduling with due date-based objectives
905
Using dispersion communication instead of correlation in the least-squares generalized method
906
Using dispersion in a fiber-optic loop to perform time domain analogue RF signal auto-correlation
907
Using dispersive delay lines and time reversal for low contrast tumour detection
908
Using distance education to teach introductory multimedia design and production
909
Using distance estimation and deep learning to simplify calibration in food calorie measurement
910
Using distance learning electronic tools within the class to engage ADHD students: A key to inclusion?
911
Using distance maps for accurate surface representation in sampled volumes
912
Using distance protection in smart grid environment
913
Using distance transform based algorithms for extracting measures of the fiber network in volume images of paper
914
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours
915
Using Distraction-Conflict Theory to Measure the Effects of Distractions on Individual Task Performance in a Wireless Mobile Environment
916
Using distributed admission control to support multimedia applications in MANET environments
917
Using Distributed Analytics to Enable Real-Time Exploration of Discrete Event Simulations
918
Using distributed apriori association rule and classical apriori mining algorithms for grid based knowledge discovery
919
Using Distributed Circuits to Model Power Capacitor Behavior
920
Using distributed component model for active service deployment
921
Using distributed computing & advanced synchronization techniques for high performance test
922
Using distributed computing platform to solve high computing and data processing problems in bioinformatics
923
Using distributed consistent branching for efficient reconciliation of mobile workspaces
924
Using distributed consistent branching for efficient reconciliation of mobile workspaces
925
Using distributed decision-making to optimize power distribution and support microgrids
926
Using Distributed Diagnosis to Deploy Highly-Available Web Servers
927
Using distributed energy infrastructure for rural health care services: Design of a mobile health vaccine refrigeration technology in rural kenya
928
Using distributed feature detection for an assistive work system
929
Using distributed fuel cells to compete with established utilities under rules permitting retail wheeling
930
Using Distributed Generation to Support and Provide Ancillary Services for the Power System
931
Using distributed hypermedia educational systems for distance education
932
Using distributed intelligence and wireless communication to control and coordinate multiple capacitor banks
933
Using distributed intelligence to transform the distribution power grid into an actively managed network
934
Using distributed magnetometers to increase IMU-based velocity estimation into perturbed area
935
Using distributed memory dynamically in a cluster of PVM-based Linux workstations
936
Using Distributed Microprocessor Systems In Marine Applications
937
Using Distributed Multilevel Agent-based Monitoring Technique for Automated Network Modelling Approach
938
Using Distributed Mutual Exclusion for Coordinating Virtual Meeting in an Ubiquitous Chat System
939
Using distributed neural networks in automated optical inspection
940
Using distributed object technologies in telecommunications network management
941
Using distributed objects for digital library interoperability
942
Using distributed objects to build the Stanford digital library Infobus
943
Using distributed observers for simplifying centralized control
944
Using distributed OLTP technology in a high performance storage system
945
Using distributed partial memories to improve self-organizing collective movements
946
Using distributed power quality monitoring for better electrical system management
947
Using distributed power quality monitoring for better electrical system management
948
Using distributed resource management in heterogeneous telecomputing platforms
949
Using Distributed Rotations for a Low-Complexity Dynamic Decode-and-Forward Relay Protocol
950
Using distributed servers to provide distributed home theatre services
951
Using Distributed Software Development in the improvement of communication and collaboration skills in SE courses: An observational study
952
Using distributed source coding and depth image based rendering to improve interactive multiview video access
953
Using Distributed Source Coding to Secure Fingerprint Biometrics
954
Using distributed topology update and preplanned configurations to achieve trunk network survivability
955
Using Distributed-Shared Memory Mechanisms for Agents Communication in a Distributed System
956
Using distribution automation for a self-healing grid
957
Using distribution LMP and time-of-delivery pricing to promote optimal placement and increased profitability of residential PV systems
958
Using distribution static compensators (D-STATCOMs) to extend the capability of voltage-limited distribution feeders
959
Using disturbance data to monitor primary frequency response for power system interconnections
960
Using Disturbance Data to Monitor Primary Frequency Response for Power System Interconnections
961
Using disturbance records to automate the diagnosis of faults and operational procedures in power generators
962
Using dither to improve the performance of lossy sigma-delta modulators
963
Using dithering for elimination of coding artifact in lattice vector quantization of image subband
964
Using diurnal power price to configure pumped storage
965
Using Diurnal Variation in Backscatter to Detect Vegetation Water Stress
966
Using Diversity as an Additional-objective in Dynamic Multi-objective Optimization Algorithms
967
Using diversity in cluster ensembles
968
Using diversity of satellite channels for navigation systems
969
Using Diversity to Design and Deploy Fault Tolerant Web Services
970
Using diversity to handle concept drift in on-line learning
971
Using divide-and-conquer GA strategy in fuzzy data mining
972
Using divide-and-conquer on custom lengthened Fourier transforms
973
Using divisible load theory to dimension optical transport networks for computational grids
974
Using Divisible Load Theory to Dimension Optical Transport Networks for Grid Excess Load Handling
975
Using DKDP crystals for adaptive compensation of thermal lens in Faraday isolators
976
Using DLBP texture descriptors and SVM for Down syndrome recognition
977
Using DLL for PC/104 Data Acquiring in LabVIEW Platform
978
Using DLNA cloud for sharing multimedia contents beyond home networks
979
Using dlPAG-evoked immobile behavior in animal-robotics navigation
980
Using DL-reasoner for hierarchical multilabel classification applied to economical e-news
981
Using dma devices for data organisation in performing a fast fourier transform in real time
982
Using DMoz for constructing ontology from data stream
983
Using DNS to establish a Localization Service
984
Using document access sequences to recommend customized information
985
Using document sets to promote query feedback
986
Using document space for relational search
987
Using Document Weight Combining Method for Enterprise Expert Mining
988
Using Documentation for Product Line Scoping
989
Using documents assessments to build communities of interests
990
Using domain decomposition and priority queue integration scheme to solve two-dimensional model of myocardium
991
Using Domain Decomposition to Solve Positive-Definite Systems on the Hypercube Computer
992
Using domain general learning models to guide engineering education research
993
Using domain knowledge for fostering the collaborative ability of a web dialogue system
994
Using domain knowledge to constrain structure learning in a Bayesian bioagent detector
995
Using domain knowledge to restrict search in an AI planner
996
Using Domain Knowledge To Synthesize Routing Software
997
Using Domain Ontology as Domain Knowledge for Requirements Elicitation
998
Using Domain Ontology to Implement a Frequently Asked Questions system
999
Using Domain Partitioning in Wrapper Design for IP Cores Under Power Constraints
1000
Using domain specific generated rules for automatic ontology population