Search results

Jump to: navigation, search
  • ...g, geometric modeling, and geometric algorithms and computation in design, analysis and manufacturing, as well as in biomedical, geophysical, digital entertain ...to): biomedical and imaging applications, physical simulation and design, analysis, and manufacturing.
    5 KB (733 words) - 23:27, 14 October 2008
  • embedded applications, and the behavior of many of these applications - Compiler analysis and implementation techniques
    6 KB (847 words) - 23:30, 14 October 2008
  • behavior based on the component behavior. To capture the intricacy of framework for the specification and analysis of rich interfaces is
    4 KB (537 words) - 23:30, 14 October 2008
  • ...ties. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepend * Social network analysis and mining
    4 KB (511 words) - 23:31, 14 October 2008
  • * Empirical studies on collaboration and information behavior in development teams. * Scientific analysis of the relation between methods/processes, tools and collaborative developm
    3 KB (341 words) - 01:15, 31 May 2012
  • characterising the behavior and determining the properties of systems. They and the methodologies and tools for the analysis and verification of system
    6 KB (823 words) - 14:28, 14 December 2008
  • including identification, analysis, extraction, mining, transformation and NE Analysis
    10 KB (1,242 words) - 12:58, 18 January 2009
  • Behavior-building, cognitive modeling, data collection and encoding ...ing, animation/camera control, tactical/strategic decision making, terrain analysis
    8 KB (1,134 words) - 17:06, 27 February 2009
  • · Malicious Behavior Detection and Analysis · Security Protocols Analysis, Design, and Proof
    4 KB (485 words) - 17:07, 27 February 2009
  • + Detection and analysis + Automated behavior model generation
    8 KB (1,020 words) - 17:07, 27 February 2009
  • - privacy audits and risk analysis - analysis of network and security protocols
    12 KB (1,690 words) - 17:08, 27 February 2009
  • understanding and analysis of existing workloads. Whether they are PDAs, * Characterization of OS, Virtual Machine, middleware and library behavior
    4 KB (589 words) - 17:08, 27 February 2009
  • ...analyze Internet measurements, or give insight into Internet structure and behavior. Examples of relevant topics are: * Internet traffic analysis
    6 KB (774 words) - 17:08, 27 February 2009
  • ...ibutions addressing the challenges of large-scale search and user behavior analysis are especially welcome.''
    780 bytes (97 words) - 17:42, 7 March 2020
  • * Multimodal content analysis and retrieval * Studies of information-seeking behavior among image/video users
    3 KB (439 words) - 06:47, 17 April 2020
  • ⑵ Strategic Management Tools and Application Analysis 2.Marketing⑴ Marketing Models and Case Analysis
    2 KB (192 words) - 11:36, 2 August 2009
  • • Intrusion and cybersecurity threat detection and analysis<br> • Crime analysis and prevention<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of evolvable systems, both theoretical › Co-evolution and collective behavior
    2 KB (260 words) - 19:16, 16 February 2010
  • * Security analysis * Malware analysis
    3 KB (343 words) - 16:31, 6 May 2020
  • * Analysis of neurophysiological and neuroanatomical data * Models of conditioning, reward and behavior
    5 KB (574 words) - 15:58, 6 March 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)