0% found this document useful (0 votes)
12 views304 pages

allReturnedMaterial2000 2013

Uploaded by

amismaroc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLS, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views304 pages

allReturnedMaterial2000 2013

Uploaded by

amismaroc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLS, PDF, TXT or read online on Scribd
You are on page 1/ 304

StArt - State of the Art through Systematic Review

SYSTEMATIC REVIEW - EMPIRICAL STUDIES ON SMELLS


Date: 11/17/2017 - 04:06:19

ID Paper Title Authors


0 Build code analyTamrawi, Ahmed and Nguyen, Hoan Anh and Nguyen, Hung Viet and Ngu
1 Back to the mou Iwamoto, Takuya and Sasayama, Yusuke and Motoki, Mitsuo and Kosaka
2 Hunting for smelHauptmann, Benedikt and Junker, Maximilian and Eder, Sebastian and H
3 Interruptions as Stouffs, Alexandre
4 Detection of em Nguyen, Hung Viet and Nguyen, Hoan Anh and Nguyen, Tung Thanh an
5 Domain-specific Guo, Yuepu and Seaman, Carolyn and Zazworka, Nico and Shull, Forres
6 Analyzing websitFalk, Laura and Prakash, Atul and Borders, Kevin
7 Understanding thArcoverde, Roberta and Garcia, Alessandro and Figueiredo, Eduardo
8 AROMA: ambientBodnar, Adam and Corbett, Richard and Nekrasovski, Dmitry
9 The evolution anOlbrich, Steffen and Cruzes, Daniela S. and Basili, Victor and Zazworka,
10 An exploratory s Santos, Jos{\'e} A. M. and de Mendon\c{c}a, Manoel G. and Silva, Carlos
11 Mining Software Kiefer, Christoph and Bernstein, Abraham and Tappolet, Jonas
12 Is a strategy fo Counsell, S. and Hierons, R. M. and Hamza, H. and Black, S. and Durran
13 The use of develOuni, Ali and Kessentini, Marouane and Sahraoui, Houari and Hamdi,
14 inAir: measuring Kim, Sunyoung and Paulos, Eric
15 Olfoto: designin Brewster, Stephen and McGookin, David and Miller, Christopher
16 The sweet smell Ghinea, Georghita and Ademoye, Oluwakemi
17 The influence of Shih, Ray and Blignaut, Pieter
18 Do bad smells inZhang, Min and Hall, Tracy and Baddoo, Nathan and Wernick, Paul
19 Funbrella: recor Fujita, Kazuyuki and Itoh, Yuichi and Yoshida, Ai and Ozaki, Maya and
20 Classbox/J: contBergel, Alexandre and Ducasse, St{\'e}phane and Nierstrasz, Oscar
21 An empirical stu Correa, Alexandre and Werner, Cl\'{a}udia and Barros, M\'{a}rcio
22 Improving objectGarz\'{a}s, Javier and Piattini, Mario
23 An interactive a Murphy-Hill, Emerson and Black, Andrew P.
24 Computational c Neumann, L\'{a}szl\'{o} and Nemcsics, Antal and Neumann, Attila
25 Questioning sof Sj{\o}berg, Dag I.K. and Anda, Bente and Mockus, Audris
26 Building empiric Schumacher, Jan and Zazworka, Nico and Shull, Forrest and Seaman, C
27 InAir: sharing i Kim, Sunyoung and Paulos, Eric
28 Analyzing the chRomano, Daniele
29 What kind of andChoi, Eunjgon and Yoshida, Norihiro and Inoue, Katsuro
30 Let's have dinneWei, Jun and Cheok, Adrian David and Nakatsu, Ryohei
31 Refactoring pip Stolee, Kathryn T. and Elbaum, Sebastian
32 Olfactory displa Kaye, Joseph 'Jofish'
33 CodeVizard: a tooZazworka, Nico and Ackermann, Christopher
34 Pricing, competi Yang, Libin and Lou, Wei
35 Assessing the imLozano, Angela and Wermelinger, Michel and Nuseibeh, Bashar
36 How 4D effects cOh, Eunji and Lee, Minkyoung and Lee, Sujin
37 A catalogue of l Parnin, Chris and G\"{o}rg, Carsten and Nnadi, Ogechi
38 Exploring the impYamashita, Aiko and Moonen, Leon
39 Senses working Jonsson, Fatima and Verhagen, Harko
40 Identifying improPatzke, Thomas and Becker, Martin and Steffens, Michaela and Sierszec
41 This image smellLoumakis, Faidon and Stumpf, Simone and Grayson, David
42 Detecting archit Bertran, Isela Macia
43 Levels of realism:Chalmers, Alan and Ferko, Andrej
44 An exploratory s Macia Bertran, Isela and Garcia, Alessandro and von Staa, Arndt
45 Are automaticall Macia, Isela and Garcia, Joshua and Popescu, Daniel and Garcia, Ales
46 Clone detection Li, Huiqing and Thompson, Simon
47 Search-based det Seng, Olaf and Stammel, Johannes and Burkhart, David
48 NetGames '06: Proceedings of 5th ACM SIGCOMM workshop on Network and system sup
49 Using concept anG\^{\i}rba, Tudor and Ducasse, St{\'e}phane and Kuhn, Adrian and Marin
50 Common refactorCounsell, S. and Hassoun, Y. and Loizou, G. and Najjar, R.
51 Computation of rP{\'e}rez, Javier and Crespo, Yania
52 'Do you smell rotWinterboer, Andi and Cramer, Henriette S. M. and Pavlin, Gregor and G
53 Detecting and vi Hermans, Felienne and Pinzger, Martin and Deursen, Arie van
54 Identifying refa Meananeatra, Panita
55 Graph-based mini Nguyen, Tung Thanh and Nguyen, Hoan Anh and Pham, Nam H. and Al-Ko
56 Semantic smells Gauthier, Fran\c{c}ois and Merlo, Ettore
57 Identifying meth Oliveto, Rocco and Gethers, Malcom and Bavota, Gabriele and Poshyva
58 IDE-based real-tZibran, Minhaz F. and Roy, Chanchal K.
59 Detecting missing Monperrus, Martin and Mezini, Mira
60 Investigating th Zazworka, Nico and Shaw, Michele A. and Shull, Forrest and Seaman, C
61 Evaluating crossNarumi, Takuji and Sato, Munehiko and Tanikawa, Tomohiro and Hirose,
62 Code smells as sAiko Yamashita and Steve Counsell
63 To what extent cAiko Yamashita and Leon Moonen
64 Adaptive DetectiJochen Kreimer
65 An empirical studWei Li and Raed Shatnawi
66 A bad-smell sen Hong Phuc Ninh and Yukinobu Tanaka and Takamichi Nakamoto and K
67 Olfactory recept E. Alfinito and C. Pennetta and L. Reggiani
68 Rooted in SensatDaniel Chamovitz
69 Mimicking the huSang Hun Lee and Oh Seok Kwon and Hyun Seok Song and Seon Joo Pa
70 Study of highly Y. Tanaka and T. Nakamoto and T. Moriizumi
71 Safety lessons aFrank Riedewald and Edmond Byrne
72 Use of a human fMichelle L. Rogers and Paulina S. Sockolow and Kathryn H. Bowles and
73 An empirical appLiguo Yu and Srini Ramaswamy
74 A graph mining aUmut Tekin and Feza Buzluca
75 Steganalysis of Xiaolong Li and Bin Li and Xiangyang Luo and Bin Yang and Ruihui Zhu
76 A comparison of Andrew Austin and Casper Holmgreen and Laurie Williams
77 The partial col M.G. Mulas and F. Perotti and D. Coronelli and L. Martinelli and R. Paolu
78 A modeling approJie Geng and Dong Zhou and Chuan Lv and Zili Wang
79 Finding and fixi Hu Xiong and Yanan Chen and Zhi Guan and Zhong Chen
80 Safety hazard and Manpreet Hora and Hari Bapuji and Aleda V. Roth
81 Relevance vectorXuemei Liu and Xiao-Hui Zhang and Jin Yuan
82 A novel binary fr Ling Wang and Xiao-long Zheng and Sheng-yao Wang
83 Reliability desi Seong-woo Woo and Jungwan Park and Michael Pecht
84 The use of simula J.B. Rousek and M.S. Hallbeck
85 Highly sensitive Ye Zhao and Shunping Zhang and Guozhu Zhang and Xiaoshuang Deng
86 Pilot implementaJørgen P. Bansler and Erling Havn
87 Complexity metriKristian Bisgaard Lassen and Wil M.P. van der Aalst
88 A note on the C Liqun Chen and Jiangtao Li
89 Empirical ReseaJun Yan
90 Probabilistic dy J. Wu and S.R. Chen
91 Sensory Respons S.S. Hussin and R. Sudirman
92 Failure and redeW. MacGregor
93 The significance Linda W.P. Peute and Monique W.M. Jaspers
94 Experimental resJuan Jiang and XiaoQian Ma
95 A systematic lite Sarah Heckman and Laurie Williams
96 Disposing used eJoseph Jean Assaad
97 A reference archEduardo Guerra and Felipe Alves and Uirá Kulesza and Clovis Fernand
98 Plasma OzonizerS. Ketkaew
99 Pheromones in sTaymour Mostafa and Ghada El Khouly and Ashraf Hassan
100 Pitfalls in \{C Carlos Javier Hernandez-Castro and Arturo Ribagorda
101 Manipulating subStéphane Bouchard and Stéphanie Dumoulin and Jeanne Talbot and A
102 Removal of cyanob Sabrina Sorlini and Francesca Gialdini and Carlo Collivignarelli
103 Differential elec K. Brudzewski and S. Osowski and A. Golembiecka
104 Refactoring of C Bruno Carreiro da Silva and Eduardo Figueiredo and Alessandro Garcia
105 Correlation stud A.K.M. Shafiqul Islam and Z. Ismail and B. Saad and A.R. Othman and
106 Differential ele K. Brudzewski and S. Osowski and J. Ulaczyk
107 Combined electroMarina Cole and James A. Covington and Julian W. Gardner
108 Illumination hea Nabarun Bhattacharya and Bipan Tudu and Arun Jana and Devdulal Gh
109 Mars mission proNaomi Mathers and Michael Pakakis and Ian Christie
110 A background eliJingwei Feng and Fengchun Tian and Jia Yan and Qinghua He and Yue
111 Generating a catGabriela Arévalo and Stéphane Ducasse and Silvia Gordillo and Osca
112 Zinc phosphide to Abdel Rahman M. El Naggar and Nashwa M. El Mahdy
113 Preemptive identNabarun Bhattacharya and Bipan Tudu and Arun Jana and Devdulal G
114 Exception handliChien-Tsun Chen and Yu Chin Cheng and Chin-Yun Hsieh and I-Lang W
115 Optimization of M. Iaquinta and M. Stoller and C. Merli
116 Recording and reBartosz Wyszynski and Takao Yamanaka and Takamichi Nakamoto
117 Investigation of Chiung-Yu Peng and Cheng-Hang Lan and Tzong-Jer Wu
118 Detection of opt Nabarun Bhattacharyya and Sohan Seth and Bipan Tudu and Pradip Ta
119 Performance of tBahram G. Kermani and Susan S. Schiffman and H. Troy Nagle
120 Statistical analy A.M. Hasofer and D. Bruck
121 Modeling: drivingMichael Francis
122 Analysis of diab Joon-Boo Yu and Hyung-Gi Byun and Myung-Suk So and Jeung-Soo Hu
123 To what extent cYamashita, A.a b and Moonen, L.a
124 Airlift reactor Miha', M. and Gavin, S.P. and Markoš, J.
125 Optimization of Xu, C.Y. and Huang, Y. and Fang, W. and Shao, J.Z.
126 Surveying develoYamashita, A. and Moonen, L.
127 Study of contempLiu, R.
128 Improvement of Nakamoto, T.a and Nihei, Y.b c
129 Reflections on mMoor, T.N. and English, S.G.
130 Using the EEG err Escalante, J.a and Butcher, S.a and Costa, M.R.b and Hirshfield, L.M.c
131 Software interfa Abdeen, H. and Shata, O. and Erradi, A.
132 CellFlood: Attac Barbera, M.V.a and Kemerlis, V.P.b and Pappas, V.b and Keromytis, A
133 Code smells as sYamashita, A.a b and Counsell, S.c
134 Application of D Gurmeric, V.E.a and Dogan, M.a and Toker, O.S.a and Senyigit, E.b a
135 Specification an Kim, T.-W. and Kim, T.-G. and Seu, J.-H.
136 The assement ofNamdari, R.a and Raz, S.a and Najafian, M.a and Shirazi, F.Z.b
137 Optimization of l Luo, C. and Su, D. and Chen, S.
138 Automated detect Greiler, M.a and Van Deursen, A.a and Storey, M.-A.b
139 OBEY: Optimal ba Jiau, H.C.a and Mar, L.W.b and Chen, J.C.a
140 Classification of Thepudom, T.a and Sricharoenchai, N.a and Kerdcharoen, T.a b
141 Steganalysis of Li, X.a and Li, B.b and Luo, X.c d and Yang, B.a and Zhu, R.a
142 Predicting Odor Snitz, K. and Yablonka, A. and Weiss, T. and Frumin, I. and Khan, R.M.
143 Industrial orangeFernández-Vázquez, R.a and Stinco, C.M.a and Hernanz, D.b and Here
144 Code Quality CulSpeicher, D.
145 Influence of the Gonçalves, G.M.S.a and Srebernich, S.M.b and Vercelino, B.G.a and
146 Four dimensionaSalah, M.a and Abed, S.b and Khader, E.b and Ahmad, S.b
147 RAVAGE: Post-sil Muldrey, B. and Deyati, S. and Giardino, M. and Chatterjee, A.
148 Quantifying the Sjoberg, D.I.K.a and Yamashita, A.a and Anda, B.C.D.a and Mockus, A
149 A gustatory receNi, L.a b and Bronk, P.a b and Chang, E.C.a b and Lowell, A.M.a b
150 Preparation and Yang, L.a b and Liu, J.b and Du, C.c and Qiang, Y.a
151 A novel binary f Wang, L. and Zheng, X.-L. and Wang, S.-Y.
152 Chemical and sen Petersen, K.D.a and Jahreis, G.b and Busch-Stockfisch, M.a and Fritsc
153 Design and perfoTan, W.a b and Xu, Y.a b and Wang, S.b and Zuo, G.b and Dong, S.
154 Characteristics Honfo, F.G.a b c and Linnemann, A.R.a and Akissoe, N.b and Souma
155 Towards a princip Ganesh, S.G. and Sharma, T. and Suryanarayana, G.
156 Development of oMatsukura, H.a and Ohmi, J.b and Ishida, H.a
157 Tiny olfactory Ariyakul, Y. and Aizawa, T. and Nakamoto, T.
158 Formidable braceRousi, R.
159 Conflict-aware opZibran, M.F. and Roy, C.K.
160 A comparison of Austin, A. and Holmgreen, C. and Williams, L.
161 A semantics-pre Bian, Y. and Wang, T. and Su, X. and Ma, P.
162 Optimization of Liu, C.a b and Yi, W.a and Zhou, H.a b
163 Finding and fixi Xiong, H.a c d and Chen, Y.b and Guan, Z.c and Chen, Z.c
164 Glutamate is an Liu, W.W. and Wilson, R.I.
165 Acute effects of Ernstgård, L.a and Norbäck, D.b and Nordquist, T.b and Wieslander
166 A secure and effDas, A.K.a and Goswami, A.b
167 Novel approach tHabtour, E.a and Choi, C.b and Osterman, M.c and Dasgupta, A.c
168 Increased estersZhang, C.-Y. and Liu, Y.-L. and Qi, Y.-N. and Zhang, J.-W. and Dai, L.-H.
169 Comparison of seWang, C. and Mao, M. and Hu, F. and Yu, Y. and He, J. and Zhu, S.
170 An exploratory s Santos, J.A.M.a and De Mendonça, M.G.b and Silva, C.V.A.c
171 A case study on Zazworka,
e N.a e and Spínola, R.O.b and Vetro, A.c and Shull, F.a and Seaman, C.d
172 What do the asser Aniche, M.F. and Oliva, G.A. and Gerosa, M.A.
173 Study of weak-acMizutani, C.a and Ukaji, M.a and Horikawa, N.b and Yamamoto, T.c an
174 Effect of dry m Siemianowski, K.a and Szpendowski, J.a and Bohdziewicz, K.a and KoÅ
175 Olfaction in the Galle, S.A.a b and Courchesne, V.c and Mottron, L.a and Frasnelli, J.d
176 Disposing used eAssaad, J.J.
177 A reference archGuerra, E.a and Alves, F.b and Kulesza, U.b and Fernandes, C.a
178 Non-redundant co Dewan, A.a and Pacifico, R.a and Zhan, R.a and Rinberg, D.b c and
179 Integration of d Lorena Villarreal, B. and Hassard, C. and Gordillo, J.L.
180 Dedicated olfact Min, S.a b and Ai, M.a and Shin, S.A.a and Suh, G.S.B.a
181 Detection of Sm Ding, W.a and Zhu, Z.a and Zhang, C.a and Chen, X.a and Jiang, W.a
182 Interactive ambieMurphy-Hill, E.a and Barik, T.a and Black, A.P.b
183 Smelling screen:Matsukura, H. and Yoneda, T. and Ishida, H.
184 Inoculation of T Blanco, P. and Mirás-Avalos, J.M. and Suárez, V. and Orriols, I.
185 Study on the preJian, L. and Lu, W. and Ning, L. and Chen-Chen, L.
186 Identification o Yang, X.a b and Yan, Z.a
187 Dorsolateral cauLiu, H.-S.a b and Chefer, S.a c and Lu, H.a and Guillem, K.d e and
188 Potential of nitr Munsch-Alatossava, P. and Ghafar, A. and Alatossava, T.
189 Odour-tracking ca Ando, N. and Emoto, S. and Kanzaki, R.
190 Intervention, se Marjalizo-Cerrato, P.J. and Tejero-Manzanares, J. and Mata-Cabrera, F. and Montes-Tubío,
191 Insects groom thBöröczky, K.a and Wada-Katsumata, A.a and Batchelor, D.b and Zh
192 Impedance sensiLiu, Q.a and Wang, H.a and Li, H.b and Zhang, J.c and Zhuang, S.c
193 Detecting missing Monperrus, M.a and Mezini, M.b
194 Follow-up audit Li, D.a b and Wang, Y.-W.a and Song, H.b and Zhao, L.-D.c
195 Asymmetric neuro Gaudry, Q.a and Hong, E.J.a and Kain, J.b and De Bivort, B.L.b c and
196 Removal of cyanobSorlini, S. and Gialdini, F. and Collivignarelli, C.
197 Measurement sys Araki, H.a and Omatu, S.b
198 Test pilots for Church, A.M.U.
199 Evaluation of antMajidnia, Z.a and Idris, A.a and Valipour, P.b
200 Zinc Deficiency Aliani, M. and Udenigwe, C.C. and Girgih, A.T. and Pownall, T.L. and Bug
201 Estimating of in Kim, B.-S.
202 An empirical an Aman, H.
203 Olfactory perceptHavlí�ek, J.a and Nováková, L.a and Vondrová, M.a and Kuběna, A.A.b and Valento
204 Pheromonal induc Roberts, S.A.a and Davidson, A.J.a and McLean, L.b and Beynon, R.J.b
205 Advantages of voNazaradeh, F.a and Dupre, M.A.a and Doerge, T.b and Eckermann, C.a
206 Circadian regulaOlmedo, M.a b and O'Neill, J.S.c and Edgar, R.S.c and Valekunja, U.
207 Non-synaptic inhSu, C.-Y.a and Menuz, K.a and Reisert, J.b and Carlson, J.R.a
208 Let's have dinneWei, J.a and Cheok, A.D.b and Nakatsu, R.a
209 An empirical analBavota, G.a and Qusef, A.a and Oliveto, R.b and De Lucia, A.a and Bin
210 Do code smells rYamashita, A.a and Moonen, L.b
211 Refactoring meeBadame, S. and Dig, D.
212 Automatic detectFontana, F.A. and Braione, P. and Zanoni, M.
213 Detecting bad smJiang, D. and Ma, P. and Su, X. and Wang, T.
214 Detecting code sHermans, F. and Pinzger, M. and Van Deursen, A.
215 Can Lexicon BadAbebe, S.L.a and Arnaoudova, V.b and Tonella, P.a and Antoniol, G.
216 Sensory perceptioHope, A.D.a and Jones, M.a and Zuo, H.b
217 Laboratory evaluNewman, S.a and Schindler, J.a and Shah, J.a and Tinta, S.a and Koeh
218 A study on analyKim, D.-G.a and Oh, B.-H.a and Kwon, H.-J.a and Chung, K.-W.b and
219 An empirical stu Zhang, R. and Ju, C.
220 Texas city refin Haga, R.A. and Saleh, J.H. and Bakolas, E.
221 Application of Fragola, J.R.a and Morse, E.b
222 The human senses Burke, J.a and Imhof, A.B.b and Hoheneder, W.b
223 Creativity comp Gentner, A.a b and Bouchard, C.a and Esquivel, D.b and Oprea, G.b
224 Perceived indoorHellgren, U.-M.a and Hynynen, P.b and Rautio-Laine, S.b and Pietarine
225 Making sense of Spector, F. and Maurer, D.
226 When AR meets Wei,
fo J. and Shengdong Zhao and Nakatsu, R. and Duh, H.B.L.
227 Adaptive chemica Takemura, R. and Takahashi, K. and Makishita, T. and Ishida, H.
228 Multi-class suppoSaha, P.a and Ghorai, S.a and Tudu, B.b and Bandyopadhyay, R.b an
229 Multivariate specKroupi, E. and Yazdani, A. and Vesin, J.M. and Ebrahimi, T.
230 Increasing Predi Mayer, A.C. and Meydbray, J.
231 Study on identif Huang, X.a and Ding, Y.a and Pasbrig, E.b and Wang, Z.c and Li, M.d
232 Analyses of pig Groenen, M.A.M.a and Archibald, A.L.b and Uenishi, H.c and Tuggle, C.
233 Bad smells and rChen, W.-K. and Wang, J.-C.
234 New material LiNNath, R.K. and Zain, M.F.M. and Kadhum, A.A.H.
235 Formal analysis Liu, Y.a and Zhang, X.a and Dong, J.S.a and Liu, Y.b and Sun, J.c an
236 Challenges in maSadiq, A.-A.a and McEntire, D.b
237 Testing and validMäättä, M. and Räty, T.
238 Image presentatiTomono, K.a and Katsuyama, H.b and Yamamoto, S.a and Tomono, A.
239 Evaluation of th Karaki, M.a and Kobayashi, E.a and Touge, T.a and Deguchi, K.a and I
240 Questioning sof Sjøberg, D.I.K.a and Anda, B.a and Mockus, A.b
241 Identifying improPatzke, T.a and Becker, M.a and Steffens, M.b and Sierszecki, K.b an
242 Detection of em Nguyen, H.V. and Nguyen, H.A. and Nguyen, T.T. and Nguyen, A.T. and
243 Identifying refa Meananeatra, P.a b
244 Adimen-SUMO: Re �lvez, J. and Lucio, P. and Rigau, G.
245 Pricing, competi Yang, L.a b and Lou, W.a
246 Analytical learn Mekruksavanich, S.a and Yupapin, P.P.b and Muenchaisri, P.a
247 The nature and oStevenson, R.J.a and Rich, A.b and Russell, A.c
248 Human olfactory Chang, Z.-Y.a b and Chen, D.-H.a b and Tong, J.a b and Tong, Y.-Y.b
249 Study of effectn Li, X.
250 Application of Gebregiworgis, T. and Powers, R.
251 Performance evalGao, D. and Yang, Z. and Cai, C. and Liu, F.
252 Olfaction shapesDillman, A.R.a and Guillermin, M.L.b and Lee, J.b and Kim, B.a and S
253 Single mutation Leary, G.P.a b and Allen, J.E.a and Bunger, P.L.a and Luginbill, J.B.
254 A subset of dop Liu, C.a b c and Plaa̧ais, P.-Y.d and Yamagata, N.a and Pfeiffer, B
255 Atp6v0a4 knockou Norgett, E.E.a and Golder, Z.J.a and Lorente-Cánovas, B.b and Ingham
256 Automatically deArcoverde, R. and Macia, I. and Garcia, A. and Von Staa, A.
257 Computation of rPérez, J.a and Crespo, Y.b
258 What kind of andChoi, E.a and Yoshida, N.b and Inoue, K.a
259 Resolution sequ Gao, Y.a b and Liu, H.a c and Fan, X.-Z.a and Niu, Z.-D.a and Shao,
260 Clones: What is Rahman, F.a and Bird, C.b and Devanbu, P.a
261 Learning expectaArena, P. and Patané, L. and Termini, P.S.
262 Differential ele Brudzewski, K.a and Osowski, S.b and Golembiecka, A.a
263 Fermentation of Li, X.a and Chan, L.J.a and Yu, B.b and Curran, P.b and Liu, S.-Q.a
264 Build code analyTamrawi, A. and Nguyen, H.A. and Nguyen, H.V. and Nguyen, T.N.
265 Detecting and vi Hermans, F. and Pinzger, M. and Van Deursen, A.
266 IDE-based real-tZibran, M.F. and Roy, C.K.
267 Aiming at higher Bechtsoudis, A.a and Sklavos, N.b
268 Manipulating subBouchard, S.a and Dumoulin, S.a and Talbot, J.b and Ledoux, A.-A.c
269 Virtual restorat Knight, J.F. and Stone, R.J. and Qian, C.
270 Jute an alternat Roy, A.K. and Chattopadhyay, S.N.
271 A system analysiCunningham Jr., A.M. and Hagar, J. and Holman, R.J.
272 Computing with Brette, R.a b
273 Mimicking the bi Che Harun, F.K.a and Covington, J.A.b and Gardner, J.W.b
274 Nanovesicle-base Jin, H.J.a and Lee, S.H.b and Kim, T.H.c and Park, J.a and Song, H.S.
275 Lock picking simArthur, K.a b and Doxon, A.J.a b and Parsons, C.a b and Provancher
276 On the relevanceMacia, I.a and Arcoverde, R.a and Garcia, A.a and Chavez, C.b and V
277 Evaluating the l Peters, R. and Zaidman, A.
278 Are automaticall Macia, I.a and Garcia, J.b and Popescu, D.b and Garcia, A.a and Medv
279 Management of sVergnes, A.
280 A spatial model Cummins, B.a and Cortez, R.a and Foppa, I.M.b and Walbeck, J.a an
281 Characteristic v Treesuwan, W.a b c and Hirao, H.d e and Morokuma, K.d and Hanno
282 Ventilation and Rousseille, F.
283 Development of aWeierstall, R.a and Pause, B.M.b
284 Sample size in usSchmettow, M.
285 Formal analysis Gritzalis, D.a and Katsaros, P.b and Basagiannis, S.b and Soupionis, Y
286 Stinking consci Young, B.D.
287 Neurogenesis driChow, S.-F.a and Wick, S.D.b and Riecke, H.a c
288 Feasible study ofZhang, W. and Wang, F. and Liu, B.
289 Absolute pwnage: Novak, J. and Stribley, J. and Meagher, K. and Halderman, J.A.
290 Characterization Yáñez,
o D.J.a and Toledano, A.b and Serrano, E.c and Martín de Rosales, A.M.d and Ro
291 Ecological and aIrlinger, F.a and In Yung, S.A.Y.a and Sarthou, A.-S.a and Delbès-Pau
292 Recognition of coBrudzewski, K.a and Osowski, S.a b and Dwulit, A.a
293 Neuroscience: Re Holy, T.E.
294 Mimicking the huLee, S.H.a and Kwon, O.S.b and Song, H.S.a and Park, S.J.b and Sung
295 The sweet smell Ghinea, G. and Ademoye, O.
296 The modificationNiu, X.a b and Wen, B.Y.c and Xue, W.a b
297 A biomimetic olf Wu, C.a and Du, L.a and Wang, D.a and Zhao, L.b and Wang, P.a
298 Effects of mangan Lehallier, B.a and Coureaud, G.b and Maurin, Y.c and Bonny, J.-M.a
299 A study of accuraHsieh, M.-C. and Lin, A.-C.
300 Effect of Iron F Kiskini, A.a and Kapsokefalou, M.b and Yanniotis, S.a and Mandala, I.a
301 One technique isAustin, A. and Williams, L.
302 Immersive virtua Rodríguez, A.a and Rey, B.a and Alcañiz, M.a b
303 Exploring the in Hou, D.a and Yao, X.b
304 iProblems - An inCodoban, M.a and Marinescu, C.b and Marinescu, R.b
305 EXTRACTOR: An Huang,
ex J.a and Carminati, F.b and Betev, L.b and Zhu, J.c and Luzzi,
306 The design of maYang, X. and Yang, J. and Zhu, J. and Yan, Z. and Zhang, F.
307 On the impact ofMacia, I.a and Garcia, A.a and Von Staa, A.a and Garcia, J.b and Med
308 Breaking undercPerković, T.a and Li, S.b and Mumtaz, A.c and Khayam, S.A.c and J
309 The influence of Shih, R. and Blignaut, P.
310 Molecular compleKermen, F.a b and Chakirian, A.a b and Sezille, C.a b and Joussain,
311 Effects of transf Yao, G.a b and Song, Z.-G.c and Wen, X.-S.a and Lan, L.a and Han,
312 Web security: A sKallapur, P.V. and Geetha, V.
313 Unexpected game Frank, A.
314 Identifying refa Meananeatra, P.a and Rongviriyapanish, S.a and Apiwattanapong, T.b
315 Directional aptit Villarreal, B.L. and Gordillo, J.L.
316 One technique isAustin, A. and Williams, L.
317 A Study of the k Killian, D. and Mahmoud, S. and Xu, H. and Noronha, S. and Nana, A.
318 Experimental resJiang, J. and Ma, X.
319 Current intrusio Nazer, G.M.a b and Selvakumar, A.A.L.c
320 Influence of de Marini, V.K. and Ahmed-Kristensen, S. and Restrepo, J.
321 Reconciling usabiLang, M.
322 Dynamics of rewLove, P.E.D.a and Edwards, D.J.b and Irani, Z.c and Goh, Y.M.d
323 Study on microcaYu-zhen, P. and Sen, W. and Yan, Z.C. and Le, W.L.
324 Senses working Jonsson, F. and Verhagen, H.
325 Study on stimulatYoshida, M. and Kato, C. and Asami, N. and Kawasumi, M. and Yamasa
326 Sensory quality �ysoniewska, E. and Kalisz, S. and Mitek, M.
327 Evolving softwarSpeicher, D.
328 Chemical compos Spiel, J.A.a and Pliszka, M.A.b and Borowski, J.a and Gutkowska, A.c
329 Population diversAngelo, K.a b and Margrie, T.W.a c
330 How 4D effects cOh, E.a and Lee, M.a and Lee, S.b
331 An analysis of o Sakawi, Z. and Sharifah Mastura, S.A. and Jaafar, O. and Mahmud, M.
332 E-quality: A grapErdemir, U.a and Tekin, U.a and Buzluca, F.b
333 The effect of le Abebe, S.L.a and Haiduc, S.b and Tonella, P.a and Marcus, A.b
334 Are the clients o Marinescu, R. and Marinescu, C.
335 Digital taste: El Ranasinghe, N. and Cheok, A.D. and Fernando, O.N.N. and Nii, H. and
336 Design of mice Ding, J. and Zhang, S.
337 Detecting infect Xu, K. and Yao, D. and Ma, Q. and Crowell, A.
338 Design smell dete Liška, P.a and Polášek, I.b
339 Iterative algorit Lehallier, B.a and Andrey, P.b c and Maurin, Y.b and Bonny, J.-M.a
340 Safety hazard and Hora, M.a and Bapuji, H.b and Roth, A.V.c
341 Automated Planni Burdun, I.Y.
342 The dynamic simu Yang, J.a and Liu, J.b
343 Immersive virtua Rodríguez, A. and Rey, B. and Alcañiz, M.
344 A background eliFeng, J.a and Tian, F.a and Yan, J.a and He, Q.b and Shen, Y.b and
345 The application Phengphol, N.
346 Insight into sigh Booth, D.A.a and Sharpe, O.a and Freeman, R.P.J.b and Conner, M.T.
347 Reliability desi Woo, S.-W.a and Park, J.a and Pecht, M.b
348 Improving the quPardo, J.E. and Rubio, M. and Pardo, A. and Zied, D.C. and à �lvarez-Ortí, M.
349 Effect of rosemaSeabra, L.M.J.a and Damasceno, K.S.F.S.C.b and Andrade, S.A.C.c a
350 Sensing game plJonsson, F. and Verhagen, H.
351 Design and impleSun, L. and Xu, P.
352 Plasticity of loc Das, S.a and Sadanandappa, M.K.a and Dervan, A.b and Larkin, A.b an
353 The ataxin-2 proMcCann, C.a b c and Holohan, E.E.a b c and Das, S.d and Dervan, A.
354 Smell-based mem Kita, Y. and Nakatani, Y.
355 Mars mission proMathers, N. and Pakakis, M. and Christie, I.
356 Invitro regenera Prasad, M.G.a and Jaffar, S.K.b and Manjula, C.c
357 Ontology based o Supnithi, T.a and Paiboonrat, P.a and Buranarach, M.a and Kawtrakul,
358 Detecting and vi Jung, W.a and Lee, E.b and Wu, C.a
359 Ventilation and Sun, Y.a b and Zhang, Y.b and Bao, L.b and Fan, Z.b and Sundell, J.c
360 Combined electroCole, M. and Covington, J.A. and Gardner, J.W.
361 Temperature distCho, J.a and Byun, H.b and Lee, S.b and Kim, J.K.c
362 ODORactor: A web Liu, X.a and Su, X.a and Wang, F.b and Huang, Z.a and Wang, Q.a an
363 Qualitative compJaworska, G.a and Sady, M.b and Grega, T.b and BernaÅ›, E.a and P
364 Applying source Haralambiev, H. and Boychev, S. and Lilov, D. and Kraichev, K.
365 Investigating th Zazworka, N.a and Shaw, M.A.a and Shull, F.a and Seaman, C.a b
366 Analytical and e Suprapto, W.a b and Suharno, B.a and Soedarsono, J.W.a and Priadi,
367 Olfactory displa Tanikawa, T.a and Nambu, A.a b and Narumi, T.a and Nishimura, K.a
368 Labeling, identi Zucco, G.M.a and Carassai, A.a and Baroni, M.R.a and Stevenson, R.J
369 A method of multKim, D.-K.a and Roh, Y.-W.b and Hong, K.-S.a
370 Study of retting Xun, Y.
371 Detecting archit Bertran, I.M.
372 Identifying meth Oliveto, R.a and Gethers, M.b and Bavota, G.c and Poshyvanyk, D.b a
373 Refactoring pip Stolee, K.T. and Elbaum, S.
374 Understanding thArcoverde, R.a and Garcia, A.a and Figueiredo, E.b
375 Study on differe Kang, K.-T.a and Park, J.-H.c and Kim, H.-J.b and Lee, H.-M.b and Lee
376 Domain-specific Elaasar, M.a c and Briand, L.b and Labiche, Y.c
377 Loss of Bardet - Tadenev, A.L.D.a and Kulaga, H.M.a and May-Simera, H.L.b and Kelley
378 The multi-chambe Gonzalez-Jimenez, J.a and Monroy, J.G.a and Blanco, J.L.b
379 Pseudo-gustatoryNarumi, T.a and Kajinami, T.b and Nishizaka, S.b and Tanikawa, T.b a
380 Continuous neuro Sakamoto, M.a b c and Imayoshi, I.a d and Ohtsuka, T.a c and Yam
381 Cytokine signali Copf, T.a b and Goguel, V.a and Lampin-Saint-Amaux, A.a and Scapleh
382 Probabilistic dy Wu, J. and Chen, S.R.
383 Odor discriminatYou, K.-J.a and Ham, H.G.b and Lee, H.J.b and Lang, Y.b and Im, C.b
384 An exploratory s Macia Bertran, I. and Garcia, A. and Von Staa, A.
385 Revealing archit Bertran, I.M.
386 Loss-of-functio Weiss, J.a and Pyrski, M.a and Jacobi, E.a and Bufe, B.a and Willneck
387 Sensory maps inGhosh, S.a and Larson, S.D.b and Hefzi, H.a and Marnoy, Z.a and Cutf
388 Molecular regulaLiu, Y.a b and Jiang, Y.-A.a c and Si, Y.a and Kim, J.-Y.d and Chen,
389 Incremental clonLi, H. and Thompson, S.
390 Code Bad SmellsZhang, M.a and Hall, T.b and Baddoo, N.a
391 Contribution to t Hanane, E.F.a and Mohamed, M.a and Mohamed, B.a and Abdelghani,
392 A systematic lite Heckman, S. and Williams, L.
393 The entrepreneurPhilpott, K.a and Dooley, L.a and Oreilly, C.b and Lupton, G.c
394 Zinc phosphide tEl Naggar, A.R.M. and El Mahdy, N.M.
395 Hedonic judgmenZarzo, M.
396 Temporal codingSu, C.-Y.a and Martelli, C.a b and Emonet, T.a b and Carlson, J.R.a
397 Brain-state-indepLi, A.a b and Gong, L.a and Xu, F.a c
398 Molecular vibrat Franco, M.I.a and Turin, L.a b and Mershin, A.b and Skoulakis, E.M.C.
399 Adaptation to NoSkoruppa, K.a and Peperkamp, S.b
400 Formulation deveAkhtar, N.a and Khan, B.A.a and Khan, M.S.a and Mahmood, T.c and K
401 The G protein-coSarkar, A. and Kumar, S. and Sundar, D.
402 Olfaction and heSong, K. and Liu, Q. and Wang, Q.
403 The averaging efKim, K.-H.
404 Management of gChen, E.a b and Deng, L.c and Liu, Z.a b and Zhu, X.a b and Chen,
405 Pulse ejection p Kadowaki, A.a and Sato, J.a and Ohtsu, K.a and Bannai, Y.b and Okad
406 Tracking the evoBakota, T.
407 Human tears conGelstein, S.a and Yeshurun, Y.a and Rozenkrantz, L.a and Shushan, S.a
408 Unitary responseBen-Chaim, Y.a and Cheng, M.M.b and Yau, K.-W.a
409 Microcosmic defoLiu, X.-W. and Geng, X.-M.
410 Behavioral cons Riemensperger, T.a b and Isabel, G.c and Coulom, H.b and Neuser, K.
411 Telomerase reactJaskelioff, M.a and Muller, F.L.a and Paik, J.-H.a and Thomas, E.a
412 Receptor-type guHallem, E.A.a g and Spencer, W.C.b and McWhirter, R.D.b and Zeller, G
413 Neural network- Olunloyo, V.O.S.a and Ibidapo, T.A.a and Dinrifo, R.R.b
414 (Inter)Subjectiv Whitt, R.J.
415 On the formationLiu, W.-D.a and Yang, G.-H.b
416 The studies of a Luo, J.a and Ma, T.b and Li, L.b and Pan, P.b and Xu, J.a and Jiang,
417 The nose tells i Seigneuric, A.a b and Durand, K.a b and Jiang, T.a b and Baudouin, J
418 Empirical softwaMäntylä, M.V.
419 Are all code smeOlbrich, S.M.a and Cruzes, D.S.b and Sjoøberg, D.I.K.c
420 Scalable and sysGabel, M.a and Yang, J.b and Yu, Y.c and Goldszmidt, M.c and Su, Z.
421 Inference and anCho, C.Y. and Babić, D. and Shin, C.E.R. and Song, D.
422 The evaluation oEvers, V. and Winterboer, A. and Pavlin, G. and Groen, F.
423 Involvement of eUno, T.a and Wang, L.-Q.b and Miwakeichi, F.c and Tonoike, M.d and
424 Real-time simulaLiu, S. and Li, Y.
425 An interactive a Murphy-Hill, E.a and Black, A.P.b
426 Defining and appMacia, I. and Garcia, A. and Von Staa, A.
427 Identifying code Carneiro, G.D.F.a and Silva, M.b and Mara, L.b and Figueiredo, E.c
428 Reducing subjectBryton, S.a and Brito E Abreu, F.a and Monteiro, M.b
429 Investigating theChatzigeorgiou, A. and Manakos, A.
430 Pleasure propaga Goh, C.K. and Nareyek, A.
431 Application stud Ruan, L.-N. and Wang, H.
432 Detection of impuDomínguez-García, A.D.a and Trenn, S.b
433 User's favorite Fukumoto, M.a and Inoue, M.b and Imai, J.-I.c
434 Design for reliabWoo, S.-W.a and Kim, H.-E.a b and Pecht, M.c
435 Modelling of ovePpretorius, P.H.a and Stephen, R.G.b and Muftic, D.c and Sadovic, S.d
436 Levels of realism:Chalmers, A.a and Ferko, A.b
437 Group dynamics Teturo, I.
438 Study on proper Ah, S.
439 Odour user inter Rashed, A. and Santos, H.
440 A research on tr Zhou, X.a and Liu, X.b
441 A study on appli Lee, T.-J. and Kim, H.-J. and Lee, C.-Y.
442 Research on thePeng, Y.a and Hu, Z.b and Guo, X.c
443 DEX - A design Gerdzhev, M.a and Tran, J.a and Ferworn, A.a and Ostrom, D.b
444 Virtual vision sy Sakamoto, K. and Kanazawa, F.
445 An illusion you Barnett-Cowan, M.
446 Tabletop life rev Nishiguchi, M.a and Sakamoto, K.a and Nomura, S.b and Hirotomi, T.c
447 Effect of inulin Zahn, S. and Pepke, F. and Rohm, H.
448 Refactoring suppLi, H. and Thompson, S.
449 Recieps for the Arularasan, S. and Lyla, P.S. and Kesavan, K. and Ajmal Khan, S.
450 Technology of siYun, J.a and Liu, L.b and An, Z.a and Su, Y.b and Guo, B.b
451 The potential hedCapparuccini, O.a and Berrie, C.P.b and Mazzatenta, A.a
452 Visual stimuli, Shepherd, A.J.
453 Building empiric Schumacher, J.a and Zazworka, N.b and Shull, F.b and Seaman, C.b
454 CodeVizard: A toZazworka, N.a and Ackermann, C.b
455 Testing the effic Chelliah, K.a and Kannan, G.a and Kundu, S.a and Abilash, N.a and
456 Systematic infer Waszak, S.M.a b c and Hasin, Y.a and Zichner, T.c and Olender, T.a
457 Worth-centred mo Renaud, K.a and van Biljon, J.b
458 Artificial phero Campo, A.a and Gutiérrez, �.b and Nouyan, S.a and Pinciroli, C.a
459 Study for three Xu, H.-L.a and Zheng, W.a and Wang, W.-Z.a and Li, X.-S.b and Yao,
460 Generating a catArévalo, G.a f and Ducasse, S.c and Gordillo, S.b e and Nierstrasz,
461 On the impact ofD'Ambros, M. and Bacchelli, A. and Lanza, M.
462 The target recogLiu, B.a and Jiao, X.b and Duan, P.a and Ding, C.a
463 Signaling by olf Bhandawat, V.a b and Reisert, J.a c and Yau, K.-W.a
464 The 'deception' Counsell, S. and Hamza, H. and Hierons, R.M.
465 Spatial organiza Estalkhzir, G.M.
466 When the new app Yoose, B.
467 Advanced descrip Haverkamp, M.
468 Effect of pure bi Bayhan, Y.a and Arin, S.a and Kiliç, E.b
469 Odours influenc Walla, P.a b c d e and Deecke, L.b c
470 Compliance and Darko,
c S.
471 Domain-specific Guo, Y.a and Seaman, C.a and Zazworka, N.b and Shull, F.b
472 Is a strategy fo Counsell, S.a and Hierons, R.M.a and Hamza, H.a and Black, S.b and
473 The "physics" of Moody, D.L.
474 Replenishment ofMunday, P.L.a and Dixson, D.L.a and McCormick, M.I.a and Meekan, M.
475 A validation of r Shatnawi, R.
476 Evaluating crossNarumi, T.a and Sato, M.b and Tanikawa, T.c and Hirose, M.c
477 Neurons in the an Kikuta, S.a b d and Sato, K.b and Kashiwadani, H.b d and Tsunoda,
478 Perceived synchrGhinea, G. and Ademoye, O.A.
479 Tools for continuHill, J.a and Schmidt, D.b and Edmondson, J.b and Gokhale, A.b
480 inAir: Sharing i Kim, S. and Paulos, E.
481 Performance pred YverÌŠs, V.
482 Clones: What is Rahman, F. and Bird, C. and Devanbu, P.
483 A note on the Chen, L.a and Li, J.b
484 Research on thePeng, Y.a and Zou, Z.a and Yang, M.a and Guo, X.b and Guo, M.a
485 The extent of m Wang, G.a and Xu, Y.a and Yang, L.b and Feng, Y.c
486 The fluid dynamiCraven, B.A.a b and Paterson, E.G.a and Settles, G.S.b
487 Formulation of a Mujica, V.a and Delgado, M.a and Ramírez, M.a and Velásquez, I.b and Pérez, C.a and
488 Effects of hapti Aoki, E.a and Hirooka, J.b and Nagatomo, N.c and Osada, T.c and Nish
489 Visual-olfactory Nambu, A.a and Narumi, T.b and Nishimura, K.a and Tanikawa, T.a an
490 Product design: Cheng, Y.S.a and Ng, K.M.a and Wibowo, C.b
491 Bombykol recepto Syed, Z.a and Kopp, A.b and Kimbrell, D.A.c and Leal, W.S.a
492 Relevance vectorLiu, X.a and Zhang, X.-H.a and Yuan, J.a b
493 Olfactory recept Alfinito, E.a b and Pennetta, C.a b and Reggiani, L.a b
494 Large-scale invesFigueroa, X.A.a and Cooksey, G.A.a and Votaw, S.V.b and Horowitz, L.
495 PI3 kinase signaChiang, H.-C.a b and Wang, L.c and Xie, Z.d and Yau, A.a and Zhong,
496 Predicting odor Haddad, R.a c and Medhanie, A.a and Roth, Y.b and Harel, D.c and S
497 Acute effects of Ernstgård, L.a and Norbäck, D.b and Nordquist, T.b and Wieslander
498 Technological con Mascaro, N.a and Rea, S.a and Cammertoni, N.a and Loschi, A.R.a and
499 Reducing oyster-Meujo, D.A.F.a and Kevin, D.A.a and Peng, J.a and Bowling, J.J.a and
500 Molecular compone Hengl, T.a and Kaneko, H.a b and Dauner, K.a and Vocke, K.a and Fr
501 Similar code det Li, H. and Thompson, S.
502 Differential ele Brudzewski, K.a and Osowski, S.b and Ulaczyk, J.a
503 Research on theLiu, H.a and Li, H.a and Li, W.b and Luo, D.c
504 DECOR: A method Moha, N.a and Guéhéneuc, Y.-G.b and Duchien, L.c and Le Meur, A
505 General principl Miller, J.R. and McGhee, P.S. and Siegert, P.Y. and Adams, C.G. and Hua
506 Pitfalls in CAP Hernandez-Castro, C.J. and Ribagorda, A.
507 Synchronized preMatsukura, H.a and Yoshida, H.a and Nakamoto, T.b and Ishida, H.a
508 Diagnose on the Zhong, C.-B.a b and Wei, X.-P.b and Nie, M.-L.a and Jiang, D.-Y.a
509 The haptic paradHamza-Lup, F.G.a and Stanescu, I.A.b
510 Electronic nose Rodríguez, J. and Durán, C. and Reyes, A.
511 A flexible electr Chilo, J.a and Horvath, G.b and Lindblad, T.c and Olsson, R.d and Re
512 Study on the decDeng, Q.a b and Wang, Q.a and Huang, Q.a and Wang, Q.b and Yin,
513 Health assessmeZhao, Y.-W. and Wei, X.-F. and Lou, Y.-X. and Lu, X.-F.
514 The evolution anOlbrich, S.a and Cruzes, D.S.b and Basili, V.c and Zazworka, N.d
515 'Do you smell ro Winterboer, A.a and Cramer, H.S.M.a and Pavlin, G.b and Groen, F.C.A
516 The church of SaJaksic, N.
517 Dynamic functionZhuanga, H.a b and Chien, M.-S.a and Matsunamia, H.a c
518 An error resilie Wu, X.-G.a and Li, R.b and Zhang, J.-G.a and Zhu, L.a
519 Nitric oxide in Kaewkroek, K. and Wattanapiromsakul, C. and Tewtrakul, S.
520 Maintenance andHanssen, G.K.a b and Yamashita, A.F.c d and Conradi, R.a and Moon
521 Speeding up simBlanc, N.a and Kroening, D.b
522 An exploratory s Khomh, F.a and Di Penta, M.b and Guéhéneuc, Y.-G.a
523 Applying and evaFigueiredo, E.a and Sant'Anna, C.b and Garcia, A.c and Lucena, C.c
524 Lexicon bad smelAbebe, S.L.a and Haiduc, S.b and Tonella, P.a and Marcus, A.b
525 The physics of noMoody, D.
526 Tracking design Vaucher, S.a and Khomh, F.a and Moha, N.b and Guéhéneuc, Y.-G
527 Designing of a f Murthy, P.L.N.a and Phoenix, S.L.b
528 Measuring the quSindhgatta, R. and Sengupta, B. and Ponnalagu, K.
529 An experimental Kim, Y.-G.a and Choi, S.a and Kim, S.-W.a and Kim, Y.-M.a and Park,
530 Model checking Baksi, D.
531 Avoiding common Sassaman, T.C. and Johansson, A.E. and Padmanabhan, M.
532 Virtual Visualis Badioze Zaman, H.a and Bakar, N.b and Ahmad, A.a and Sulaiman, R.a
533 Improving the pr Zhang, M.a and Baddoo, N.a and Wernick, P.a and Hall, T.b
534 Graph-based mini Nguyen, T.T. and Nguyen, H.A. and Pham, N.H. and Al-Kofahi, J.M. and
535 Navigation in ev Ponticorvo, M.a and Miglino, O.a b
536 Pilot implementaBansler, J.P. and Havn, E.C.
537 Detection of sul Tanabu, Y. and Sasaki, T. and Takasugi, T. and Fujita, S.
538 Mould in buildin Sjöberg, A.
539 Technical & sociSuyantoa and Syaifudina and Oemar, S.b and Lotong, M.b and Diana,
540 The extraction o Lee, P.-L.a b c and Shu, C.H.d and Chang, H.C.a and Wu, C.H.a
541 Funbrella: RecorFujita, K. and Itoh, Y. and Yoshida, A. and Ozaki, M. and Kikukawa, T.
542 The influence o Kabacińska, A. and Babicz-Zielińska, E.
543 Quality of rye Ostasiewicz, A. and Ceglińska, A. and Skowronek, S.
544 Grazing behaviouAhmadi, A.
545 'Do you smell ro Winterboer, A.a and Cramer, H.S.M.a and Pavlin, G.b and Groen, F.C.A
546 Effects of bilim Wan Norhana, M.N.a b and A., M.N.A.b and Poole, S.E.c and Deeth,
547 InAir: Measuring Kim, S. and Paulos, E.
548 Experimental useSaeed, S.H. and Abbas, Z. and Gopal, B.
549 Network analysisZhou, X.a and Zhang, R.b and Wang, Y.b and Li, P.b and Liu, B.c
550 A study on multifLiu, Z.-H.
551 Chemical substan Pompanomchai, C. and Khongchuay, P.
552 Toward a catalogGarcia, J. and Popescu, D. and Edwards, G. and Medvidovic, N.
553 EvoSpaces - MultAlam, S.a and Boccuzzo, S.b and Wettel, R.c and Dugerdil, P.a and Ga
554 Scent presentati Ohtsu, K.a and Sato, J.a and Bannai, Y.b and Okada, K.-I.a
555 Acute olfactory Syed, Z. and Leal, W.S.
556 Identification of Shi, Z.a and Tong, Y.b and Chen, D.b and Li, Y.a
557 Influence of the Pradelles, R.a b d e and Vichi, S.c and Alexandre, H.b e and Chassa
558 3-D process mode Hölzer, G.a and Knechtel, R.a and Breit, S.a b and Schröpfer, G.a
559 Improved ant colWang, J.a b and Liu, S.-Y.a and Li, Z.-M.a
560 User interface s Monin, A.-E.a and Dowell, J.b
561 Glomerular microc Linster, C.a b and Cleland, T.A.a c
562 Investigation of Peng, C.-Y.a and Lan, C.-H.b and Wu, T.-J.a
563 Optimization of Iaquinta, M. and Stoller, M. and Merli, C.
564 Modification of Turner, S.L.a and Ray, A.b
565 Structured worksPalou, E.a b and López-Malo, A.b and Gazca, L.c
566 A pilot study in Smith, T.J. and George, D.R. and Sparagano, O.A.E. and Seal, C. and Sh
567 Analysis of miss Lou, J.-W.
568 Clone detection Li, H. and Thompson, S.
569 FISim: A new simGarcia, F. and Lopez, F.J. and Cano, C. and Blanco, A.
570 Evidence-based Garousi, V.
571 ANO2 is the cili Stephan, A.B.a and Shum, E.Y.a and Hirsh, S.a and Cygnar, K.D.a and
572 GNRH1 mutations Chan, Y.-M.a b and De Guillebon, A.a and Lang-Muritano, M.c and Plum
573 Evaluating the v Moody, D. and Hillegersberg, J.V.
574 Demonstration ofNakamoto, T. and Kinoshita, M. and Murakami, K. and Yossiri, A.
575 Microbial, senso Diez, A.M.a and Björkroth, J.b and Jaime, I.a and Rovira, J.a
576 Formyl peptide r Rivière, S.a and Challet, L.a and Fluegge, D.b c and Spehr, M.b c a
577 Select DrosophilSemmelhack, J.L. and Wang, J.W.
578 Case study of th Brambilla, M. and Navarotto, P. and Guarino, M.
579 Maintainability mThongmak, M. and Muenchaisri, P.
580 Cell-based olfac Lee, S.H.a and Jun, S.B.b and Ko, H.J.a and Kim, S.J.b and Park, T.H
581 On the anonymitZeng, P.a and Cao, Z.a and Choo, K.-K.R.b and Wang, S.c
582 Fetal ethanol ex Youngentob, S.L.a and Glendinning, J.I.b
583 Refactoring of C da Silva, B.C.a and Figueiredo, E.b and Garcia, A.b and Nunes, D.a
584 Complexity metriLassen, K.B.a and van der Aalst, W.M.P.b
585 An empirical appYu, L.a and Ramaswamy, S.b
586 SubSmell: MultimPornpanomchai, C. and Threekhunprapa, A. and Pongrasamiroj, K. and S
587 Odor coding by mo Chen, T.-W.a b c and Lin, B.-J.b d and Schild, D.a b c d
588 Exception handliChen, C.-T. and Cheng, Y.C. and Hsieh, C.-Y. and Wu, I.-L.
589 Odour character Brookes,
d J.C.a and Horsfield, A.P.b and Stoneham, A.M.a
590 A novel biomimetWu, C. and Chen, P. and Yu, H. and Liu, Q. and Zong, X. and Cai, H. an
591 Volatile aroma c Mahboob, S.a and Hussain, B.c and Alkahem, H.F.a and Al-Akel, A.S.a
592 The analysis of Li, W.a b and Kou, X.b and Zhao, G.c and Wang, Y.b
593 An improved ant Qi,
a B. and Jun, L. and Yan, L.
594 Software visuali Boccuzzo, S. and Gall, H.C.
595 Anomaly Intrusi Bahrololum, M. and Khaleghi, M.
596 Race analysis f Blanc, N.a and Kroening, D.b
597 Do bad smells inZhang, M.a and Hall, T.b and Baddoo, N.a and Wernick, P.a
598 Data mining on Buehrer, G.a and Parthasarathy, S.b and Goyder, M.b
599 Is the need to f Counsell, S.
600 Specifying and vDong, J.S.a and Sun, J.b and Sun, J.a and Taguchi, K.c and Zhang, X
601 Analyzing websitFalk, L. and Prakash, A. and Borders, K.
602 A survey about t Rech, J.a and Spriestersbach, A.b
603 Documenting andHou, D.a and Rupakheti, C.R.a and Hoover, H.J.b
604 Low scale deployInayatullah, M. and Daud, K. and Hameed, A. and Ali, M.
605 The research of Xu, D. and Guo, L. and Zhang, Y. and Wang, Z.
606 A catalogue of l Parnin, C. and Görg, C. and Nnadi, O.
607 The effect of pe Kim, D.a and Jang, J.a and Shin, S.J.b
608 Pulse ejection p Kadowaki, A.a and Sato, J.a and Ohtsu, K.a and Bannai, Y.b and Okad
609 Manufacture andChang, S.P.a and Lin, C.M.b and Lou, C.W.c and Hsing, W.H.d and Lin
610 Reproduction of Nakamoto, T. and Nimsuk, N. and Wyszynski, B. and Takushima, H. and
611 An analysis of c Sang, J.
612 Reconsideration Eguchi, S.a and Tachihara, S.a and Kubo, K.b and Hosogai, A.b
613 Embedded neural Bashyal, S.a and Venayagamoorthy, G.K.b and Paudel, B.c
614 Mission to the Mathers, N. and Pakakis, M. and MacDonald, B.
615 Study on supportiGong, H. and Yan, S.
616 Odor recorder u Nakamoto, T.
617 Activity theory Mohamud, M.O.
618 Research on inteGao, X.-Z. and He, M.-S.
619 Model of transie Fujimoto, A.a and Tomatani, M.a and Kuwahara, T.a b
620 Angel or devil? Lai, M.K.
621 Model of transie Fujimoto, A. and Kuwahara, T.
622 Prediction of st Li, Y. and Goddard III, W.A.
623 Beer classificati Pornpanomchai, C. and Suthamsmai, N.
624 Development of aMerritt, J.D.a and Krajcik, J.a and Shwartz, Y.b
625 Artificial odor d Kodogiannis, V.S.a and Lygouras, J.N.b and Tarczynski, A.c and Chow
626 Modeling humanBarrière,
e O.a and Lutton, E.a and Baudrit, C.b and Sicard, M.b and Pi
627 Bootstrap GaussiWang, X. and Bi, D. and Ding, L. and Wang, S.
628 Isoprene interfe Loivamäki, M.a and Mumm, R.b and Dicke, M.b and Schnitzler, J.-P.a
629 Synchronisation Ademoye, O.A. and Ghinea, G.
630 Ecological parti Ward, D.
631 Using accelerateGrant, F.L.
632 Neuralized is ex Pavlopoulos, E.a b c and Anezaki, M.a and Skoulakis, E.M.C.a b
633 Security verific Liu, J.a b and Ye, X.c and Zhang, J.a and Li, J.a
634 Mosquitoes smellSyed, Z. and Leal, W.S.
635 Visual detection Dhambri, K. and Sahraoui, H. and Poulin, P.
636 Neural correlate Kepecs, A.a and Uchida, N.a b and Zariwala, H.A.a c and Mainen, Z.F
637 Virtual reality p Kobayashi, S.
638 SNMP is a signalJin, X. and Tal, S.H. and Smith, D.P.
639 Wake up and smel Blackburn, S.M.a and McKinley, K.S.b and Garner, R.a and Hoffmann,
640 A model of stimuMartinez, D.a b and Montejo, N.a
641 Functional asymm Suzuki, H.a d and Thiele, T.R.b and Faumont, S.b and Ezcurra, M.c a
642 Intelligent face Khashman, A.
643 Illumination hea Bhattacharya, N.a and Tudu, B.b and Jana, A.a and Ghosh, D.a and
644 Preemptive identBhattacharya, N.a and Tudu, B.b and Jana, A.a and Ghosh, D.a and
645 Efficient olfact Kostal, L.a and Lansky, P.a and Rospars, J.-P.b
646 Aversive learnin Li, W.a and Howard, J.D.a and Parrish, T.B.a b and Gottfried, J.A.a c
647 The Drosophila pDatta, S.R.a and Vasconcelos, M.L.a and Ruta, V.a and Luo, S.a and W
648 Evidence for olf Nevitt, G.A.a c and Losekoot, M.b c and Weimerskirch, H.d
649 Seed odor mediat Youngsteadt, E.a and Nojima, S.a and Häberlein, C.b and Schulz, S.b
650 Behavioral conseRiffell, J.A.a and Alarcón, R.d e and Abrell, L.b c and Davidowitz, G
651 Using field-repai Wagner, I.a b and Bertacco, V.a b and Austin, T.a b
652 Water shrews deCatania, K.C.a and Hare, J.F.b and Campbell, K.L.b
653 Cooking up an inNakamoto, T.a and Otaguro, S.a and Kinoshita, M.a and Nagahama, M.b
654 Experimental va Gomes, P.B. and Mata, V.G. and Rodrigues, A.E.
655 Development of aFarrow, D.a b
656 Assessing the imLozano, A. and Wermelinger, M. and Nuseibeh, B.
657 Assessing the imLozano, A. and Wermelinger, M. and Nuseibeh, B.
658 An empirical stu Correa, A.a and Werner, C.a and Barros, M.b
659 Self-Organizing Tudu, B.a and Bhattacharyya, N.b and Jana, A.b and Ghosh, D.b and
660 A simulation fac Urban, U.
661 Detecting designElamkulam, J.a and Glazberg, Z.b and Rabinovitz, I.c and Kowlali, G.a
662 Detecting designBoström, P. and Björkqvist, J.
663 Expanding the R& Atkinson, R.D.
664 Size and frequenCounsell, S.a and Mendes, E.b
665 Improvements i Graham, J.H.a and Mostafa, M.S.b and Arazi, B.a and Tantawy, A.a and
666 Study on treatm Zhu, T. and Li, J. and Dou, B.-J. and Liang, W.-J. and Jin, Y.-Q.
667 Empirically eval De F. Carneiro, G. and Orrico, A.C.A. and De Mendonça Neto, M.G.
668 Judgment of pol Rentinck, L. and Steehouder, M.
669 Methodological aAlegre, H.a and Marques, J.b and Pina, A.b and Coelho, S.b
670 Odor recorder u Nakamoto, T.a and Nakama, T.b
671 Automatic locali Mohseni, H. and Kasaei, S.
672 Using concept anGrba, T.a and Ducasse, S.b and Kuhn, A.a and Marinescu, R.c and Dan
673 Using concept anGîrba, T.a and Ducasse, S.b and Kuhn, A.a and Marinescu, R.c and
674 Clinical effects oHu, K.-H.a b and Li, W.-T.a
675 Innate versus le Kobayakawa, K.a and Kobayakawa, R.a and Matsumoto, H.b and Oka, Y.a
676 Effect of physicalHernández,
refining on the
C. oil
andofMieres,
the corozo's
A. andkernel
Niño,(Acrocomia aculeata)
Z. and Pérez, S. [Efecto de la refinación física
677 An essential rol Benton, R.a b and Vannice, K.S.a c and Vosshall, L.B.a
678 Sensing and charFord, A.R. and Reeve, S.W.
679 Dissecting a circChalasani, S.H.a and Chronis, N.a and Tsunozaki, M.a and Gray, J.M
680 'Everyday objectDavidson, H.
681 Circadian regulatDecker, S. and McConnaughey, S. and Page, T.L.
682 Hypomorphic CEP2 McEwen, D.P.a and Koenekoop, R.K.d and Khanna, H.b and Jenkins, P.M
683 Olfactory detect Cain, W.S.a c and Schmidt, R.a and Wolkoff, P.b
684 Genetic variatio Keller, A.a and Zhuang, H.b and Chi, Q.b and Vosshall, L.B.a and Mat
685 Mining software Kiefer, C. and Bernstein, A. and Tappolet, J.
686 Sensolab drives interior experimentation
687 An adaptive methYu, M.a and Zhou, X.-Y.b
688 Meat artificial Sun, Y.-H.a and Sun, Z.-L.b and Li, Y.b
689 Olfactory enhancAdemoye, O.A. and Ghinea, G.
690 A functional cir Kimchi, T. and Xu, J. and Dulac, C.
691 The detection of Fischler, W.a b and Kong, P.a b and Marella, S.a b and Scott, K.a b
692 Hebbian STDP inCassenaer, S. and Laurent, G.
693 Smell peak prediTudu, B.a and Das, B.a and Bhattacharyya, N.b and Jana, A.b and G
694 Measurement of Nakamoto, T.a b and Tanaka, Y.a b and Ninh, H.P.a b
695 A bad-smell sen Ninh, H.P.a and Tanaka, Y.a and Nakamoto, T.a and Hamada, K.b
696 Propagation of oRoot, C.M.a and Semmelhack, J.L.a and Wong, A.M.b and Flores, J.b
697 An empirical stu Li, W. and Shatnawi, R.
698 Modeling of neuro Valova, I.a and Lapteva, O.a and Gueorguieva, N.b
699 Health risk asse Oesterholt, F.a and Martijnse, G.b and Medema, G.a and Van Der Kooij
700 Projected fringe Chen, Y. and He, Y. and Hu, E. and Ai, C.
701 Towards a truly Covington, J.A.a and Gardner, J.W.a and Hamilton, A.b and Pearce, T.
702 Genomic imprintiSwaney, W.T.a b and Curley, J.P.a and Champagne, F.A.a b and Kev
703 How to determinChen, Y.-Q. and Gao, W.-S.
704 A single class o Kurtovic, A. and Widmer, A. and Dickson, B.J.
705 Influence of odorKeller, A. and Vosshall, L.B.
706 Real-time sensinTakano, M. and Fujiwara, Y. and Sugimoto, I. and Mitachi, S.
707 Detection of opt Bhattacharyya, N.a and Seth, S.b and Tudu, B.b and Tamuly, P.c an
708 GSK-3/Shaggy reg Wolf, F.W.a c d and Eddison, M.a and Lee, S.a and Cho, W.a e and H
709 Relational repre Cleland, T.A.a and Johnson, B.A.b and Leon, M.b and Linster, C.a
710 Creative uses of Bainbridge, W.A.a and Bainbridge, W.S.b
711 'Infotaxis' as a Vergassola, M.a and Villermaux, E.b and Shraiman, B.I.c
712 Smelling home ca Gerlach, G.b e and Atema, J.a and Kingsford, M.J.c and Black, K.P.d
713 Scavenger hunt: Massimi, M.a and Ganoe, C.H.b and Carroll, J.M.b
714 Reality is our l Rohde, M.a b and Klamma, R.c and Jarke, M.c d and Wulf, V.b d
715 A metric-based hSalehie, M. and Li, S. and Tahvildari, L.
716 Correlation stud Shafiqul Islam, A.K.M.a and Ismail, Z.b and Saad, B.a and Othman, A
717 Common refactorCounsell, S.a and Hassoun, Y.b and Loizou, G.c and Najjar, R.c
718 Model-based systFuhrmann, H.a and Von Hanxleden, R.a and Rennhack, J.b and Koch,
719 Investigation of Kotan, C.a and Lewis, J.R.b
720 Characterizing thVan Rompaey, B. and Du Bois, B. and Demeyer, S.
721 The effectivenesCounsell, S.a and Hierons, R.M.a and Najjar, R.b and Loizou, G.b and
722 A software fault Needham, D. and Jones, S.
723 New method in se Hosseini, M.S.K. and Atyabi, M.
724 Study of navigatiJun, M.a and Hengjun, Z.a and Jianhua, G.b
725 Design as a meaHughes, B. and Tillotson, J.
726 A communicationBannai, Y.a b and Ishizawa, M.b and Shigeno, H.b and Okada, K.b
727 Osmotically inacHeer, M.a b and Frings, P.a b and Baecker, N.a b
728 The indoor climatAmaral Mendes, J.J.a and Andersson, K.b and Pombo, V.c
729 Towards the assSchifferstein, H.N.J.a and Smeets, M.A.M.b
730 A survey of visioJihong, L. and Xiaoye, S.
731 Drivers for softw Mäntylä, M.V. and Lassenius, C.
732 A fuzzy assessmHan, J.-Y.a b and Li, S.-S.c and Li, H.-P.d and Lu, Y.-L.b
733 The impact of haMinogue, J.a and Gail Jones, M.b and Broadwell, B.b and Oppewall, T.
734 Comparing the roSchifferstein, H.N.J.
735 Augmented reality Rogers, D.
736 Automating redeSandberg, M. and Larsson, T.
737 Study of highly Tanaka, Y. and Nakamoto, T. and Moriizumi, T.
738 An investigation Shatnawi, R. and Li, W.
739 Refactoring too Drozdz, M. and Kourie, D.G. and Watson, B.W. and Boake, A.
740 Movie with scentNakamoto, T. and Yoshikawa, K.
741 Thiolene foams and elastomers
742 Determination ofE, E.-D.-S.a and Bao, Y.-D.-L.b and Na, R.-G.-R.b
743 Search-based det Seng, O. and Stammel, J. and Burkhart, D.
744 Movie with scentNakamoto, T.a b and Yoshikawa, K.a
745 Separate encoding Kadohisa, M. and Wilson, D.A.
746 Broad activation Mandairon, N. and Stack, C. and Kiselycznyk, C. and Linster, C.
747 Subjective evaluMäntylä, M.V. and Lassenius, C.
748 Detecting bad smPiveta, E.K. and Hecht, M. and Pimenta, M.S. and Price, R.T.
749 Structure-olfacti Zakarya, D.a and Farhaoui, L.a and Hamidi, M.b and Bouachrine, M.b
750 Topologically-a Li, J.a b c and Ye, X.-M.b and Tian, Y.a c
751 Olfoto: Designin Brewster, S.A. and McGookin, D.K. and Miller, C.A.
752 Ric-8B promotesVon Dannecker, L.E.C.a and Mercadante, A.F.a b and Malnic, B.a
753 Modelling soft-s Fu, X. and Hogrefe, D.
754 Smell, think and Loutfi, A.a b and Coradeschi, S.a b
755 Brain response Berglund, H.a and Lindström, P.b and Savic, I.b c
756 A macro-ergonomi Hallock, M.L.a and Alper, S.J.a and Karsh, B.a b
757 Current situationLesser-Carrillo,
of MTBE (methylL.E.a b ether) in aquifer systems [Situación actual del MTBE (metil terbutil
terbutyl
758 Inadvertent soci Kavaliers, M.a and Choleris, E.c and Ã…gmo, A.d and Braun, W.J.b an
759 Trial manufactur Tanaka, T. and Iida, Y. and Saito, Y.
760 Rats smell in st Rajan, R. and Clement, J.P. and Bhalla, U.S.
761 A survey on CIOLindström, Å. and Johnson, P. and Johansson, E. and Ekstedt, M. a
762 Goα regulates oMatsuki, M.a b and Kunitomo, H.a and Iino, Y.a
763 The products of Schnee, C.a and Köllner, T.G.a and Held, M.b and Turlings, T.C.J.b
764 Stereotypic and Masuda-Nakagawa, L.M.a and Tanaka, N.K.b d and O'Kane, C.J.c
765 Beyond the olfacNikonov, A.A.a and Finger, T.E.b and Caprio, J.a
766 Consistent structCollier, C.a b c and Yarrington, P.a b c
767 Adaptive detecti Kreimer, J.
768 Study of smell-s Guo, D.-M. and Yang, J.-H. and Li, B.-X.
769 How companies Gries,
le B. and Gericke, K. and Blessing, L.
770 Product metrics Munro, M.J.
771 Improving objectGarzás, J.a and Piattini, M.b
772 Model-based scalMasticola, S.a and Bondi, A.a and Hettish, M.b
773 An H∞ technoloChernodarov, A.V.
774 A theory-based m Ikart, E.M.
775 Archeology of coWettel, R. and Marinescu, R.
776 Odor and chemes Cain, W.S.a c and De Wijk, R.A.a b and Jalowayski, A.A.a and Pilla
777 An experiment onMäntylä, M.V.
778 Building, datab Liu, N.a and Xu, F.b and Shepherd, G.M.b and Miller, P.L.a
779 Classbox/J: ContBergel, A.a and Ducasse, S.b and Nierstrasz, O.a
780 Classbox/J: ContBergel, A.a and Ducasse, S.a b and Nierstrasz, O.a
781 The benefits of Rodman, D.M.
782 Record of mint f Nakamoto, T.a and Hirota, Y.a and Ide, J.b
783 Validation of im Perales, J.-F. and Ribes, A. and Carrera, G. and Puigjaner, L. and Roca,
784 Virtual sensors Piza, H.I.b and Ramos, F.F.a and Zúñiga, F.b
785 Comprehensive Eichberg, M. and Haupt, M. and Mezini, M. and Schäfer, T.
786 Modeling humanKang, J. and Wright, D.K. and Qin, S.F. and Zhao, Y.
787 Studies and metho Crow, L.H.a b c d e
788 Pathogenic bacteZhang, Y. and Lu, H. and Bargmann, C.I.
789 Study of highly Tanaka, Y. and Nakamoto, T. and Moriizumi, T.
790 H-RAFT - HeuristBöhm, S.M.
791 Experiment and aLiu, H.a and Cui, Y.-R.a and Zhang, S.-L.b and Yu, T.-G.b
792 An empirical anaNiu, H.a b and Baldick, R.a b c
793 Towards the optiMihancea, P.F. and Marinescu, R.
794 Discovering una Arévalo, G. and Ducasse, S. and Nierstrasz, O.
795 Performance of tKermani, B.G.a c and Schiffman, S.S.b and Nagle, H.T.a
796 Sensational tec Dekker, A.a and van Saaze, V.b
797 Brining of cod fi Esaiassen, M.a b and Østli, J.b and Joensen, S.b and Prytz, K.c and
798 Efficient RNAi-b Zhao, W. and Fanning, M.L. and Lane, T.
799 A blinded comparKardas, P. and Muras, M.
800 The matrix of insÖhlmann, D.a and Ohlmann, O.M.a and Danzebrink, H.U.b
801 Distinguishing d Jiang, J.N. and Baldick, R.
802 A reliable switc Schulz, A. and Schneeberger, M. and Wassermann, J.
803 Neuroscience: An Remy, J.-J.a and Hobert, O.b
804 Analysis of diab Yu, J.-B.a and Byun, H.-G.b and So, M.-S.c and Huh, J.-S.a
805 Intelligent classi Kodogiannis, V.S.
806 Critical period Yamaguchi, M. and Mori, K.
807 Separation of proKang, K.-Y.a and Ahn, D.-H.b and Jung, S.-M.b and Kim, D.-H.c and C
808 Study of chiral Nandi, N.
809 Cell signaling: Bhandawat, V.a b and Reisert, J.a and Yau, K.-W.a
810 Controlling a ga Ishida, H. and Nakayama, G. and Nakamoto, T. and Moriizumi, T.
811 Odor maps in theZou, Z.a b and Li, F.c and Buck, L.B.a b d
812 Brain response Savic, I.a c d and Berglund, H.b and Lindström, P.a
813 The flight paths Riley, J.R.a and Greggers, U.b and Smith, A.D.a and Reynolds, D.R.c
814 Recording and reWyszynski, B.a b and Yamanaka, T.b and Nakamoto, T.b
815 Modeling humanKang, J. and Wright, D.K. and Qin, S.F. and Zhao, Y.
816 Adaptive recogn Kreimer, J.
817 Encoding social Lin, D.Y.a and Zhang, S.-Z.b and Block, E.b and Katz, L.C.a
818 A previously uncKudwa, A.E.a and Bodo, C.a and Gustafsson, J.-Ã….c and Rissman, E.F
819 Mechanism and cir Sivan, E. and Kopell, N.
820 Active sampling Lovell, J.S. and French, P.D.
821 Explosives and l White, J.a b and Waggoner, L.P.c and Kauer, J.S.a b
822 Detection strate Marinescu, R.
823 Bad smells - Hum Mäntylä, M.V. and Vanhanen, J. and Lassenius, C.
824 Detection of sin Cometto-Muñiz, J.E.a c and Cain, W.S.a and Abraham, M.H.b
825 Nonparametric on- Aksenova, T.I. and Volkovich, V.V. and Villa, A.
826 Fundamental stud Nakamoto, T. and Takigawa, H. and Yamanaka, T.
827 Algorithmic verif Remelhe, M.P.a and Lohmann, S.a and Stursberg, O.a and Engell, S.a
828 Optimized designKamalian, R.a and Takagi, H.b and Agogino, A.M.a
829 Aroma characteriBhattacharyya, N.a and Tudu, B.b and Bandyopadhyay, R.b and Bhuya,
830 AROMA: Ambient Bodnar,
a A. and Corbett, R. and Nekrasovski, D.
831 To naïvely smel Kowadlo, G. and Russell, R.A.
832 The causes of diZhou, W.a and Lv, J.H.b and Zhao, Y.c
833 A method for moni Allison, R.A.a and Walter, K.A.a and Marx, D.a and Lippner, G.b and C
834 Olfactory displa Kaye, J.
835 Improving the cl Chen, H.a and Goubran, R.A.a and Mussivand, T.b
836 Biochemical gas-s Mitsubayashi, K.a and Matsunaga, H.b and Nishio, G.b and Ogawa, M.a
837 Orexin effects onApelbaum, A.F.a and Perrut, A.b and Chaput, M.a
838 Colors and KansKanda, T.
839 Electrochemical Minamide, T.a and Mitsubayashi, K.b and Saito, H.b and Nishio, G.a
840 Magnetoreception Mora, C.V.a d and Davison, M.b and Martin Wild, J.c and Walker, M.M.
841 Nonparametric on- Aksenova, T.I. and Volkovich, V.V. and Villa, A.
842 Statistical analy Hasofer, A.M. and Bruck, D.
843 Understanding trRoshandel, R.a and Schmerl, B.b and Medvidovic, N.a and Garlan, D.b
844 Implementation oGruchmann, T. and Hölscher, U. and Liu, L.
845 Recollection-lik Fortin, N.J. and Wright, S.P. and Eichenbaum, H.
846 Dynamical analysi Xu, D. and Principe, J.C.
847 Pheromone anosm Maïbèche-Coisne, M.a b and Nikonov, A.A.c and Ishida, Y.a and Jac
848 Integrated multipÖlçer, A.I. and Alkaner, S. and Turan, O.
849 Automated design Trifu, A. and Seng, O. and Genssler, T.
850 Using history in Raţiu, D.a and Ducasse, S.b and Gîrba, T.b and Marinescu, R.a
851 Learning modulatDaly, K.C.a c and Christensen, T.A.b and Lei, H.b and Smith, B.H.a a
852 Enhanced diamete Baumgartner, J.a and Kuehlmann, A.b
853 Incorporating qu Rahman, A.G.A. and Ramli, R. and Mohd, S.M.S. and Yusoff, F.A. and Ve
854 Dynamically vulcNaskar, K. and Noordermeer, J.W.M.
855 Temporal and reg Matarazzo, V.a and Ronnett, G.V.a b
856 Odor-Driven AttrGalán, R.F.a and Sachse, S.b c and Galizia, C.G.b d and Herz, A.V.
857 A highly conservPitts, R.J.a and Fox, A.N.a b and Zwiebeil, L.J.a
858 A modified error Wang, X.G. and Tang, Z. and Tamura, H. and Ishii, M.
859 Brain asymmetryPascual, A.a b and Huang, K.-L.a and Neveu, J.a and Préat, T.a
860 The Use of ZeoliLaw, T.S.C.a and Chao, C.Y.H.a and Chan, G.Y.W.b and Law, A.K.Y.b
861 Transformation oWilson, R.I. and Turner, G.C. and Laurent, G.
862 Evolutionary biolPenny, D.
863 Corrosion pit siz Medved, J.J.a and Breton, M.b and Irving, P.E.c
864 Learning rules a Hopfield, J.J.a and Brody, C.D.a b
865 The Drosophila hChang, K.T. and Shi, Y.-J. and Min, K.-T.
866 Centre-surround Aungst, J.L.a and Heyward, P.M.a c and Puche, A.C.a and Karnup, S.
867 Identifying refa Tourwe, T. and Mens, T.
868 A Taxonomy andMäntylä,
a M. and Vanhanen, J. and Lassenius, C.
869 Investigation of Liu, P.-H.a and Chang, C.-H.a and Chang, H.-P.b
870 Isotropic-sequenPorr, B. and Wörgötter, F.
871 The conformationLuca, S.a and White, J.F.b and Sohal, A.K.c e and Filippov, D.V.d
872 The dissertation?De Paolis, R.
873 Failure and redeMacGregor, W.
874 Fundamental stud Yamanaka, T. and Matsumoto, R. and Nakamoto, T.
875 Correlation of r Kim, Y.-G.c and Kwon, H.-B.a and Kim, S.-W.a and Park, C.-K.a and P
876 Chemical and beSchaal, B.a and Coureaud, G.a and Langlois, D.b and Giniès, C.b an
877 Ergonomic studySen, R.N. and Yeow, P.H.
878 Study of the tre Pang, J.-Z.a and Sun, Y.-J.b and Yang, Z.-Z.a and Hao, J.-D.a and Gu
879 Decisions about Neff, B.D.
880 Importance of t Kelliher, K.R.a and Ziesmann, J.a e and Munger, S.D.a and Reed, R.R.b
881 Virtual test platf Lu, Z.-G. and Chai, J.-Y. and Wang, X.-H. and Su, P.-S.
882 Dechlorination t Worley, J.L.a and Dietrich, A.M.b and Hoehn, R.C.b
883 Research article Luo, M.a and Fee, M.S.b and Katz, L.C.a
884 The dangers of mPetroni Jr., N.L.a b and Arbaugh, W.A.a b
885 Resetting the Ci Levine, J.D.a and Funes, P.a b and Dowse, H.B.c and Hall, J.C.a
886 A simulation studWilliams, C.R.a and Chompuming, P.b
887 Proactive ReliabGlaccum, J.F. and Hirschauer, M.-A.
888 Ammonia ventingMcConnell, R.a and McGrath, P.b
889 Setup for Stimul Khokhlov, A.A. and Kolesnikov, S.S.
890 Controlling a G Ishida, H. and Nakayama, G. and Nakamoto, T. and Moriizumi, T.
891 Olfactory bulb Valova, I.a and Ram, P.a and Georgiev, G.b
892 Olfactory plastic Mainland, J.D. and Bremner, E.A. and Young, N. and Johnson, B.N. and Khan, R.M. and Bens
893 Prediction of st Vaidehi, N.a and Floriano, W.B.a and Trabanino, R.a c and Hall, S.E.
894 Fuzzy-neuro LVQKusumoputro, B. and Budiarto, H. and Jatmiko, W.
895 Deficient pheromDel Punta, K. and Leinders-Zufall, T. and Rodriguez, I. and Jukam, D. a
896 Computational caCaticha, N.a and Palo Tejada, J.E.a and Lancet, D.b and Domany, E.c
897 Development of aOwen, C.M.a b and Patterson, J.b c and Simpson, D.G.d
898 Oscillations and Perez-Orive, J. and Mazor, O. and Turner, G.C. and Cassenaer, S. and Wi
899 Dopamine-mediat Rosenkranz, J.A. and Grace, A.A.
900 Automated telepDulude, L.
901 Discrimination o Carroll, L.S. and Penn, D.J. and Potts, W.K.
902 On the RelevancMacia, I. and Arcoverde, R. and Garcia, A. and Chavez, C. and Von Staa
903 Towards an unifiDairaine, L. and Exposito, E. and Thalmensy, H.
904 Improved HypersBellucci, J.P. and Smetek, T.E. and Bauer, K.W.
905 Anomaly detectioPeng Xinguang and Ren Kaifeng
907 A Case for RobuGupta, H. and Ribeiro, V.J. and Mahanti, A.
908 A novel fuzzy anLi Zhi-tang and Li Yao and Wang Li
909 Table of contents
910 Ionosphere electRadicella, S.M.
911 PID-Based Featur Qian Quan and Cai Yu-hua and Wu Yue
913 Prioritizing sof Guimaraes, E. and Garcia, A. and Figueiredo, E. and Yuanfang Cai
914 Analyzing and resRezvani, M. and Aryan, R.
915 Towards a new desKhummanee, S. and Khumseela, A. and Puangpronpitag, S.
916 A two-stage agg Tabia, Karim and Benferhat, S. and Djouadi, Y.
917 AutoGAD: An Imp Johnson, R.J. and Williams, J.P. and Bauer, K.W.
918 Anomaly detecti Mahadevan, V. and Weixin Li and Bhalodia, V. and Vasconcelos, N.
919 Anomaly detectioChein-I Chang and Shao-Shan Chiang
920 Network PerformBarford, P. and Duffield, N. and Ron, A. and Sommers, J.
921 A comprehensiveKarbaschian, A.R. and Mirpuryan, M.S. and Tavizi, T.
923 End-element anom Beers, C. and Smith, N.B.
924 Predictive NetwoCelenk, M. and Conley, T. and Willis, J. and Graham, J.
925 Improving cyber-Linda, O. and Manic, M. and Vollmer, T.
926 AWG-Detector: AAfridi, M.J. and Awan, A.J. and Iqbal, J.
927 Detecting and ReHongxin Hu and Gail-Joon Ahn and Kulkarni, K.
928 Chaotic invarian Shandong Wu and Moore, Brian E. and Shah, M.
929 An UnsupervisedJiang Zhong and Xiongbing Deng and Luosheng Wen and Yong Feng
930 GPR survey at thde Jong van Coevorden, C.M. and Cobos Sanchez, C. and Pantoja, M.F. a
931 Anomaly detectioRajasegarar, S. and Leckie, C. and Palaniswami, M.
932 Dynamic Circuit Hoang, H. and Fu, S.J.
933 Temporal AnalysiLiu, H. and Gupta, R.
934 Anomaly Program Dingyi Fang and Xiaojiang Chen and Zhangyong Tang and Feng Chen
935 Sequencegram: n Hubballi, N. and Biswas, S. and Nandi, S.
936 A distributed ag Zongxing Xie and Quirino, T. and Mei-Ling Shyu and Shu-Ching Chen a
937 Detecting CumulGang Lu and Junkai Yi and Lu, K.
938 An ExperimentalLamech, C. and Rad, R.M. and Tehranipoor, M and Plusquellic, J.
939 A Packet-Based Huayang Cao and Miao Wang and Xiaoqiang Wang and Peidong Zhu
940 Power quality suKushare, B.E. and Ghatol, A.A. and Date, T. N.
941 Detection of AnoShadhan, L. and Cohen, I.
942 Defending distri Kai Hwang and Ying Chen and Hua Liu
943 Anomaly DetectiLike Zhang and White, Gregory B.
944 Second order sli Rahme�, S. and Labit, Y. and Gouaisbaut, F. and Floquet, T.
945 Position detecti Tobely, T.E. and Salem, A.
946 Behavior-Profile Frias-Martinez, V. and Stolfo, S.J. and Keromytis, A.D.
947 Network AnomalyPapalexakis, E.E. and Beutel, A. and Steenkiste, P.
948 Trust-assisted a Zheng, Shanshan and Baras, J.S.
949 An empirical anaBavota, G. and Qusef, A. and Oliveto, R. and De Lucia, A. and Binkley, D
950 Network Traffic Xiaorong Cheng and Kun Xie and Dong Wang
951 Supporting the Riveiro, M. and Falkman, G.
952 The new approach Valdman, A.
953 Design and impleKumar, S. and Joshi, R.C.
954 A quality inspec Molleda, J. and Granda, J.C. and Usamentiaga, R. and Garcia, D.F. and
955 Discovery of Ga Pogorelc, B. and Gams, M.
956 Attack recall conAnh Tran Quang and Qianli Zhang and Xing Li
957 Photonic band-ga Kita, T. and Ishikawa, R. and Yamada, H.
958 Cross-feature anYi-an Huang and Wei Fan and Wenke Lee and Yu, P.S.
959 A nonparametricRosario, D.
960 An ExperimentalSooyeon Shin and Taekyoung Kwon and Gil-Yong Jo and Youngman Par
961 Implementation Shen Jianfang and Cheng Lianglun and Fu Xiufen
962 A Novel Method bin Haji Ismail, A.S. and Abdullah, A.H. and bin Abu Bak, K. and bin Ng
963 Anomaly DetectioSimmross-Wattenberg, F. and Asensio-Perez, J.I. and Casaseca-de-la-Hig
964 The design of d Yaohui Wang and Hongjian Chu and Zhaoyang Qu
965 Experimental ev Ghorayeb, S.R. and Valle, T.
966 Octopus-IIDS: AnMafra, P.M. and Moll, V. and da Silva Fraga, J. and Santin, A.O.
967 Hybrid Intrusion Kai Hwang and Min Cai and Ying Chen and Min Qin
968 Intrusion Detect Zhong Jiang and Wen Luosheng and Feng Yong and Ye Chun Xiao
969 Statistical analy Hajji, H.
970 A New DatabaseGang Lu and Junkai Yi and Lu, K.
971 Detecting Anomal Camossi, E. and Dimitrova, T. and Tsois, A.
972 Collaborative de Schooler, E.M. and Livadas, C. and Joohwan Kim and Gandhi, P. and Pas
973 Program Detecti Xinguang Peng and Junfeng Zhang
974 Veri cation Thro Isaksen, B. and Bertacco, V.
975 Cable engineerinNewbern, V.A.
976 Making DesignerWiwatwattana, N. and Jagadish, H.V. and Lakshmanan, L. V S and Srivas
977 A Novel NetworkJiang Zhong and Xiongbing Deng and Luosheng Wen and Yong Feng
978 Intrusion Detec Jiang Zhong and Zhiguo Li and Yong Feng and Cunxiao Ye
979 Integrating studeWalther, J. and Kellam, N. and Radcliffe, D. and Boonchai, C.
980 Tree Based BehaJianyun Xu and Sung, A.H. and Qingzhong Liu
981 Mining large gra Kang, U. and Duen Horng Chau and Faloutsos, C.
982 Automatic Corre Vasilache, N. and Cohen, A. and Pouchet, L.
983 Research on a TrShuifang Yin and Shengchun Yu
984 Group health man Bethke, B. and How, J.P. and Vian, J.
985 Generation and cYu-Chiu Chao,
986 Satellite optica Guo Haichao and Yao Zhoushi and Wang Bo
987 Study of Influen Tang Xingong and Hu Wenbao and Yan Liangjun
988 Radiation Effec Adell, P.C. and Scheick, L.Z.
989 Visualizing and i Zhuowei Li and Das, A.
990 A wearable ultra Basak, A. and Ranganathan, V. and Bhunia, S.
991 Robust control toAriba, Y. and Gouaisbaut, F. and Rahme, S. and Labit, Y.
992 Fast and compacTao Li and Shigang Chen and Yibei Ling
993 Per-Flow Traffi Tao Li and Shigang Chen and Yibei Ling
994 Nucifer: A small Letourneau, A. and Bui, V. -M and Cribier, M. and Fallot, M. and Fechner,
995 Baselining networ Hajji, H.
996 UAV borne real- Wang Feng and Wu Yundong and Zhang Qiang
997 SSD-Assisted HyXiangyong Ouyang and Islam, N.S. and Rajachandrasekar, R. and Jose
998 On Testing of ImChung, A.
999 A novel intrusio Nadkarni, K. and Mishra, A.
1000 Optimizing complRay, M. and Mo Liu and Rundensteiner, E. and Dougherty, D.J. and Gupt
1001 Theory of redundMirza-Aghatabar, M. and Breuer, M.A. and Gupta, S.K. and Nazarian, S.
1002 Statistical and Gang Lu and Junkai Yi and Lu, K.
1003 A Multi-expert C Tich Phuoc Tran and Pohsiang Tsai and Jan, T.
1004 Traffic monitori Ariba, Y. and Gouaisbaut, F. and Rahme, S. and Labit, Y.
1005 Toward composab di Pietro, A. and Huici, F. and Bonelli, N. and Trammell, B. and Kastovsk
1006 Intrusion detecti Jing Zhong and Hongjuan Wu and Yushu Lai
1007 DANAK: Finding Wagner, C. and Francois, J. and State, R. and Engel, T.
1008 Realization of i Zhao Yanjun and Wei Ming jun and Wang Jing
1009 A Bayesian Infe Wei-Shinn Ku and Haiquan Chen and Haixun Wang and Min-Te Sun
1010 Improving operatChitnis, P. and Fatnani, P. and Sheth, Y. M. and Merh, B. N. and Yarde,
1011 Dealing with Dri Herder, J.N. and van Moolenbroek, D.C. and Appuswamy, R. and Bingz
1012 Numerical simulaLiang Xu and Wang Zhengyu and Liu Guohua and Chen Yinlu
1013 A Hybrid Artifi Machado, R. B. and Boukerche, A. and Sobral, J.B.M. and Juca, K.R.L. a
1014 Adaptive responsThing, V.L.L. and Sloman, M. and Dulay, N.
1015 Resilient hybrid Kher, S. and Nutt, V. and Dasgupta, D.
1016 Defending againYong Tang and Shigang Chen
1017 Auto-AssociativeHerrero, A. and Corchado, E. and Gastaldo, P. and Picasso, F. and Zunin
1018 Routers With VeVishwanath, A. and Sivaraman, V.
1019 Prediction of ca Satapathi, G.N. and Srihari, P. and Jyothi, A. and Lavanya, S.
1020 Performance evalLada, E.K. and Wilson, J.R. and Steiger, N.M. and Joines, J.A.
1021 Expert-Aware ApWong, D.H.-T. and Kok-Soon Chai and Ramadass, S. and Vavasseur, N.
1022 Magnetic field b Afzal, M.H. and Renaudin, V. and Lachapelle, G.
1023 Cognitive fit and Galletta, D.F. and Everard, A. and Durcikova, Alexandra and Jones, B.
1024 Minimizing overl Chmielewski, A. and Wierzchon, S.T.
1025 AUTOMATED 3DYi-Yu Chou and Lepore�, N. and de Zubicaray, G. and Rose, S.E. and
1026 Proactive detect Gross, K.C. and Bhardwaj, V. and Bickford, R.
1027 Role of shape anXiong Wei and Yao Jun and Li Wei and Shen Jingling and Li Binbin
1028 IGODS: An import Shisko, J.F. and Steele, A. and Mengel, M.J.
1029 RAVAGE: Post-sil Muldrey, B. and Deyati, S. and Giardino, M. and Chatterjee, A.
1030 Attacking the ID Pevny, Tomas and Komon, Martin and Rehaky, Martin
1032 The effects of D Sadre, R. and Sperotto, A. and Pras, A.
1033 Automating CelluKogeda, O.P. and Nyika, S.
1034 An improved GaAs Matsunaga, N. and Yamamoto, M. and Hatta, Y. and Masuda, H.
1035 Low-temperatureLi, Bin and Jiang, Jinchun and Zhang, Su-ying and Zhang, Feng-shan
1036 Agnostic diagnosXin Miao and Kebin Liu and Yuan He and Yunhao Liu and Papadias, D.
1037 Specific heat a Plackowski, Tomasz and Wang, Yuxing and Junod, Alain
1038 Symmetry filteri Li Ting-jun and Kong Ling-jiang and Zhou Zheng-ou
1039 Domestic robots Xiaofeng Xiong and Zhangjun Song and Jianwei Zhang
1040 Robust resourceBarlet-Ros, P. and Sanjuas-Cuxart, J. and Sole�-Pareta, J. and Iannac
1041 Research on hom Sun Huihui and Xu Jining and Zhang Lin
1042 Experiences Wit Hegde, M. and Kumar, P. and Vasudev, K.R. and Sowmya, N.N. and Anan
1043 A real-time hybr Xiaorong Cheng and Shanshan Wen
1044 Hybrid Classifie Te-Shun Chou and Tsung-Nan Chou
1045 Modeling of gradAlpay, S.P.
1046 Automatic syste Larrauri, J.I. and Sorrosal, G. and Gonza�lez, M.
1047 Proactive Cellul Kogeda, O.P. and Agbinya, J.I.
1048 CALD: SurvivingSheng Wen and Weijia Jia and Wei Zhou and Wanlei Zhou and Chuan X
1049 A novel indoor wYao-Jen Chang and Chen-Nien Chen and Li-Der Chou and Tsen-Yung
1050 Development of Mohra, A. and Sheta, A. and Siddiqui, Z. and Elshafiey, I.
1051 Bluetooth NetwoOConnor, T. and Reeves, D.
1052 The ANSER projec Capezio, F. and Mastrogiovanni, F. and Sgorbissa, A. and Zaccaria, R.
1053 Data analysis anKulczycki, P.
1054 NeuroNet: Toward Yu Chen
1055 Multi-agent intr Chi-Ho Tsang and Sam Kwong
1057 Ultraviolet and Lim, S. H. and Yu, E.T.
1058 Profiling river Barrick, D. and Teague, C. and Lilleboe, P. and Cheng, R. and Gartner, J
1059 Intrusion detec Reznik, L. and Bitemirov, B.K. and Negnevitsky, M.
1060 Evaluating the UBolten, J.D. and Crow, W.T. and Xiwu Zhan and Jackson, T.J. and Reyno
1061 Camera Response Yu-Feng Hsu and Shih-Fu Chang
1062 An approach of m Cai, Ping and Ni, Lishun
1063 The Timescale oMazur, J.E. and Fennell, J.F. and Roeder, J.L. and O'Brien, P.T. and Guild
1064 A statistical ex Norris, Kevin and Watson, Ian
1065 Visual Detectio Dhambri, K. and Sahraoui, H. and Poulin, P.
1066 Robust and resil Quanyan Zhu and Basar, T.
1067 Using Field-RepaWagner, I. and Bertacco, V. and Austin, T.
1068 DECOR: A Method Moha, N. and Gue�he�neuc, Y. and Duchien, L. and Le Meur, A.
1069 Optimal design Jarman, K.D. and Smith, L.E. and Heredia-Langner, A. and Renholds, A.R
1070 Building operabi Lock, R. and Hibbard, K. and Rasmussen, R. and Clark, K. and Magner,
1071 An inherently an Bornhauser, U. and Martini, P. and Horneffer, M.
1072 Histogram-basedKind, A. and Stoecklin, M.P. and Dimitropoulos, X.
1073 Human-machineHunold,
s K.Q. and LaCourse, J.R.
1074 Workflow DesignNanshan Du and Yiwen Liang and Linxia Du and Li Zhao
1075 An Investigation Shatnawi, R. and Wei Li
1076 Scandal: SystemSchumacher, C. and Weinstock, J.H. and Leupers, R. and Ascheid, G.
1077 A flexible and fe Chi-Shih Chao
1078 Detecting Bad S Jiang Dexun and Ma Peijun and Su Xiaohong and Wang Tiantian
1079 System ModelingMcDonald, B.S. and Myjak, M.J. and Hensley, W.K. and Smart, J.E.
1080 EntomoModel: Un Stewart, C. and Kai Shen and Iyengar, A. and Jian Yin
1081 Real-time quantifZellag, K. and Kemme, B.
1082 Analysis and OptMolero, J.M. and Garzon, E.M. and Garcia, I. and Plaza, A.
1083 Study and Design De Lera Acedo, E. and Garcia, E. and Gonzalez-Posadas, V. and Vazque
1084 Detecting Artifa Hwai-Jung Hsu and Feng-Jian Wang
1085 Optimization desiXueying An and Leping Yang and Xiaoning Xi
1086 GPU task paralleUeno, K. and Suzumura, T.
1088 An analytical f Ozer, S.Z. and Papavassiliou, S.
1089 SVC-Based MultiZhisheng Zhang and Xuejun Zhu
1090 Using Artifact F Hwai-Jung Hsu and Feng-Jian Wang
1091 Relative Orbit D Rucai Che and Honghua Zhang
1092 CharacterizationQiang Zou and Dan Feng
1093 Unmixing Compon Gu Yanfeng and Zhang Ye and Liu Ying
1094 Visualization f Zhaoxia Wang and Chee Seng Chong and Goh, R.S.M. and Wanqing Zh
1095 Adaptive ControlDydek, Z.T. and Annaswamy, A.M. and Lavretsky, E.
1096 Laboratory-basedBadger, M. and Bushmitch, D. and Agnish, V. and Cozby, R. and Fikus, J
1097 A Distribution-B D'Alconzo, A. and Coluccia, A. and Ricciato, F. and Romirer-Maierhofer,
1098 Detecting Anomal Hanbo Dai and Feida Zhu and Ee-Peng Lim and HweeHwa Pang
1099 Stress testing s Wu, J.
1100 Design and Impl Liu Yueming and Huang Binghua and Shen Jianchun and Yuan Yuan
1101 An adaptive reseMatsutani, M. and Annaswamy, A.M.
1102 Facing 802.11 AOthman, J.B. and Bouam, S. and Diverchy, B. and Lauquin, N. and Vand
1103 An unknown input Rahme�, S. and Labit, Y. and Gouaisbaut, F.
1104 A decentralized Belkacemi, R. and Feliachi, A.
1105 Ontology-based Hongxin Hu and Gail-Joon Ahn and Kulkarni, K.
1106 The Design of InFu-Chien Kao and Yun-Sheng Tsai and Chiou, A.S. and Wang, S.R. an
1107 Rasat Leo Satel Akin, M. and Dag, B.
1108 Sliding Mode ObRahme�, S. and Labit, Y. and Gouaisbaut, F.
1109 Discovery and RHu, Hongxin and Ahn, Gail-Joon and Kulkarni, Ketan
1110 Design guidelineTsujii, H. and Adachi, K. and Ohuchi, K. and Aoki, N. and Ito, T. and Mat
1111 An analytical fr Ozer, S.Z. and Papavassiliou, S.
1112 A Network Anoma Ya-ling Zhang and Zhao-guo Han and Jiao-xia Ren
1113 Investigating N Haidong Fu and Xiguo Yuan and Kui Zhang and Xiaolong Zhang and Qi
1115 An anomaly-baseCioffi, C. and Pagliarecci, F. and Spalazzi, L.
1116 Fates: A Granul Janies, Jeff and Chin-Tser Huang
1117 An Information-TAshfaq, A.B. and Javed, M. and Khayam, S.A. and Radha, H.
1118 Terminal sliding Yong Feng and Fengling Han and Xinghuo Yu and Tari, Z. and Lilin Li a
1119 Anomaly detecti Yi Zhang and Weiwei Chen and Black, J.
1120 Design of an embRibeiro, A.G.C.D. and Maitelli, A.L. and de M.Valentim, Ricardo A. and
1121 The torsional w Rabani, A. and Challis, R.E. and Pinfield, V.J.
1122 A Framework forBouzida, Y. and Mangin, C.
1123 Highly effective Rosario, D.S.
1125 Design of a Non-Doyle, T.E. and Ieta, A. and Kucerovsky, Z.
1126 Correction strat Zhongmei Shu and Shixian Li and Yayao Zuo and Xiaocong Zhou and Y
1128 Host anomaly deByungRae Cha
1129 Wood anomaly trSoltani, N. and Lheurette, E. and Lippens, D.
1130 Magnetic field a Bergs, Richard and Islam, Rashed A. and Vickers, Michael and Stephano
1131 Electrode regulaWang Yuhua and Miao Jianlin
1132 Autonomic NetwoChonho Lee and Suzuki, J.
1133 Anomaly intrusioByungRae Cha and Vaidya, B. and Seungjo Han
1134 Robust feature sPascoal, C. and Rosario de Oliveira, M. and Valadas, R. and Filzmoser,
1136 Design of low-coKumar, U. and Champaty, B. and Shashikala, P. and Pal, K.
1137 Detection of anoVallee, M. and Merdan, M. and Vrba, P.
1138 Basic experimentSanmaru, Y. and Ose, T. and Kawasaki, T. and Sikata, Y. and Hosoda, S
1139 Adaptive Flight Jinho Jang and Annaswamy, A.M. and Lavretsky, E.
1140 Reduction of Fa Srinivasan, N. and Vaidehi, V.
1141 A multiobjective Weijian Kong and Jinliang Ding and Tianyou Chai and Xiuping Zheng a
1142 Experiences on D Penya, Y.K. and Bringas, P.G.
1143 Internet routing Wong, T. and Van Jacobson and Alaettinoglu, C.
1144 NIDS based on pMrdovic, S. and Perunicic, B.
1145 Towards DesigniMeng, Yuxin and Li, Wenjuan and Kwok, Lam-For and Xiang, Yang
1146 Research on Smel Chang Chunguang and Zhu Yunlong and Hu Kunyuan and Shen Hai
1147 The application Dong Nanping and Zhou Guanling and Wang Yuping
1148 A Neural NetworkMencar, C. and Fanelli, A.M. and Chieco, M.
1149 The Optimal ApplDong Nanping and Zhou Guanling and Wang Yuping
1150 FSS with a wavegu Jie Wang and Hui Deng and Jin-ming Deng
1151 Probabilistic ri Meshkat, L.
1152 Autonomic diagno Marnerides, A.K. and Hutchison, David and Pezaros, D.P.
1153 Visualizing NaturHui Fang and Tam, G.K.-L. and Borgo, R. and Aubrey, A.J. and Grant, P
1154 Discovering ChaAngiulli, F. and Fassetti, F. and Palopoli, L.
1155 A study of varia Nadi, S.
1156 Distributed fair Indumathi, G. and Murugesan, K.
1157 Double Close LoWang Yuhua and Lu Xiuhe and Wang Shirong
1158 A measurement b Garroppo, R.G. and Giordano, S. and Lucetti, S. and Tavanti, L.
1159 Threat-driven moDianxiang Xu and Nygard, K.E.
1160 Utilising Applic Bate, I.
1161 An Improved AntQi Bing and Jun Lu and Yan Long
1162 Trends in QoS prAlagoz, F.
1163 In-plane satellit Guangyan Xu and Eng Kee Poh and Danwei Wang and Baolin Wu
1164 A new mapping m Peng Yu and Zavala-Hidalgo, J. and Morey, S.L. and O'Brien, J.J.
1165 An analysis of s Therdphapiyanak, J. and Piromsopa, K.
1166 Traffic-Aware Fi Acharya, S. and Wang, J. and Zihui Ge and Znati, T.F. and Greenberg, A
1167 Timed Petri NetsTao Hong and Mo-Yuen Chow
1168 Jumping Scanning Yan Zhou and Chun Chen and Qiang Wang and Jiajun Bu
1169 Geomagnetism aiYing Liu and Meiping Wu and Xiaoping Hu and Hongwei Xie
1170 Unbounded systeDeconinck, G. and Vanthournout, K. and Van de Vyver, J. and Driesen, J
1171 Mix Genetic and Lin Jian and Lin Xiaohui and Cao Xibin
1172 Backup Hydrogen Qinghua Wang and Rochat, P.
1173 A portable gait Benedict, G.A. and Ruiz, V.F.
1174 [Copyright notice]
1175 Trojan detection Lamech, C. and Plusquellic, J.
1176 Giant light-indu Dianat, P. and Prusak, R.W. and Persano, A. and Quaranta, F. and Cola,
1177 Operational Les Garcia-Galan, C. and Armstrong, R.E. and Lammers, M.L. and McMillan,
1178 The polyphase reReass, W.A. and Borovina, D. L. and Brown, V. W. and Doss, J.D. and Gr
1179 International sp Savoy, M. and Miller, T.
1180 Efficient techniq Sgubini, S. and Palmerini, G.B.
1181 Robust control oSkinner, J. and Koppang, P. and Johns, D.
1182 A Double-Stage K Sabatelli, S. and Galgani, M. and Fanucci, L. and Rocchi, A.
1183 The Credit Viola Yihong Xu
1185 Overview of RadFretz, K. and Kirby, K. and Marsh, D. and Stratton, J.
1186 Visual Analysis Langelier, G. and Dhambri, K.
1187 Negative pressu Chun-Hua Tian and Jun-chi Yan and Jin Huang and Yu Wang and Dong-
1188 OBEY: Optimal Ba Jiau, H.C. and Lee Wei Mar and Chen, J.C.
1189 Anatomy of a ReKoller, R. and Rangaswami, R. and Marrero, J. and Hernandez, I. and Smit
1190 Churn-Resilient Zhenyu Li and Gaogang Xie and Kai Hwang and Zhongcheng Li
1191 Model-based relia Bierbaum, R.L. and Brown, T.D. and Kerschen, T.J.
1192 PCM-controlled Karppanen, M. and Suntio, T. and Sippola, M.
1193 Phenology of theVerhegghen, A. and Defourny, P.
1194 An Improved Snor Kang Hong and Zhang Jiangang
1195 Grating resonancNosich, A.I. and Byelobrov, V.O. and Shapoval, O.V. and Natarov, D.M.
1196 The Kepler end-tCooke, B. and Thompson, R. and Standley, S.
1198 Detecting comproMizrak, A.T. and Savage, S. and Marzullo, K.
1199 Towards steganog Mazurczyk, W. and Szczypiorski, K. and Jankowski, B.
1200 High-Speed Netwo CÌŒeleda, P. and Krmicek, V. and Rehak, M. and Medvigy, D.
1201 Beyond Output VDebin Gao and Reiter, M.K. and Song, D.
1202 Quality of archi Mettlach, T. and Chung-Chu Teng and Weir, R. and LaRue, K.
1203 Fast Automated Mohammed, M.M.Z.E. and Chan, H.A.
1204 Potential issues Iqbal, N. and Maarof, M.A.
1205 The Risk AssessYong-li Guo and Yuan-zheng Zhai and Jin-sheng Wang and Yan-guo Te
1206 Digital Instrume Hui-Wen Huang and Wei-Yi Yang and Chunkuan Shih and Swu Yih and
1207 Reconfigurable fIbrahim, M.M. and Asami, K. and Mengu Cho
1208 Simulation and hCaldwell, B.S. and Onken, J.D.
1209 Detecting and D Yu Yao and Jun-Wei Lv and Fu-Xiang Gao and Ge Yu and Qing-Xu Den
1210 Analysis of Fire Golnabi, K. and Min, R.K. and Khan, L. and Al-Shaer, E.
1211 On modeling AS Li,t Lei and Changjia Chen
1212 Network Intrusi Rehak, M. and Pechoucek, M. and Bartos, K. and Grill, Martin and Celeda
1213 The developmentSiripatana, A. and Jaroensutasinee, K. and Prueksaaroon, S. and Vannar
1214 Hop-Count MonitDallas, D. and Leckie, C. and Ramamohanarao, K.
1215 Distributed intr Yong Wang and Huihua Yang and Xingyu Wang and Ruixia Zhang
1216 Maintenance ageLetia, I.A. and Marian, D.A.
1217 Best-effort Data Sigholm, J. and Raciti, M.
1218 Airtime Fairness Joshi, T. and Mukherjee, A. and Younghwan Yoo and Agrawal, D.P.
1219 A new density-raDongmei Chen and Meng, M.Q.-H.
1220 A satellite morta Fox, George and Salazar, Ronald and Habib-Agahi, Hamid and Dubos, G
1221 The use of ATMLGorringe, C.
1222 Using an FPGA di Gaughan, W. and Butka, Brian
1223 A Schematic-BasRai, N. and Hashempour, H. and Yizi Xing and Kruseman, B. and Hamdio
1224 Semi-supervisedMin, Cheol-Hong and Tewfik, A.H.
1225 Traffic measuremAghdai, A. and Fan Zhang and Dasanayake, N. and Kang Xi and Chao, H
1226 Development of Dowen, D. and Moser, J. and Mobley, J.
1227 Intelligent wire Po-Jen Chen and Shin-Pei Tsai and Shu-Pei Kao and Hsien-En Lin and
1228 Fairness AnalysiBabu, A.V. and Jacob, L.
1229 Detecting struct Vasa, R. and Schneider, J.-G. and Woodward, C. and Cain, A.
1230 Automated GeneBarltrop, K.J. and Friberg, K.H. and Horvath, G.A.
1232 Metrics for charaRiihijarvi, J. and Mahonen, P. and Wellens, M.
1233 Measurement Bas Owezarski, P. and Larrieu, N.
1234 A holistic immu Eng Keong Lua and Ruichuan Chen
1235 Semantic grep: rBull, R.I. and Trevors, A. and Malton, A.J. and Godfrey, M.W.
1236 Fluorescent supeShi, Donglu and Cho, H.S. and Huth, Chris and Hong Xu and Gu, H. -C an
1237 Application leve Chen, Zhen and Fa-Chao Deng and An-An Luo and Xin Jiang and Guo-
1238 False data injec Yilin Mo and Garone, E. and Casavola, A. and Sinopoli, B.
1239 Inductive and cade Sao Jose, Artur Nogueira and Colin, Arnaud Christophe Pierre Marie
1240 Towards improved Neil, Joshua and Uphoff, Benjamin and Hash, Curtis and Storlie, Curtis
1241 One summer at Morris, J. and Nickles, D. and Rauth, D.
1242 MAC-layer Time Ming Zhang and Shigang Chen and Ying Jian
1243 Experience with Cherukupalli, S.
1244 Fault recovery o Ranjbaran, M. and Khorasani, K.
1245 A ComprehensivYing Zhang and Tatipamula, M.
1246 A lean warehousDotoli, Mariagrazia and Epicoco, Nicola and Falagario, Marco and Costan
1247 Perspectives for Koch, W.
1248 Research and imWen Kai and Lu Lihua
1249 Modeling networkSeong Soo Kim and Reddy, A.L.N.
1250 Research of Circu Guangyan Xu and Huanqiang Wang
1251 The impact of RTWang, Jianxin and Li, Bin
1252 Neuro-adaptive aZhou, Meimei and Song, Yongduan and Cai, Wenchuan and Fan, Lingling
1253 Particle size de Mazumder, R. and Ghosh, S. and Mondal, P. and Bhattacharya, Dipten an
1254 Planetary explor Haoping Huang and SanFilipo, B. and Won, I. J.
1255 Electronic packaLee, J.K. and Stoffel, N. and Fite, K.
1256 A multi-layered Hangjun Zhou and Sha Fu
1257 Resource managGhosh, S. and Rajkumar, R.
1258 Analysis and reme Dutka, A. and Orkisz, M.
1259 Generalized faulRanjbaran, M. and Khorasani, K.
1260 Cooperative MAC Chang-Yeong Oh and Tae-Jin Lee
1261 Failure margin a Avresky, D. and Natchev, N.
1262 Agent-Based NetKrmicek, V. and CÌŒeleda, P. and Rehak, M. and Pechoucek, Michal
1263 Effects of Hapti Aoki, E. and Hirooka, J. and Nagatomo, N. and Osada, T. and Nishino, H
1264 The effects of p Buchman, S. and Turneaure, J. P.
1266 Phenomenon of V a aldman, A.
1267 Fault detection i Azarnoush, H. and Khorasani, K.
1268 Long-EnduranceCrimmins, D.M. and Patty, C.T. and Beliard, M.A. and Baker, J. and Jalb
1269 MAC protocol usiChang-Yeong Oh and Tae-Jin Lee
1270 Determining the Jordan, C.J. and Zhang, Q. and Roves, J.
1271 A Hybrid UDP-TC Hashmi, I. and Qadir, M.A. and Rehman, M.
1272 LINEBACkER: Bio- Teuton, Jeremy and Peterson, Elena and Nordwall, Douglas and Akyol,
1273 Low Nickel ConteWaeckerle, T.
1274 A novel vessel s Ocbagabir, H. and Hameed, I. and Abdulmalik, S. and Barkana Buket, D.
1275 Collaborative maSampaio, A.Z. and Santos, J.P. and Gomes, A.R. and Rosario, D.P. and
1276 Exploring the evoLangelier, G. and Sahraoui, H. and Poulin, P.
1277 ClimaWin: An intPinto, S. and Castro, T. and Brito, N. and Gomes, T. and Tavares, A. and
1278 FUZZGY: A hybrid HaratiNik, M.R. and Akrami, M. and Khadivi, S. and Shajari, M.
1279 A Novel CongestiMoghaddam, M.H.Y. and Adjeroh, D.
1280 Life scientist ta Applewhite, A.
1281 A TXOP-based Sc Qianhua Deng and Cai, A.
1282 Triple-point-ty Zhou, Chao and Liu, Wenfeng and Xue, Dezhen and Ren, Xiaobing and B
1283 Navigation, Inte Rife, J. and Khanafseh, S. and Pullen, S. and De Lorenzo, D. and Ung
1284 Interframe-Spac Jeng-Farn Lee and Wanjiun Liao and Meng-Chang Chen
1285 Human assisted Senanayake,
to C. and Senanayake, S. M N A
1286 Workshop - usin Jacobson, D. and Rursch, J.A.
1287 A Metric-Based Salehie, M. and Shimin Li and Tahvildari, L.
1288 Detection strate Marinescu, R.
1290 Shielding againstWagner, I. and Bertacco, V. and Austin, T.
1291 Variable Length Mingwei Leng and Xiaoyun Chen and Longjie Li
1292 Studies in apply Novakov, S. and Chung-Horng Lung and Lambadaris, I. and Seddigh, N.
1294 On the Impact o D'Ambros, M. and Bacchelli, Alberto and Lanza, M.
1295 Multi-scale Entr Yan Ruo-Yu and Zheng Qing-Hua
1297 Investigating th Chatzigeorgiou, A. and Manakos, A.
1298 Design Smell DetLiska, P. and Polasek, I.
1299 Network AnomalyFengyu Wang and Bin Gong and Yi Hu and Ningbo Zhang
1300 Tracking Design Vaucher, S. and Khomh, F. and Moha, N. and GueÌ�heÌ �neuc, Y.
1301 Filtering and Re Xiao Yu and Lu-An Tang and Jiawei Han
1302 Advances in struKumar, A. and Srivastava, A. and Goel, N. and Nayak, A.
1304 Research on AnoMingsheng Liu and Yuemei He and Qingli Meng and Zhihui Wang
1305 Product Metrics Munro, M.J.
1306 Anomaly detecti Handra, S. I. and Ciocarlie, H.
1307 A Dynamic AnomYi Xie and Shun-zheng Yu
1308 Fully UnsupervisVeracini, T. and Matteoli, S. and Diani, M. and Corsini, G.
1309 Vehicle Design VYilu Zhang and Gantt, G.W. and Rychlinski, M. and Edwards, R. and Corre
1310 Anomaly detecti Liangliang Wang and Zhiyong Li and Jixiang Sun and Shilin Zhou
1311 Range anomaly sZhao, Mingbo and He, Jun and Lu, Zaiqi and Fu, Qiang
1312 Anomaly DetectiLee, Yuh-Jye and Yeh, Yi-Ren and Wang, Yu-Chiang Frank
1313 Anomaly DetectiJun Ma and Guanzhong Dai
1314 Java quality ass van Emden, E. and Moonen, L.
1315 Anomaly detecti Celik, M. and Dadaser-Celik, F. and Dokuz, A.S.
1316 Adaptive Profil Magalhaes, J.P. and Moura Silva, L.
1317 Anomaly DetectiMehmood, A. and Nasrabadi, N.M.
1318 Anomaly-aware IChun Yeow Yeoh
1319 Robust multiban Beltramonte, T. and Clemente, C. and di Bisceglie, M. and Galdi, C.
1320 Time series ano Khaokaew, Y. and Pukkawanna, S.
1321 Assuring softwarvan Emden, E. and Moonen, L.
1322 Combining sketcPukkawanna, S. and Fukuda, K.
1323 Improved Edit D Qian Quan and Wu Jinlin and Zhu Wei and Xin Mingjun
1324 A Density-Base Kai Wang and Ying Wang and Bo Yin
1325 Anomaly detecti Yu-Lei Wang and Chun-Hui Zhao and Ying Wang
1326 The dangers of mPetroni, N.L., Jr. and Arbaugh, W.A.
1327 Using a DynamicLi Han
1328 A Fast Search AYing-Hui Kong and Yun-Jie Lv and Jin-Sha Yuan and Yan-Ming Liu
1329 Real-Time Anoma Wenke Zhang and Bastani, F. and I-Ling Yen and Hulin, K. and Bastani,
1331 An anomaly detec Lin Ji and Yuexiang Yang and Lei Yan
1332 Anomaly DetectioNam Hun Park and Won Suk Lee
1333 Anomaly Intrusi Yao Yu and Yang Wei and Gao Fu-Xiang and Yao Yu
1334 Anomaly detectioLee, R.K. and Watson, R. and Kitts, C. and Stang, P. and Palmintier, B.
1335 Design of an ae Zhang Xingguo and Yi Xiaoyu
1336 Anomaly detectioEljadi, E.E. and Othman, Z.A.
1337 On the Impact ofMacia, I. and Garcia, A. and Von Staa, A. and Garcia, J. and Medvidovic,
1338 Factor analysis Ningning Wu and Zhang, J.
1339 The Analysis of Nan Zhang and Congcong Zhang and Yonggang Li
1340 Anomaly intrusioGe Zheng and Qinghua Cao and Chao Liu
1341 Based on the cluLi Xiaohui and Zhao Chunhui
1342 The ST6 autonom Sherwood, R. and Chien, S. and Tran, D. and Cichy, B. and Castano, R.
1343 Anomaly DetectiQu Zhiyi and Zheng Wenxiu
1344 Anomaly NetworkShanyue Bu and Ruchuan Wang and Hong Zhou
1345 Design and impl Layfield, R. and Thuraisingham, Bhavani and Khan, L. and Kantarcioglu,
1346 Identifying Code de F Carneiro, G. and Silva, M. and Mara, L. and Figueiredo, E. and Sa
1347 Detectors generaAziz, A.S.A. and Salama, M. and ella Hassanien, A. and El-Ola Hanafi, S
1348 Direct identific Shaohua Jiang and Weihua Gui and Ding, S.X. and Yongfang Xie
1349 Noniterative algoGasulla, M. and Pallas-areny, Ramon
1351 Anomalies in disBotincan, M. and Nogo, G.
1352 Defining and AppMacia, I. and Garcia, A. and von Staa, A.
1353 Indoor waypoint Riehle, T.H. and Anderson, S.M. and Lichter, P.A. and Condon, J.P. and
1354 Quantifying the Sjoberg, D.I.K. and Yamashita, A. and Anda, B.C.D. and Mockus, A. and
1355 Matrix Factoriza Snasel, V. and Platos, J. and Kromer, P. and Abraham, A.
1356 Designing Harmon Badrzadeh, B. and Smith, K. and Wilson, R.
1357 Anomaly Based IChitrakar, R. and Huang Chuanhe
1358 A Dendritic Cell Song Yuan and Qi-juan Chen
1359 Research and ImLi Han
1360 Spectral anomaliManolatou, Christina and Popovic, M.A. and Rakich, P.T. and Barwicz, T
1361 Fast Anomaly DeAng Li and Lin Gu and Kuai Xu
1362 Anomaly detectioLinda, O. and Manic, M. and McJunkin, T.R.
1363 The sense of sme Galan, D. and Galan, R. and Martinez, A.L. and Moreno, I.
1364 Computer optimiTrufanov, I. and Metelskiy, V. and Bogdanova, L. and Krisan, Y. and Shab
1365 Automated Detect Greiler, M. and van Deursen, A. and Storey, M.-A.
1366 A New ApproachHongyu Yang and Lixia Xie and Feng Xie
1367 A novel anomalyHong-Yu Yang and Li-Xia Xie and Feng Xie
1368 Designing PassivBadrzadeh, B. and Smith, K.S. and Wilson, R.C.
1369 A Grid-Based Cl Xiaotao Wei and Houkuan Huang and ShengFeng Tian
1370 Design and test Hongqiao Gao and Xiaohui Duan and Xiaoqiang Guo and Anpeng Huang a
1371 A Large-Scale HYi Xie and Shun-zheng Yu
1372 Initial Layer Mo Igarashi, M. and Takekuma, I. and Nemoto, H. and Hirayama, Y. and Hos
1373 Characterizing t Van Rompaey, B. and Du Bois, B. and Demeyer, S.
1374 Use of Electrica Molenaar, D.
1375 An neural networkXiao Yanhong and Hu Hongjun and Jiang Huixia and Zhou Jinglin and Y
1376 Variable Discou Yan Chen and Jinhui Lei and Xuebing Yang
1377 Optimization of Chunguang Chang and Yunlong Zhu and KunYuan Hu and Yi Zhang
1378 Are the Clients Marinescu, R. and Marinescu, C.
1379 E-Quality: A grapErdemir, U. and Tekin, U. and Buzluca, F.
1380 Traffic feature Qian Xu and Dong-nian Cheng and Ying-ding Fu
1381 A Negative Sele Guo Jian-hua and Yang Hai-dong
1382 A System AnalysCunningham, A.M. and Hagar, J. and Holman, R.J.
1383 A Framework forTao Wang and Jun Wei and Wenbo Zhang and Hua Zhong
1384 Archeology of coWettel, R. and Marinescu, R.
1385 Resilient Identi Phua, C. and Smith-Miles, K. and Lee, V. and Gayler, R.
1386 I-IncLOF: ImprovKarimian, S.H. and Kelarestaghi, M. and Hashemi, S.
1387 Identifying heavyNingbo Zhang and Fengyu Wang and Bin Gong and Liangxiong Li
1388 Detecting Abnorm Bhaduri, K. and Das, K. and Matthews, B.L.
1389 Effects of the s Acito, N. and Diani, M. and Matteoli, S. and Corsini, G.
1390 Self-Supervisin Baresi, L. and Guinea, S.
1391 Real-Time Analys Apiletti, D. and Baralis, E. and Bruno, G. and Cerquitelli, T.
1392 Distributed oppoViet-Duc Le
1393 Maximum Margin/ Shukai Li and Tsang, I.W.
1395 Optimizing portaFranz, R.L.
1396 Research on unkJin Yan and Wang Jian-zhen
1397 Research on minXu Bo and Hu Nianlian and Li Guoqing
1398 Plastic Surgery Singh, R. and Vatsa, M. and Bhatt, H.S. and Bharadwaj, S. and Noore,
1399 A Hybrid Algorit Gang Shen and Jian Zhu and Zhongping Qin
1400 Real-Time ECG Si Szczepanski, A. and Saeed, K.
1401 n-INCLOF: A dyna Ke Gao and Feng-Jing Shao and Ren-Cheng Sun
1402 A study on the feWanli Ma and Tran, D. and Sharma, D.
1403 Load Forecastin Nahi, S.
1404 An Intrusion Det Min Luo and Xiaohong Li and Shouhe Xie
1405 The Application Yao Li and Xu Ying and Wang Riqing
1406 Monte Carlo LogVouzis, P.D. and Arnold, M.G. and Collange, S. and Kothare, M.V.
1407 Odour plume tra Kiatweerasakul, M. and Stonham, T. J.
1408 Network abnorma Luying Chen and Weimin Li and Xiaolong Wu and Cuicui Wang and Daz
1409 Research for scaXinliang Wang and Fang Liu and Luying Chen and Zhenming Lei
1410 Detection of ep Theiler, J. and Adler-Golden, S.M.
1411 Required Spectr Farsund, O. and Rustad, G. and Kasen, I. and Haavardsholm, T.V.
1412 Enhanced soundMungamuru, B. and Aarabi, P.
1413 Lesion Detectio Macenko, M. and Celenk, M. and Limin Ma
1414 Unsupervised mul Hong Liu and Jiang Li
1415 Continuous monitKontaki, M. and Gounaris, A. and Papadopoulos, A.N. and Tsichlas, K.
1416 A Hybrid AutomaHuali Li and Liangpei Zhang
1417 A symbolic approPeng Liu and Huibiao Zhu and Naiyong Jin
1418 Outlier Detectio Jakkula, V. and Cook, D.
1419 Automatic imageWang, K.I.-K. and Bonnetat, A. and Andrews, M. and Salcic, Z. and Akagi
1420 Pegasus: MiningKang, U. and Chau, D.H. and Faloutsos, C.
1421 Investigation of Badrzadeh, B. and Wilson, R.C. and Smith, K.S.
1422 Calculation of re Olson, B. and Riess, M.
1423 Electrical chara Lawrence, T. E. and Donovan, S. M. and Knowlton, W.B. and Rush-Byers,
1424 The research of m Hai-Bo Liu
1425 Studying the pot Kamarulizam, S.N.B. and Bari, H.A.A. and Arumugam, N.D.
1426 Structural Appli Gupta, P. and Tirth, V. and Srivastava, R. K.
1427 Evaluating the c Lumme, V. and Pylvanen, M.
1429 Learning your li Clarkson, B. and Basu, S. and Eagle, N. and Choudhury, T. and Pentland
1430 Social and BehaDurao, F. and Dolog, P.
1431 Time Series AnaYibing Wang and Sanghyun Cheon and Qun Wang
1432 Using accelerated Wohlgemuth, J.H. and Kurtz, S.
1433 Simulation of sysXian-xi Luo and Ming-zhe Yuan and Hong Wang
1434 H-RAFT - heuristBohm, S.M.
1435 Advantages of voNazaradeh, F. and Dupre, M.A. and Doerge, T. and Eckermann, C. and K
1436 Orthogonal subsp Chein-I Chang
1438 Refactoring the Hodgetts, P.
1440 EXTRACTOR: An JinexHuang and Carminati, F. and Betev, L. and Jianlin Zhu and Luzzi, C.
1441 Reproduction of Nakamoto, T. and Nimsuk, N. and Wyszynski, B. and Takushima, H. and
1442 On the security Peng Zeng and Choo, K.-K.R. and Da-Zhi Sun
1443 Scheduling with Sucha, P. and Hanzalek, Z.
1444 Diagnosis of mulLumme, V.
1445 Discovering UnaArevalo, G. and Ducasse, S. and Nierstrasz, O.
1446 A novel analytic Jinwoo Kim and Hyunok Oh and Junchul Choi and Hyojin Ha and Soonho
1448 Energy-efficient Watfa, M.K. and Commuri, Sesh
1449 Scent PresentatiOhtsu, K. and Sato, J. and Bannai, Y. and Okada, K.
1451 Detecting DDoS Siaterlis, C. and Maglaris, B.
1452 Cognitive memory Widrow, B.
1453 A Data Stream OCao Lijun and Liu Xiyin and Zhou Tiejun and Zhang Zhongping and Liu A
1454 Finite element a Shweta, P. and Anburajan, M.
1455 Ethical analysis Theng, Ooi Sock and Bin Ismail, Maszlan
1457 On Group Key Ma Wen-Tao Zhu and Deng, R.-H.
1458 Towards PortablBakota, T. and Ferenc, R. and Gyimothy, T. and Riva, C. and Xu, J.
1461 The fuzzy controBin Dong and Li Zhang and Yongjian Wu and Jian Feng and Tianyou Cha
1462 Impact of Traffi Tellenbach, B. and Brauckhoff, D. and May, M.
1463 The scale self-adQi Xing-jian and Hu Guang-min and Yang Dan and Li Zong-lin
1464 ANODR based ano Sayee Kumar, M. and Selvarajan, S. and Balu, S.
1465 Applying Data MiAzevedo, D.R. and Ambrosio, A.M. and Vieira, M.
1466 Using Selective Androulidakis, G. and Chatzigiannakis, V. and Papavassiliou, S.
1467 Detection and ClBarria, J.A. and Thajchayapong, S.
1468 Detection NetwoWang Hong and Gong Zhenghu and Guan Qing and Wang Baosheng
1469 Root causes for Bornhauser, U. and Martini, P. and Horneffer, M.
1470 Social network aLimsaiprom, P. and Tantatsanawong, P.
1471 Anomaly predict Friedlander, D. and Chattopadhyay, I. and Ray, A. and Phoha, S. and Ja
1472 Based on patternMian Zhang and Li Zhang
1473 User's favorite Fukumoto, M. and Inoue, M. and Imai, J.
1474 Fuzzy mega clusHubballi, N. and Biswas, S. and Nandi, S.
1475 Advances in SecO'Sullivan, A. and Pless, R.
1476 The protection a Bin Mao
1477 Prediction of pe Magalhães, J.P. and Moura Silva, L.
1478 A design of lineaCaipeng Wu and Jiahao Deng and Ji Sun and Yanli Yang
1479 Design of a NewGongxing Wu and Yimin Huang
1480 Understanding aAndroulidakis, G. and Chatzigiannakis, V. and Papavassiliou, S. and Gr
1481 Anomaly detectioDas, S. and Sarkar, S. and Ray, A. and Srivastava, A. and Simon, D.L.
1482 An Improved VibrLandry, M. and Leonard, F. and Landry, C. and Beauchemin, R. and Turcot
1483 Passive Identifi Mellia, M. and Meo, M. and Muscariello, L. and Rossi, D.
1484 A policy anomal Xuhua Zhang and Qiaoyan Wen
1485 A hybrid cluster Yu-Xin Ding and Yan Shi and Yong Shi and Jun-Qing Jiang
1486 Border Gateway Mujtaba, M. and Nanda, P. and Xiangjian He
1487 An Exploratory Khomh, F. and Di Penta, M. and Gue�he�neuc, Y.
1488 Cross-Layer BasXia Wang and Wong, J.S. and Stanley, F. and Basu, S.
1489 A comparative s Nyalkalkar, K. and Sinha, S. and Bailey, M. and Jahanian, F.
1490 An Empirical An Aman, H.
1491 Towards periodi Barbosa, R.R.R. and Sadre, R. and Pras, A.
1492 XML based openBenelbahri,
to M.A. and Bouhoula, A. and Trabelsi, Z.
1493 Combining wavelCallegari, C. and Giordano, S. and Pagano, M. and Pepe, T.
1494 Improving the PrMin Zhang and Baddoo, N. and Wernick, P. and Hall, T.
1495 Anomaly DetectiEunhye Kim and Kim, Sehun
1496 Research of NeurWei, Xianmin
1497 Bad smells - humMäntylä, M.V. and Vanhanen, J. and Lassenius, C.
1498 Workshop rescheRong Dong and Wei-ping He and Ya-jie Li and Wen-rui He
1499 JSNOSE: DetectiFard, Amin Milani and Mesbah, Ali
1500 Exploring the impYamashita, A. and Moonen, L.
1501 An affordable miMiller, D.D. and Lozier, D.W. and Haberle, R.M. and Galal, K. and Mitchel
1502 The #x2018;decep Counsell, S. and Hamza, H. and Hierons, R.M.
1503 Unified NegativeMeng Bai and Xiaoguang Zhao and Zeng-Guang Hou and Min Tan
1504 Comparing anoma Killourhy, K.S. and Maxion, R.A.
1505 The dynamic simJunyao Yang and Jie Liu
1506 A taxonomy and Mantyla,
a M. and Vanhanen, J. and Lassenius, C.
1507 Intelligent fuzz Man-chen Xiong and Ling-long Wang
1508 Selecting observWen-Chiao Lin and Garcia, H.E. and Tae-Sic Yoo
1509 An experiment onMäntylä, M.V.
1510 Identifying meth Oliveto, R. and Gethers, M. and Bavota, G. and Poshyvanyk, D. and De L
1511 Design and impleUda, S. and Ogashiwa, N. and Nagami, K. and Kondo, K. and Nakagawa,
1512 Anomaly Intrusi Zhengjie Li and Yongzhong Li and Lei Xu
1513 Situation views: Thronesbery, C. and Schreckenghost, D.
1514 Empirical softwaMäntylä, M.V.
1515 Preventing Sybil Fong, P.W.L.
1516 Design and opera Blantocas, Gene Q. and Ramos, H.J. and Wada, Motoi
1517 Smell-driven pe Chambers, Christopher and Scaffidi, Christopher
1518 An improved HidSultana, A. and Hamou-Lhadj, A. and Couture, M.
1519 Reducing SubjectBryton, S. and Brito e Abreu, F. and Monteiro, M.
1520 Experimental stuQing Shan and Wang Hua and Zhao Lumei and Tang Cunjiang and Yue Z
1521 Fault Diagnosis Shaohua Jiang and Weihua Gui and Chunhua Yang and Yongfang Xie
1523 Casting Details Chernov, N.M. and Medvedev, K.A.
1524 The ExperimentaQing Shan and Wang Hua and Tang Cunjiang and Li Hu and Shi Zhe and
1525 Method based onJiang Shaohua and Gui Weihua and Yang Chunhua and Tang Zhaohui a
1526 Permeability pre Chunhua Yang and Hongqiu Zhu and Weihua Gui
1527 Experimental InvYongqi Liu and Yanxia Wang and Haifeng Wang and Ping Li
1529 Product quality cWeihan Wan and Haizhou Wang and Li Yongjun and Baiwu Wan
1530 Research on therZhijie Yang and Daqiang Cang and Yu Li and Wenbo Guo and Linlin Zha
1531 Based on Fuzzy Wang Yuhua
1532 Connected VehiclYilu Zhang and Gantt, G.W. and Rychlinski, M.J. and Edwards, R.M. and C
1533 Detecting DominCheriyadat, A.M. and Radke, R.J.
1534 Adaptive framewor Juvonen, A. and Sipola, T.
1536 IDSV: Intrusion Tao Jun and Lin Hui and Liu Chunlin
1537 Online monitorinGang Xiao and Wen Zhang and Yong-Liang Zhang and Jiu-Jun Chen an
1538 Impact of metric Vasudeva Shrivastava, S. and Shrivastava, V.
1539 Vulnerability Dis Antunes, J. and Neves, N. and Correia, M. and Verissimo, P. and Neves,
1540 Endpoint predict Yuan Ping and Feng Lin and Mao Zhizhong
1541 A generic conce Brockmann, W. and Buschermöhle, A. and Hülsmann, J.
1542 Boosting MarkovZonghua Zhang and Naït-Abdesselam, F. and Pin-Han Ho
1543 Results From ApLo Presti, C. and Milbrath, B. and Tardiff, M. and Hartley-McBride, S.
1544 A Quadratic, Co Pozo, S. and Varela-Vaca, A.J. and Gasca, R.M.
1545 A method for HMM Panhong Wang and Liang Shi and Beizhan Wang and Yangbin Liu and
1546 Effective Detect Wei Yu and Xun Wang and Dong Xuan and Lee, D.
1547 Channel Occupan Kashibuchi, K. and Jamalipour, A. and Kato, N.
1549 A Practicable MeQianwei Zhou and Guanjun Tong and Baoqing Li and Xiaobing Yuan
1550 Evaluating an ouda Veiga Cabral, R. and Spinosa, E.J.
1551 Data clone detecHermans, F. and Sedee, B. and Pinzger, M. and van Deursen, A.
1552 The Fuzzy ContrWang Yuhua
1553 An investigation Martin, R.A.
1554 Recursive Sample Shimizu, S. and Sugisaki, K. and Ohmori, H.
1555 Self-AssessmentChan, T.C.-T. and Kwai-Sang Chin and Ping-Kit Lam
1556 A statistical app Moscalu, T. and Steel, A.M. and Brown, E. and Lim, Y.L.
1557 A study of host- Yasin, M.M. and Awan, A.A.
1558 Dynamic model se Maruyama, Y. and Yamanishi, K.
1559 Applied Research Ming Xue and Changjun Zhu
1560 A Novel Cross L Shrestha, R. and Kyong-Heon Han and Dong-You Choi and Seung-Jo H
1561 Stateless and guKe Liu and Abu-Ghazaleh, N.
1562 A Temperature SMong-Fong Horng and Chien-Chou Shih and Wen-Hsiung Hsieh and Li-C
1563 Bionic evolution Xuanwu Zhou
1564 Power quality soErmis, M. and Acik, A. and Gultekin, B. and Terciyanli, A. and Nalcaci, E
1565 Toward decentraPrieto, A.G. and Gillblad, D. and Steinert, R. and Miron, A.
1566 Multi-Level Intr Al-Nashif, Y. and Kumar, A.A. and Hariri, S. and Guangzhi Qu and Yi Luo
1567 Power quality soErmis, M. and Acik, A. and Gultekin, B. and Terciyanli, A. and Nalcaci, E
1568 End of life cont Ansems, A. and van Gijlswijk, R. and Huisman, J.
1569 Distributed auto Khorashadi, B. and Liu, F. and Ghosal, D. and Zhang, M. and Chuah, C
1570 Finding system-leDavies, M.D. and Limes, G.
1571 Real-Time Resolu Woojin Ahn and Doo Yong Lee
1572 Automated identiKhandoker, A.H. and Kimura, Y. and Palaniswami, M.
1573 Trend detection Yasar, M. and Ray, A.
1574 Distinguishing D Ke Li and Wanlei Zhou and Ping Li and Jing Hai and Jianwen Liu
1575 Real-time, embed Araiza, M.L. and Kent, R. and Espinosa, R.
1576 Long-term ECG tOefinger, M.B. and Krieger, M. and Mark, R.G.
1577 Artificial Immun Chang Chun-guang and Zhu Yun-long and Na Bao-gui and Hu Kun-yuan
1578 Object detection Atallah, L. and Changjing Shang and Bates, R.
1579 Preparation and Jiang, Yihang and Qin, Baoquan and Yi Chen and Wei Huang and Zhao,
1580 Power consumptio Sun Ying and Zhang Niaona and Lu Xiuhe and Yang Hongxia and Yue Z
1581 Energy Conservat Li Huibin and Wang Hua and Qing Shan and Hu Jianhang and Li Youling
1582 A new model base Li Wang and Dong-qing Wang and Ning Ding
1583 Research and imp Fang Yinglan and Han Bing and Li Ye-bai and Wang Tianhua
1584 Evaluation of th Lee Jincheng and Wang Fen and Xu Zhifen and Liu jie and Xu dandan a
1585 The research of Hai-tao Ma and Wen You and Tao Chen
1586 Based on BP netw Guicheng Wang and Xiangping Kong and Zhansheng Zhang and Wendan
1587 Modelling and opHenkel, S. and Kharitonov, Alexander and Sawodny, O.
1588 Improved In-Flig Jensen, F. and Nielsen, P.H. and Tauber, J. and Martin-Polegre, A.
1589 System level appDegerstrom, M.J. and Buhrow, B.R. and McCoy, B.O. and Zabinski, P.J. a
1590 Coordinating ConDuan Ping and Wu Min and Xu Chenhua
1591 Internal model coFeng Yu and Zhizhong Mao
1592 The operating coDe-Jiang Zhang and Zhang Guang-lai and Niao-Na Zhang
1594 Odor Recorder UNakamoto, T. and Nakama, T.
1595 The causes of diZhou, W. and Lv, J. H. and Zhao, Y.
1596 Perceived SynchrGhinea, G. and Ademoye, O.A.
1597 User Behavior AHan-Ching Wu and Huang, S.-H.S.
1598 An analysis of c Jinyan Sang
1600 Ontology Based Supnithi, T. and Paiboonrat, P. and Buranarach, M. and Kawtrakul, A. a
1602 Automatic Local Mohseni, H. and Kasaei, S.
1603 Is the need to f Counsell, S.
1604 Classifying smokCharumporn, B. and Omatu, S.
1605 Harmonic StatistOuyang Sen and Shi Xuntao
1607 Development of aOwen, C.M. and Patterson, John and Simpson, D.G.
1608 High resolution Yu, Jing and Miao, Peng and Li, Minheng and Yihong Qiu and Yisheng
1609 Classification of Gonçalves, A.R. and de Oliveira Camargo-Brunetto, M.A.
1610 Evaluation of shoPapadopouli, M. and Raftopoulos, E. and Shen, H.
1611 Pricing, competi Libin Yang and Wei Lou
1612 Network Analysi Xuezhong Zhou and Runsun Zhang and Yinghui Wang and Ping Li and B
1614 3-D without four Harris, M.
1615 Movie with ScenNakamoto, T. and Yoshikawa, K.
1618 An H infin; technChernodarov, A.V.
1621 Software based aGopalakrishnan, Abhilash and Biswal, Abhinna Chandra
1622 Electronic nose: Kodogiannis, V.S. and Chountas, P. and Pavlou, A. and Petrounias, I.
1624 Development andLiu, Yang and Yang, Jiajia and Yu, Yinghua and Inai, Yoshinobu and Wu,
1625 Demonstration ofNakamoto, T. and Kinoshita, M. and Murakami, K. and Yossiri, A.
1626 A Fuzzy Assessm Jing-Yuan Han and Shu-Shan Li and Hai-Ping Li and Yan-Li Lu
1627 The Analysis of Wei Li and Xiaodong Kou and Guohao Zhao and Yuanyuan Wang
1628 Behavior selectioKim, K.-J. and Sung-Bae Cho and Sang-Rok Oh
1629 The Effectivene Counsell, S. and Hierons, R.M. and Najjar, R. and Loizou, G. and Hassou
1632 Improving the cl Hong Chen and Goubran, R.A. and Mussivand, T.
1636 Beyond the refacMens, T. and Tourwe, T. and Munoz, F.
1637 Identify househoCharumporn, B. and Yoshioka, M. and Fujinaka, T. and Omatu, S.
1638 Using software mMeananeatra, P. and Rongviriyapanish, S. and Apiwattanapong, T.
1639 A Digital Olfac Hayes, D.J. and Wallace, D.B. and Taylor, D. and Antohe, B.V. and Achiri
1641 Smell Peak PredTudu, B. and Das, B. and Bhattacharyya, N. and Jana, A. and Ghosh, D
1642 The application Zhao Dean and Zhu Jianyun and Pan Tianhong and Zhang Xiaochao
1643 Lexicon Bad SmeAbebe, S.L. and Haiduc, S. and Tonella, P. and Marcus, A.
1647 Empirical ResearZhu Xiaoyang
1648 Molecular orbita Fujimoto, A. and Kanashima, T. and Okuyama, M.
1649 Humidity compens Nakamoto, T. and Ikeda, T. and Hirano, H. and Arimoto, T.
1650 Experimental stuXian-ping Luo and Hua Lai and Jian-chang Li and Qun Yan and Jun Li
1652 Trust, trait theo Poole, M.S. and Liqiong Deng and Brown, H.G. and Al Moorad and Fordu
1653 A Survey of VisioJihong Liu and Xiaoye Sun
1655 The Effect of L Abebe, S.L. and Haiduc, S. and Tonella, P. and Marcus, A.
1656 Bad Smells and Woei-Kae Chen and Jung-Chi Wang
1657 Empirical ResearZhipeng Zang and Lianshui Li and Xuefang Xie and Weijun Cui
1658 Evaluating the L Peters, R. and Zaidman, A.
1659 The Use of NeurHuiling Yuan and Tianrui Zhou and Jie Zhou
1660 To naively smell Kowadlo, G. and Russell, R. Andrew
1661 Smelling Screen:Matsukura, H. and Yoneda, T. and Ishida, H.
1662 Research on effeZhijie Yang and Daqiang Cang and Wenbo Guo and Yu Li and Linlin Zha
1663 Investigations o Samuelsson, C. and Lehner, T.
1664 K-means clusteriMajid, N.A.A. and Young, B.R. and Taylor, M.P. and Chen, J.J.J.
1665 Smelling heart f Voss, A. and Witt, K. and Fischer, C. and Reulecke, S. and Poitz, W. and
1666 The application Qingting Li and Linlin Lu and Xue Liu and Qingxi Tong
1667 Smelting processHongwei Zhang and Zhihuan Song
1669 Imperial smeltin Shaohua Jiang and Weihua Gui and Zhaohui Tang
1670 Exergy Analysis Jiang Aihua and Mei Chi and Shi Zhangming and Wang Hongcai and Yu
1671 Open loop respon Agalgaonkar, A.P. and Muttaqi, K.M. and Perera, S.
1672 Operational Pat Xiaobo Peng and Weihua Gui and Yonggang Li and Zhikun Hu and Ling
1673 Application of p Chen Qing and Wu Min and Tang Zhao-Hui and Gui Wei-hua and Hu Ya
1674 Analysis of non- Yufeng Lian and Wen You and Xuesheng Feng
1675 Reducing the cosTasic�, V. and Milivojevic�, D.R. and Pavlov, M. and Despotovic, V.
1676 Predictive mode Yang Hong-tao and Li Hui and Niao-Na Zhang
1677 Semantic smells Gauthier, F. and Merlo, E.
1678 Effect of Smell Yoto, A. and Nakamura, Y. and Yokogoshi, H. and Katsuno, T. and Mori
1679 Are all code smeOlbrich, S.M. and Cruzes, D.S. and Sjoberg, Dag I K
1680 Adaptive PCA bas Hu Zhikun and Chen Zhiwen and Gui Weihua and Jiang Bin
1681 Direct and Indir Herman, R. and Gaunt, C.T.
1682 The use of multi Siti, M. and Jordaan, J. and Jimoh, A.A. and Nicolae, D.V.
1683 Predictive mode Yang hong-tao and Li Hui and Li Xiu-lan and Zhu Ming-yi
1684 Can Lexicon BadAbebe, S.L. and Arnaoudova, V. and Tonella, P. and Antoniol, G. and G
1685 Smelting PotentiLi Youling and Li Huibin and Wang Hua and Qing Shan and Hu Jianhang
1686 Smelting High P Qing Shan and Wang Hua and Tang Cunjiang and Shi Zhe and Li Hu and
1687 A Process for th Jiang Jiachao and Zhao Youcai
1688 Response analysi Agalgaonkar, A.P. and Muttaqi, K.M. and Perera, S.
1689 Optimization of Zhang Yingwei and Fan Yunpeng and Du Wenyou
1691 Dynamical complSu, Min and Lin, Zhenshan
1692 Directional Apti Villarreal, B.L. and Gordillo, J.L.
1693 The inconsisten Bowes, David and Randall, David and Hall, Tracy
1694 What Do the Asse Aniche, M.F. and Oliva, G.A. and Gerosa, M.A.
1695 Control and applZhao-ming Lei and Zuo-Jun Liu and He-xu Sun and Hong-xun Liu
1696 Balance modeling Bo Zhang and Huai-wei Zhang and Jie Guo and Jia-jun Mao and Zeng-li
1697 Half a Century o Milivojevic, D.R. and Pavlov, M. and Despotovic, V. and Tasic, V.
1698 Fault detection Jiang, Shaohua and Wang, Xiaoli and Gui, Weihua
1699 Research on MeLu Shan and Fu-hua Huang
1700 The relationship Carr, A.S. and Smeltzer, L.R.
1701 Autonomous HotTews, A. and Pradalier, C. and Roberts, J.
1702 Static Var comp Fei-feng Ji and Khan, M.M. and Chen Chen
1703 Modeling the redu Yuan Li and Tong Zhu and Zhiyu Xin and Jinchang Li
1704 Autonomous HotRoberts,
M J. and Tews, A. and Pradalier, C. and Usher, K.
1705 Intelligent contr Guo Li and Guangming Zhang and Xiang Ling and Weihua Gui and Guiz
1706 Beneficiation of Galbraith, P. and Devereux, J.L.
1707 State Optimizati Chenhua Xu and Min Wu and She, Jinhua
1708 Dynamical #x000Escano, J.M. and Bordons, C. and Nuevo, A.
1709 A Neural NetworkWu Min and Xu Chenhua
1710 Parametric ARX dMa Silva, A.J. and da Fonseca Neto, J.V. and Nagem, N.F.
1711 Optimal operatioShihua Luo and Xihua Chen and Jiusun Zeng
1712 Hybrid predictiv Max, S. and Aldo, C.
1713 E HS aspects onLehner, T.
1714 Power-Electroni Korn, A. and Steimer, P.K. and Suh, Y. and Kolar, J.W.
1715 Pattern Identifi Nagem, N.F. and da Fonseca Neto, J.V. and Braga, C.A.
1716 PCA based pressEscano, J.M. and Dorado, F. and Bordons, C.
1717 Study on ImprovDeng Hai-bo and Kong Ling-qiang and Zhu Hai-ling and Wu Cheng-hui a
1718 Comparative studKe Xu and Junling Niu and Chunguang Li and Juntan Liu and Weigong
1719 Prediction modelPing Yuan and Zhi-zhong Mao and Fu-Li Wang
1720 An improved multFeng Lin and Mao Zhizhong and Yuan Ping and You Fuqiang
1721 Study on Lot-BasQiunan Meng and Qian Yin and Liu Xiaobing
1722 An operations rePayne, D.F. and Pretorius, J-H C. and Pretorius, P.D.
1723 Hybrid intellige Zhi-Wei Wu and Tian-You Chai and Jun Fu and Sun, J.
1724 Carbon content Meng Hui and Tang Yuguo and Chen Fangxiao
1725 Study on activityYa-jun Wang and Ji-xin Yang and Jun-li Shi
1726 Study of region Zhang Ya-ning and Ma Jun-hai
1727 Study on WuhanZhihong
i Li
1728 Application of Huixin Tian and Zhizhong Mao and Shu Wang and Kun Li
1729 Optimization of Balan, R. and Maties, V. and Stan, S.-D.
1730 Applications of Krueger, A.J. and Krotkov, N.A. and Kai Yang and Carn, S. and Vicente,
1731 Modeling and con Balan, R. and Maties, V. and Hancu, O. and Stan, S. and Ciprian, L.
1732 A Soft-Sensing Chunhua Yang and Hongqiu Zhu and Weihua Gui and Dinghua Zhang
1733 Spent Nuclear F Hyo-Jik Lee and Byung-Suk Park and Sung-Hyun Kim and Byung-Suk Pa
1735 An optimal powerChunhua Yang and Deconinck, G. and Weihua Gui and Yonggang Li
1736 The use of KohoVermasvuori, M. and Enden, P. and Haavisto, S. and Jamsa-Jounela, S.-
1737 Characteristics Xiuyan Zhou and Zhe Zhao and Zhang Juanxia and Xiangxin Xue
1738 Broadband fish i Rogers, E.O. and Fleischer, G.W. and Simpson, P.K. and Denny, G.F.
1739 Two year resultsScheideman-Miller, C. and Clark, P.G. and Smeltzer, S.S. and Carpenter
1740 Drivers and inhibGarza, F. and Dedehayir, O.
1741 The endpoint preZhang Niao-na and Zhang Guang-lai and Yang hong-tao
1742 Prediction modelChangjun Guan and Wen You and Xiaomei Lin
1743 An Optimization Chunsheng, Wang and Wu Min and Cao Weihua
1744 Thermodynamic Liu an Yun-fei and Peng Yan and Liu Hong-min and Ma Bo
1745 Analysis of Pow Zhen Wang and Ninghui Wang and Tie Li
1746 Monitoring of SoBoyanov, B.S. and Kehayov, Y.I. and Ivanov, K.I.
1747 A new type of t Chen Ge-hua
1748 Predictive contr Chunhua Chen and Bin Cui and Feng Yu and Jun Zhang
1749 Improving genetiYan Feng and Gui Weihua and Chen Yong and Xie Yongfang and Ren H
1750 Fault Diagnosis Pan Lian and Ning Ning and Chen Aiping and Tong Yaobin
1751 The multi-scale Zhang Niaona and Wang Zijian and Zhang Dejiang
1752 Measuring thicknSang-Woo Choi and Jung-Luel Yoo and Tae-Hwa Choi and Kwan-Tae K
1753 Study on adaptivHou Yunhai and Sun Shihua and Li Ershuai and Genping Liu
1754 Study on soft meNingning Wang and Qingrong Huang and Lihui Feng
1755 The end point fo Dongmei Wang and Wen You
1756 Integrating wir Ciccozzi, F. and Cicchetti, A. and Delsing, J. and Seceleanu, T. and Aker
1757 The forecasting Sun Ying and Yang Hongxia
1758 Integration of m Tasic, V. and Milivojevic, D.R. and Pavlov, M. and Despotovic, V. and Bro
1759 Latent space tra Deng, P.C. and Gui, W.H. and Xie, Y.F.
1760 The prediction o Hui Li and Ran Duan and Dejiang Zhang
1761 Identification De-An Zhao and Tian-Hong Pan and Jian-Yun Zhu and Qing Wang
1762 Could olfactory Washburn, D.A. and Jones, L.M.
1763 Size and FrequeCounsell, S. and Mendes, E.
1764 A Study on the MHuang Wei
1765 Research on theYongjun Peng and Zili Zou and Min Yang and Xi Guo and MaKun Guo
1766 Interruptions as Arroyo, E. and Selker, T. and Stouffs, A.
1767 Improvement of oYamanaka, T. and Yoshikawa, K. and Nakamoto, T.
1768 Health AssessmeYan-Wei Zhao and Xin-Feng Wei and Yun-Xiang Luo and Xiao-Fei Lu
1769 On cognitive mecWang, Yingxu
1770 Fundamental stud Yamanaka, T. and Matsumoto, R. and Nakamoto, T.
1771 Computer VisionXueheng Tao and Hongjie Li and Jinshi Lu and Xuejun Wang
1772 A Flexible FrameNodler, J. and Neukirchen, H. and Grabowski, J.
1773 Study of odor re Yamanaka, T. and Wyszynski, B. and Nakamoto, T.
1774 Application of r Ran Liu and Buchert, M. and Dittrich, S. and Manhart, A. and Merz, C. an
1775 Application of ar Zhang Shouming and Zhang Yunsheng
1776 Twenty years of Tasic, V. and Despotovic, V. and Brodic, D. and Pavlov, M. and Milivojevi
1777 Petri Net Modeli Li Yongyao and Wang Xiaoming
1779 Research on theBi Ke-xin and Liu Meng
1781 Discrimination a Witt, K. and Reulecke, S. and Voss, A.
1782 Modeling of SO2Chunhua Chen and Feng Yu and Bin Cui
1783 Recovery status Li, Q. H. and Meng, A. H. and Zhang, Y.G.
1785 Understanding an Laskaris, N.A. and Kosmiois, E.K. and Homma, R.
1787 Artificial Odor Kodogiannis, V.S. and Lygouras, J.N. and Tarczynski, A. and Chowdrey,
1788 Research on Ha Shu Cheng and Qing-Hua Bai
1789 An H infin;-tech Chernodarov, A.V. and Kovregin, V.N.
1790 Identification o Xihong Yang and Wancui Xie and Chaohua Zhang and Haiyan Wu and Si
1791 Reactive power aSharma, P. and Thukaram, D.
1792 Virtual Reality Kobayashi, S.
1795 A method of secuYiqun Huang and Zhengding Lu and Heping Hu
1796 Non-Destructive Jain, K.R. and Modi, C.K. and Patel, J.J.
1797 Non-destructive Jain, K.R. and Modi, C.K. and Pithadiya, K.J.
1799 Prospects of ele Hamid Khan, A. and Fayyaz Khan, M.
1800 Research on Int Gao Xian-zhong and He Ming-sheng
1801 Accuracy of DeteLili, N. A.
1802 Study on the DecDeng Qi and Wang Qi and Huang Qifei and Wang Qunhui and Yin Pingh
1804 Recognition of CBrudzewski, K. and Osowski, Stainslaw and Dwulit, A.
1805 Study of Retting Yan Xun
1806 Apparatus and me Hyacinthe, B.P.
1807 Smart clothes fo Axisa, F. and Dittmar, A. and Delhomme, G.
1808 Enzymatic browniWang Ya and Zhao Ping and Zhou Shangzhen and Li Jiayin and He Hain
1809 Sensing game plJonsson, F. and Verhagen, H.
1810 Clinical Effects Ko-Hsin Hu and Wen-Tyng Li
1812 Grazing BehavioAhmadi, A.
1813 Determination ofDutta, R. and Hines, E.L. and Gardner, J.W. and Kashwan, K. R. and Bh
1815 Structural and p Beznosov, P. A. and Kondratyuk, A. A. and Romanov, B. P.
1816 The certainty of Laplante, P.A.
1817 Improvement of Nakamoto, T. and Nihei, Y.
1818 Proposal for th Ota, S. and Ito, S. and Mitsukura, Y. and Fukumi, M.
1819 The Influence of Zhang Beike and Li Ruizhen and Liao Yang
1820 Control study baHuang, Yue-Qin and Chen, Xian-Zhong and Wang, Tian and Huang, Liu
1821 Method for prediHe Jian-cheng and Pu Bin-hong and Ding Hong-juan and Wang Hui
1822 Selection Metho Nakamoto, T. and Murakami, K.
1824 Study on SupportHuaping Gong and Sufen Yan
1825 The endpoint forYangxiao Hong and Xu Jing and Yanghong Tao
1826 A Method for OnHaas, T. and Lammers, P.S. and Diekmann, B. and Horner, G. and Boeke
1827 Research on theJianglong, Liu and Xiangbin, Wu
1828 Odor ApproximatNakamoto, T. and Ohno, M. and Nihei, Y.
1829 Study on the No Wenwu, Shao and Xingdu, Li and Wenwu, Shao and Xiumei, Lin
1830 Prioritizing Sof Guimaraes, Everton. and Garcia, Alessandro and Figueiredo, Eduardo a
1831 A MultidimensionTsantalis, Nikolaos and Guana, Victor and Stroulia, Eleni and Hindle, Ab
1832 Using UnconventMonares, Alvaro and Ochoa, Sergio F. and Pino, Jos{\'e} A. and Ruiz-L
1833 Exploring the Im Yamashita, Aiko and Moonen, Leon
1834 The Use of DevelOuni, Ali and Kessentini, Marouane and Sahraoui, Houari and Hamdi,
1835 Analyzing the ChRomano, Daniele
1836 Hunting for SmelHauptmann, Benedikt and Junker, Maximilian and Eder, Sebastian and H
1837 An Exploratory SSantos, Jos{\'e} A. M. and de Mendon\c{c}a, Manoel G. and Silva, Carlos
1838 Exploring Multip Ramic-Brkic, Belma and Chalmers, Alan and Sadzak, Aida and Debattista,
1839 Detecting MissinMonperrus, Martin and Mezini, Mira
1840 Semantic SmellsGauthier, Fran\c{c}ois and Merlo, Ettore
1841 Investigating th Fontana, F.A. and Ferme, V. and Marino, A. and Walter, B. and Martenka
1843 Research of Int Fangfang Yuan and Lidong Zhai and Yanan Cao and Li Guo
1848 Based on the useLiu Hong
1849 Practical methodXuan Mo and Monga, V. and Bala, R. and Rodrguez-Serrano, J.A. and Zh
1850 Anomaly DetectiDoelitzscher, F. and Knahl, M. and Reich, C. and Clarke, N.
1851 Constant false a AlShaalan, R. and AsSadhan, B. and Al-Muhtadi, J. and Bin-Abbas, H. an
1852 Anomaly detectioRejas, J.G. and Bonatti, J. and Burillo, F. and Martinez, R.
1853 Intrusion detect Darwish, S.M. and Guirguis, S.K. and Ghozlan, M.M.
1857 Applying Data MiCoppolino, L. and D'Antonio, S. and Garofalo, A. and Romano, L.
1858 Impact-Induced Garrett, H.B. and Close, S.
1867 A wireless netwoScarpato, G. and Caputo, T. and Caputo, A. and De Cesare, W. and Espo
1869 Rootkit detectio Xiongwei Xie and Weichao Wang
1872 Experimental stuXiao-Fei Liu and Xian-Song Guo and Lei Sun and Tie Gao
1873 A review of exis Tanuja, S. and Shailesh, K.R. and Kini, S.G. and Kurian, C.P.
1876 Forensic study oMorillo, R. and Lai, J. and Meshkat, L.
1877 Anomaly detectioKarapistoli, Eirini and Economides, Anastasios A.
1878 The algorithm of Ming Gu
1880 Parametric and nJansson, D. and Medvedev, A.
1884 Landslide detectDabbiru, L. and Aanstoos, J.V. and Hasan, K. and Younan, N.H. and Wei
1889 Capturing ConneSalah, H. and Strufe, T.
1891 Confidence-AwarEsgin, E. and Karagoz, P.
1893 The Mean-VarianPugliese, M. and Santucci, F.
1896 Shipboard IPS t Islam, M. and Hinton, W. and McClelland, M. and Logan, K.
1899 Synthesis of De Pavon, R. and Carpenter, B.
1905 Case study in imStewart, D. and Jenkins, R. and Dolezilek, D.
1907 A Geographical Cintra Cugler, D. and Bauzer Medeiros, C. and Shekhar, S. and Toledo, L
1914 A novel multi-r Qian Zheng and Chao Chen and Zhinan Li and Anpeng Huang and Bingli
1916 An Anomaly Intr Quan Qian and Jianyu Li and Jing Cai and Rui Zhang and Mingjun Xin
1918 An Anomaly AnalXiangzeng Kong and Yaxin Bi and Glass, D.H.
1919 A framework of cJothilakshmi, K. and Usha, G. and Bose, S.
1921 How Good Are Co Yamashita, A.
1922 Code Smell DeteFontana, F.A. and Zanoni, M. and Marino, A. and Mantyla, M.V.
1925 Oxygen EnrichedYu Hongxia and Sun Pengfei
1926 WakeScope: RunKwanghwan Kim and Hojung Cha
1927 Are Domain-Speci Leite Silva, A. and Garcia, A. and Reioli, E.J. and Pereira de Lucena, C.J
1928 On Anomalous Ho Weiren Yu and Aggarwal, C.C. and Shuai Ma and Haixun Wang
1930 An intelligent i Senthilnayaki, B. and Venkatalakshmi, K. and Kannan, A.
1931 Review on differ Singh, S. and Talwar, R.
1933 Graceful labelin Mithun, P. and Raajan, N.R.
1934 Identify Online Ji Li and Yueliang Xiao
1935 Olfaction recognSaha, A. and Konar, A. and Rakshit, P. and Ralescu, A.L. and Nagar, A.
1940 Frequency controHao Jiang and Jin Lin and Yong-hua Song and Xiao-min Li and Jian-xun
1941 Do developers c Yamashita, A. and Moonen, L.
1944 Exploratory expeMingshan Hou and Shiqi Li and Hongbo Dong and Chao Liu
1945 Identification, Stolee, K.T. and Elbaum, S.
1949 Olfactory MeasurFukasawa, A. and Suzuki, R. and Okada, K.-I.
1950 Design on the R Jiao Shuqing
1952 The Central Det Xiao Li and Poor, H.V. and Scaglione, A.
1953 Evaluation and CGiray, S.M. and Polat, A.G.
1955 End-point deviceCupek, R. and Folkert, K. and Huczala, L. and Zonenberg, D. and Tomczy
1956 Ellipsoids clust Ma Shuhua and Wang Jinkuan and Liu Zhigang
1957 Probabilistic neuAndrew, A.M. and Kamarudin, K. and Mamduh, S.M. and Shakaff, A.Y.M.
1958 Analytics-Based Kelkar, A. and Naiknaware, U. and Sukhlecha, S. and Sanadhya, A. and
1960 Interactive Tabu Fukumoto, M. and Inoue, M. and Kawai, K. and Imai, J.-I.
1961 On Netflix cata Bellante, W. and Vilardi, R. and Rossi, D.
1962 The Power Consu Yuan Zhugang and Chen Pu and Wang Xiaohong
1964 Reality and perc Taqvi, Z.
1966 Detecting bad smPalomba, F. and Bavota, G. and Di Penta, M. and Oliveto, R. and De Luc
1970 A comparative s Ayoub, M.W. and Robinson, F.V.P.
1972 Parallel ComputaQing Wu and Yang Dai and Jun Chen and Zhuo Chen
1975 Fault-Prone ModKasai, N. and Morisaki, S. and Matsumoto, K.
1979 Analysis of the Ma Lin-Dong and Qin Rui and Li Er-Chao and Li Zhan-Ming
1980 Endpoint carbonLi Jianwen and Liang Chengzhuang
1982 Parameters adjuLi Jianwen and Ma Boyuan
1983 Development of pRendroyoko, I. and Rusli, M.
1984 Non-destructive Goswami, P.R. and Jain, K.R.
1985 Helping end userChambers, C.
1987 Study on the rel Xiaolin Zhu and Huang Dong
1990 Wireless and porAleixandre, M. and Montero, E. and Santos, J.P. and Sayago, I. and Horri
1991 Feature of nozzleHae-yong Yun and Ho-chan Kim
1994 The assement ofNamdari, R.a and Raz, S.a and Najafian, M.a and Shirazi, F.Z.b
1995 Model-based desi Savard, J.a and Bao, L.a and Bois, G.a and Boland, J.-F.b
1996 Fear learning enKass, M.D. and Rosenthal, M.C. and Pottackal, J. and McGann, J.P.
1997 The effects of Wang, X.a and Han, A.a and Wen, C.a and Chen, M.a and Chen, X.a a
1999 COCHISE projectRybarczyk, Y.a b and Vernay, D.b and Rybarczyk, P.b and Lebret, M.
2000 Investigating th Fontana, F.A.a and Ferme, V.a and Marino, A.a and Walter, B.b and M
2003 Identification, i Stolee, K.T.a and Elbaum, S.b
2004 How good are cod Yamashita, A.
2006 Glass and wine: Venturi, F. and Zinnai, A. and Fantoni, G. and Gabelloni, D. and Razional
2009 On the relations De Santis, F.a b and Kasper, M.c d and Mangard, S.b and Sigl, G.a an
2010 Experiences fromNuutinen, P.a and Kaipia, T.a and Peltoniemi, P.a and Lana, A.a and
2012 Influence of eth Dias, D. and Guarda, A. and Wiethan, B.A. and Claussen, L.E. and Bohr
2013 Influence of dif Åžener, H.a and Yildirim, H.K.b
2014 The effects of m Okanović, D.G.a and Džinić, N.R.b and Karović, D.R.c and Tasić
2015 Sensory responsHussin, S.S. and Sudirman, R.
2016 Cleanliness is neTobia, K. and Chapman, G. and Stich, S.
2017 Wireless and porAleixandre, M.a and Montero, E.a and Santos, J.P.a and Sayago, I.a an
2020 Electronic nose Xu, J.a b and Miao, F.c and Zhao, F.b and Cao, Y.b and Yu, H.c and
2021 Analysis proximaGranados, C. and Guzmán, L.E. and Acevedo, D.
2022 Using unconventMonares, A.a and Ochoa, S.F.a and Pino, J.A.a and Ruiz-Lopez, T.b
2023 High-affinity ol Hussain, A.a c and Saraiva, L.R.a d and Ferrero, D.M.b and Ahuja, G.
2024 Development andLiu, Y. and Yang, J. and Yu, Y. and Inai, Y. and Wu, J.
2025 Differential exp Leal, W.S. and Choo, Y.-M. and Xu, P. and Da Silva, C.S.B. and Ueira-Vie
2026 Pheromone discrDamberger, F.F.a and Michel, E.a and Ishida, Y.b d and Leal, W.S.b
2039 Odour receptors Kain, P.a and Boyle, S.M.b and Tharadra, S.K.a and Guda, T.a and Pha
2042 2,4,6-TrichloroanTakeuchi, H.a b and Kato, H.c and Kurahashi, T.a b
2067 Transformation oLi, H.a b and Li, Y.a b and Lei, Z.a b and Wang, K.a and Guo, A.a c
2069 Olfactory searchMasson, J.-B.a b
2091 Gold nanoparticlCompagnone, D.a and Fusella, G.C.a and Del Carlo, M.a and Pittia, P.a
2095 Smelling screen:Matsukura, H.a b and Yoneda, T.a and Ishida, H.a
2108 Analysis of natu Swarup, S.a b d and Huang, W.a b and Mackay, T.F.C.a b and Anholt
2110 On developmentDas,o S. and Punekar, H.
2111 JSNOSE: DetectiFard, A.M. and Mesbah, A.
2112 An experimental Woon, K.S.a and Wan, S.b and Tnay, G.L.a
2113 Olfactory effect Feit, T. and Leopold-Wildburger, U.
2114 A novel nano-capNishiura, H.a and Sugimoto, K.a and Akiyama, K.b and Musashi, M.b
2116 Silva,
Are domain-specific A.L. andstrategies
detection Garcia, A.
forand Reioli,
code E.J. and
anomalies De Lucena,
reusable? C.J.P. multi-project study [Reuso d
An industry
2118 Panappticon: EvZhang, L.a and Bild, D.R.b and Dick, R.P.b and Morley Mao, Z.b and D
2119 Probabilistic neuAndrew, A.M.a and Kamarudin, K.a and Mamduh, S.M.a and Shakaff, A.
2121 Exploring multiplRamic-Brkic, B.a and Chalmers, A.b and Sadzak, A.c and Debattista, K.
2123 Genetic algorithmLapczynska-Kordon, B.a and Fraczek, J.a and Slipek, Z.a and Ivanowa,
2126 Energy-aware anWei Wang and Huiran Wang and Beizhan Wang and Yaping Wang and J
2127 Reconstruction sHong-Sen Yan and Jian-Liang Lin
2128 Empirical analysiChin-Feng Fan and Swu Yih and Wan-Hui Tseng and Wei-Chih Chen
2129 Formal workflow Sherry X. Sun and J. Leon Zhao
2130 \{GPR\} evaluat Lei Xiang and Hui-lin Zhou and Zhen Shu and Si-hao Tan and Guo-qing
2131 An anomaly-based S. Chiappetta and C. Mazzariello and R. Presta and S.P. Romano
2132 DDS: A deadlockYang Wang and Paul Lu
2133 Factors affectingS. Collins and G. Matthews and J. Thomas and G. Hermon
2134 Entropy and FlowRafael Zempoaltecatl-Piedras and Pablo Velarde-Alvarado and Deni To
atic Review
MELLS

Abstract
Build process is crucial in software development. However, the analysis support for build code i
In this paper, we focus on breathe and propose interactive system Back to the mouth. There areman
Tests are central artifacts of software systems and play a crucial role for software quality. Insy
This paper describes exploratory studies of interruption modalities and disruptiveness.Fiveinterru
In dynamic Web applications, there often exists a type of code smells, called embedded codesmel
Code smells refer to commonly occurring patterns in source code that indicate poor programmingpra
An increasing number of people rely on secure websites to carry out their daily business. Asurvey
There is growing empirical evidence that some (patterns of) code smells seem to be, eitherdelibera
This work explores the properties of different output modalities as notification mechanisms inthe c
Code smells are design flaws in object-oriented designs that may lead to maintainability issuesin
Context: The concept of code smells is widespread in Software Engineering. However, in spite ofth
One of the most important decisions researchers face when analyzing the evolution of softwaresy
Code smells reflect code decay and, as such, developers should seek to eradicate such smellsthrough
One of the widely used techniques for evolving software systems is refactoring, a maintenanceacti
Good indoor air quality is a vital part of human health. Poor indoor air quality can contributeto
We present a study into the use of smell for searching digi-tal photo collections. Many peoplenow
Olfaction, or smell, is one of the last challenges which multimedia applications have to conquer.As
Smell simulation technology allows humans to use their sense of smell to enhance or acceleratethei
In 1999 Fowler et al. identified 22 Bad Smells in code to direct the effective refactoring. Theseare
We propose an umbrella-like device called Funbrella that entertains people with many types ofra
Unanticipated changes to complex software systems can introduce anomalies such as duplicatedcod
The Object Constraint Language (OCL) is a OMG standard that plays an important role in theelabor
Designers have accumulated much knowledge referring to OO systems design and construction, butth
Code smells are characteristics of software that indicate that code may have a design problem.Cod
This paper presents experimentally based rules and methods for the creation of harmonic colorsets
Context: Many metrics are used in software engineering research as surrogates for maintainabilit
Identifying refactoring opportunities in software systems is an important activity in today'sagil
This paper describes inAir, a tool for sharing measurements and visualizations of indoor airquali
Antipatterns and code smells have been widely proved to affect the change-proneness of softwarec
Although code clone (i.e. a code fragment that has similar or identical fragments) is regarded as
Having dinner together is undoubtedly a kind of pleasurable experience, which involves variouschan
Mashups are becoming increasingly popular as end users are able to easily access, manipulate,
The last twenty years have seen enormous leaps forward in computers' abilities to generate sounda
This extended poster abstract presents a software visualization tool (CodeVizard) that helpsrese
Peer-to-peer (P2P) streaming applications have led to the disharmony among the involved parties:
Our aim is to gain a better understanding of the relationship between bad smells and designprincip
4D is a kind of marketing term, 4D film is a system that is added to various special effects like
Preserving the integrity of software systems is essential in ensuring future product success.Com
Code smells are indicators of issues with source code quality that may hinder evolution. Whilepr
In this article we will discuss players' experience of computer games in terms of sight, sound
Successful software products evolve continuously to meet the changing stakeholder requirements.Fo
Users are confronted with an overwhelming amount of web pages when they look for information onth
Refactoring tends to avoid the early deviation of a program from its intended architecturedesign. H
ealism in real-time has long been a "holy grail" of the computer graphics community. Whilereal-tim
Although aspect-oriented programming (AOP) aims to improve software maintainability, developersc
As software systems are maintained, their architecture modularity often degrades througharchitec
A well-known bad code smell in refactoring and software maintenance is duplicated code, or codecl
A software system's structure degrades over time, a phenomenon that is known as software decay or
Welcome to Netgames 2006". . . it is the speed of electric involvement that creates the integral
Software systems need to change over time to cope with new requirements, and due to designdecisi
Refactoring, as a software engineering discipline has emerged over recent years to become animpo
Complex refactoring processes, such as applying big refactorings or removing design smells arediff
In this paper, we present ongoing research concerning the interaction between users andautonomo
Spreadsheets are often used in business, for simple tasks, as well as for mission critical taskss
Refactoring is a well-known technique that preserves software behaviors and improves its badstruc
The interplay of multiple objects in object-oriented programming often follows specificprotocols,
Access control models implement mechanisms to restrict access to sensitive data from unprivilegedu
We propose a novel approach to identify Move Method refactoring opportunities and remove theFeat
Code clone is a well-known code smell that needs to be detected and managed during the softwared
When using object-oriented frameworks it is easy to overlook certain important method calls thatare
Technical debt is a metaphor describing situations where developers accept sacrifices in onedime
In this research, we aim to realize a gustatory display that enhances our experience of enjoyingfo
AbstractContext Code smells are manifestations of design flaws that can degrade code maintainabi
AbstractContext Code smells are indicators of poor coding and design choices that can cause prob
Criteria for software quality measurement depend on the application area. In large software syste
Bad smells are used as a means to identify problematic classes in object-oriented systems for refac
A bad-smell sensing network using gas detector tubes and mobile phones having digital cameras i
Mammalian olfactory system is the archetype of smell sensor devices. Its complexity resides both in
All plants have a sense of smell. It allows them to communicate, and studies show that they ripen i
Sensing smell is a highly complex biological process, and characterizing and mimicking the interaction between the olfactory r
We describe a rapid and low-cost system for monitoring bad smells in the living environment. Thi
Abstract In a bulk chemical plant producing resins, a flashback from an incinerator through the
AbstractPurpose The success of health information technology implementations is often tied to the
In software development, especially component-based software development, dependency locality sta
Abstract The object-oriented approach has been the most popular software design methodology for t
Abstract Pixel-value-differencing (PVD) is a well-known technique for content adaptive steganogra
Context Security vulnerabilities discovered later in the development cycle are more expensive to fi
Abstract The seven-story \{RC\} building hosting a University dorm and named “Casa dello Studen
This paper presents a novel virtual maintenance application for maintenance safety evaluation (MS
Three-party password-based authenticated key exchange (3PAKE) protocols allow two users (clients
This research identifies and tests key factors that can be associated with time to recall a product.
To improve the original design flaws of overturning assembly of glass stacking machine taken as a
Abstract In this paper, a novel binary fruit fly optimization algorithm (bFOA) is proposed to sol
When newly designed refrigerator parts failed due to repetitive loads under consumer usage condit
Many public facility layouts have been developed with little consideration of the visually impaired, producing difficult and unple
Abstract In this study, an electrical fire simulator was fabricated and connected to a test platfo
Objectives This study aims to explore the issues and challenges involved in designing and organiz
Process modeling languages such as EPCs, BPMN, flow charts, \{UML\} activity diagrams, Petri nets
Direct Anonymous Attestation (DAA) is a cryptographic scheme that enables remote authentication
Disharmony in China primarily reflected in the income, education, employment. The research object
In addition to moderate wind and normal traffic scenarios, it is known that some extreme events m
The common proprioceptive sense consist sight, sound, touch, taste and smell. This aim of paper
As part of an ongoing Combined Cycle Power Generation research program at Dalhousie University in
Objectives To assess the usability of an emerging \{POE\} system, OM/Lab, for the computer-support
A new method, microwave pyrolysis, has been investigated to dispose the paper mill sludge. Microwave pyrolysis is a new fas
Context Automated static analysis (ASA) identifies potential source code anomalies early in the so
Abstract Used engine oils (UEOs) are among the toxic wastes that affect marine and human lives. A
Metadata-based frameworks enable behavior adaptation through the configuration of custom metadata
This paper presents design of plasma ozonizer using high voltage high frequency in micro-conver
Pheromones are found throughout the living world and are a primal form of communication. These c
We present a black-box attack against an already deployed \{CAPTCHA\} that aims to protect a f
The feeling of presence has been shown to be an important concept in several clinical applications
Various species of cyanobacteria may produce cyanotoxins, bad smell and taste and cause a deteri
The paper presents the application of differential electronic nose and support vector machine for
It has been advocated that Aspect-Oriented Programming (AOP) is an effective technique to improve
Most herbs have their own characteristic smell due to the presence of volatile compounds. Tradit
The paper reports an improved method for electronic nose that combines two identical or very simi
We present a novel, smart sensing system developed for the flavour analysis of liquids. The syste
One of the most complicated components of electronic olfaction process is odour handling and deli
The Victorian Space Science Education Centre (VSSEC) scenario-based programs, including the Miss
When mice are used as experimental subjects in the detection of wound infection based on electron
Context Inheritance is the cornerstone of object-oriented development, supporting conceptual mo
Zinc phosphide is a highly effective rodenticide used widely to protect grain in stores and dome
During black tea manufacturing, tealeaves pass through the fermentation process, when the grassy s
Exception handling design can improve robustness, which is an important quality attribute of soft
The wastewater stream produced during tomato manufacturing is characterized by a dark color and b
Despite high significance of the sense of smell, the technique of recording and reproducing the ol
An uncomfortable smell was reported by employees of an \{IT\} office (information technological o
Fermentation is an extremely crucial process in black tea manufacturing and is primarily responsib
The focus of this study is to find the appropriateness of the Levenberg–Marquardt (LM) neural ne
A statistical analysis of data on recognition of fire cues during sleep was carried out to determin
You are walking along a busy traffic-filled street and the cars are passing by as they always have
A portable gas analyzing system has been developed using conducting polymer (polypyrrole) sensor
Context: Code smells are indicators of poor coding and design choices that can cause problems dur
In recent times, environmental production methods and organic products are increasingly sought a
The introduction of blue light curing to dyeing and finishing will be save energy and reduce emi
This paper discusses the use of freelance marketplaces to conduct a survey amongst professional
With the development of technology, the computer technology has been used into more and more are
Odor approximation is a technique of creating a scent similar to a target scent by blending mult
The researchers have developed a system of value innovation modelling founded on the applicatio
There are a number of limitations to existing usability testing methods, including surveys, interv
Interfaces are recognized as an important mechanism to define contracts governing interactions be
In this paper, we introduce a new Denial-of-Service attack against Tor Onion Routers and we study
Context Code smells are manifestations of design flaws that can degrade code maintainability. So
The selection of optimum aroma among vanilla, strawberry and cacao for prebiotic pudding was aimed
The words Code smells mean certain code lines which makes problems in source code. It also mean
This study has been carried out in order to evaluate the job efficiency among the graduates of Is
In this study, fresh garlic was fermented into black garlic in high temperature and high humidity
Designing automated tests is a challenging task. One important concern is how to design test fixtur
The redistribution of class responsibilities is a common reengineering practice in object-oriente
Electronic nose (e-nose) is a device that plays an important role for odor assessment due to its l
Pixel-value-differencing (PVD) is a well-known technique for content adaptive steganography. By t
To understand the brain mechanisms of olfaction we must understand the rules that govern the link
Summary: This study was aimed to analyse the impact of the debittering process (DP) in the overal
Two of the meanings of the word "cultivation" that are rather unrelated show a strong dependency,
The aim of the present study was to evaluate the sensory assessments of identical cosmetic formula
In this paper, an immersive virtual roller coaster is introduced. A three Degree-Of-Freedom (3DOF
With trends in mixed-signal systems-on-chip indicating increasingly extreme scaling of device dim
Context: Code smells are assumed to indicate bad design that leads to less maintainable code. How
Behavioural responses to temperature are critical for survival, and animals from insects to human
The main goal of this study was to use cornstarch in the production of environmentally sound adh
In this paper, a novel binary fruit fly optimization algorithm (bFOA) is proposed to solve the mu
The aim of the study was to evaluate volatile compounds as marker compounds for the edible oil det
Rural China has a large number of biomass wastes, but the utilization efficiency of agricultural
The traditional production of shea butter requires a heat treatment of the nuts. This study compar
Fred Brooks in his book "The Mythical Man Month" describes how the inherent properties of software
In this paper, an olfaction aid system is proposed, which allows a human worker to have an enhance
Recently, various types of olfactory displays have been developed based on several techniques to
We live in an experience economy. The more saturated the global market becomes with products offe
Duplicated or similar source code, also known as code clones, are possible malicious 'code smells
Context: Security vulnerabilities discovered later in the development cycle are more expensive to f
Cloned code, also known as duplicated code, is among the bad "code smells". Procedure extractio
The viable probiotic count is the key factor to functionality of fermented milk. It is very impor
Three-party password-based authenticated key exchange (3PAKE) protocols allow two users (clients
Glutamatergic neurons are abundant in the Drosophila central nervous system, but their physiologic
The secondary alcohol 3-methyl-1-butanol (3MB, isoamyl alcohol) is used, for example, as a solvent
Connected health care has several applications including telecare medicine information system, pe
The functionality of next-generation U.S. Army platforms, such as the small unmanned ground vehicl
Esters and higher alcohols produced by yeast during the fermentation of wort have the greatest im
High pressure processing is an alternative technique for thermal treatment of foods for sterilizati
Context: The concept of code smells is widespread in Software Engineering. However, in spite of th
Context: The technical debt (TD) concept describes a tradeoff between short-term and long-term goa
Unit tests and production code are intrinsically connected. A class that is easy to test usually p
The human skin is weak-acidic in a healthy condition, so that it is important keeping a slightly
The objective of the research study was to determine the effect of dry matter concentration degree
The autism spectrum (AS) is characterized by enhanced perception in vision and audition, described
Used engine oils (UEOs) are among the toxic wastes that affect marine and human lives. A compreh
Metadata-based frameworks enable behavior adaptation through the configuration of custom metadata
Many species are critically dependent on olfaction for survival. In the main olfactory system of m
The olfaction sense in animals has been exploited on some applications like chemicals detection an
Animals across various phyla exhibit odor-evoked innate attraction behavior that is developmenta
In order to make the flue-cured tobacco represent better aroma quality, an electronic nose with
Some software packages offer the user soft advice: recommendations that are intended to help the u
We propose a new olfactory display system that can generate an odor distribution on a two-dimensio
The fermentative ability of five autochthonous Saccharomyces cerevisiae strains (XG1, XG2, XG3,
Using the acidic components of Medicine-food Schisandra researched a new bean curd coagulant. Th
In order to explore the application of multi-sensor fusion technology in nondestructive testing o
Chronic drug administration induces neuroplastic changes within brain circuits regulating cognitiv
For different reasons, the amount of food loss for developing and developed countries is approxima
The reconstruction of mechanisms behind odour-tracking behaviours of animals is expected to enabl
This study presents a compact intervention, search and rescue equipment designed and developed t
Grooming, a common behavior in animals, serves the important function of removing foreign mate
By mimicking biological olfaction, biosensors have been used for the detection of important liga
When using object-oriented frameworks it is easy to overlook certain important method calls that ar
The disharmony of government investment projects was introduced, which essence is in longterm st
In Drosophila, most individual olfactory receptor neurons (ORNs) project bilaterally to both sides
Various species of cyanobacteria may produce cyanotoxins, bad smell and taste and cause a deteri
A study on smell sensing and classification has been developed for a long time by many ways. M
The US Air Force Test Pilot School is overhauling its curriculum, cramming new essentials into i
The objective of this study is to treat leather with silver nanoparticles so as to develop antibac
Taste, one of the major senses in humans, is the ability to detect the flavor of substances such as
It can be said that the Sewage Line Repair Business being actively executed for recent several ye
Comment statements are useful to enhance the readability and/or understandability of software m
Olfactory abilities show a high degree of inter-individual variability and this could be partly rela
Many mammals use scent marking for sexual and competitive advertisement, but little is known abo
The human larynx is a versatile organ. Main functions are phonation, protection and regulation of
Circadian clocks provide a temporal structure to processes fromgene expression to behavior in org
Diverse sensory organs, including mammalian taste buds and insect chemosensory sensilla, show a m
Having dinner together is undoubtedly a kind of pleasurable experience, which involves various cha
Unit testing represents a key activity in software development and maintenance. Test suites with h
Code smells are manifestations of design flaws that can degrade code maintainability. As such, t
The number of end-users who write spreadsheet programs is at least an order of magnitude larger
Code smells are structural characteristics of software that may indicate a code or design problem
Detecting bad smells in program design and implementation is a challenging task. Manual detectio
Spreadsheets are used extensively in business processes around the world and just like software,
In software development, early identification of fault-prone classes can save a considerable amount
A major concern of designers of consumer products is how their products will be perceived in the
As the ARMY prepares to deploy modern tactical networks in theater [1], there is an increasing ne
This paper is for the study of feature analysis of the correlation of brain waves between channels
Manufacturing is a major driving force and an important pillar for national economic development.I
In 2005 an explosion rocked the BP Texas City refinery, killing 15 people and injuring 180. The com
Although PRA had its roots in Statistical Decision Theory (1), it was first applied in its initial
The architect of a lunar habitat is challenged to create surroundings that enhance not only the ph
The study presented in this article aims to measure the impact of sensory, cognitive and affective m
The purpose of the present study was to chart the perceived indoor air quality (IAQ) in Finnish re
The purpose of this study was to document colour and texture associations to odours using a variet
Food has always been interwoven with the human life, biologically and emotionally. Recently, ther
Crayfish are known to generate water jets by waving their special appendages with a fan-like shap
Electronic nose (e-nose) is a machine olfaction system that has shown significant possibilities as
Olfactory perception is a complex phenomenon associated with other processes such as cognition and
Solar power plant investors expect photovoltaic (PV) modules to safely and efficiently produce elec
Plastic packaging is an indispensable element in the packaging industry. The identification of pla
For 10,000a €‰years pigs and humans have shared a close and complex relationship. From dome
Testing the GUI (Graphical User Interface) of a software application is typically accomplished by
Photocatalysis is a rapidly developing field in environmental engineering. Photocatalyst is acti
Pervasive computing systems are heterogenous and complex as they usually involve human activitie
A mass fatality incident occurs when a disaster causes many deaths and the affected country does
Models and modelling are effective approaches to describe events or activities of systems or envir
This paper describes the effect on eye catching by digital signage that releases smell from screen
Olfactory impairment is a characteristic of early stage of Parkinson's disease (PD). Over 95% of PD
Context: Many metrics are used in software engineering research as surrogates for maintainabilit
Successful software products evolve continuously to meet the changing stakeholder requirements. F
In dynamic Web applications, there often exists a type of code smells, called embedded code smel
Refactoring is a well-known technique that preserves software behaviors and improves its bad stru
In this paper, the authors present Adimen-SUMO, an operational ontology to be used by first-order
Peer-to-peer (P2P) streaming applications have led to the disharmony among the involved parties:
This study proposed a new defect-detection approach using a declarative meta-programming techniq
Several studies have demonstrated reliable cross-modal associations between odours and various vi
In this work, a gas chamber which is of a bionic functionality was designed based on the special
The experiment studied the effectness of different methods of initiating the MBBR, including ino
Since antiquity, humans have used body fluids like saliva, urine and sweat for the diagnosis of d
This paper studies several types and arrangements of perceptron modules to discriminate and quant
Many parasitic nematodes actively seek out hosts in which to complete their lifecycles. Olfaction
Sex pheromone communication, acting as a prezygotic barrier to mating, is believed to have contr
Animals approach stimuli that predict a pleasant outcome. After the paired presentation of an odo
Autosomal recessive distal renal tubular acidosis (dRTA) is a severe disorder of acid-base homeo
Software architecture degradation is a longstanding problem in software engineering. Previous studi
Complex refactoring processes, such as applying big refactorings or removing design smells are diff
Although code clone (i.e. a code fragment that has similar or identical fragments) is regarded as
This paper analyzes 10 kinds of typical bad smells in 4 aspects to recommend a resolution sequ
Clones are generally considered bad programming practice in software engineering folklore. They ar
Insects are becoming a reference point in Neuroscience for the study of biological aspects at the
The paper presents the application of differential electronic nose and support vector machine for
This study was carried out to ascertain the behavior and fermentation performance of mixed yeasts
Build process is crucial in software development. However, the analysis support for build code is
Spreadsheets are often used in business, for simple tasks, as well as for mission critical tasks
Code clone is a well-known code smell that needs to be detected and managed during the software
Modern enterprise infrastructures adopt multilayer network architectures and heterogeneous server
The feeling of presence has been shown to be an important concept in several clinical applications
Previous restorative environment (RE) research suggests that exposure of individuals to natural se
Search for non-wood lignocellulosic fibres began in early seventy as a result of sudden surge in
The Lockheed Martin F-16 ventral fin redesign-combinatorial test study effort was to demonstrate
Neurons communicate primarily with spikes, but most theories of neural computation are based on f
In this study the authors report on the development of a new type of electronic nose (e-nose) ins
We developed a nanovesicle-based bioelectronic nose (NBN) that could recognize a specific odorant
As locks become more and more complex and numerous, locksmiths have less opportunity to practice o
The longevity of evolving software systems largely depends on their resilience to architectural d
An anti-pattern is a commonly occurring solution to a recurring problem that will typically negati
As software systems are maintained, their architecture modularity often degrades through archite
Although they contribute directly to water treatment and environmental protection, lift stations, s
Mosquito host-seeking behavior and heterogeneity in host distribution are important factors in pr
As the mechanism underlying the sense of smell is unclear, different models have been used to ra
The means applied to smell treatment in a sewage treatment plant depend both on the ventilation ne
A key function of the olfactory system is the detection of differences in odour quality. Therefore,
Usability studies are important for developing usable, enjoyable products, identifying design flaws
Anti-SPIT policies counter the SPam over Internet Telephony (SPIT) by distinguishing bots launc
Contemporary neuroscientific theories of consciousness are typically based on the study of vision
The reshaping and decorrelation of similar activity patterns by neuronal networks can enhance their
Wood because of its unique texture, color, smell has a good affinity with the people is to improve
Many IT departments use remote administration products to configure, monitor, and maintain the sy
Clinical olfactory tests are used to address hyposmia/anosmia levels in patients with different types of olfactory impairments. T
The impact of the growth of two Gram-negative bacteria, Psychrobacter celer and Hafnia alvei, ino
This paper studies the application of the differential electronic nose for the recognition of coffe

Sensing smell is a highly complex biological process, and characterizing and mimicking the intera
Olfaction, or smell, is one of the last challenges which multimedia applications have to conquer. A
In this experiment, do smell pine impregnated pressure experiments with small molecules phenoli
The immobilization efficiency of molecular detectors is of great importance with regard to the pe
Manganese-enhanced magnetic resonance imaging (MEMRI) is a powerful tool for visualizing neuronal
With the advance of science and medicine, life expectancy of human beings becomes increasingly hig
The scope of the present study was to investigate the effects of different iron compounds on the p
Security vulnerabilities discovered later in the development cycle are more expensive to fix than
This work aims to identify the arousal and presence level during an emotional engineering study. D
Reuse has significantly improved software productivity and quality. An application interacts with
In the current demonstration we present a new instrument that provides for each existing class in
Automatic refactoring techniques guarantee the correctness and effectiveness for the transformati
With the improvement of living standard, people are paying more and more attention on the freshn
Aspect-oriented programming (AOP) aims to improve software modularity, although developers can un
This paper reports two attacks on Undercover, a human authentication scheme against passive obse
Smell simulation technology allows humans to use their sense of smell to enhance or accelerate thei
One major unresolved problem in olfaction research is to relate the percept to the molecular stru
Transformer bushing may seep oil due to trailer coupling overheat or design flaws, in order to res
Every system used in real time will be having some security threats. Internet has not been excepti
This paper describes situations where learning games are not perceived by the player as being r
Identifying refactoring is an important step of bad smell removal process. Many developers have p
Olfaction is an interesting new challenging area for intelligent systems to be developed and applied
Security vulnerabilities discovered later in the development cycle are more expensive to fix than
The potential for primary water stress corrosion cracking (PWSCC) of large diameter austenitic ni
A new method, microwave pyrolysis, has been investigated to dispose the paper mill sludge. Micr
It is a known fact that computer and network systems have certain design flaws which leads to secu
This paper aims to understand the following issues: how design flaws motivate the rejection of alt
Usability and security are often portrayed as though they are competing priorities in information
Little systematic knowledge is available on the dynamics of rework in complex hydrocarbon (oil an
The deer placenta polypeptide has dense fishy smell and it is easy to be oxidized. The fishy sme
In this article we will discuss players' experience of computer games in terms of sight, sound
The falling asleep at the wheel is big problem that should be exterminated. Then we pay attention
The objective of the study was to compare the sensory quality of black currant nectars and bevera
Instead of having a system of rigid quality criteria, we suggest to coevolve the knowledge about g
The objective of this study was to characterize the chemical composition and some selected propert
Although neurons are known to exhibit a broad array of intrinsic properties that impact critically
4D is a kind of marketing term, 4D film is a system that is added to various special effects like
Odour is an environmental element consisting of organic and inorganic components. Odour is also r
Recently, with increasing maintenance costs, studies on software quality are becoming increasingl
Experienced programmers choose identifier names carefully, in the attempt to convey information
Design flaws are those characteristics of design entities (e.g., methods, classes) which make the
With the continuous advancements in ubiquitous computing and media, the technology has widened to
In recent years, there are a number of mouse maze devices developed. In this paper, we introduce
A major vector of computer infection is through exploiting vulnerable software or design flaws in
Design smells in software models reduce the software quality. Smells identification supports the r
Manganese (Mn)-enhanced magnetic resonance imaging (MEMRI) is an emerging technique for visualizin
This research identifies and tests key factors that can be associated with time to recall a product.
A critical situation can suddenly develop in the 'pilot (automaton) - aircraft - operational enviro
Taking Lishi loess as the media and domestic sewage as the carbon source for treating agent of a
This work aims to identify the arousal and presence level during an emotional engineering study. D
When mice are used as experimental subjects in the detection of wound infection based on electron
Problem statement: The problem of the research derives from a lack of study and understanding abou
The paper presents an innovative theory of perception of multiple features across and within modal
When newly designed refrigerator parts failed due to repetitive loads under consumer usage condit
Samples of refined grape seed oil macerated with grinded fresh grape seeds were analyzed in orde
We assessed the influence of rosemary on some of the quality characteristics of Litopenaeus van
In this article we discuss the sensory experiences of playing computer games by exploring the s
Testability is a significant design feature for system, which has gong through five stages such as
Despite its ubiquity and significance, behavioral habituation is poorly understood in terms of th
Local control of mRNA translation has been proposed as a mechanism for regulating synapse-specifi
Many victims of The Great Best Japan Earthquake lost many precious mementos. Such losses can r
The Victorian Space Science Education Centre (VSSEC) scenario-based programs, including the Miss
This study describes a method of propagation for one of the cultural of banana developed by the I
Orchid is one of the economic crops in world market. The varieties of shape, style, color and sme
Change history in project revisions provides helpful information on handling bugs. Existing studi
To study the associations between dorm environment and occupants' health, a nested case-control s
We present a novel, smart sensing system developed for the flavour analysis of liquids. The syste
Moxibustion generates heat stimulation which expands blood vessels and promotes blood circulatio
Summary: ODORactor is an open access web server aimed at providing a platform for identifying odo
This study provides a qualitative comparison of blackcurrant and blackcurrant-whey beverages ov
Source code analysis has been and still is extensively researched topic with various application
Technical debt is a metaphor describing situations where developers accept sacrifices in one dim
Porosity in cast metals often leads to cracking of components due to stress concentration and lea
Olfactory sensation is based on chemical signals whereas the visual sensation and auditory sensa
In this study we examined the development of wine expertise. We asked four groupsö untrained wine
In this paper, we propose a method to detect and recognize multiple odors, and implement a multi
In the process of retting flax, there is a large quantity of wastewater with bad smell and high co
Refactoring tends to avoid the early deviation of a program from its intended architecture design.
We propose a novel approach to identify Move Method refactoring opportunities and remove the Fea
Mashups are becoming increasingly popular as end users are able to easily access, manipulate, a
There is growing empirical evidence that some (patterns of) code smells seem to be, either deliber
Different from primitive tissue engineering, current tissue engineering and biomedical research fo
Model verification is the process of checking models for known problems (or anti-patterns). We
Bardet - Biedl syndrome (BBS) is a pleiotropic, heterogeneous human disease whose etiology lies pr
One of the major disadvantages of the use of Metal Oxide Semiconductor (MOS) technology as a tra
In this paper, we propose a pseudo-gustatory display based on the cross-modal interactions that un
Although the functional significance of adult neurogenesis in hippocampal-dependent learning and
Cytokine signaling through the JAK/STAT pathway regulates multiple cellular responses, including
In addition to moderate wind and normal traffic scenarios, it is known that some extreme events m
This paper presents a novel method for inferring the odor based on neural activities observed fro
Although aspect-oriented programming (AOP) aims to improve software maintainability, developers c
Although aspect-oriented programming (AOP) aims to improve the software modularity, developers can
Loss of function of the gene SCN9A, encoding the voltage-gated sodium channel Na v 1.7, causes a
Sensory information may be represented in the brain by stereotyped mapping of axonal inputs or by
Although the question of to whom a male directs his mating attempts is a critical one in social i
A well-known bad code smell in refactoring and software maintenance is the existence of code clone
Fowler et al. identified 22 Code Bad Smells to direct the effective refactoring of code. These ar
The purpose of the present work is to treat the leachates, from the public landfill site of the to
Context: Automated static analysis (ASA) identifies potential source code anomalies early in the s
With increasing pressure on universities to play a role in the national innovation process, this ex
Zinc phosphide is a highly effective rodenticide used widely to protect grain in stores and dome
Different psychophysical works have reported that, when a wide range of odors is assessed, the hed
Most natural odors are mixtures and often elicit percepts distinct from those elicited by their co
It is critical for normal brains to perceive the external world precisely and accurately under ever
A common explanation of molecular recognition by the olfactory system posits that receptors recog
This paper examines whether adults can adapt to novel accents of their native language that conta
This study was designed to formulate, pharmaceutically evaluate a topical skin-care cream (w/o e
Background: Guanine protein-coupled receptors (GPCRs) constitute a eukaryotic transmembrane pro
Bionic technology provides a new elicitation for mobile robot navigation since it explores the way
To learn more about the effects of mixing different odorants, a series of air dilution sensory (A
Gas gangrene is an emergency condition, which usually develops after injuries or surgery. This st
Trials on the transmission of olfactory information together with audio and visual information ar
It is believed by many academic and industrial experts, that source code cloning (copy&paste progr
Emotional tearing is a poorly understood behavior that is considered uniquely human. In mice, te
The sense of smell begins with odorant molecules binding to membrane receptors on the cilia of ol
Concrete is a sort of inhomogeneous and discontinuous diverse mixture, it has very complicated in
The neuromodulatory function of dopamine (DA) is an inherent feature of nervous systems of all ani
An ageing world population has fuelled interest in regenerative remedies that may stem declinin
CO 2 is both a critical regulator of animal physiology and an important sensory cue for many ani
In this study, a prototype electronic nose was developed for monitoring the quality of cocoa bean
The verbs of perception-verbs denoting sight, sound, touch, smell, and taste-are often used to exp
Design flaws are important factors that influence the quality of products in mechanical engineerin
We have studied the absorption of volatile organic compounds (VOCs) and vapochromic characteriz
Crossmodal linkage between the olfactory and visual senses is still largely underexplored. In thi
Low software evolvability may increase costs of software development for over 30%. In practice, hu
Code smells are particular patterns in object-oriented systems that are perceived to lead to diff
Software developers often duplicate source code to replicate functionality. This practice can hin
We propose a novel approach to infer protocol state machines in the realistic high-latency netwo
This paper reports the application of results from human- social agent interaction experiments to
We investigated the olfactory "Kansei" information processing for two kinds of smells by measuring
Blue-green algae, widely distributed almost all over the world, is one kind of the most ancient
Code smells are characteristics of software that indicate that code may have a design problem. Co
A code smell is any symptom in the source code that possibly indicates a bad design or programming
Code smells are anomalies often caused by the way concerns are realized in the source code. Their
Guidelines for refactoring are meant to improve software systems internal quality and are widely
Software design problems are known and perceived under many different terms such as bad smells, fl
Learning has always been one of the core mechanics in computer games. Players learn specific batt
At present, university students are a major concern in our society. Student apartment is the main
This paper presents an analytical framework for detecting the presence of jumps and impulses in the
This study proposes a method that creates a scent suited with a user's favor using paired compar
A general method for reliability design of a mechanical system is proposed. A case study is presen
Supported by rapidly advancing computer technology, numerical software improves by the day. Toget
Realism in real-time has long been a "holy grail" of the computer graphics community. While real-t
High performance in various tasks by robots that move to cooperate is expected. In working with g
In the process of building a socialist harmonious society, building the harmonious community as
Historically, some new technologies are faced with rejection or acceptance. So researchers develop
In the last 20 years, China has been in the radical change of urbanization. The cities have been g
It is important to utilize the citrus sludge in terms of the reuse of waste materials in the man
Social unconventional emergencies not only bring disaster to human life and living environment,
This paper presents the work on Drop and EXplore (DEX), a small rescue robot to be used in Urban
The authors have researched multimedia system and support system for nursing studies on and practi
Eating is a multisensory experience involving more than simply the oral sensation of the taste and
The authors have researched multimedia system and support system for nursing studies on and practi
Efforts related to nutrient optimisation are responsible for the increasing importance of tailori
Low coupling between modules and high cohesion inside each module are key features of good soft
Shellfish and other aquatic organisms suitable for food and feed are of worldwide importance. The
The aim of this study was to raise the nutrition of potato starch residue. In the fermentation pr
Perfumes are commonly used to cover body odour, or to provide a positive, attracting, and interes
This study investigated the associations between various factors anecdotally reported to trigger
Identifying refactoring opportunities in software systems is an important activity in today's agi
This extended poster abstract presents a software visualization tool (CodeVizard) that helps res
Chilli-based repellents have shown promise as deterrents against crop-raiding elephants in Africa.
Copy-number variations (CNVs) are widespread in the human genome, but comprehensive assignment
The twenty-first century society fights against an inherent tendency to over-classify and label p
Foraging robots involved in a search and retrieval task may create paths to navigate faster in the
This paper provides an assumption of three tiers space of smart grid. The assumption considers the
Context: Inheritance is the cornerstone of object-oriented development, supporting conceptual m
The presence of design flaws in a software system has a negative impact on the quality of the sof
The mobile robot behavior control raises very high requirement to environmental perception. The in
An important contributing factor for the high sensitivity of sensory systems is the exquisite sensi
Code smells represent code decay and as such should be eradicated from a system to prevent futur
In this paper, we have considered programming for organizing rural residences in northern villages
With the growth of Web 2.0 library intranets in recent years, many libraries are leaving behind leg
Preliminary works indicate that a comprehensive assessment of soundscapes requires integration of
Petroleum fuels have caused environmental problems that affect the whole atmosphere and some estim
The present study was conducted to investigate the influence of olfaction on subjective valence in
The aim of the study was to determine consumer compliance and acceptability of multiple fortifie
Code smells refer to commonly occurring patterns in source code that indicate poor programming pr
Code smells reflect code decay and, as such, developers should seek to eradicate such smells throug
Visual notations form an integral part of the language of software engineering (SE). Yet historica
There is increasing concern that ocean acidification, caused by the uptake of additional CO 2 at t
Software refactorings are used commonly to fix problems such as the code smells. In this case stu
In this research, we aim to realize a gustatory display that enhances our experience of enjoying f
Rodents can localize odor sources by comparing odor inputs to the right and left nostrils. However,
The concept of synchronization is of fundamental importance in multimedia systems and application
The end-to-end evaluation of distributed systems' quality-of-service (QoS) properties such as pe
This paper describes inAir, a tool for sharing measurements and visualizations of indoor air quali
The purpose of this article is to explore the possibility of using a tool based on artificial intel
Clones are generally considered bad programming practice in software engineering folklore. They ar
Direct Anonymous Attestation (DAA) is a cryptographic scheme that enables remote authentication
Social unconventional emergencies not only bring disaster to human life and living environment, b
The disharmony between rapid development of science and technology and lower lag of management
The canine nasal cavity contains hundreds of millions of sensory neurons, located in the olfactory
This study focuses on the pilot scale extraction, characterization and purification of cashew oil
Terminal equipment like personal computers (PCs) and mobile phones are mainstream devices in the
Olfactory displays which exist now can only present the set of scents which was prepared beforeha
The traditional Chinese medicinal tincture is inconvenient to use and has strong herbal smells. It
Male moths are endowed with odorant receptors (ORs) to detect species-specific sex pheromones with
To improve the original design flaws of overturning assembly of glass stacking machine taken as a
Mammalian olfactory system is the archetype of smell sensor devices. Its complexity resides both in
The mammalian olfactory system is able to discriminate among tens of thousands of odorant molecu
Multiple intracellular signals are altered in Alzheimer's disease brain tissues, including the PI3
A primary goal for artificial nose (eNose) technology is to report perceptual qualities of novel
Abstract: The objective was to assess acute effects from controlled exposure of volunteers to 2-e
The Ricotta Forte is a traditional dairy product from Puglia, a region of southern Italy. It is a c
An innovative approach to Post-Harvest Processing (PHP) of oysters is introduced focusing on the
The mammalian olfactory system detects an unlimited variety of odorants with a limited set of odo
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is t
The paper reports an improved method for electronic nose that combines two identical or very simi
The freshness on four selected types of fish (Red Snapper, Gurnard, Tarakihi and Trevally) which
Code and design smells are poor solutions to recurring implementation and design problems. They m
Knowledge of how insects are actually affected by sex pheromones deployed throughout a crop so as
We present a black-box attack against an already deployed CAPTCHA that aims to protect a free
This paper reports on an olfactory display system that enables the synchronized presentation of od
With respect to the success of supply chain, supply chain logistics system is a key factor and al
The process of learning involves interaction with the learning environment through our five senses
Electronic noses (ENs), are used for many applications, but we must emphasize the importance of t
Ovarian cancer is one of the leading causes of death from cancer in women. The lifetime risk is a
Given more efficient utilization of waste, the social impact of waste recycling is far-reaching in
The studies on the assessment of urban landscape river health are scarce. The aggregative indicato
Code smells are design flaws in object-oriented designs that may lead to maintainability issues i
In this paper, we present ongoing research concerning the interaction between users and autonom
The church of Saint Anthony of Padua in Zagreb was built in 1934 and represents a valuable eccles
Odorant receptors are among the fastest evolving genes in animals. However, little is known abou
The traditional error resilience technique has been widely used in video coding. Many literatures h
Curcuma mangga Val. & Zijp. is a member of the Zingiberaceae family commonly grown in Thailan
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the sy
SystemC is a system-level modeling language that offers a wide range of features to describe conc
Code smells are poor implementation choices, thought to make object-oriented systems hard to main
Empirical studies have stressed that aspect-oriented decompositions can cause non-obvious flaws i
We introduce the notion of "lexicon bad smell", which parallels that of "code smell" and indicat
Visual notations form an integral part of the language of software engineering (SE). Yet historica
"God class" is a term used to describe a certain type of large classes which "know too much or d
Composite Overwrapped Pressure Vessels (COPVs) are often used for storing pressurant gases on board
Service Oriented Architecture (SOA) has gained popularity as a design paradigm for realizing ente
An experimental study on the ride comfort of the Korean high-speed train is presented. Passengers
This paper shows the application of a type of formal software verification technique known as light
Cooling towers are an attractive method to provide cooling water to power plants and other proces
Research on the teaching of science and mathematics in schools and universities have shown that a
Current approaches to detecting Bad Smells in code are mainly based on software metrics. We sug
The interplay of multiple objects in object-oriented programming often follows specific protocols
Mobile robots navigation is a broad topic, covering many different technologies and applications.
Pilot implementation is a powerful and widely used approach in identifying design flaws and implem
Gases are one of quite difficult environmental factor to treat. They are obstruction in humans lif
This paper describes an investigation of indoor air complaints in a large office and health care
In the recent news and publication, many reports have appeared-telling us that some people aroun
Patients suffering from olfaction impairment are incapable of judging the smell of delicious foo
We propose an umbrella-like device called Funbrella that entertains people with many types of ra
The brand is one of the selection criteria which plays an increasing role in consumers' purchasi
The objective of this study was to compare the quality of rye breads made of dough obtained usin
Herbivores select diets from an array of plant species that differ in physical and chemical chara
In this paper, we present ongoing research concerning the interaction between users and autonom
The potential of using juice of bilimbi (Averrhoa bilimbi L.) and tamarind (Tamarindus indica L.
Good indoor air quality is a vital part of human health. Poor indoor air quality can contribute to
An electronic nose is an instrument intended to mimic the human sense of smell. Electronic noses (
Chinese medical formula (CMF) is the main therapies in traditional Chinese medicine (TCM) clin
Disharmony of various factors in road system is one of important reasons that cause traffic accide
Normally, an electronic nose project uses two researches areas which are hardware for developing
An architectural bad smell is a commonly (although not always intentionally) used set of architectu
In software development, a major difficulty comes from the intrinsic complexity of software systems
Trials on the transmission of olfactory information together with audio/visual information are cu
West Nile virus, which is transmitted by Culex mosquitoes while feeding on birds and humans, has
An electronic nose system was developed for detecting beef freshness. An array of gas sensor was
Volatile phenols, such as 4-ethylphenol, are responsible for a "horsey" smell in wine. Thus, the st
In this paper we describe a novel tool for modeling the fabrication of MEMS and semiconductor devi
For QoS unicast routing problem under the constraints of delay and bandwidth in modern telecommu
The development of user interfaces for safety critical systems is driven by requirements specifica
Microcircuits in the olfactory bulb have long received particular attention from both experimentali
An uncomfortable smell was reported by employees of an IT office (information technological offic
The wastewater stream produced during tomato manufacturing is characterized by a dark color and b
The fruitfly Drosophila melanogaster exhibits a robust and innate olfactory-based avoidance behav
Alimentos Divertidos is an inquiry-based science and engineering program for P-12 students. To p
Summary Previously, it has been shown that thyme and pennyroyal essential oils have potential as
In view of the design flaw of G60 generator protection in the actual utilization when the unit eng
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code
Background: Regulatory motifs describe sets of related transcription factor binding sites (TFBSs)
Issue (e.g., defect) repositories usually contain rich information that can be used to mine evid
For vertebrate olfactory signal transduction, a calcium-activated chloride conductance serves as
Idiopathic hypogonadotropic hypogonadism (IHH) is a condition characterized by failure to under
UML is a visual language. However surprisingly, there has been very little attention in either res
This article shows our research efforts toward the development of an olfactory display system fo
Blood sausage, a widely consumed traditional product, would benefit from an increased commercial l
Mammals rely heavily on olfaction to interact adequately with each other and with their environm
Fruitflies show robust attraction to food odours, which usually excite several glomeruli. To unders
Smell and flavor are key factors that determine the acceptance of food by consumers. With referenc
Maintainability is an important factor that developers should be concerned because two-thirds of
The initial event in olfactory perception is the binding of odorant molecules to specific receptor
In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonym
Human epidemiologic studies reveal that fetal ethanol exposure is highly predictive of adolescent e
It has been advocated that Aspect-Oriented Programming (AOP) is an effective technique to improve
Process modeling languages such as EPCs, BPMN, flow charts, UML activity diagrams, Petri nets, e
In software development, especially component-based software development, dependency locality sta
The idea of adding the SubSmell logo to the movie for describing the scent of each event in the
Odor representation in the olfactory bulb (OB) undergoes a transformation from a combinatorial g
Exception handling design can improve robustness, which is an important quality attribute of softw
The olfactory system sensitively discerns scents from many small molecules as the brain analyses s
This paper presents a novel biomimetic olfactory biosensor for the study of olfactory transductio
The objective of this study was to find out volatile aroma and organoleptic differences if any am
The relationship between environment and economic development has become the major concern of t
This paper proposed an improved ant algorithm with feedback function extension and dynamic pherom
There exist numerous software visualization techniques that aim to facilitate program comprehensi
Intrusion Detection Systems have been widely used to overcome security threats in computer netw
SystemC is a system-level modeling language that offers a wide range of features to describe conc
In 1999 Fowler et al. identified 22 Bad Smells in code to direct the effective refactoring. These ar
The STI Cell Broadband Engine architecture represents an interesting design point along the spect
A current and difficult challenge in the software engineering arena is assessment of code smells and
With the development of sensor technology and electronic miniaturization, wireless sensor network
An increasing number of people rely on secure websites to carry out their daily business. A survey
Today, many practitioners have consolidated their experience with software models in collections o
Scattered concerns, design features whose implementations span multiple program units, can pose ex
With ever expanding influence of RFID technology, it is empirical to address basic design flaws an
Introduce the concept of virtual human, according to the content and requirements of the maintain
Preserving the integrity of software systems is essential in ensuring future product success. Co
Most of long-term engineering class projects require teamwork. Often, conducting projects increase
Trials on transmission of olfactory information together with audio/visual information are curren
Bamboo charcoal shows many advantages such as: moisture-proof foul smells reduction, the release
We propose the new system for scent reproduction at remote site together with video. The odor is
This paper presents the results of an empirical analysis of corporate social responsibility for
Japan Aerospace Exploration Agency (JAXA) imposed odor requirements for non-metallic material u
Fire is one of the most common hazards in US households. In 2006 alone, 2705 people were killed due
Within the climate of declining numbers of students choosing to take post-compulsory science and
Along with China's economic and social development, there are more and more disharmonies within ru
Since a variety of smells can be made by blending multiple odor components, an odor recorder ca
Human Resource (HR) systems are increasingly being focused on as subjects of study by researcher
As a kind of public goods, there is always disharmony between official standard and factual indust
The model of transient response of semiconductor gas sensor under modulation heating has been co
The aim of this paper is to discuss the role of scents in interaction design. Scent-output is not
The model of transient response of semiconductor gas sensor under modulation heating has been co
G protein-coupled receptors (GPCRs) mediate the senses of vision, smell, taste, and pain. They ar
An electronic nose is a smart instrument that is designed to detect and discriminate among comple
Prior research indicates that one of the most difficult concepts for students to understand is tha
Current clinical diagnostics are based on biochemical, immunological, or microbiological methods.
Industrial agrifood processes often strongly rely on human expertise, expressed as know-how and
Rotating machinery anomaly detection is of paramount significance for industries to prevent cat
Isoprene is the most abundant volatile compound emitted by vegetation. It influences air chemistry
The concept of synchronisation is of fundamental importance in multimedia systems and application
Determining composition and structure of ant communities may help understand how niche opportuniti
Organizations in the oil and gas industry around the world have placed an enormous importance on
Memory formation involves multiple molecular mechanisms, the nature and components of which are
Key management is a significant part of secure wireless communication. In IEEE 802.11i standard,
The insect repellent DEET is effective against a variety of medically important pests, but its
Design anomalies, introduced during software evolution, are frequent causes of low maintainabilit
Humans and other animals must often make decisions on the basis of imperfect evidence. Statistici
External world is physical world, where objects, electromagnetic waves, air waves and temperatures
The only known volatile pheromone in Drosophila, 11-cis-vaccenyl acetate (cVA), mediates a varie
Evaluation methodology underpins all innovation in experimental computer science. It requires r
It has been proposed that synchronized neural assemblies in the antennal lobe of insects encode t
Chemotaxis in Caenorhabditis elegans, like chemotaxis in bacteria, involves a random walk biased
A human face is a complex object with features that can vary over time. However, we humans have a
One of the most complicated components of electronic olfaction process is odour handling and deli
During black tea manufacturing, tealeaves pass through the fermentation process, when the grassy s
The concept of coding efficiency holds that sensory neurons are adapted, through both evolutionary
Learning to associate sensory cues with threats is critical for minimizing aversive experience. Th
Courtship is an innate sexually dimorphic behaviour that can be observed in naive animals without
Wandering albatrosses (Diomedea exulans) forage over thousands of square kilometers of open ocean
Seed dispersal mutualisms are essential for the survival of diverse plant species and communitie
Spatiotemporal variability in floral resources can have ecological and evolutionary consequences
Functional correctness is a vital attribute of any hardware design. Unfortunately, due to extremel
American water shrews (Sorex palustris) are aggressive predators that feed on a variety of terrest
The authors have developed an olfactory display capable of realtime scent blending. Because their
The new methodology based on Perfumery Ternary Diagram® (PTD®) used to predict the odor value
The development of an upper division elective course in manufacturing processes for a Bachelor of
Our aim is to gain a better understanding of the relationship between bad smells and design princi
Our aim is to gain a better understanding of the relationship between bad smells and design princi
The Object Constraint Language (OCL) is a OMG standard that plays an important role in the elabor
Fermentation process in black tea manufacturing plays the key role in determining the quality of
The linear aeration of pipes under pressure constitutes an innovative smell reduction method,. The
Embedded systems are used in various critical devices and correct functioning of these devices i
Complicated control systems are used in many safety-critical applications, such as in cars and airp
The research and experimentation (R&E) tax credit has long been the subject of criticism. Some argu
A previous study by Bieman et al., investigated whether large, object-oriented classes were more
Supervisory control and data acquisition (SCADA) systems monitor, regulate, gather information fr
Odor smell from tobacco processing is a kind of odor pollution. Air emitted from Shanghai Cigare
Program comprehension is the basis for software maintenance and reengineering. It is possible an
Written texts like policy advises are often reviewed and judged. In this study we analyze the exper
Rehabilitation is nowadays a hot topic of the agenda of most European water supply stakeholders.
Since a variety of smells can be generated by blending multiple odor components, an odor record
Cephalometric analysis has an important role in diagnosis and treatment of dental disharmonies. I
Software systems need to change over time to cope with new requirements, and due to design decis
Software systems need to change over time to cope with new requirements, and due to design decis
Allergic rhinitis (AR) is the sixth most common chronic illness worldwide, which has a significant
The mammalian olfactory system mediates various responses, including aversive behaviours to spoil
The principal objective was to evaluate the effect of the physical refining on the characteristics i
The CD36 family of transmembrane receptors is present across metazoans and has been implicated b
One of the technological challenges associated with trace vapor detection of explosive materials a
Although many properties of the nervous system are shared among animals and systems, it is not k
The Shakespeare Institute, University of Birmingham, Stratford-Upon-Avon has convened conference
Olfactory learning in insects has been used extensively for studies on the neurobiology, genetics
Cilia regulate diverse functions such as motility, fluid balance, and sensory perception. The cili
Young adult subjects who occupied a well-ventilated space with low background of level of ozone ac
Human olfactory perception differs enormously between individuals, with large reported perceptua
One of the most important decisions researchers face when analyzing the evolution of software s
RCP Design Global, working with partners Alstom, RATP and SNCF, is looking to improve the sensory
Symmetry is an obvious phenomenon in two-way communications. In this paper, we present an adaptiv
An artificial olfactory system was developed for monitoring meat freshness according to meat smel
The increasing demand for multi-modal systems and applications that are highly interactive and mu
In mice, pheromone detection is mediated by the vomeronasal organ and the main olfactory epithel
There are five known taste modalities in humans: sweet, bitter, sour, salty and umami (the taste
Odour representations in insects undergo progressive transformations and decorrelation from the
Fermentation process in black tea manufacturing plays the key role in determining the quality of
We have developed multi-point bad-smell sensing system for monitoring living environment. Altho
A bad-smell sensing network using gas detector tubes and mobile phones having digital cameras i
Investigating how information propagates between layers in the olfactory system is an important s
Bad smells are used as a means to identify problematic classes in object-oriented systems for refac
The sense of smell, called olfaction, involves the detection and perception of different odors, an
Dual water supply systems were installed in several newly built housing estates in the Netherland
A novel technique is presented for measurement of surface profile, dynamic inspection of surface
Today, the capability of the human olfactory system is still, in many ways, superior to that of t
Mammalian imprinted genes are generally thought to have evolved as a result of conflict between
Ecological compensation, as a monetary measure, has been a key effective way to address the dish
Insects, like many other animals, use sex pheromones to coordinate their reproductive behaviour
The olfactory system is thought to recognize odors with multiple odorant receptors (ORs) that ar
In order to detect plant aroma in a natural environment, we have investigated roses' aroma using
Fermentation is an extremely crucial process in black tea manufacturing and is primarily responsib
Habituation is a universal form of nonassociative learning that results in the devaluation of sen
The perceptual quality of odors usually is robust to variability in concentration. However, maps of
Video games constitute a major sector of computing with distinctive social implications. Analysis
Chemotactic bacteria rely on local concentration gradients to guide them towards the source of a
Many marine fish and invertebrates show a dual life history where settled adults produce dispersin
The significance of scavenger hunt prototyping model for analysis of mobile collaborative problem
The present paper presents a longitudinal study of the course 'High-tech Entrepreneurship and New
One of the important activities in re-engineering process is detecting design flaws. Such design
Most herbs have their own characteristic smell due to the presence of volatile compounds. Tradit
Refactoring, as a software engineering discipline has emerged over recent years to become an imp
With the growing complexity of distributed systems, the inter-communication within and between s
Guidelines for speech user interfaces generally promote the use of delayed confirmation in speech
Test code, just like any other code we write, erodes when frequently changed. As such, refactoring
In this paper, we describe and then appraise a testing taxonomy proposed by van Deursen and Moon
Analysis of software fault trees exposes hardware and software failure events that lead to unsafe
In human communication we see, smell, and touch things to understand the fact of them. Here we sug
Recent advances in wireless communications and the hardware performance of handset devices make p
As more is being discovered about the physiological and psychological mechanisms that govern our
Studies on olfactory communication using scents in addition to audio/visual information have re
High salt intake led to osmotically inactive sodium retention in space as well as in metabolic ba
A questionnaire survey was conducted in early 2006 at the University Hospital in Coimbra (HUC) a
People may differ in the extent to which they use and rely on their different sensory modalities,
The development of effective user interfaces, appropriate sensors, and information processing tech
This paper presents an empirical study of drivers for software refactoring decisions. We studied
This paper describes an assessment of urban sustainability based on a fuzzy analytic hierarchy pr
Of the five sensory channels - sight, sound, taste, smell, and touch, it is only our sense of touch
All senses are open to receive information during user-product interactions. The present paper co
The objective of this paper is devoted to research on the feasibility of using augmented reality (
Automating redesign is an approach for engineering designers to prevent design related manufact
We describe a rapid and low-cost system for monitoring bad smells in the living environment. Thi
Bad smells are used to identify problematic classes in object-oriented design. Although intuitivel
Poorly designed software systems are difficult to understand and maintain. Modifying code in one
We developed an olfactory display to blend 8 component odors at any composition. The solenoid va
Thiolene chemistry is making market inroads. Although known since a very long time, it is only rec
In the study of Mongolian medicine the authors found that the Mongolian medicine contains large
A software system's structure degrades over time, a phenomenon that is known as software decay or
We developed the olfactory display to blend 8 component odors at any composition. The solenoid va
Piriform cortical circuits are hypothesized to form perceptions from responses to specific odora
A number of electrophysiological experiments have shown that odor exposure alone, unaccompanied b
This paper presents the results of an empirical study on the subjective evaluation of code smells
This paper defines algorithms to automatically detect five types of bad smells that occur in asp
Structure-olfactive threshold relationships for 40 pyrazine derivatives have been studied by multi
In mobile IPv6 network, AAA mechanism is necessary for administration and security because roam
We present a study into the use of smell for searching digital photo collections. Many people now
Odorants are detected by a large family of odorant receptors (ORs) expressed in the nose. The inf
The notion of soft state has been introduced in packet-switched networks to achieve particular ser
In this paper, we explore the integration of an electronic nose and its odour discrimination funct
The progesterone derivative 4,16-androstadien-3-one (AND) and the estrogen-like steroid estra-1
The diagnosis of illness is important for quality patient care and patient safety and is greatly a
Groundwater contamination with MTBE has become the center of national attention in the US. Alth
Social information can be acquired either directly or indirectly from cues inadvertently produced
In connection with the worldwide increase of the environmental consciousness, eco-machining become
It has been hypothesized that rats and other mammals can use stereo cues to localize odor sources, b
The challenge of IT management is today considerable. In industry, the organizational role of the
The heterotrimeric G protein Go is abundantly expressed in the mammalian nervous system and mod
Plants can defend themselves against herbivores by attracting natural enemies of the herbivores. T
The larval brain of Drosophila is a useful model to study olfactory processing because of its cell
We report electrophysiological evidence that a simple odotopy, the spatial mapping of different od
Coupling analytical methods to experimental results forms the basis of consistent structural integri
Criteria for software quality measurement depend on the application area. In large software system
A simple optical chemical sensing method is presented to solve the problem of limited detecting r

Refactoring can have a direct influence on reducing the cost of software maintenance through chang
Designers have accumulated much knowledge referring to OO systems design and construction, but t
Scalability is one of the crucial nonfunctional requirements that must be evaluated in the Incept
This paper discusses the problem of damping of divergent oscillations of an inertial gyroplatform
In recent years, a number of organisations have invested heavily in executive information systems
Code duplication is a common problem, and a well-known sign of bad design. As a result of that, in
An experiment explored ability of subjects to detect vapors of the plasticizer TXIB (2,2,4-trimeth
Recent trends in software development have emphasized the importance of refactoring in preserving
We have developed a suite of informatics tools for experimental research in the odor-encoding me
Unanticipated changes to complex software systems can introduce anomalies such as duplicated co
Unanticipated changes to complex software systems can introduce anomalies such as duplicated co
On Earth, although we no longer depend on our sense of smell for survival, the "flavour" of our
Although GC/MS is a standard technique to analyze gases, a combination of mass spectrometry wit
Results of the odor impact of several agro alimentary production plants are presented in three di
This paper proposes a sensor-based mechanism that allows virtual creatures to perceive the envir
Current tools for software understanding mostly concentrate on one comprehension technique, e.g.,
This paper describes the framework of a real-time simulation system to model human behavior and r
The main Department of Defense (DoD) document on reliability tasks from 1980 until it was rescinde
Food can be hazardous, either through toxicity or through bacterial infections that follow the in
We describe rapid and lowe-cost system for monitoring bad smells in the living environment. This
Design flaws of fault tolerance techniques may lead to undesired consequences in particular fault
Although the unitary light heatproof riser made of phenol-formaldehyde resin is satisfactory for fo
The objective of electricity restructuring is to produce reliable electricity efficiently. Even th
In order to increase the maintainability and the flexibility of a software, its design and impleme
Object-oriented applications are difficult to extend and maintain, due to the presence of impli
The focus of this study is to find the appropriateness of the Levenberg-Marquardt (LM) neural net
This paper is part of an ongoing study of performances that make a physical and psychological conn
In order to study how triphosphate, salt, glucose, ascorbate and starch, both separately and in mi
Objective: We address the problem of selecting an efficient set of initiator molecules (siRNAs) f
Non-compliance is one of the leading reasons of therapy failure in case of antibiotherapy of respi
The research of Odile Meulien and Dietmar Ohlmann is about perceiving a multidimensional world. No
The power industry is perhaps the only industry where industry-wide economy heavily depends on e
Active magnetic bearings (AMBs) offer some advantages over conventional bearings such as contact f
Animals alter their behavioral patterns in an experience-dependent manner. Olfactory imprinting i
A portable gas analyzing system has been developed using conducting polymer (polypyrrole) sensor
There is an increasing demand world-wide for the application of intelligent, fast and inexpensive m
Granule cells in the olfactory bulb (OB) are continually produced and added into the neuronal cir
Supercritical carbon dioxide extraction was investigated as a method for removing lipids and bad f
An atomistic calculation of the interaction between peptide motifs and enantiomeric odorant molecu
Signaling by heterotrimeric GTP-binding proteins (G proteins) drives numerous cellular processes.
Gas sensors provide an artificial sense of smell for a mobile robot to track an airborne gas/odor
In the olfactory system, environmental chemicals are deconstructed into neural signals and then rec
The testosterone derivative 4,16-androstadien-3-one (AND) and the estrogen-like steroid estra-1
In the 'dance language' of honeybees, the dancer generates a specific, coded message that describe
Despite high significance of the sense of smell, the technique of recording and reproducing the ol
This paper describes the framework of a real-time simulation system to model human behavior and r
Criteria for software quality measurement depend on the application area. In large software syste
Mammalian urine releases complex mixtures of volatile compounds that are used in reproduction, te
Sex differences in brain and behavior are ubiquitous in sexually reproducing species. One cause o
Odor recognition encompasses both clustering and fine discrimination. Clustering joins together se
Deminers and dismounted countermine engineers commonly use metal detectors, ground penetrating r
are developing a portable, artificial olfactory system based on multiple attributes of the sense o
In order to support the maintenance of an object-oriented software system, the quality of its desi
This paper presents the results of an initial empirical study on the subjective evaluation of bad
We have measured complete concentration-detection (i.e., psychometric or detectability) functions
The present study introduces the method for solving the problem on early prediction of epilepsy s
A smell reproduction technique is useful in the field of virtual reality. We have developed the
The a-posteriori analysis of logic controllers can be a suitable means to detect design flaws if t
We combine interactive evolutionary computation (IEC) with existing evolutionary synthesis softwa
Black tea quality is a very complex phenomenon. There are almost two hundred varieties of bio-ch
This work explores the properties of different output modalities as notification mechanisms in the
This paper presents a new intelligent odor localization strategy, which enables a robot to locate t
Until now, there are some literatures discussing the conflict causes in western theory, especially
Trash and debris in storm water is a threat to aquatic wildlife, is aesthetically unpleasant, sme
The last twenty years have seen enormous leaps forward in computers' abilities to generate sound
Traditional pattern recognition (PARC) methods used in Electronic noses (Enose) are either param
An alcohol oxidase (AOD) immobilized gas-sensor (bio-sniffer) with stick-type configuration was d
The central nervous system integrates information from sensory inputs and regulates different syste
In this paper human Kansei to colors is studied investigating the relation between colors of food
In medical and dental fields, evaluation for halitosis is important. Methyl mercaptan (MM) is o
Two conflicting hypotheses compete to explain how a homing pigeon can return to its loft over gr
The present study introduces an approach for early prediction of seizure onset in patients affecte
A statistical analysis of data on recognition of fire cues during sleep was carried out to determin
Over the past decade a number of architecture description languages (ADLs) have been proposed to
To ensure safe application of medical devices in practice a Usability Engineering Process (UEP) s
Recognition memory may be supported by two independent types of retrieval, conscious recollection
This paper presents a theoretical approach to understand the basic dynamics of a hierarchical and
Previous biochemical evidence suggests that a cytochrome P450 specific to male antennae of the
Ship design today can be viewed as an ad hoc process. It must be considered in the context of integ
Software inevitably changes. As a consequence, we observe the phenomenon referred to as "Software
As systems evolve and their structure decays, maintainers need accurate and automatic identific
Recent evidence suggests that odor-driven responses in the insect antennal lobe (AL) can be modif
Bounded model checking (BMC) has gained widespread industrial use due to its relative scalability
This paper demonstrates the idea of incorporating the concept of Quality Auditing in Condition Base
Thermoplastic vulcanizates (TPVs) or dynamic vulcanizates are a special class of thermoplastic el
Rett syndrome (RTT) is a neurodevelopmental disorder caused by mutations in the gene encoding Me
The antennal lobe plays a central role for odor processing in insects, as demonstrated by electrop
Anopheles gambiae is a highly anthropophilic mosquito responsible for the majority of malaria tra
We have noted that the local minima problem in the backpropagation algorithm is usually caused b

This paper presents the effects of combining a zeolite filter with an oxidant-generating device to
Molecular genetics has revealed a precise stereotypy in the projection of primary olfactory sens

Samples of Alclad 7475 aluminium alloy containing a 3.18 mm radius semi-circular edge notch were s
Plasticity in connections between neurons allows learning and adaptation, but it also allows noise t
Mental retardation is the most common phenotypic abnormality seen in Down's syndrome (DS) patien
Centre-surround inhibition-the suppression of activity of neighbouring cells by a central group of n
We show how automated support can be provided for identifying refactoring opportunities, e.g., w
This paper presents research in progress, as well as tentative findings related to the empirical s
The method of strain tensor (ST) analysis efficiently demonstrates the morphological differences
The simplest form of sensor-motor control is obtained with a reflex. In this case the reflex can be
G protein-coupled receptors (GPCRs) mediate the perception of smell, light, taste, and pain. They
The experience of the Faculty of Design of the Como regional Centre of the Politecnico di Milano i
As part of an ongoing Combined Cycle Power Generation research program at Dalhousie University in
A new method for the odor recorder, electronically recording the recipe of odors or scents made
Ride comfort is one of the most important dynamic performance characteristics of railway vehicles
Mammals owe part of their evolutionary success to the harmonious exchanges of information, energ
The study aimed at reducing the occupational health and safety problems faced by the manual compo
The chroma and smell were well wiped-off during the treatment of undegradable substance in car
Evolutionary ecologists are attempting to explain how parents make behavioural decisions about ho
Odor stimulation of olfactory sensory neurons (OSNs) leads to both the activation and subsequent
To reduce cost, risk and time, the bottle-necks and design flaws of interrupt latency, computing sp
Chlorine in finished water can mask the more subtle odors of geosmin and 2-methylisoborneol (2-MIB
Many mammalian species rely on pheromones - semiochemicals produced by other members of the sam
Mitigating design flaws in security architecture is a difficult task. Mitigating one known security
Circadian clocks are influenced by social interactions in a variety of species, but little is know
This paper presents the usefulness of simulation in studying the impacts of system failures and de
This case study paper will provide practical tools, used in a systematic process, to improve relia
Following closure of a substantial part of the BHP Steelworks at Newcastle, New South Wales, the
A setup for recording the electrical activity of an insulated olfactory epithelium is described. The
Gas sensors provide the artificial sense of smell for a mobile robot to track an airborne gas/odo
There is increasing evidence from recent neurobiological studies, that biological neural networks
on, B.N. and Khan, R.M. and Bensafi, M. and Sobel, N.
G protein-coupled receptors (GPCRs) mediate our sense of vision, smell, taste, and pain. They are
The human sensory test is often used for obtaining the sensory quantities of odors, however, the f
The mammalian vomeronasal organ (VNO), a part of the olfactory system, detects pheromones-chemi
We introduce and study an artificial neural network inspired by the probabilistic receptor affinity
The continuous respiration olfactometer (CRO) was designed as a respiration-synchronous method for
In the insect olfactory system, oscillatory synchronization is functionally relevant and reflects t
Pavlovian conditioning results when an innocuous stimulus, such as an odour, is paired with a beh
Surveys about automated telephone answering systems, known as interactive voice response systems
Genes of the major histocompatibility complex (MHC) play a central role in immune recognition, ye
The longevity of evolving software systems largely depends on their resilience to architecturalde
The design and development process of complex systems require an adequate methodology and effici
The goal of a remote-sensing system is to gather data about the geography it is imaging. In order
The concept of the unidentified pattern comes from theoretic analysis of pattern space andexperim
In this paper, we demonstrate that anomalies in Internet traces can have a significant impact ons
More and more intrusion detection systems were developed, but most of these systems have very
The following topics are dealt with: hybrid semi-blind digital image watermarking technique; fac
Terminology regarding "ionosphere electron density models" will be reviewed. Differences between"m
In case-based reasoning (CBR), cases are generally represented by features. Different features hav
According to recent studies, architecture degradation is to a large extent a consequence of theint
Firewalls are essential components in network security solutions. In order to implement correctsec
Network security is usually protected by a firewall, which checks in-out packets against a set ofd
This paper deals with anomaly score aggregation and thresholding in multi-model anomaly-basedapp
This work extends the emerging field of hyperspectral imagery (HSI) anomaly detectors and employs
A novel framework for anomaly detection in crowded scenes is presented. Three properties areiden
Anomaly detection becomes increasingly important in hyperspectral image analysis, sincehyperspect
Detecting the occurrence and location of performance anomalies (e.g., high jitter or loss events
In order to utilize benefits and remove disadvantages of both misuse and anomaly based intrusionde
Piezoelectric composites are commonly used in medical diagnostic ultrasonic imaging arrays. Thep
Various approaches have been developed for quantifying and displaying network traffic information
The planned large scale deployment of smart grid network devices will generate a large amount of
Use of unmanned Aerial Vehicles (UAVs) has gained significant importance in the recent years bec
The advent of emerging computing technologies such as service-oriented architecture and cloudcomp
A novel method for crowd flow modeling and anomaly detection is proposed for both coherent andinco
In this paper, an novel unsupervised intrusion detection method is presented, in which the anoma
This paper describes the ground penetrating radar (GPR) survey performed on the archaeological sit
Anomaly detection in wireless sensor networks is an important challenge for tasks such as faultdi
The International Space Station (ISS) Payload Engineering Integration (PEI) organization hasdevelop
Mobile ad hoc network (MANET) faces serious security threat due to lack of consideration of secu
Neural network can be used in anomaly detection. In order to improve the traditional IDS (intrus
Our contribution in this paper is two fold. First we provide preliminary investigation resultses
In this paper, a novel agent-based distributed intrusion detection system (IDS) is proposed, whi
The concept of cumulated anomaly is addressed in this paper, which describes a new type of dat
New validation methods are needed for ensuring integrated circuit (IC) Trust, and in particular f
The current implementation of BGP protocol has a variety of vulnerabilities and weakness. Monitor
Power quality issues are day-by-day becoming important because of increasing use of sensitiveelect
Multi-resolution decompositions, such as the wavelet transform, are often employed in anomalydete
Network security breaches hinder the application of distributed computing systems manifested as
Network anomaly intrusion detection is designed to provide in-depth defense against zero-dayattac
We investigate the design of a second order sliding mode observer for detecting anomalies in TC
The detection of any buried object depends on the analysis of its emerged magnetic anomaly data
Anomaly detection (AD) sensors compute behavior profiles to recognize malicious or anomalousactivi
Early Internet architecture design goals did not put security as a high priority. However, todayI
Fast anomaly detection and localization is critical to ensure effective functioning of wirelesss
Unit testing represents a key activity in software development and maintenance. Test suites withhi
Network traffic anomaly detection can be done through the self-similar analysis of network traffic
Despite the growing number of systems providing visual analytic support for investigative analysis,
To specialists, insulation coordination is well-known. The insulation level of the overhead line or
Intrusion detection is the process of identifying suspicious activities on a target system ornetw
Endless strip generation is the key to productivity and quality in several types of steel coilprod
A tool for discovery of gait anomalies of elderly from motion sensor data is proposed. The gait ofth
This paper presents an approach to control the attack recall in an anomaly detection system usings
We have systematically studied Bragg Grating Filters in Si photonic-wire waveguides. The refle
With the proliferation of wireless devices, mobile ad-hoc networking (MANET) has become a verye
An innovative idea is proposed and its application to hyperspectral imagery is presented, as avia
Wireless industrial sensor networks are necessary for industrial applications, so that wirelesssen
Windows is an operating system based on message which is built on event - driven mechanism. Hoo
Most current intrusion detection methods cannot process large amounts of audit data for real-ti
This paper proposes a novel method to detect anomalies in network traffic, based on a nonrestricted
A model of database anomalous detection is designed in this paper. The model can not only describ
Anomalies present in the hard tissue of teeth are manifested in several ways such as cavities,deca
The intrusion detection systems (IDS) are designed to identify unwanted attempts at manipulating,
This paper reports the design principles and evaluation results of a new experimental hybridint
Recently the machine learning-based intrusion detection approaches have been subjected to extensi
This paper addresses the problem of normal operation baselining for automatic detection of networ
A new type of database anomalies, which is called Cumulated Anomaly, is addressed in this pape
An important contribution to anti-fraud and supply-chain security comes from the development of
Network defense is an elusive art. The arsenal to defend our devices from attack is constantlylagg
Anomaly detection of privileged programs is one of the most important means to ensure the securi
Assessing the correctness of a digital design is a challenging task hampered by extremely largecir
During the conceptual period of a cable system with a client, the design and engineering mustproac
XML schema design has two opposing goals: elimination of update anomalies requires that the sche
Data mining techniques have been successfully applied in intrusion detection because they can de
Recently the machine learning-based intrusion detection approaches have been subjected to extens
This paper presents the evaluation of an alternative procedure to facilitate engineering students'r
The general basis for anomaly detection and fraud detection is pattern recognition. An effectiveo
How do we find patterns and anomalies, on graphs with billions of nodes and edges, which do not f
Loop nest optimization is a combinatorial problem. Due to the growing complexity of modernarchitec
Most of the packets transmission control algorithm use the load shedding and hop-to-hop choke pack
Unmanned aerial vehicles (UAVs) are well-suited to a wide range of mission scenarios, such as se
Parity violation experiments require precision manipulation of helicity-correlated beam coordinat
In the isolation testing platform, vibration spectrum is tested, The course of test, result fromat
Series of models are designed to test the influences of some parameters such as resistivity ofove
To guarantee mission success and minimize the risk of anomalies in space, current space-powerarch
Anomaly-based intrusion detection (AID) techniques are useful for detecting novel intrusions withou
Clinicians generally agree that the most effective way to treat a malignant tumor within body org
Several studies have considered control theory tools for traffic control in communication networ
Traffic measurement provides critical real-world data for service providers and networkadministr
Traffic measurement provides critical real-world data for service providers and networkadministr
The Nucifer detector will be deployed in the next few months at the Osiris research reactor inFran
This paper addresses the problem of normal operation baselining for automatic detection of networ
Road information is useful in many fields. In this paper, a real-time mapping system is presented
Many applications cache huge amount of data in RAM to achieve high performance. A good example
Intrusion Detection Systems (IDSs) are important components in the strategy of defense in depth
The potential for rapid and infrastructure-less deployment in harsh geographic terrain as well as
Complex Event Processing (CEP) has become increasingly important for tracking and monitoring co
The down scaling of feature sizes and higher process variations in future CMOS nano-technologies ar
A new type of database anomaly is described by addressing the concept of cumulated anomaly in t
Network security is a critical component for any sized organization. While static defencetechnolog
The use of the control theory tools for traffic control in communication networks, for example, t
As the growth of Internet traffic volume and diversity continues, passive monitoring and dataan
Information security is an issue of serious global concern. The complexity, accessibility, andope
With the growth of network connectivity and network sizes, the interest in traffic classification
On the basis of further analyzing the operational mechanism of the existing intrusion detections
The past few years have witnessed the emergence of an increasing number of applications for trac
The Experimental Physics and Industrial Control System (EPICS) is a comprehensive set of softwa
This work augments MINIX 3's failure-resilience mechanisms with novel disk-driver recoverystrategi
The numerical simulation of elastic waves by the staggered grid finite difference method isresearch
Agent Based Models are the natural extension of the Ising or Cellular Automata-like models which
This dissertation presents a distributed denial-of-service adaptive response (DARE) system, capa
In this paper, hybrid wireless sensor network model is envisaged over the power distribution gridfo
With the capability of infecting hundreds of thousands of hosts, worms represent a major threat
Intrusion detection systems (IDS's) ensure the security of computer networks by monitoring traffi
The past few years have seen researchers debate the size of buffers required at core Internetrouter
Digital Signal Processing (DSP) applications have predominantly gained popularity in the study of
We summarize the results of an experimental performance evaluation of WASSP, an automatedwavelet
Nowadays, many computers have been infected with the computer anomalies or viruses. The availabili
Heading estimation plays an important role in pedestrian navigation applications. With the advent
While intelligent agents have been developed to provide objective and expert advice to users, moste
The quality of an immune-based negative selection algorithm hardly depends on quality of generated
We developed and validated a new method to create automated 3D parametric surface models of thel
Software aging is a phenomenon, usually caused by resource contention, that can cause missioncri
We investigated the transmission enhancement and the suppression in rectangular holes array atter
The Interactive Graphical Ocean Database System (IGODS) is a complete software solution to support
With trends in mixed-signal systems-on-chip indicating increasingly extreme scaling of devicedim
We study the problem of directed attacks on the learning process of an anomaly-based IntrusionDe
Flow-based monitoring has become a popular approach in many areas of network management. However
This paper presents an approach for prediction of faults in cellular networks using mobileintellig
This paper describes an improved device model of GaAs MESFETs and heterojunction FETs for the d
The design and manufacture of diode lasers for gas analysis or multilayer thin-film optical device
In wireless sensor networks (WSNs), diagnosis is a crucial and challenging task due to thedistrib
We present a technique for measuring the specific heat (C) and the isothermal magnetocaloric effe
The clutter reduction is one of the most important problems in the ground penetrating radar (GPR)
This paper presents a kind of domestic robot with multifunction such as cleaning, surveillance.
Building robust network monitoring applications is hard given the unpredictable nature of network
This paper presents the design and implementation of a new recognition method to monitor homeacc
We present a centralized integrated approach for: 1) enhancing the performance of an IEEE 802.
Hybrid intrusion detection is a novel kind of model combining the advantages of anomaly detecti
This paper describes a hybrid design for intrusion detection that combines anomaly detection withm
Graded ferroelectrics and ferroelectric multilayers have received great interest as active element
In this paper, a new automatic system in almost real time for overhead power line inspection byUn
Cellular network faults prediction models using mobile intelligent agent are presented in thispa
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Der
A novel wayfinding system is presented with an aim to increase workplace and life independence fo
This paper presents a research that aims at developing a system for microwave imaging andhyperth
Bluetooth, a protocol designed to replace peripheral cables, has grown steadily over the last five
This paper describes ANSER, a system designed to perform surveillance in civilian airports andsimil
The subject of this paper is a statistical fault detection system with the scope of detection,diagn
Malicious attacks against Internet infrastructure are one of the most damaging threats to moderns
Industrial control systems have been globally connected to the open computer networks fordecentra
Aluminum gratings with subwavelength slit widths were designed and analyzed for spectral filterin
During the summer of 2000, a bistatic UHF radar - the RiverSonde - was designed, built, and teste
The paper presents the results of an empirical study of the intrusion detection methods in wire
Soil moisture is a fundamental data source used by the United States Department of Agriculture(U
We present a fully automatic method to detect doctored digital images. Our method is based on arig
Transaction is an important feature for databases, snapshot isolation (SI) is a transactionaliso
The timescale for creating high potentials on shadowed spacecraft surfaces depends on theconducti
An approximate Nash equilibrium strategy is difficult for opponents of all skill levels to exploit,
Design anomalies, introduced during software evolution, are frequent causes of low maintainabilit
The tradeoff between robustness and resilience is a pivotal design issue for modern industrialcont
Functional correctness is a vital attribute of any hardware design. Unfortunately, due to extremel
Code and design smells are poor solutions to recurring implementation and design problems. They
Passive gamma-ray spectrometers composed of attenuation filters and integrating detector material
The Europa Jupiter System Mission (EJSM) has been prioritized as the next Outer Planets Flagship
Especially for large Network Operators (NOs), eliminating routing anomalies is an important aspect
Identifying network anomalies is essential in enterprise and provider networks for diagnosingeven
This study addressed the issues of uncertainty inherent in satellite control and in optimizing th
Both control-flow and data-flow perspectives are primary in process representation of a workflow.
Bad smells are used to identify problematic classes in object-oriented design. Although intuitivel
SystemC is the de facto standard language for electronic system level design and simulation. Sys
Firewall is one of the premier devices of the current Internet, which can protect the entire networ
Detecting bad smells in program design and implementation is a challenging task. Manual detecti
We are developing a next-generation unattended sensor that can detect and identify radiation sou
Subtle implementation errors or mis-configurations in complex Internet services may lead toperf
While online transaction processing applications heavily rely on the transactional propertiesprovid
Anomaly detection is an important task for hyperspectral data exploitation. A standard approach f
The results of a parametric study and design of an ultrawideband dual-polarized array ofdifferen
In service-oriented architecture (SOA), workflows coordinate the services and artifacts to provid
The differential J2 influence is a big challenge to design periodic relative motion between twospac
Stream computing has emerged as a new processing paradigm that processes incoming data streams
In this paper, we analyze the common packet channel (CPCH) mechanism for finite population, fini
The design of multivariate control charts for automatic anomaly detection in computer networks is
Workflow is a set of tasks which are systematized to achieve certain business goal(s), where thetas
The concept of satellite formation flying has been known for some times. Areas of satelliteformation
As one of the workload characteristics, the anomaly behaviorsin real workload have been recognizedas
Anomaly detection is one of the most important applications for hyperspectral images. In this p
This paper studies the importance of visualization for discerning and interpreting patterns of d
This brief describes the application of direct and indirect model reference adaptive control to alig
The Army is currently using the Network Integration Events (NIE) to test emerging technologies i
In this work we present a novel scheme for statistical-based anomaly detection in 3G cellularnetwo
Bipartite graphs can model many real life applications including users-rating-products in online
Today's military systems rely for their performance on combinations of hardware and software. Whi
This paper analyzes the influence of tire pressure and temperature anomalies, describes theimport
This paper addresses the effect of actuator anomalies on flight control design, with particularemp
The success of wireless networks is draining unprecedented research interest that translates i
This paper deals with the issue of anomaly detection in TCP/IP networks based on a control theory
In this paper, a decentralized automatic generation control design based on an artificial immun
The advent of emerging computing technologies such as service-oriented architecture and cloudcomp
Brightness obviously affects the pixel value of an image sensor. Image identification from atradi
This paper presents the power system design and operation of RASAT micro satellite. The design
In recent years, traffic monitoring and especially anomaly estimation have constituted an openpro
Emerging computing technologies such as web services, service-oriented architecture, and cloudco
We fabricated MOSFET devices using flash lamp annealing (FLA), and studied the halo profiledepe
The random access scheme has been shown to be an efficient transfer mechanism of packet data inwi
Network anomaly detection technology has been the research hotspot in intrusion detection (ID) fi
Due to the biological immune system applied to the field of computer security, immunologicalscie
This work presents an anomaly-based system for parental control. This approach combined withtrad
Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but inreal-
Recent studies have shown that standalone anomaly classifiers used by network anomaly detectors
This paper proposes a terminal sliding mode observer for detecting the anomaly intrusions in TCP/
Demand Response (DR) programs are designed to reduce energy consumption for relatively short tim
Some diseases, such as hypertension, require a close control of the patient's blood pressure. Thi
This paper is concerned with the design of viscosity sensors based on a torsional waveguide. Thea
This paper introduces a novel system (architecture and techniques) that aims to secure overlaynetwor
High signal to noise separation has been a long standing goal in the signal detection community.H
Brain-computer interface (BCI) research is primarily conducted with equipment designed for thecon
During maintaining the materialized view in the data warehouse, how to efficiently handle thec
To improve the anomaly intrusion detection system using system calls, this study focuses onneuro
On the basis of a fishnet-like structure, we analyze a metamaterial design involving dimer aperture
This study reports the low frequency magnetoelectric (ME) response of the sintered compositesco
The heat which electric furnace smelt iron alloy is needed is provided by electrode extreme. Whenth
As Internet applications have been rapidly increasing in complexity and scale, they are expected t
To improve the anomaly intrusion detection system using system calls, this study focuses onsuper
Robust statistics is a branch of statistics which includes statistical methods capable of dealinga
Large number of accidents, related to the equipment safety, occurs in various hospitals across the
Manufacturing systems need to become more flexible and agile in order to address permanentlychan
Many of spacecraft anomalies are caused by discharge on solar array. We investigate two methods
This paper evaluates the performance of an adaptive flight control in the presence of multipleactua
This paper discusses about a network anomaly detection system which is aimed at reduction of then
Electric smelting furnaces, applied in the smelting process of infusible mineral, are highlyenergy
Network intrusion detection systems (NIDS) have the challenge to prevent network attacks andunaut
Diagnosing inter-domain routing problems in the Internet is hard. BGP, the defacto inter-domaingl
This paper presents a novel payload analysis method. Consecutive bytes are separated by boundary
With the advent of Cloud Computing, IDS as a service (IDSaaS) has been proposed as an alternativ
During the smelting process of refined copper strip production, to reduce varied losses caused byo
A technical scheme, which can properly arrange IDS and optimally apply the algorithms of detecti
The paper shows an application of neural networks for the prediction of water levels in artesianwe
This paper puts forward a technical scheme which properly arranges IDS and optimally applies the
When a Frequency Selective Surface (FSS) is irradiated by electromagnetic waves with differentinc
Decisions made during the operational phase of a space mission often have significant and immediat
Network traffic abnormalities pose one of the greatest threats for networked environments. Auto
Natural image statistics is an important area of research in cognitive sciences and computer visio
We consider the problem of discovering attributes, or properties, accounting for the a priori state
Configurable software systems allow users to customize them according to their needs. Supportingsu
With the rapid growth of the Internet and other Internet-protocol related applications, manyimp
Electrode regulator system of ore smelting electric arc furnace is a nonlinear, multivariate,parame
In the paper we introduce and evaluate the performance of the Deficit Transmission Time (DTT)sch
Design-level vulnerabilities are a major source of security risks in software. To improvetrustworth
There is a vast amount of existing work that investigates energy aware computing. However to expl
This paper proposed an improved ant algorithm with feedback function extension and dynamic pherom
We first introduce the basics of satellite communication systems including a generic designtopol
Formation design considering the eccentricity and the J2 perturbation is significant for a practical
Satellite altimetry data have been very useful in the study of oceanic eddies. However, eddies a
In this paper, we determined the appropriate number of clusters and the proper amount of entries
The overall performance of a firewall is crucial in enforcing and administrating security,especiall
To perform fault studies (e.g., fault detection, diagnosis, and mitigation) via Internet for are
In this paper, we describe a novel error diffusion scheme for higher halftone quality with lessvis
Geomagnetic field is one of the geophysical fields of the Earth and can be used to limit the error
A robust information infrastructure is required to collect power quality measurements and to exe
The mix genetic and simulated annealing algorithm has been presented to optimize the parameters
Two hydrogen masers (HM, a primary and a backup) are used in the precise timing facility (PTF) to
Microcontrollers are widely used in the area of portable control systems, though they are onlybegi
The following topics are dealt with: logic-and-high-level synthesis; test power temperature cont
The horizontal dissemination of the chip fabrication industry has raised new concerns overIntegrat
Capacitance is the ability of a device to store energy in the electric field. Conventionalcapacit
Over the last four decades of human spaceflight, the capabilities and complexity of mannedspacecr
The Spallation Neutron Source (SNS) is a new 1.4 MW average power beam, 1 GeV accelerator beingbu
The electrical power system of the International Space Station (ISS) represents the largestspac
Accurate orbital propagation is required in order to correctly estimate (in design phase) and carr
Frequency steer limits are important aspects that influence the overall response and design of
This paper presents an application-specific integrated processor for an angular estimation syste
This paper adopts the method of combining both the empirical and normative research to study cred
The Radiation Belt Storm Probes (RBSP) mission is part of NASA's Living With a Star Program, andl
In this challenge report, we will see how to use VERSO in order to analyse Azureus. We answer th
Negative pressure wave is a popular method to detect the occurrence and location of leak incident
The redistribution of class responsibilities is a common reengineering practice in object-oriente
Host intrusion prevention systems for both servers and end-hosts must address the dual challeng
Massive data dissemination is often disrupted by frequent join and departure or failure of clie
Testing has typically been a key means of detecting anomalous performance and of providing afoun
The paper investigates the dynamics associated to the fourth-order converter known as two-induct
In order to study anomalies and trends of the land surface phenology for different vegetation typ
This paper introduces the existing distributed intrusion detection technology and points out thedi
We present a mini-review on the discovery, nature and characterization of the specific family ofna
Launched by NASA on 6 March 2009, the Kepler Mission has been observing more than 100,000 targets
While it is widely understood that criminal miscreants are subverting large numbers ofInternet-co
The paper presents initial step toward new network anomaly detection method that is based on traff
This paper presents a design of high-speed network traffic acquisition subsystem suitable foragen
Many host-based anomaly detection techniques have been proposed to detect code-injection attacks
The National Data Buoy Center (NDBC) traces its beginning to the formation of the National Data
Polymorphic worms evade signature-based intrusion detection systems (IDSs) by varying their pay
Recent trends in computational research show the significance of computation-based biologicalresea
The paper takes the typical Karst-Phreatic in the north of China-Dawu Water Source as an example
This research adopted personal computer transient analyzer-advanced boiling water reactor versi
This paper presents the design of a reconfigurable avionics system based on modern Static RandomA
This paper describes a recently completed project to develop a human factors informed simulation o
We proposed a worm detection and defense system named bot-honeynet in this paper, which combine
Firewall is the de facto core technology of today's network security and defense. However, themana
In this paper, we propose a model to depict AS characters based on Netflow data collected from asp
We apply advanced agent trust modeling techniques to identify malicious traffic in computernetworks
This paper introduces a new approach for visualizing multidimentional weather-direction-relatedtim
We investigate the problem of defending wireless sensor networks against attacks that disruptdyna
Intrusion detection system (IDS) plays a critical role in information security because it provides
Maintenance agents have the purpose of ensuring that the specified conditions are fulfilled, byemp
Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc Net
Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness fo
In order to denote the abnormalities of the patients, we propose a novel approach to detect anomaly
Estimating the operational lifetime of satellites and spacecraft is a complex process. Operationalli
The paper considers the benefits and practicalities of using the Automatic Test Markup Language
When using a Light Detection and Ranging (LIDAR) gun for civil engineering applications, anomal
This paper presents a defect extraction methodology for dislocation anomalies in analogue-mixedsig
In this study, we target to automatically detect stereotypical behavioral patterns (stereotypy)
Enterprise data centers (EDCs) are critical infrastructure to large enterprises, governmentagenci
This paper describes the design and testing of an electromechanical damper assembly for the MarsS
With the advancement in information technology, intelligent information system development is a
This paper investigates the issue of fairness in IEEE 802.11-based multirate wireless local arean
It is an increasingly accepted fact that software development is a non-linear activity withinher
Verification and validation testing of autonomous spacecraft routinely culminates in the explorati
We propose the study of different entropy metrics as measures of complexity of network traffic.Bas
How to provide quality of service (QoS), has been a major issue for the Internet for the pastdeca
Active Peer-to-Peer (P2P) worms present serious threats to the global Internet by exploiting pop
Searching source code is one of the most common activities of software engineers. Text editors
There is an increasing need for early detection and treatment of cancer before a tumor mass becom
Traditional NAC system in enterprise network is in coarse granularity (e.g. IP or MAC address) an
In this paper we study the effect of false data injection attacks on state estimation carried over
This work consists in an investigation about the electromagnetic interaction between two vehicula
This paper focuses on several important topics related to subgraph anomaly detection for compute
The test stands at SSC are enormous structures, each with several hundred - even thousands - ofse
Wireless LANs have been densely deployed in many urban areas. Contention among nearby WLANs isl
This paper highlights some of the work undertaken to assess transmission cable assets and explor
Miniature Unmanned Aerial Vehicles (UAVs) with ability to vertically take off and land (as inquadr
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet w
This paper focuses on reengineering of production warehouses with lean manufacturing. Using as
Over four decades, target tracking has evolved into a mature discipline acting as a backbone forem
Based on the RRC(Radio Resource Control) connection establishment process of network-side descr
The paper presents a network measurement approach to represent samples of network packet header
In this paper, the passive and periodic circular-like formations design at critical inclinationunder
Since the condition of wireless channel is very complicated, many rate adaptation mechanisms we
This paper investigates the problem of anti-slip brake control of high-speed train. An adaptivene
We report results of a comprehensive study of the phase transition at TN (∼643 K) as a functio
A prototype broadband electromagnetic (EM) sensor, GEM-5, has been built and tested as a possiblenew
Millivolt level signals generated in residual muscles can be used to control sophisticated upper
It is an important issue to preserve the consistent delivering order of messages at each site inD
A QoS-aware real-time operating system must schedule multiple tasks which have different timing
In the context of operation of rotating machinery vibrations are inevitable. Consequences oflong-
Development of an autonomous fault diagnosis and recovery system for unmanned aerial vehicles has
Cooperative communications using relays in wireless networks have similar effects of multiple-in
One problem in the contemporary computer networks is monitoring the failure margin, i.e., whatnum
The paper presents security platform based on agents as an efficient and robust solution forhigh-
Terminal equipment like personal computers (PCs) and mobile phones are mainstream devices in theI
Gravity probe B (GP-B) was designed to measure the geodetic and frame dragging precessions ofgyr
The mechanism of anomalous flashover on HV insulation at sufficiently low voltages (AC voltage,l
This paper presents a method for detecting faults in a reaction wheel of an attitude control syst
The solar-powered autonomous underwater vehicle (SAUV) was designed for long-endurance missions,
In wireless local area networks (WLANs) based on IEEE 802.11 families such as a/b/g, mobile sta
This paper examines the effectiveness of two shallow decoys, Deception Toolkit (DTK) and Honeyd.
Data-intensive scientific and engineering applications require both transfers of large amounts of
One essential component of resilient cyber applications is the ability to detect adversaries andpr
Invar-type austenitic Fe-Ni alloys have been studied for a long time due to their noticeablephysi
Diabetic retinopathy (DR) occurs in patients who have had diabetes for at least five years. Dise
Virtual Reality (VR) models were created in order to help in the maintenance of exterior closuresa
Assessing software quality and understanding how events in its evolution have lead to anomalies a
In this paper the ClimaWin concept is introduced. The ClimaWin project's main goals are to improv
In this paper, we propose a model to detect credit card frauds that can occur in various paymentc
Recent developments in biosensor and wireless technology have led to rapid progress in wearable re
This article announces the appointment of Susan Hockfield as the first woman to lead MIT and the
The IEEE 802.11e proposes new features to support quality-of-service (QoS) in wireless local are
We report a large piezoelectric Pb-free system—Ba(Ti0.8Hf0.2)O3-(Ba0.7Ca0.3)TiO3, designed upo
The United States Navy seeks the capability to land manned and unmanned aerial vehicles autonomo
In this paper, we propose an interframe-space (IFS)-based distributed-fair-queuing (IDFQ) mechan
Gait analysis is a widely used approach to detect deformations and allow clinicians to concludepo
Cyber defense competitions (CDCs) can be used to engage students with information technology andr
One of the important activities in re-engineering process is detecting design flaws. Such designf
In order to support the maintenance of an object-oriented software system, the quality of its desi
Correctness is a paramount attribute of any microprocessor design; however, without noveltechnol
There has been much interest in mining anomaly patterns in time series. However, different datase
The rising complexity of network anomalies necessitates increased attention to developing newtec
The presence of design flaws in a software system has a negative impact on the quality of thesoft
The idea of using entropy measurement to detect anomalies or analyze traffic characteristics hasbe
Software design problems are known and perceived under many different terms such as bad smells,fl
Design smells in software models reduce the software quality. Smells identification supports there
As the development of Internet, it is more and more difficult to detect anomaly promptly andprecis
"God class" is a term used to describe a certain type of large classes which "know too much or d
Anomaly detection is an important data mining task. Most existing methods treat anomalies asinco
Physical damages like thermally grown oxide (TGO) layer develop in the coated gas turbine bladed
In this paper, with the research on the development survey of the network anomaly detection at hom
Refactoring can have a direct influence on reducing the cost of software maintenance throughchangi
Anomaly detection is a domain that represents the key for the future of data mining. We will tr
It is difficult for the existing anomaly detection methods to distinguish the burst of normaltraff
This paper proposes a fully unsupervised anomaly detection strategy in hyperspectral imagery ba
In recent years, passenger vehicle product development faces great challenges to maintain highveh
The kernel RX algorithm improves the separability between target and background pixels by mappi
Research on the range anomaly suppression algorithm in laser radar (ladar) range images issignifi
Anomaly detection has been an important research topic in data mining and machine learning. Many
Anomaly detection in computer networks tries to detect traffic deviation from the normal model.T
Software inspection is a known technique for improving software quality. It involves carefullyex
Anomaly detection is a problem of finding unexpected patterns in a dataset. Unexpected patterns
The most important factor in the assessment of the availability of a system is the mean-time tore
This paper describes a new kernel wavelet-based anomaly detection technique for long-wave (LW)F
IEEE 802.11n standard has fulfilled the promise of improved performance when compared to theprev
This paper deals with the problem of Constant False Alarm Rate (CFAR) detection of thermal anoma
Time series arise frequently in many sciences and engineering application, including finance,digi
In this retrospective we will review the paper "Java Quality Assurance by Detecting Code Smells"t
Statistics-based anomaly detections have been studied and implemented widely due to their potenti
Edit distance has been widely used in different areas to evaluate the similarity between strings o
Cloud computing has been more and more popular and widely used as a new model of informationtech
Large amount of spectral wavebands of hyperspectral remote sensing data provide an abundant and
Mitigating design flaws often provides the only means to protect legacy equipment, particularly in
IDS (Intrusion Detection system) is an active and driving defense technology. This paper mainlyf
Anomaly detection is to find aggregate which is different from the most aggregates. Aiming at th
For deployed systems, software fault detection can be challenging. Generally, faulty behaviors ar
At present analyzing mass data in network by data mining technology in order to detect intrusion ha
In anomaly detection, one important issue how to model the normal behavior of activities performedb
An anomaly intrusion detection approach based on hybrid MLP/CNN (multi-layer perceptron/chaoticn
An expert system is a type of program designed to model human knowledge and expertise. This work
An ATE system design based on many condition procedures control ejection seat is presented. This
In order to evaluate the quality of UKM's NIDS, this paper presents the process of analyzing net
Aspect-oriented programming (AOP) aims to improve software modularity, although developers canunw
We propose a novel anomaly detection algorithm based on factor analysis and Mahalanobis distance.
Taking into account that heart auscultation remains the dominant method for heart examination in
Soft computing techniques exploit the given tolerance of imprecision, partial truth, and uncertai
RX algorithm is the most classical algorithm in hyperspectral image anomaly detection algorithm,
The autonomous sciencecraft experiment (ASE), part of the new millennium space technology 6 proj
Some particular attacks can be detected when applying outlier mining to anomaly detection. Beside
Distributed denial-of-service (DDoS) attack presents a very serious threat to the stability andsecu
Context-based anomaly tracking represents a new approach to security enhancement of communicati
Code smells are anomalies often caused by the way concerns are realized in the source code. Thei
This paper presents an approach for detecting network traffic anomalies using detectors generated
This paper deals with the data-driven design of parity space based fault detection (FD) systems. Th
In this paper, we compare five noniterative (one-step) algorithms for two-dimensional electricalr
In this paper, we report and analyze anomalies evidenced in experimental evaluation of a distribu
A code smell is any symptom in the source code that possibly indicates a bad design or programmin
A wide assortment of technologies have been proposed to construct indoor navigation services for
Context: Code smells are assumed to indicate bad design that leads to less maintainable code.Howe
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misusepa
This paper presents the results of harmonic analysis and harmonic filter design for a grid connect
The role of Intrusion Detection System (IDS) has been inevitable in the area of Information andNe
The analysis process of the classical Dendritic Cell Algorithm (DCA) is performed offline, which h
IDS (Intrusion Detection system) is an active and driving defense technology. This paper mainlyf
Coupling-induced frequency shift is identified as a source of spectral response degradation inhig
Recent spates of cyber attacks towards cloud computing services running in large data centers have
Resilient control systems in critical infrastructures require increased cyber-security andstate-a
This paper presents an approach to the integration of the sense of smell in social robots. TheIn
The authors present a methodology for the basis of the development of mathematical algorithms o
Designing automated tests is a challenging task. One important concern is how to design testfixture
This paper presents a new approach to detect attacks from network activities. Network connectionsw
This paper presents a new approach to detecting attack activities. In this method, networkconnecti
This paper presents the results of harmonic analysis and harmonic filter design for a grid-connect
In this paper, we proposed a two phase grid-based clustering algorithm to partition network traffi
With the rapid development of wireless communications and sensor technologies, multi-leadelectro
Many methods designed to create defenses against distributed denial of service (DDoS) attacks are
With increase in recording density of HDD, to deposit a recording medium as designed and also toe
Test code, just like any other code we write, erodes when frequently changed. As such, refactoring
Primary aluminium production is an energy-intensive process. About one quarter of the production
A new method based on neural network for controlling the liquid level of molten steel smeltingnon-c
In view of the vacuum smelting process temperature control for existence of non-linear big lag an
Grouping batch and sorting order (GBSO) for smelting charges is a key cycle in refined copper stri
Design flaws are those characteristics of design entities (e.g., methods, classes) which make the
Recently, with increasing maintenance costs, studies on software quality are becoming increasingl
Most researches treated anomalies as deviations in the overall traffic volume. However, not all o
Negative Selection Algorithm (NSA) is an artificial immune system for anomaly detection. Threewe
The Lockheed Martin F-16 ventral fin redesign-combinatorial test study effort was to demonstrate
The service-centric applications are composed of third-party services. These services delivered b
Code duplication is a common problem, and a well-known sign of bad design. As a result of that, in
Identity crime is well known, prevalent, and costly; and credit application fraud is a specific cas
Data streams outlier mining is an important and active research issue in anomaly detection. Most o
In many applications, such as network congestion monitoring, accounting and network anomalydete
In the cloud computing environment resources are accessed as services rather than as a product.Mo
In this paper we investigate the effects of the signal dependent noise on the CFAR property of t
Service compositions suffer changes in their partner services. Even if the composition does notcha
This paper presents a flexible framework that performs real-time analysis of physiological data tomo
The advantages of smartphones such as integrated sensors, programmability, scalability and clouds
Due to the absence or scarcity of outliers, designing a robust outlier detector is very challengin
In preparing to meet the proposed recycling targets in the WEEE directive, several design forenvi
Distinguish accurately known and unknown attack is a key element to classification model in order
Aimed at “isolated information resources� problem Chinese mine enterprises meet in producti
Advancement and affordability is leading to the popularity of plastic surgery procedures. Facialplas
Entropy estimation plays an important role in many network tasks, in particular, anomaly detectio
This paper presents a novel algorithm for ECG signal feature extraction and proposes a solution
With the development of the data stream technology, The way to detect anomalies in data streamsacc
The 3 most important issues for anomaly detection based intrusion detection systems by using datam
The demand for neural and fuzzy network techniques to predict the increasing load and itsapplicati
A spectral clustering intrusion detection approach is presented in this paper. The basic idea of thea
The forecast of geology prospecting during tunnel boring machine (TBM) working is based on thedet
Simple algorithms can be analytically characterized, but such analysis is questionable or eveni
This paper reports on the development of a mobile robot equipped with semiconductor gas sensorsw
This paper discusses the problem of normal operation baselining for automatic detection of netwo
In order to effectively detect the scan attack on high-speed links, this paper improves the co
The formalism of anomalous change detection, which was developed for finding unusual changes
We have developed and tested a standoff biological aerosol detection demonstrator employingultra
A new approach to sound localization, known as enhanced sound localization, is introduced, offer
In this paper, we present a method that detects lesions in two-dimensional (2D) cross-sectionalbr
Trajectory analysis is very important to human behavior-analysis for video processing based smart
Anomaly detection is considered an important data mining task, aiming at the discovery of elements(
Anomaly endmembers play an important role in the application of remote sensing, such as in unmi
In Verilog programs, multiple non blocking assignments (NBA) to the same signal in an identicalalw
Household electricity consumption is a direct contributor to household expenses. Electricity acts
The zebrafish is a popular model organism that is widely applied with lab-on-a-chip (LoC) techn
We have entered in an era of big data. Graphs are now measured in terabytes or even petabytes;a
This paper investigates an incident that occurred in a grid connected aluminum smelting plant th
The WEEE Directive targets product categories rather than product design. However, as a practicalc
Through-wafer interconnects (TWI) allows 3-D chip stacking enabling integration of multiple chipf
During the electric arc furnace work process, electrode arc lengths show strong random disturbs and
Main by product in ore smelting which is slag from tin production in Malaysia has become a trigge
Sensors and actuators designs have mimicked nature to a large extent. Similar to our five senses
Classification and prediction are effective tools in anomaly and fault detection. They can be used
The wearable platform is an important perspective from which to collect developmental data. Thisgi
Collaborative tagging has emerged as a useful means to organize and share resources on the Web
Time series analysis can be used to analyze structural changes in dynamic networks. the technique
Long-term reliability is critical to the cost effectiveness and commercial success of photovoltaic
Lime is an important smelting raw material for iron& steel plants. Most of large and medium-scaleiro
Design flaws of fault tolerance techniques may lead to undesired consequences in particular faultc
The human larynx is a versatile organ. Main functions are phonation, protection and regulation oft
The orthogonal subspace projection (OSP) approach has received considerable interest inhyperspect
The goal of many current process improvement efforts is to become more agile by adopting an agile
Automatic refactoring techniques guarantee the correctness and effectiveness for the transformati
We propose the new system for scent reproduction at remote site together with video. The odor isi
New node deployment is inevitable in a wireless sensor network because nodes in the network may
This paper presents a scheduling problem for a monoprocessor without preemption with timingconst
Condition of equipment can be presented by a series of descriptors derived from the raw data.Typic
Object-oriented applications are difficult to extend and maintain, due to the presence of impli
In this paper, we propose a novel analytical method, called scheduling time bound analysis, to f
A Sensor network is a sensing, computing and communication infrastructure that allows us toinstrum
Trials on the transmission of olfactory information together with audio/visual information arecur
Network traffic anomalies such as distributed denial of service attacks or the propagation of a n
Regarding the workings of the human mind, memory and pattern recognition seem to be intertwined.
A new data stream outlier detection algorithm SODRNN is proposed based on reverse nearest neigh
The skull or cranium forms a protective cover for the brain and the sense organs, and provides aba
In an effort to promote the space program launched by the government of United States (US), thefi
Recently, Pour et al. proposed a group key management scheme for secure multicast, where each mem
The usage of software metrics for various purposes has become a hot research topic in academia
Due to the nonlinearity, the strong coupling and the frequent random disturbance during the ACsmel
Detection of network traffic anomalies is a key requirement for the provisioning of a reliablenetw
Identifying network traffic anomalies accurately and rapidly is very critical to efficient operati
An anonymous on demand routing protocol (ANODR) was designed based on the previous studies as
Telemetry data is the only source for identifying/predicting anomalies in artificial satellites.Hum
Sampling has become an essential component of scalable Internet traffic monitoring and anomalyde
This paper proposes a novel anomaly detection and classification algorithm that combines thespatio
Anomalies generate vast amounts of bogus traffic, which can overwhelm the network and any attached
Today, spreading global routing information within an Autonomous System (AS) is usually implemen
The anomaly and attack patterns using data mining have attracted in recent years. The social netw
This paper presents anomaly prediction in complex mechanical systems at an early stage where ano
This study was on the computer network layer and application layer data packet interception,analysi
This study proposes a method that creates a scent suited with a user's favor using pairedcompari
Most of the anomaly based techniques produce vast number of alert messages that include a largeper
Security system design and analysis are constantly improving. There are advances in sensors, ins
Firstly, the urban industrial sites are identified in accordance with the international and China's
The topic of this paper is about prediction of performance anomalies caused by software aging. W
The discovery of giant magneto-impedance(GMI) in soft magnetic materials has opened new horizon
Intrusion detection analyzes unauthorized accesses and malicious behaviors and finds intrusionbeha
In this paper, the emphasis is placed on the evaluation of the impact of various packet sampling
This paper presents a method of feature extraction in the context of aviation data analysis. Theun
This paper deals with the successful application of vibration analysis for circuit-breaker (CB)
In this paper we focus on passive measurements of TCP traffic, main component of nowadays traffic
With the complexity of the network environment, there are many problems with using network device
Adaptive Resonance Theory (ART) and k-means have been widely used for clustering, but those twoal
Border Gateway Protocol (BGP) is the de-facto inter-domain routing protocol used across thousands
Code smells are poor implementation choices, thought to make object-oriented systems hard tomain
Wireless mesh networking has been a cost-effective technology that provides wide-coverage broad
Modern networks are complex and hence, network operators often rely on automation to assist ina
Comment statements are useful to enhance the readability and/or understandability of softwaremo
Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operati
In our days, firewalls are widely deployed to secure both hosts and networks against attacks andun
In the last years CUSUM based algorithms have emerged as a good basis to develop efficient syste
Current approaches to detecting bad smells in code are mainly based on software metrics. We sugg
In this paper, we propose a hybrid feature selection method in which Principal Components Analys
Images anomaly refers to a relatively constant image, which suddenly appeared continuous monitori
This work presents the results of an initial empirical study on the subjective evaluation of badco
Owing to the complexity of the production environment the rescheduling has become the core pro
JavaScript is a powerful and flexible prototype-based scripting language that is increasingly us
Code smells are indicators of issues with source code quality that may hinder evolution. Whilepr
Concept studies for the Pascal Mars Scout mission defined an economical approach for establishing
Code smells represent code decay and as such should be eradicated from a system to prevent futur
A novel negative selection algorithm is presented, which is inspired by the negative selectionmech
Keystroke dynamics-the analysis of typing rhythms to discriminate among users-has been proposed
Taking Lishi loess as the media and domestic sewage as the carbon source for treating agent of a
This paper presents research in progress, as well as tentative findings related to the empiricalst
Parameter self-setting fuzzy PID control algorithm for control drying temperature is applied toimp
Diagnosers for keeping track on the occurrences of special events in the framework of unreliablep
Recent trends in software development have emphasized the importance of refactoring in preserving
We propose a novel approach to identify Move Method refactoring opportunities and remove the Fea
As a result of the vast Internet growth, a multi-homing technology is being extensively utilized t
K-means clustering algorithm is an effective method that has been proved for apply to the intru
Event-oriented recognition and display software has been developed to assist human supervisors of
Low software evolvability may increase costs of software development for over 30%. In practice,hum
In Face book-style Social Network Systems (FSNSs), which are a generalization of the access contr
A cast steel magnetic sector mass analyzer is developed for studies of hydrogen and helium ion b
End-user programmers such as scientists and engineers often adopt a visual domain-specific lang
Host-based intrusion detection techniques are needed to ensure the safety and security of softw
Guidelines for refactoring are meant to improve software systems internal quality and are widely
Smelting reduction ironmaking technology, which can solve two problems of scarcity of coking coal
Support vector machine (SVM) is powerful for the problem with small sampling, nonlinear and highdime
Manufacturing details of any ferrous and non- ferrous alloys of complicated configuration posse
Smelting reduction iron making technology will solve the coke shortage and environmental polluti
Based on the high performance of support vector machine (SVM) in tackling small sample size, high
An intelligent prediction modeling approach integrating case based reasoning (CBR) with adaptivep
Blast furnace gas emitted from smelting steel production process is harmful to human health and t
Surveys the research on industrial product quality control problems combined with the flash smel
In order to utilize the both slag and heat energy of the smelting steel slag, the experiments of
Electrode regulator system is a key link in electric arc furnace smelted ore metal, its improvedcon
We propose a new concept of Connected Vehicle Diagnostics and Prognostics (CVDP) to address some
We discuss the problem of detecting dominant motions in dense crowds, a challenging and societal
Information security has become a very important topic especially during the last years. Webserv
With the growing diverse demands for Internet applications, network security issues become moreac
In order to overcome the defect of physic-chemical monitoring system and enhance the intelligence
As the software system changes, the design of the software deteriorates hence reducing the qualit
The increasing reliance put on networked computer systems demands higher levels of dependability
The endpoint parameters are very important to the process of electric arc furnace steel-making, b
Embedded systems permeate increasingly complex, unstructured and non-stationary environments lik
While Markov reward models (MRMs) have been widely used for system dependability evaluation, their
Algorithms based on time-series analysis techniques were explored for maximizing the effectivenes
Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, anderror-pr
HMM (Hidden Markov Model) is a very important intrusion detection tool. The classical HMM training
Active worms have been posing a major security threat to today's Internet. It is widely believed
In the IEEE 802.11 distributed coordination function (DCF), the basic service set (BSS) suffe
The direction of a moving target is an important piece of information in many wireless sensornetw
Genetic Programming (GP) has been successfully applied to supervised classification problems. T
Spreadsheets are widely used in industry: it is estimated that end-user programmers outnumberpro
Electrode-lift regulating system for ore smelting electric arc furnace is a nonlinear,parameter-time-
In previous studies, a variety of unsupervised anomaly detection techniques for anomaly detection
The effectiveness of sample-entropy was practically shown as the measure index of irregularity fro
Since the 1980s many Hong Kong toy companies have transferred their manufacturing operations toC
Government computer networks need a real-time network traffic monitoring tool to detect anomalies
Intrusion detection systems (IDS) are complimentary to other security mechanisms such as access
In recent years there has been increased interest in detecting anomalies in network trafficdata/a
Intrusion detection is one of network security area of technology main research directions. Datami
Intrusion detection System forms a vital component of internet security. To keep pace with thegrow
Geographic routing can provide efficient routing at a fixed overhead. However, the performance of
A temperature surveillance system (TSS) developed on technologies of wireless sensor networks (
Bionic evolution mimicks the unique properties of biological evolution and proves to be an effect
This paper describes the solution of power quality problems arising from 12-pulse smelter conver
In recent years, data communication networks have grown to immense size and have been diversified
As the deployment of network-centric systems increases, network attacks are proportionallyincreas
This paper describes the solution of power quality problems arising from 12-pulse smelter conver
In order to enlarge the insight of the behaviour of heavy metals during the processing ofend-of-li
In this article, we study an ad hoc distributed automated incident detection algorithm for highwa
NextGen civil aviation capabilities depend heavily on systems-of-systems that interact to produceu
This paper presents a method of self-intersection detection and resolution for dynamiccylindrical-
In this study, we propose an automated algorithm (support vector machines, SVM) to recognize the
This paper presents the formulation and evaluation of effective algorithms of reliable data analys
Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties i
This paper explores an integrated modeling and reasoning approach to real-time, embedded diagnos
The double-knockout (dKO) mouse model, with homozygous null encoding for the apoE lipoproteinmol
With the purpose of optimize charging for refined copper strip producing, a multi-object real time
Side-scan sonar is now considered 'the instrument-of-choice' for underwater archaeological surveys
The ternary system of j/BiGaO3-(1-x-y) BiScO3-xPbTiO3 (BGS-PT) ceramics was prepared by using
Two-input layer wavelet neural network prediction model is established, through the analysis of t
With the increasingly exhausting mineral resources and deteriorating environmental pollution,cur
In the smelting process of blast furnace, maintaining the temperature at an acceptable level is t
In this paper, it has been deeply analyzed and studied the safety measurement to bus insulationr
Soils and dominant plants were surveyed in the Siding mineland area. Based on the determination
In view of the low speed, the heavy load, reversing, the frequently brake, the intense impactchar
The aspect of impact on the quality of steel is considered, according to the actual productionproc
This paper deals with the modelling and optimisation of a so-called glass feeder. A feeder is a ki
The in-flight pattern measurements of a sub-millimeter space telescope may be improved bydetermini
Weave-induced skew on printed wiring boards (PWB) for 10+ Gbps SerDes data rates can be verysig
Based on some features in the lead-zinc sintering process, such as complex relations, multipleobjec
To deal with the nonlinear and time-variant of the electrode regulator system in arc furnace, an I
As the electric arc furnace (EAF)operating conditions is difficult to directly measured, resulting
Since a variety of smells can be generated by blending multiple odor components, an odor recor
Until now, there are some literatures discussing the conflict causes in western theory, especially
The concept of synchronization is of fundamental importance in multimedia systems and application
Network attackers usually compromise legitimate user account to gain access to host computer. Tode
This paper presents the results of an empirical analysis of corporate social responsibility fors
Orchid is one of the economic crops in world market. The varieties of shape, style, color and sm
Cephalometric analysis has an important role in diagnosis and treatment of dental disharmonies. I
A current and difficult challenge in the software engineering arena is assessment of code smells an
We have created an electronic nose using the metal oxide sensors from two commercial brands, FIS a
Based on the research subject of harmonic pollution of Nanhai in Foshan, a harmonics survey inNanh
The continuous respiration olfactometer (CRO) was designed as a respiration-synchronous method for
Laser speckle imaging (LSI) has been implemented as a tool of acquiring two dimensional blood fl
This article presents two classifiers based on machine learning methods, aiming to detectphysiolo
Our goal is to characterize the traffic load in an IEEE 802.11 infrastructure. This can bebenefic
Peer-to-peer (P2P) streaming applications have led to the disharmony among the involved parties:
Chinese medical formula (CMF) is the main therapies in traditional Chinese medicine (TCM) clin
New glasses-free 3-D devices are about to hit the market, and their backers are hoping they'll ma
We developed the olfactory display to blend 8 component odors at any composition. The solenoidval
This paper discusses the problem of damping of divergent oscillations of an inertial gyroplatform(
Software Assistive Systems supporting visualization, simulation with aid of virtual reality couldp
Recently, the use of smell in clinical diagnosis has been rediscovered due to major advances inod
Human have five senses which are visual, auditory, smell, touch and taste. The sense of touch isoccu
This article shows our research efforts toward the development of an olfactory display system fo
This paper describes an assessment of urban sustainability based on a fuzzy analytic hierarchypr
The relationship between environment and economic development has become the major concern of t
Tangible agent (TA) is a new medium that communicates the senses of sight, hearing, touch, smell,
In this paper, we describe and then appraise a testing taxonomy proposed by van Deursen and Moon
Traditional pattern recognition (PARC) methods, used in electronic noses (e-noses) are eitherpar
Current refactoring tools only provide support for performing selected refactorings. We show howt
This paper presents the ability of a new electronic nose (EN) system to identify various sources
Refactoring is a technique for improving software structure without changing its behavior which c
Ink-jet microdispensing technology was used to develop an instrument for the quantitativedetermina
Fermentation process in black tea manufacturing plays the key role in determining the quality of
Moldy grain have mildew which are harmful to people and animals. To provide a simple and objective
We introduce the notion of "lexicon bad smell", which parallels that of "code smell" and indicat
State-owned enterprises (SOEs) have multiple goals including economic and non economic targets.
Surface reactions of SnO/sub 2/ gas sensor for aminic molecules such as methyl and ethyl amine a
Cheap and rapid sensing system is required for detecting bad smell or VOC. Although a gas detec
As for its high selectivity of NH4+, large specific surface, simple and inexpensive desorption,ze
This study investigates the effect of individual personality traits on trust in virtualcollaboration
The development of effective user interfaces, appropriate sensors, and information processingtechn
Experienced programmers choose identifier names carefully, in the attempt to convey informationa
Testing the GUI (Graphical User Interface) of a software application is typically accomplished by
In general, data envelope analysis (DEA) assumes that inputs and outputs are "desirable goods", b
An anti-pattern is a commonly occurring solution to a recurring problem that will typicallynegativ
Because artificial neural networks discard the traditional modeling methods, it can extract doma
This paper presents a new intelligent odor localization strategy, which enables a robot to locatet
We propose a new olfactory display system that can generate an odor distribution on atwo-dimension
How to increase the ration of iron and heat recovery from the smelting steel slag is an important
The non-ferrous smelting industry is a major consumer of silica flux with the aim of forming afayal
Developing a fault detection and diagnosis system of complex processes usually involve large volume
The human body odor contains different volatile organic compounds which can be used as biomarke
During the archaeological study of culture layers, much attention is paid to the filler of themate
To solve the problems that available technology was difficult to detect smoke concentration in t
In this paper, the Hammerstein fault prediction modeling based on least squares support vectorma
To highlight the energy-saving feature of the integral device of fuming furnace and waste heatboil
An Aluminium smelter is one of the peculiar loads, which typically represents a series ofelectrol
Operational pattern describe a set of on line operational parameters which need to be determined o
The principal component related variable residual (PVR) statistic is introduced to industry proces
During the decarburization process of smelting steel and iron, not only carbon content is difficult
Monitoring and control of consumption of electricity for great consumers, such as Copper Mining an
Unit electricity consumption is important indicator on production of Mn-Si alloy. There exists a
Access control models implement mechanisms to restrict access to sensitive data from unprivilegedu
In this study, we investigated the memory task performance and the central nervous activity afte
Code smells are particular patterns in object-oriented systems that are perceived to lead todiffi
In this paper, an adaptive fault detection scheme based on a recursive principal component analys
Interruptions in the supply of electricity to customers are inevitable but it is important tomeasur
This paper is focusing on the development of intelligent agent technology and application of that
Daily average output and unit electricity consumption are two important indicators on production
In software development, early identification of fault-prone classes can save a considerable amount
HIsmelt is an energy-saving and emission-reducing technology as compared to the blast furnaces (B
Smelting reduction iron making technology will solve the coke shortage and environmental polluti
In this paper, an industrial-scale alkaline process for the production of Zn powder using brasssm
Aluminium smelters are one of the peculiar loads, which typically represent a series of electrolyt
In this paper, a new modeling approach is proposed by adding the partial least squares (PLS) mode
Effects of the relationship between species and environment on an eco-epidemiological system arei
Olfaction is an interesting new challenging area for intelligent systems to be developed and applied
Fowler and Beck defined 22 Code Bad Smells. These smells are useful indicators of code that may
Unit tests and production code are intrinsically connected. A class that is easy to test usuallypr
Chaos and its application in electrical system are studied in this paper. The simulation of chaos
The basic idea of H2-C mixture reduction reflexes using hydrogen as main reductant and carbon as
The Copper Mining and Smelting Complex Bor (RTB Bor) in the Republic of Serbia has a long hist
Considering the characteristic of the imperial smelting furnace (ISF) data in abnormal distributi
The synergy of supply chain or its efficiency can be analyzed through the measurement of supplych
No doubt exists that information technology is emerging as a key resource in the purchasing proces
This paper reports work involved with the automation of a hot metal carrier - a 20 tonneforklift
A new type of static var compensator (SVC) based on the method of rolling synchronous symmetric
The reduction of iron ore fines using fluidized bed has attracted more attentions in recent year
This paper reports work on the automation of a hot metal carrier, which is a 20 tonne forklift-t
The moisture control for sinter mixture is always a difficulty in industry. This paper presents am
With the ever-increasing problem of addressing end-of-life electronics, more emphasis is beingpl
This paper describes an intelligent integrated state optimization technique for the lead-zincimperi
Two Neurofuzzy model of a mixing chamber pressure have been proposed. The process is a part of
Based on some features in the lead-zinc sintering process, such as strong non-linearity and a lar
The anode effect that occurs in electrolytic smelter pot is responsible for gases such as PFC's.Th
Two key variables in blast furnace ironmaking - silicon content in hot metal ([Si]) and hot metal
The principal copper pyrometallurgical technology employed in Chile is the Teniente converter (TC
Inside the electronics we all use and enjoy a multitude of materials and substances does the wor
The productivity of AC electric arc smelters widely used in the nonferrous metals industry isrel
Smelters have a difficult task in the reduction of the green house gas emission (GHG) by decreas
PCA is a popular technique used in model reduction and fault diagnosis and isolation. In this wor
In this paper, the environmental impact from zinc leaching residue was analyzed, and a process of
In this work the effect of reaction temperature, sulfuric acid concentration, liquid-to-solid ratio
In the smelting process of Ladle Furnace, the steel temperature affects the LF's operation andrh
An efficient improved multi-objective particle swarm optimization algorithm based weighted phero
To solve the problem of production logistics control resulted from dynamic material batch in ironand
This paper considers the relevance of operations research to electrical transmission network dema
Controlling the product quality and energy consumption within their desired ranges is the mainobje
In the process of smelting of iron alloy, the carbon content has been a most important reference
For the complexities of production and the limitations and lacks of methods for cost estimation o
An industrial structure model is built based on complex networks theory and input-output theory.T
The Eleventh Five-Year Plan has been fully fulfilled and achieved much progress in industrialecon
In this paper, a new soft sensor model of LF molten steel temperature is introduced after analy
Model Based Predictive Control is a class of computer algorithms that explicitly use a process mod
Sulfur dioxide is emitted by volcanoes, produced by combustion of fossil fuels or smelting of ores
Model based predictive control is a class of computer algorithms that explicitly use a process mode
Pneumatic drying process of ore concentrate is a typically complex industrial process, whichinvol
Korea Atomic Energy Research Institute (KAERI) has been developing an advanced spent fuelconditi
Depending on varying prices of electricity, an optimal power-dispatching system (OPDS) is develope
Process monitoring and fault diagnosis have been studied widely in recent years, and the number
The environmental impact of heavy metal pollution from mining activities is of growing concern.
Broadband acoustic echoes were collected on free-swimming alewives Alosa psuedoharungus, rainbow
Schools in the United States are required to supply specific specialty services such as speech,oc
A value network refers to a collection of interdependent firms that contribute to the creation o
In order to overcome the problem that the least square support vector machines (LS-SVM) usingGau
Accurate prediction of the end-point temperature and carbon content of AOD furnace is of greats
To deal with the problem of high cost and low accuracy existed in traditional methods of lead-zin
Deformation resistance of X80 pipeline steel was researched by experiment with the Gleeble-3500.
Arc fusion method in a submerged arc furnace has been successfully employed to grow high qualit
This study deals with the soil contamination as a reason of the emissions during 50 years work of
This study develops a new type AOD converter temperature measurement system. We transmitted lig
The structural features and parameter identification of wiener model are firstly introduced in t
For the problem of adding cold charges operation in the PS Converter copper smelting, a kind ofim
Blast furnace condition and stable operation for blast furnace is crucial, The production practices
Due to ferroalloy submerged arc furnace smelting is an extremely complicated chemistry and physi
The blast furnace is used to smelt iron in the steel industry. Ore and cokes are input and hot air
The electric arc furnace electrode regulator system of adaptive control problem. First proposed t
Producing sulfuric acid from metallurgical off-gas process is a complex system, SO2 conversion ratio
Carbon value online measurement is one of the most important tasks of the AOD furnace ferroalloyp
We analyze here the topic of integration, in the area of process automation, from sensor/actuator
In this paper, the forecasting method for the furnace bottom temperature and carbon content insm
Monitoring and management of technological processes in the complex production units requiresinte
Principal component analysis (PCA) has been effectively applied in fault detection and in diagnosi
AOD furnace smelting low-carbon ferrochrome for the actual situation of the affected end AOD stov
This paper presents a smell analysis system used to identify if grain is mildewed. This system is
Smell (olfaction) can be critical to our daily living - for example, smelling smoke from a fire in
A previous study by Bieman et al., investigated whether large, object-oriented classes were mores
Failure science is the new branch of management science. Failure science starts from revealinghidden
Social unconventional emergencies not only bring disaster to human life and living environment,
This paper describes exploratory studies of interruption modalities and disruptiveness. Fiveinterru
The smell reproduction technique in addition to those for vision and hearing are useful in thefi
The studies on the assessment of urban landscape river health are scarce. The aggregative indicato
In neuropsychology it is commonly recognized that 70% of all the sensory receptors in the brain ar
A new method for the odor recorder, electronically recording the recipe of odors or scents made
Today quality and safety are major drivers for the seafood industry. In this paper, computer visi
Manual reviews and inspections of software artefacts are time consuming and thus, automated analy
The smell reproduction technique in addition to that for vision and hearing will be useful in thef
During recent years, technological innovations, especially increasing demand on green technologies
For a long time the judgment of zinc fuming furnace's smelting end point has primarily depended o
This paper presents a historical overview of development and application of a distributed system
Time delay is introduced into coloured Petri net, then the fixed time delay coloured Petri net ise
Under the background of manufacturing green innovation system, this dissertation studies the modes
The objective of this study was to prove the general applicability of an electronic nose forana
Based on the quantitative relationship of reaction time and contact time, in connection with thet
Energy shortage has seriously hindered the economic development in many countries. The energycons
The olfactory bulb (OB) is the first stage of olfactory information processing in the brain. On i
Current clinical diagnostics are based on biochemical, immunological, or microbiological methods
The harmony monitoring mechanism of government system is put forward for improving the synerge
This paper discusses the problem of damping of divergent oscillations of the parameters of updatab
In order to shorten the production cycle of traditional fermented fish, cured fish was fermented b
Wind power, as an alternative to fossil fuels, is plentiful, renewable, widely distributed, clean,
External world is physical world, where objects, electromagnetic waves, air waves and temperatures
There have been growing interests in privacy preserving data mining. Secure multiparty computation
The Indian spice industry by and large is primitive yet. Screen cleaner and dust removing are t
The Indian spice industry by and large is primitive yet. Screen cleaner and dust removing are t
Dhaka the capital city of Bangladesh has around 12 million people generating around 5000 tons of
As a kind of public goods, there is always disharmony between official standard and factualindustr
Virtual slaughtering and dissection is a way to learn about anatomy and dissect animals withouthar
Given more efficient utilization of waste, the social impact of waste recycling is far-reaching ins
This paper studies the application of the differential electronic nose for the recognition ofcoffee
In the process of retting flax, there is a large quantity of wastewater with bad smell and highcon
As we advance with the implementation of novel technologies, apparati and protocols that combine
The world is becoming more and more "health conscious" and there is an important need for theimpr
Effects of temperature, pH value, substrate concentration and enzyme inhibitors on polyphenoloxi
In this article we discuss the sensory experiences of playing computer games by exploring the s
Allergic rhinitis (AR) is the sixth most common chronic illness worldwide, which has a significant
Herbivores select diets from an array of plant species that differ in physical and chemicalcharac
In these paper we have used a metal oxide sensor based electronic nose (EN) to analyse five teasa
Non-steady physical and chemical processes in oxide materials are very important when reachingex
Identifying and managing uncertainty is an essential part of the engineering of complex systems. Bu
Odor approximation is a technique of creating a scent similar to a target scent by blending mult
Recently, many researches of the extraction of personal comfort and preference have been studied
In recent years, Rare Earth (RE) has been mined, smelted and applied largely. Because the Rare E
The blast furnace smelting has a very close relationship with the shape of the blast surface and th
To study the method for prognosis based on diagnostic information technology in Chinese medicine
A variety of smells can be realized by blending multiple odor components using an olfactory di
Along with China's economic and social development, there are more and more disharmonies withinrur
The AOD stove ferroalloy steel-making endpoint temperature and the ingredient are the controlobje
Growing industrialization and its implication to nuisance smells led to an increased interest in
In recent years, the Southeast Guizhou has been developing quickly in industrial economy. But itsin
Since a set of odor components that can cover a wide range of smells have not been yet revealed,
The Northeast China leading industries were chosen and their development strategies were analyze
According to recent studies, architecture degradation is to a large extent a consequence of the in
In this paper we present an empirical study on the refactoring activity in three well-known project
Awareness mechanisms are normally used to deliver context information to computer systems users.
Code smells are indicators of issues with source code quality that may hinder evolution. While pr
One of the widely used techniques for evolving software systems is refactoring, a maintenance act
Antipatterns and code smells have been widely proved to affect the change-proneness of software c
Tests are central artifacts of software systems and play a crucial role for software quality. In sy
Context: The concept of code smells is widespread in Software Engineering. However, in spite of th
The cross-modal interaction between vision and other senses is a key part of how we perceive the re
When using object-oriented frameworks it is easy to overlook certain important method calls that are
Access control models implement mechanisms to restrict access to sensitive data from unprivileged
There are various activities that support software maintenance. Program comprehension and detecti
In this paper, we proposed an intrusion detection system for detecting anomaly on Androidsmartph
This paper first designs a database anomaly detection model. This model can be more accuratedepic
Video anomaly detection can be used in the transportation domain to identify unusual patterns such
Security is still a major concern in Cloud computing, especially the detection of nefarious use o
With the rapid growth of communication technologies, the widespread use of the Internet, and there
The aim of this work is an approach using multisensor remote sensing techniques to recognize the
Most of valuable information resources for all organizations are stored in database. It's a serio
Wireless Sensor Networks (WSNs) have become a hot research topic in recent years. They have many
Recent studies have indicated that the effects of meteoroid and debris impacts on spacecraft are n
The main purpose of this work is the design and implementation of an integrated wireless network a
As a special type of stealth attacks, a rootkit hides its existence from malware detection andma
In this paper, a dual-polarized ultra-wideband antenna element for wide-angle scan phased array,
The lifetime of LED luminaires, made of high power LED arrays, operating under hostile conditions
Summary form only given. This paper provides a summary of a task that was undertaken at the JetP
Wireless sensor networks (WSNs) are gaining more and more interest in the research community due
Principle of anomaly detection technique based on a chi-square statistic was described. Algorithm
Two methods for distinguishing between healthy subjects and patients diagnosed with Parkinson'sdi
This paper explores anomaly detection algorithms to detect vulnerabilities on Mississippi riverle
Measuring accurate graph snapshots of peer-to-peer (P2P) overlay networks is essential to unders
Traditional process modeling in contemporary information systems concentrates on the design andc
We propose a reliable technique to detect behavior anomalies in monitoring critical infrastructu
The design of Shipboard Integrated Power System (IPS) with variable frequency drives (VFD) arecons
Digital Data is everywhere - from massive amounts of single sourced to huge conglomerations ofsma
This paper is a case study of the design process and validation of a simple and effective solutio
This paper addresses the problem of improving the quality of metadata in biological observationda
Cardiovascular disease (CVD) has become the leading cause of human deaths today. In order to c
Page Rank is the Google web page ranking algorithm which is based on web link analysis, and has
The basic method and concept of time series feature extraction is applied to anomaly analysis ofs
Mobile Ad-hoc Networks (MANETs) are most popular area with many applications and it hadinfrastruc
An advantage of code smells over traditional software measures is that the former are associatedw
Several code smells detection tools have been developed providing different results, because sme
The oxygen enriched bottom blowing furnace is one of the main equipment in production of coppermatt
Android provides a WakeLock mechanism for application developers to ensure the proper executio
To prevent the quality decay, detection strategies are reused to identify symptoms ofmaintainabili
Network streams have become ubiquitous in recent years because of many dynamic applications. Suc
In this paper, intelligent algorithms for intrusion detection are proposed which detect the networ
Detection of Earth surface changes is essential to monitor regional climatic changes, avalanche
In recent years, Encryption has fascinated extra responsiveness owing to the swift development i
Auction fraud and anomalies detection is proved to be a troublesome task. The fraudulent cliques c
The paper proposes a novel approach to recognize smell stimuli from the electroencephalogram (EEG)
Reducing fossil consumptions of aluminum smelting productions, which consumes around 8% electric
Code smells are a well-known metaphor to describe symptoms of code decay or other issues with cod
In order to solve high carbon emission and high consumption of energy in metallurgical industry,
With the emergence of tools to support visual mashup creation, tens of thousands of users haves
Olfaction is a very important sense in daily life. Decline in olfaction has been reported to be a
The paper introduces a study in research of principles applicable to the real-time measurement
This paper formulates the Central Detection Officer (CDO) problem in which a central officer de
Data mining provides a useful environment and set of tools for processing large datasets such asI
In this paper the authors present an original methodology that may be useful for dedicated onlin
With the wide application of wireless sensor network, there has been a growing need for the use o
Determination of burning smell is important because it can help in early fire detection andpreve
Today's enterprise systems are continuously monitored for timely detection of behavioral anomalie
Interactive evolutionary computation (IEC) is known as an effective method to optimize mediacont
Multimedia streaming applications have substantially changed the market policy of an increasingnumb
In view of the current situation of the industry, our country energy resources are relatively sc
What we perceive with our senses becomes the basic real time information that directs and helps
Code smells represent symptoms of poor implementation choices. Previous studies found that these
Aluminum smelting is one of the most energy consuming industrial processes involving AC-DCconve
Efficiency of parallel computation is always a fundamental research field in high performancecomp
This paper proposes a fault-prone prediction approach that combines a fault-prone prediction mod
High energy-consuming enterprises consumption account for a large proportion in the total socia
VOD(Vacuum Oxygen Decarburization) is a special furnace steel refining process. In the process,
In Vacuum Oxygen Decarburization(VOD) steel refining process, the endpoint carbon content andend
The rise of new electric customers with type of load of iron smelting electric furnace has made P
As India is a hub of spices, quality assessment is mandatory for all these spice industries. Till
In this paper, the author discusses three techniques that will help end users find and fixperform
By using the 2001~2011 Ferrous metal smelting and rolling processing industry environment ofecon
There are a big number of studies about wine regarding the vinification process and the finalprodu
Recently, robot technologies are applying to the multidisciplinary fields of study due to thedevel
This study has been carried out in order to evaluate the job efficiency among the graduates of Is
The Integrated Modular Avionics (IMA) architecture has been a crucial concern for the aerospace
The central nervous system rapidly learns that particular stimuli predict imminent danger. This lea
Hydrogen sulfide (H2S) is a colorless, flammable, extremely hazardous gas with a "rotten egg" sm
Aside from the recent progresses in robotics, autonomous robots are still limited in assisting dis
There are various activities that support software maintenance. Program comprehension and detecti
With the emergence of tools to support visual mashup creation, tens of thousands of users have
An advantage of code smells over traditional software measures is that the former are associated
The FBS model describes theoretically the design process of a product. Only few papers present real
The design and the security verification of side-channel resistant cryptographic hardware often r
Experiences from the field setup of utility grid low voltage DC (LVDC) distribution are discussed.
The redox behavior of ethanethiol in wines was studied considering its action in presence of resver
Maceration and fermentation time and temperatures are important factors affecting wine quality. I
The aim of these investigations was to determine the influence of mineral adsorbents "Minazel" and
The common proprioceptive sense consist sight, sound, touch, taste and smell. This aim of paper
A number of studies have shown that seemingly morally irrelevant factors influence the moral judg
There are a big number of studies about wine regarding the vinification process and the final prod
Enteromorpha prolifera is an important economic seaweed in China. The characteristic aromatic co
The aim of this study was to make sausage using by-products of the production process of canned
Awareness mechanisms are normally used to deliver context information to computer systems users.
Carrion smell is strongly repugnant to humans and triggers distinct innate behaviors in many other
Human have five senses which are visual, auditory, smell, touch and taste. The sense of touch is occ
The southern house mosquito, Culex quinquefasciatus, has one of the most acute and eclectic olfa
The Bombyx mori pheromone-binding protein (BmorPBP) is known to adopt two different conformation
There are major impediments to finding improved DEET alternatives because the receptors causing
We investigated the sensitivity of single olfactory receptor cells to 2,4,6-trichloroanisole (TCA
Although the response properties of most neurons are, to a large extent, determined by the presyna
Various insects and small animals can navigate in turbulent streams to find their mates (or food)
A gas sensor array based on peptide modified gold nanoparticles deposited onto 20. MHz quartz cry
We propose a new olfactory display system that can generate an odor distribution on a two-dimensio
Understanding the relationship between genetic variation and phenotypic variation for quantitati
In modern cooling systems the requirement of higher performance demands highest possible heat tr
JavaScript is a powerful and flexible prototypebased scripting language that is increasingly use
This novel study revealed a critical design flaw in conventional gundrilling which prevents effectiv
In the study at hand, the authors pose the question how people are influenced by olfactory stimu
We developed a novel nano-capsule using the micellization ability of α-lipoic acid for the purpose
To prevent the quality decay, detection strategies are reused to identify symptoms of maintainabil
Improving and optimizing user-perceived smartphone performance requires understanding device, s
Determination of burning smell is important because it can help in early fire detection and prev
The cross-modal interaction between vision and other senses is a key part of how we perceive the re
The work presents the optimization of the quality characteristics of dried apples and celery obta
Anomaly detection is indispensable for satisfying security services in mobile ad hoc network (M
Abstract Antikythera mechanism should be the oldest astronomical geared calculator in the world. I
Lessons from safety–critical anomalies during operation provide important information for cons
Abstract Workflow design has become a critical function in enterprise information management. How
Abstract Ground-penetrating radar (GPR) is widely used in the field of civil engineering; it can
Abstract In this paper we present the results of a study we recently conducted by analyzing a larg
Abstract Workflow-based workloads usually consist of multiple instances of the same workflow, whi
Remote handling operations at \{JET\} have encountered many challenges to achieve the installatio
Research Tools in Anomaly-based Intrusion Detection are highly dependent on appropriate traffic tra
Status/Selection Status/Extraction Year
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
ACCEPTED UNCLASSIFIED 2009
ACCEPTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2012
ACCEPTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
ACCEPTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
ACCEPTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED
ACCEPTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
ACCEPTED UNCLASSIFIED 2013
ACCEPTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2014
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
ACCEPTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
ACCEPTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
ACCEPTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
ACCEPTED UNCLASSIFIED 2012
ACCEPTED UNCLASSIFIED 2012
ACCEPTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
ACCEPTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
ACCEPTED UNCLASSIFIED 2011
ACCEPTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
ACCEPTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
ACCEPTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
ACCEPTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
ACCEPTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
DUPLICATED UNCLASSIFIED 2010
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
DUPLICATED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
ACCEPTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
ACCEPTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
DUPLICATED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
DUPLICATED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
DUPLICATED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
DUPLICATED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
DUPLICATED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
DUPLICATED UNCLASSIFIED 2007
DUPLICATED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
DUPLICATED UNCLASSIFIED 2007
DUPLICATED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
ACCEPTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
DUPLICATED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
ACCEPTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
DUPLICATED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
ACCEPTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
DUPLICATED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
DUPLICATED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
DUPLICATED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2008
DUPLICATED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
DUPLICATED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
DUPLICATED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2012
DUPLICATED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2003
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
DUPLICATED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
ACCEPTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2002
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2005
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2003
REJECTED UNCLASSIFIED 2004
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2006
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2009
REJECTED UNCLASSIFIED 2008
REJECTED UNCLASSIFIED 2010
REJECTED UNCLASSIFIED 2007
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2012
REJECTED UNCLASSIFIED 2011
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
ACCEPTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
ACCEPTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
DUPLICATED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
REJECTED UNCLASSIFIED 2013
Journal
Proceedings of the 2012 International Conference on Software Engineering
ACM SIGGRAPH 2009 Emerging Technologies
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the 4th IEEE International Conference on Multimodal Interfaces
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Proceedings of the 4th symposium on Usable privacy and security
Proceedings of the 4th Workshop on Refactoring Tools
Proceedings of the 6th international conference on Multimodal interfaces
Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering andMeasurement
Proceedings of the 17th International Conference on Evaluation and Assessment in SoftwareEngineering
Proceedings of the Fourth International Workshop on Mining Software Repositories
Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics
Proceeding of the fifteenth annual conference on Genetic and evolutionary computationconference
Proceedings of the 11th international conference on Ubiquitous computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ACM Trans. Multimedia Comput. Commun. Appl.
Proceedings of the South African Institute of Computer Scientists and Information TechnologistsConference on Knowledge, In
Proceedings of the 2008 workshop on Defects in large software systems
Proceedings of the International Conference on Advances in Computer Enterntainment Technology
Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems,languages, and applica
Proceedings of the 10th international conference on Model Driven Engineering Languages andSystems
Proceedings of the 24th international conference on Perspectives in Conceptual Modeling
Proceedings of the 5th international symposium on Software visualization
Proceedings of the First Eurographics conference on Computational Aesthetics in Graphics,Visualization and Imaging
Proceedings of the ACM-IEEE international symposium on Empirical software engineering andmeasurement
Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering andMeasurement
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the Fifth Workshop on Refactoring Tools
Proceedings of the 14th ACM international conference on Multimodal interaction
Proceedings of the 33rd International Conference on Software Engineering
Proceedings of the 17th annual ACM symposium on User interface software and technology
Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering andMeasurement
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
Ninth international workshop on Principles of software evolution: in conjunction with the 6thESEC/FSE joint meeting
Proceedings of the 10th International Conference on Virtual Reality Continuum and ItsApplications in Industry
Proceedings of the 4th ACM symposium on Software visualization
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the 8th International Conference on Advances in Computer EntertainmentTechnology
Proceedings of the 16th International Software Product Line Conference - Volume 1
Proceedings of the 20th ACM international conference on Information and knowledge management
Proceedings of the 33rd International Conference on Software Engineering
Proceedings of the 24th Spring Conference on Computer Graphics
Proceedings of the tenth international conference on Aspect-oriented software development
Proceedings of the 11th annual international conference on Aspect-oriented SoftwareDevelopment
Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation
Proceedings of the 8th annual conference on Genetic and evolutionary computation

Ninth international workshop on Principles of software evolution: in conjunction with the 6thESEC/FSE joint meeting
Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering
Proceedings of the Fifth Workshop on Refactoring Tools
Proceedings of the 11th International Conference on Human-Computer Interaction with MobileDevices and Services
Proceedings of the 2012 International Conference on Software Engineering
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
Proceedings of the the 7th joint meeting of the European software engineering conference and theACM SIGSOFT symposium
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the 33rd International Conference on Software Engineering
Proceedings of the 27th Annual ACM Symposium on Applied Computing
ACM Trans. Softw. Eng. Methodol.
Proceedings of the 2nd Workshop on Managing Technical Debt
Proceedings of the 1st Augmented Human International Conference
Journal of Systems and Software
Information and Software Technology
Electronic Notes in Theoretical Computer Science
Journal of Systems and Software
Sensors and Actuators B: Chemical
Sensors and Actuators B: Chemical
New Scientist
Biomaterials
Sensors and Actuators B: Chemical
Journal of Loss Prevention in the Process Industries
International Journal of Medical Informatics
Journal of Systems and Software
Science of Computer Programming
Signal Processing
Information and Software Technology
Engineering Failure Analysis
Computer-Aided Design
Information Sciences
Journal of Operations Management
Expert Systems with Applications
Knowledge-Based Systems
Engineering Failure Analysis
International Journal of Industrial Ergonomics
Sensors and Actuators B: Chemical
International Journal of Medical Informatics
Information and Software Technology
Information Processing Letters
Procedia Engineering
Engineering Structures
Procedia Engineering
Engineering Failure Analysis
International Journal of Medical Informatics
Applied Thermal Engineering
Information and Software Technology
Construction and Building Materials
Journal of Systems and Software
Procedia Engineering
Journal of Advanced Research
Computers & Security
Interacting with Computers
Desalination
Expert Systems with Applications
Electronic Notes in Theoretical Computer Science
Sensors and Actuators B: Chemical
Sensors and Actuators B: Chemical
Sensors and Actuators B: Chemical
Sensors and Actuators B: Chemical
Acta Astronautica
Sensors and Actuators B: Chemical
Information and Software Technology
Journal of Advanced Research
Sensors and Actuators B: Chemical
Journal of Systems and Software
Desalination
Sensors and Actuators B: Chemical
Building and Environment
Sensors and Actuators B: Chemical
Sensors and Actuators B: Chemical
Fire Safety Journal
Materials Today
Sensors and Actuators B: Chemical
Information and Software Technology
Chemical Papers
Advanced Materials Research
2013 2nd International Workshop on User Evaluations for Software Engineering Researchers, USER 2013 - Proceedings
Lecture Notes in Electrical Engineering
IEEE Sensors Journal
International Journal of Design Management and Professional Practice
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
2013 5th International Conference on Computer Science and Information Technology, CSIT 2013 - Proceedings
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Journal of Systems and Software
Food and Bioprocess Technology
International Journal of Software Engineering and its Applications
World Applied Sciences Journal
Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering
Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation, ICST 2013
IEEE Transactions on Software Engineering
2013 10th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Te
Signal Processing
PLoS Computational Biology
International Journal of Food Science and Technology
Communications in Computer and Information Science
Brazilian Archives of Biology and Technology
2013 9th International Symposium on Mechatronics and Its Applications, ISMA 2013
Proceedings of the IEEE VLSI Test Symposium
IEEE Transactions on Software Engineering
Nature
Advance Journal of Food Science and Technology
Knowledge-Based Systems
European Journal of Lipid Science and Technology
Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering
International Journal of Food Science and Technology
Journal of Object Technology
IEEJ Transactions on Sensors and Micromachines
IEEJ Transactions on Sensors and Micromachines
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
IET Software
Information and Software Technology
Jisuanji Yanjiu yu Fazhan/Computer Research and Development
Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering
Information Sciences
Proceedings of the National Academy of Sciences of the United States of America
Indoor Air
Journal of Medical Systems
SMT Surface Mount Technology Magazine
European Food Research and Technology
Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering
ACM International Conference Proceeding Series
ACM International Conference Proceeding Series
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Sen'i Gakkaishi
Zywnosc. Nauka. Technologia. Jakosc/Food. Science Technology. Quality
Perception
Construction and Building Materials
Journal of Systems and Software
Nature
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the National Academy of Sciences of the United States of America
Intelligent Automation and Soft Computing
Information Visualization
IEEE transactions on visualization and computer graphics
Food Science and Technology International
Applied Mechanics and Materials
Applied Mechanics and Materials
Proceedings of the National Academy of Sciences of the United States of America
International Journal of Molecular Sciences
Bioinspiration and Biomimetics
Dyna (Spain)
Proceedings of the National Academy of Sciences of the United States of America
Biosensors and Bioelectronics
ACM Transactions on Software Engineering and Methodology
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice
Nature
Desalination
Artificial Life and Robotics
Air Force Magazine
Jurnal Teknologi (Sciences and Engineering)
Critical Reviews in Food Science and Nutrition
KSCE Journal of Civil Engineering
Proceedings - 2012 4th International Workshop on Empirical Software Engineering in Practice, IWESEP 2012
Perception
Science
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS
Proceedings of the National Academy of Sciences of the United States of America
Nature
ICMI'12 - Proceedings of the ACM International Conference on Multimodal Interaction
IEEE International Conference on Software Maintenance, ICSM
IEEE International Conference on Software Maintenance, ICSM
IEEE International Conference on Software Maintenance, ICSM
Journal of Object Technology
Proceedings of the 2012 2nd International Conference on Instrumentation and Measurement, Computer, Communication and
IEEE International Conference on Software Maintenance, ICSM
Proceedings - Working Conference on Reverse Engineering, WCRE
International Journal of Designed Objects
Proceedings - IEEE Military Communications Conference MILCOM
Proceedings of the 2012 International Conference on Artificial Intelligence, ICAI 2012
Journal of Software
11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliab
11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliab
Proceedings of the International Astronautical Congress, IAC
ICDC 2012 - 2nd International Conference on Design Creativity, Proceedings
10th International Conference on Healthy Buildings 2012
Seeing and Perceiving
11th IEEE International Symposium on Mixed and Augmented Reality 2012 - Arts, Media, and Humanities Papers, ISMAR-AM
ECS Transactions
Proceedings of the International Conference on Sensing Technology, ICST
Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE
Conference Record of the IEEE Photovoltaic Specialists Conference
Applied Mechanics and Materials
Nature
Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/D
Advances in Natural and Applied Sciences
Proceedings - 2012 IEEE 17th International Conference on Engineering of Complex Computer Systems, ICECCS 2012
Journal of Emergency Management
2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Scie
SIGMAP 2012, WINSYS 2012 - Proceedings of the International Conference on Signal Processing and Multimedia Applicatio
2012 ICME International Conference on Complex Medical Engineering, CME 2012 Proceedings
International Symposium on Empirical Software Engineering and Measurement
ACM International Conference Proceeding Series
2012 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012 - Proceedings
2012 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012 - Proceedings
International Journal on Semantic Web and Information Systems
IEEE International Workshop on Quality of Service, IWQoS
Information Technology Journal
Perception
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition)
Shenyang Jianzhu Daxue Xuebao (Ziran Kexue Ban)/Journal of Shenyang Jianzhu University (Natural Science)
Combinatorial Chemistry and High Throughput Screening
Neural Networks
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Nature
Proceedings of the National Academy of Sciences of the United States of America
2012 3rd International Workshop on Recommendation Systems for Software Engineering, RSSE 2012 - Proceedings
ACM International Conference Proceeding Series
ACM International Conference Proceeding Series
Ruan Jian Xue Bao/Journal of Software
Empirical Software Engineering
Neural Networks
Expert Systems with Applications
International Journal of Food Microbiology
Proceedings - International Conference on Software Engineering
Proceedings - International Conference on Software Engineering
Proceedings of the ACM Symposium on Applied Computing
IEEE Latin America Transactions
Interacting with Computers
International Journal of Gaming and Computer-Mediated Simulations
IPPTA: Quarterly Journal of Indian Pulp and Paper Technical Association
Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012
PLoS Computational Biology
IET Nanobiotechnology
Biosensors and Bioelectronics
Haptics Symposium 2012, HAPTICS 2012 - Proceedings
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
AOSD'12 - Proceedings of the 11th Annual International Conference on Aspect Oriented Software Development
Eau, l'INDUSTRIE, les Nuisances
PLoS Computational Biology
Journal of Molecular Modeling
Eau, l'INDUSTRIE, les Nuisances
Perception
Communications of the ACM
International Journal of Information Security
Journal of Consciousness Studies
PLoS Computational Biology
Advanced Materials Research
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Frontiers in Neuroengineering
International Journal of Food Microbiology
IEEE Transactions on Instrumentation and Measurement
Nature
Biomaterials
ACM Transactions on Multimedia Computing, Communications and Applications
Advanced Materials Research
Biosensors and Bioelectronics
Magnetic Resonance Imaging
Applied Mechanics and Materials
Food and Bioprocess Technology
Proceedings - 2011 5th International Symposium on Empirical Software Engineering and Measurement, ESEM 2011
Annual Review of CyberTherapy and Telemedicine
Proceedings - Working Conference on Reverse Engineering, WCRE
Proceedings - Working Conference on Reverse Engineering, WCRE
2011 International Conference on System Science, Engineering Design and Manufacturing Informatization, ICSEM 2011
Lecture Notes in Electrical Engineering
Proceedings - 5th Brazilian Symposium on Software Components, Architectures and Reuse, SBCARS 2011
SOUPS 2011 - Proceedings of the 7th Symposium on Usable Privacy and Security
ACM International Conference Proceeding Series
Scientific Reports
Gaodianya Jishu/High Voltage Engineering
Lecture Notes in Electrical Engineering
Proceedings of DiGRA 2011 Conference: Think Design Play
2011 5th Malaysian Conference in Software Engineering, MySEC 2011
Proceedings - 2011 10th Mexican International Conference on Artificial Intelligence: Advances in Artificial Intelligence and Ap
International Symposium on Empirical Software Engineering and Measurement
American Society of Mechanical Engineers, Pressure Vessels and Piping Division (Publication) PVP
Applied Thermal Engineering
European Journal of Scientific Research
ICED 11 - 18th International Conference on Engineering Design - Impacting Society Through Engineering Design
Information Systems Development - Business Systems and Services: Modeling and Development
Journal of Construction Engineering and Management
Proceedings - 4th International Congress on Image and Signal Processing, CISP 2011
ACM International Conference Proceeding Series
Proceedings of the International Display Workshops
Zywnosc. Nauka. Technologia. Jakosc/Food. Science Technology. Quality
Proceedings of the 2nd International Workshop on Software Knowledge, SKY 2011, in Conjunction with IC3K 2011
Zywnosc. Nauka. Technologia. Jakosc/Food. Science Technology. Quality
Scientific Reports
Proceedings of VRCAI 2011: ACM SIGGRAPH Conference on Virtual-Reality Continuum and its Applications to Industry
Research Journal of Applied Sciences
Proceedings of VISSOFT 2011 - 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis
Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011
Proceedings - 11th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2011
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
2011 International Conference on Electronics, Communications and Control, ICECC 2011 - Proceedings
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011
Proceedings - 2011 2nd Eastern European Regional Conference on the Engineering of Computer Based Systems, ECBS-EE
Magnetic Resonance Imaging
Journal of Operations Management
SAE International Journal of Aerospace
2011 2nd International Conference on Mechanic Automation and Control Engineering, MACE 2011 - Proceedings
Studies in health technology and informatics
Sensors and Actuators, B: Chemical
American Journal of Applied Sciences
Seeing and Perceiving
Engineering Failure Analysis
European Journal of Lipid Science and Technology
Journal of Food Quality
Proceedings of CGAMES'2011 USA - 16th International Conference on Computer Games: AI, Animation, Mobile, Interactive M
ICRMS'2011 - Safety First, Reliability Primary: Proceedings of 2011 9th International Conference on Reliability, Maintainability
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Acta Astronautica
International Journal of Pharmacy and Technology
Proceedings - 2011 Annual SRII Global Conference, SRII 2011
IEICE Transactions on Information and Systems
Indoor Air
Sensors and Actuators, B: Chemical
Journal of Visualization
Bioinformatics
Food Science and Technology International
EUROCON 2011 - International Conference on Computer as a Tool - Joint with Conftele 2011
Proceedings - International Conference on Software Engineering
Advanced Materials Research
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Perception
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
5th International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2011
Proceedings - International Conference on Software Engineering
Proceedings - International Conference on Software Engineering
Proceedings - International Conference on Software Engineering
Proceedings - International Conference on Software Engineering
Tissue Engineering and Regenerative Medicine
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the National Academy of Sciences of the United States of America
Sensors
Proceedings - IEEE Virtual Reality
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Engineering Structures
IEEE Transactions on Biomedical Engineering
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, AOSD.11
Proceedings of the 10th International Conference on Aspect-Oriented Software Development Companion, AOSD.11
Nature
Nature
Nature
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Journal of Software Maintenance and Evolution
Eau, l'INDUSTRIE, les Nuisances
Information and Software Technology
Technovation
Journal of Advanced Research
Sensors
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Cognitive Science
World Academy of Science, Engineering and Technology
BMC Bioinformatics
Sensors
Sensors
Journal of Huazhong University of Science and Technology - Medical Science
Electrical Engineering in Japan (English translation of Denki Gakkai Ronbunshi)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Science
Proceedings of the National Academy of Sciences of the United States of America
Advanced Materials Research
Proceedings of the National Academy of Sciences of the United States of America
Nature
Proceedings of the National Academy of Sciences of the United States of America
Agricultural Engineering International: CIGR Journal
Journal of Pragmatics
Proceedings - 2010 IEEE 17th International Conference on Industrial Engineering and Engineering Management, IE and EM2
Proceedings of SPIE - The International Society for Optical Engineering
Perception
IEEE International Conference on Software Maintenance, ICSM
IEEE International Conference on Software Maintenance, ICSM
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA
Proceedings of the ACM Conference on Computer and Communications Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Transactions of Japanese Society for Medical and Biological Engineering
ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings
Proceedings of the ACM Conference on Computer and Communications Security
Proceedings - 24th Brazilian Symposium on Software Engineering, SBES 2010
Proceedings - 24th Brazilian Symposium on Software Engineering, SBES 2010
Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010
Proceedings - 7th International Conference on the Quality of Information and Communications Technology, QUATIC 2010
Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, CIG2010
2010 IEEE 11th International Conference on Computer-Aided Industrial Design and Conceptual Design, CAID and CD'2010
Proceedings of the IEEE Conference on Decision and Control
2010 IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation,
ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE)
43rd International Conference on Large High Voltage Electric Systems 2010, CIGRE 2010
Proceedings - SCCG 2008: 24th Spring Conference on Computer Graphics
2010 World Automation Congress, WAC 2010
2nd International Conference on Information Science and Engineering, ICISE2010 - Proceedings
Proceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010
Applied Mechanics and Materials
Palpu Chongi Gisul/Journal of Korea Technical Association of the Pulp and Paper Industry
Journal of Computers
8th IEEE International Workshop on Safety, Security, and Rescue Robotics, SSRR-2010
Proceedings of SPIE - The International Society for Optical Engineering
Perception
Proceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010
International Journal of Food Science and Technology
Proceedings - 10th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2010
Advance Journal of Food Science and Technology
Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering
Perception
Journal of Light and Visual Environment
ESEM 2010 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measure
ESEM 2010 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measure
Current Science
PLoS Computational Biology
Universal Access in the Information Society
Biological Cybernetics
Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control
Information and Software Technology
Proceedings - International Conference on Quality Software
Proceedings of the World Congress on Intelligent Control and Automation (WCICA)
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the International Conference on Information Technology Interfaces, ITI
Australian Journal of Basic and Applied Sciences
Journal of Web Librarianship
Noise Control Engineering Journal
AMA, Agricultural Mechanization in Asia, Africa and Latin America
Sensors
Journal of Applied Sciences
Proceedings - International Conference on Software Engineering
Proceedings - International Conference on Software Engineering
Proceedings - International Conference on Software Engineering
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the IASTED International Conference on Software Engineering, SE 2010
ACM International Conference Proceeding Series
Proceedings of the National Academy of Sciences of the United States of America
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans
IEEE Software
Conference on Human Factors in Computing Systems - Proceedings
Journal of Building Physics
Proceedings - International Conference on Software Engineering
Information Processing Letters
2010 International Conference on Biomedical Engineering and Computer Science, ICBECS 2010
2010 International Conference on Logistics Systems and Intelligent Management, ICLSIM 2010
Journal of the Royal Society Interface
Revista de la Facultad de Ingenieria
CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems
Proceedings - IEEE Virtual Reality
Industrial and Engineering Chemistry Research
Proceedings of the National Academy of Sciences of the United States of America
Expert Systems with Applications
Sensors and Actuators, B: Chemical
Lab on a Chip - Miniaturisation for Chemistry and Biology
Proceedings of the National Academy of Sciences of the United States of America
PLoS Computational Biology
Indoor Air
Industrie Alimentari
International Journal of Food Microbiology
Proceedings of the National Academy of Sciences of the United States of America
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Sensors and Actuators, B: Chemical
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni
IEEE Transactions on Software Engineering
Proceedings of the National Academy of Sciences of the United States of America
Computers and Security
Journal of Mechanical Science and Technology
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice
Internet and Higher Education
Sensors
2009 16th IEEE-NPSS Real Time Conference - Conference Record
3rd International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2009
3rd International Conference on Bioinformatics and Biomedical Engineering, iCBBE 2009
2009 3rd International Symposium on Empirical Software Engineering and Measurement, ESEM 2009
ACM International Conference Proceeding Series
WIT Transactions on the Built Environment
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of SPIE - The International Society for Optical Engineering
Songklanakarin Journal of Science and Technology
IEEE International Conference on Software Maintenance, ICSM
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings - Working Conference on Reverse Engineering, WCRE
SBES 2009 - 23rd Brazilian Symposium on Software Engineering
Proceedings - Working Conference on Reverse Engineering, WCRE
IEEE Transactions on Software Engineering
Proceedings - Working Conference on Reverse Engineering, WCRE
Collection of Technical Papers - AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Experimental Techniques
Computer Methods and Programs in Biomedicine
American Society of Mechanical Engineers, Power Division (Publication) PWR
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
32nd Annual IEEE Software Engineering Workshop, SEW-32 2008
ESEC-FSE'09 - Proceedings of the Joint 12th European Software Engineering Conference and 17th ACM SIGSOFT Sympos
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
15th Americas Conference on Information Systems 2009, AMCIS 2009
ICCAS-SICE 2009 - ICROS-SICE International Joint Conference 2009, Proceedings
9th International Conference and Exhibition - Healthy Buildings 2009, HB 2009
Society of Petroleum Engineers - SPE/IATMI Asia Pacific Health Safety, Security and Environment Conference and Exhibition
IFMBE Proceedings
ACM International Conference Proceeding Series
Zywnosc. Nauka. Technologia. Jakosc/Food. Science Technology. Quality
Zywnosc. Nauka. Technologia. Jakosc/Food. Science Technology. Quality
2nd International Conference on Environmental and Computer Science, ICECS 2009
MobileHCI09 - The 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
International Journal of Food Microbiology
ACM International Conference Proceeding Series
2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009
Proceedings - 2009 1st International Workshop on Database Technology and Applications, DBTA 2009
Proceedings of the 9th International Conference of Chinese Transportation Professionals, ICCTP 2009: Critical Issues in Tran
Proceedings - 2009 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings - 2009 9th Annual International Symposium on Applications and the Internet, SAINT 2009
Proceedings of the National Academy of Sciences of the United States of America
Nongye Jixie Xuebao/Transactions of the Chinese Society of Agricultural Machinery
International Journal of Food Microbiology
ASMC (Advanced Semiconductor Manufacturing Conference) Proceedings
Xitong Fangzhen Xuebao / Journal of System Simulation
Cognition, Technology and Work
Neural Networks
Building and Environment
Desalination
Nature
ASEE Annual Conference and Exposition, Conference Proceedings
International Journal of Food Science and Technology
Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control
Proceedings of the 2009 ACM SIGPLAN Symposium on Partial Evaluation and Program Manipulation, PEPM'09
BMC Bioinformatics
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings - IEEE Virtual Reality
International Journal of Food Microbiology
Nature
Nature
Transactions of the ASABE
International Journal of Software Engineering and Knowledge Engineering
Biosensors and Bioelectronics
IEEE Communications Letters
Proceedings of the National Academy of Sciences of the United States of America
Electronic Notes in Theoretical Computer Science
Information and Software Technology
Journal of Systems and Software
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the National Academy of Sciences of the United States of America
Journal of Systems and Software
Journal of the Royal Society Interface
Biosensors and Bioelectronics
Advances in Natural and Applied Sciences
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
IEEE International Conference on Software Maintenance, ICSM
Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD
DEFECTS'08: 2008 International Symposium on Software Testing and Analysis - Proceedings of the 2008 Workshop on Defe
Proceedings of the International Conference on Supercomputing
Proceedings of the 2nd International Conference on Research Challenges in Information Science, RCIS 2008
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
SOUPS 2008 - Proceedings of the 4th Symposium on Usable Privacy and Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings - Asia-Pacific Software Engineering Conference, APSEC
Proceedings of the 2008 International Conference on Communications in Computing, CIC 2008
9th International Conference on Computer-Aided Industrial Design and Conceptual Design: Multicultural Creation and Design
SOFTVIS 2008 - Proceedings of the 4th ACM Symposium on Software Visualization
ASEE Annual Conference and Exposition, Conference Proceedings
IEEJ Transactions on Sensors and Micromachines
Advanced Materials Research
Proceedings of IEEE Sensors
Proceedings of 2008 IEEE International Conference on Service Operations and Logistics, and Informatics, IEEE/SOLI 2008
European Space Agency, (Special Publication) ESA SP
2008 IEEE Sensors Applications Symposium, SAS-2008 - Proceedings
International Astronautical Federation - 59th International Astronautical Congress 2008, IAC 2008
Proceedings - 2008 2nd International Symposium on Intelligent Information Technology Application, IITA 2008
Sensor Letters
Human Resource Information Systems - Proceedings of the 2nd International Workshop on Human Resource Information Sys
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
Sensor Letters
Proceedings from the 6th Conference on Design and Emotion 2008
IEEJ Transactions on Sensors and Micromachines
Pacific Symposium on Biocomputing 2008, PSB 2008
Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR
Computer-Supported Collaborative Learning Conference, CSCL
IEEE Transactions on Information Technology in Biomedicine
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the International Joint Conference on Neural Networks
Proceedings of the National Academy of Sciences of the United States of America
2008 IEEE International Conference on Multimedia and Expo, ICME 2008 - Proceedings
Pacific Science
Society of Petroleum Engineers - 9th International Conference on Health, Safety and Environment in Oil and Gas Exploration
Proceedings of the National Academy of Sciences of the United States of America
IEEE International Conference on Communications
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Nature
Proceedings - International Conference on Informatics Education and Research for Knowledge-Circulating Society, ICKS 200
Proceedings of the National Academy of Sciences of the United States of America
Communications of the ACM
PLoS Computational Biology
Nature
Studies in Computational Intelligence
Sensors and Actuators, B: Chemical
Sensors and Actuators, B: Chemical
PLoS Computational Biology
Science
Nature
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Proceedings of the National Academy of Sciences of the United States of America
IEEE Computer Graphics and Applications
AIChE Journal
ASEE Annual Conference and Exposition, Conference Proceedings
International Workshop on Principles of Software Evolution (IWPSE)
9th International Workshop on Principles of Software Evolution, IWPSE 2007, Held in Conjunction with the 6th ESEC/FSE Joi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, IICAI 2007
Eau, l'INDUSTRIE, les Nuisances
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Proceedings of the 2006 IEEE Conference on Computer Aided Control Systems Design, CACSD
Journal of Technology Transfer
3rd International IEEE Workshop on Software Evolvability 2007, SE
22nd International Conference on Computers and Their Applications 2007, CATA 2007
Xi'an Jianzhu Keji Daxue Xuebao/Journal of Xi'an University of Architecture and Technology
VI Jornadas Iberoamericanas de Ingenieria de Software e Ingenieria del Conocimiento 2007, JIISIC 2007
IEEE International Professional Communication Conference
8th Annual Water Distribution Systems Analysis Symposium 2006
Proceedings of IEEE Sensors
ISSPIT 2007 - 2007 IEEE International Symposium on Signal Processing and Information Technology
International Workshop on Principles of Software Evolution (IWPSE)
9th International Workshop on Principles of Software Evolution, IWPSE 2007, Held in Conjunction with the 6th ESEC/FSE Joi
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
Nature
Informacion Tecnologica
Nature
Proceedings of SPIE - The International Society for Optical Engineering
Nature
Textile History
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Indoor Air
Nature
Proceedings - ICSE 2007 Workshops: Fourth International Workshop on Mining Software Repositories, MSR 2007
Railway Gazette International
Computers and Security
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition)
Proceedings of SPIE - The International Society for Optical Engineering
Nature
Nature
Nature
Proceedings - International Conference on Computing: Theory and Applications, ICCTA 2007
IEEJ Transactions on Sensors and Micromachines
Sensors and Actuators, B: Chemical
Proceedings of the National Academy of Sciences of the United States of America
Journal of Systems and Software
Neural Computing and Applications
Journal of Water Supply: Research and Technology - AQUA
Proceedings of SPIE - The International Society for Optical Engineering
IET Nanobiotechnology
Proceedings of the National Academy of Sciences of the United States of America
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice
Nature
Proceedings of the National Academy of Sciences of the United States of America
IEICE Electronics Express
Sensors and Actuators, B: Chemical
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Social Science Computer Review
Nature
Proceedings of the National Academy of Sciences of the United States of America
IEEE Pervasive Computing
Behaviour and Information Technology
IEEE International Conference on Program Comprehension
Sensors and Actuators, B: Chemical
ISESE'06 - Proceedings of the 5th ACM-IEEE International Symposium on Empirical Software Engineering
AIAA/IEEE Digital Avionics Systems Conference - Proceedings
Proceedings of the Human Factors and Ergonomics Society
IEEE International Conference on Software Maintenance, ICSM
Proceedings - Testing: Academic and Industrial Conference - Practice and Research Techniques, TAIC PART 2006
IEEE International Conference on Software Maintenance, ICSM
2006 Annual India Conference, INDICON
IET Conference Publications
Proceedings from the 5th Conference on Design and Emotion 2006
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
AIAA 57th International Astronautical Congress, IAC 2006
HB 2006 - Healthy Buildings: Creating a Healthy Indoor Environment for People, Proceedings
Proceedings from the 5th Conference on Design and Emotion 2006
Proceedings of the World Congress on Intelligent Control and Automation (WCICA)
ISESE'06 - Proceedings of the 5th ACM-IEEE International Symposium on Empirical Software Engineering
Proceedings of the 2006 International Conference on Machine Learning and Cybernetics
Virtual Reality
Proceedings from the 5th Conference on Design and Emotion 2006
AIAA 57th International Astronautical Congress, IAC 2006
Proceedings of the ASME Design Engineering Technical Conference
Sensors and Actuators, B: Chemical
Proceedings - Third International Conference onInformation Technology: New Generations, ITNG 2006
IEEE International Conference on Computer Systems and Applications, 2006
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Research Disclosure
Guang Pu Xue Yu Guang Pu Fen Xi/Spectroscopy and Spectral Analysis
GECCO 2006 - Genetic and Evolutionary Computation Conference
Proceedings - IEEE Virtual Reality
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Empirical Software Engineering
Journal of Universal Computer Science
Journal of Molecular Modeling
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Conference on Human Factors in Computing Systems - Proceedings
Proceedings of the National Academy of Sciences of the United States of America
IEE Proceedings: Communications
Autonomous Robots
Proceedings of the National Academy of Sciences of the United States of America
Ergonomics
Ingenieria Hidraulica en Mexico
Proceedings of the National Academy of Sciences of the United States of America
Nihon Kikai Gakkai Ronbunshu, C Hen/Transactions of the Japan Society of Mechanical Engineers, Part C
Science
Information Systems Frontiers
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Collection of Technical Papers - AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference
Electronic Notes in Theoretical Computer Science
Chinese Journal of Sensors and Actuators
Proceedings ICED 05, the 15th International Conference on Engineering Design
Proceedings - International Software Metrics Symposium
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
2005 International Conference on Physics and Control, PhysCon 2005, Proceedings
9th Pacific Asia Conference on Information Systems: I.T. and Value Creation, PACIS 2005
Proceedings - Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 200
Indoor Air
2005 International Symposium on Empirical Software Engineering, ISESE 2005
WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA
ACM SIGPLAN Notices
SAE Technical Papers
Proceedings of IEEE Sensors
AIChE Annual Meeting, Conference Proceedings
IEEE CAMSAP 2005 - First International Workshop on Computational Advances in Multi-Sensor Adaptive Processing
IEEE International Conference on Software Maintenance, ICSM
Technical Papers of ISA
Proceedings - Annual Reliability and Maintainability Symposium
Nature
Digest of Technical Papers - International Conference on Solid State Sensors and Actuators and Microsystems, TRANSDUCE
Proceedings of the International Conference on Dependable Systems and Networks
Zhuzao Jishu/Foundry Technology
2005 IEEE Power Engineering Society General Meeting
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Sensors and Actuators, B: Chemical
Digital Creativity
LWT - Food Science and Technology
Artificial Intelligence in Medicine
Wiadomosci lekarskie (Warsaw, Poland : 1960)
Proceedings of SPIE - The International Society for Optical Engineering
IEEE Transactions on Power Systems
VDI Berichte
Science
Sensors and Actuators, B: Chemical
Journal of Intelligent and Fuzzy Systems
Proceedings of the National Academy of Sciences of the United States of America
Biotechnology and Bioprocess Engineering
Current Science
Science
IEEE Sensors Journal
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Nature
Sensors and Actuators, B: Chemical
Biomedical Sciences Instrumentation
Informatik - Forschung und Entwicklung
Nature
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of SPIE - The International Society for Optical Engineering
Proceedings of SPIE - The International Society for Optical Engineering
IEEE International Conference on Software Maintenance, ICSM
IEEE International Conference on Software Maintenance, ICSM
Indoor Air, Supplement
Journal of Automation and Information Sciences
IEICE Transactions on Electronics
Proceedings of the IEEE International Symposium on Computer-Aided Control System Design
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
IEEE Region 10 Annual International Conference, Proceedings/TENCON
ICMI'04 - Sixth International Conference on Multimodal Interfaces
2004 IEEE Conference on Robotics, Automation and Mechatronics
IEEE International Engineering Management Conference
Joint Conference on Water Resource Engineering and Water Resources Planning and Management 2000: Building Partnersh
UIST: Proceedings of the Annual ACM Symposium on User Interface Softaware and Technology
Proceedings of IEEE Sensors
Proceedings of the SICE Annual Conference
Proceedings of Modelling and Simulation, MS'2004
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
Proceedings - Electrochemical Society
Nature
Problemy Upravleniya I Informatiki (Avtomatika)
Fire Safety Journal
Proceedings - Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004)
VDI Berichte
Nature
IEEE Transactions on Neural Networks
Proceedings of the National Academy of Sciences of the United States of America
Journal of Ship Production
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Proceedings of the National Academy of Sciences of the United States of America
Proceedings - Design, Automation and Test in Europe Conference and Exhibition
International Journal of COMADEM
Annual Technical Conference - ANTEC, Conference Proceedings
Proceedings of the National Academy of Sciences of the United States of America
Neural Computation
Proceedings of the National Academy of Sciences of the United States of America
Neurocomputing
Nature
Indoor and Built Environment
Science
Nature
International Journal of Fatigue
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Nature
Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR
Conference on Software Maintenance
Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung C
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
Proceedings of the National Academy of Sciences of the United States of America
Tessili per Impieghi Tecnici
Engineering Failure Analysis
IEEE Sensors Journal
Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit
Nature
International journal of occupational safety and ergonomics : JOSE
Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology
Nature
Proceedings of the National Academy of Sciences of the United States of America
Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering
Journal / American Water Works Association
Science
IEEE Security and Privacy
Science
Winter Simulation Conference Proceedings
ASQ Annual Quality Congress Proceedings
Process Safety Progress
Instruments and Experimental Techniques
Proceedings of IEEE Sensors
Intelligent Engineering Systems Through Artificial Neural Networks
Nature
Proceedings of the National Academy of Sciences of the United States of America
ISA Transactions
Nature
Neural Computation
IEEE Transactions on Biomedical Engineering
Science
Nature
Behaviour and Information Technology
Proceedings of the National Academy of Sciences of the United States of America
Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on
Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conferenceon
Geoscience and Remote Sensing, IEEE Transactions on
Dependable Computing, 2005. Proceedings. 11th Pacific Rim International Symposium on
Modeling, Analysis Simulation of Computer and Telecommunication Systems (MASCOTS), 2010 IEEEInternational Symposiu
High-Performance Computing in Asia-Pacific Region, 2005. Proceedings. Eighth InternationalConference on
Electro/Information Technology (EIT), 2011 IEEE International Conference on
Antennas and Propagation (EuCAP), 2013 7th European Conference on
Computer Science and Information Engineering, 2009 WRI World Congress on
Modeling in Software Engineering (MiSE), 2013 5th International Workshop on
Multitopic Conference, 2009. INMIC 2009. IEEE 13th International
Computer Science and Software Engineering (JCSSE), 2013 10th International Joint Conference on
Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on
Geoscience and Remote Sensing, IEEE Transactions on
Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on
Geoscience and Remote Sensing, IEEE Transactions on
INFOCOM 2009, IEEE
Telecommunications (IST), 2012 Sixth International Symposium on
Ultrasonics, Ferroelectrics and Frequency Control, IEEE Transactions on
Information Forensics and Security, IEEE Transactions on
Resilient Control Systems (ISRCS), 2012 5th International Symposium on
Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on
Dependable and Secure Computing, IEEE Transactions on
Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on
Intelligent Computation Technology and Automation, 2009. ICICTA '09. Second InternationalConference on
Advanced Ground Penetrating Radar (IWAGPR), 2011 6th International Workshop on
Wireless Communications, IEEE
Thermal and Thermomechanical Phenomena in Electronics Systems, 2006. ITHERM '06. The TenthIntersociety Conference o
Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on
Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on
Communication Systems and Networks (COMSNETS), 2011 Third International Conference on
Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing,2007. SNPD 2007. Eighth ACIS I
Information Forensics and Security, IEEE Transactions on
Networking, Architecture, and Storage, 2009. NAS 2009. IEEE International Conference on
Power Engineering Conference, 2007. IPEC 2007. International
Electrical and Electronics Engineers in Israel, 2006 IEEE 24th Convention of
Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International
Computational Intelligence in Security and Defense Applications, 2007. CISDA 2007. IEEE Symposiumon
Decision and Control (CDC), 2010 49th IEEE Conference on
Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE InternationalSymposium on
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conferenceon
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual IEEE CommunicationsSociety Confere
Software Maintenance (ICSM), 2012 28th IEEE International Conference on
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Information Visualisation (IV), 2010 14th International Conference
Electrical Insulation, 2002. Conference Record of the 2002 IEEE International Symposium on
Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011International Conference on
Industry Applications Society Annual Meeting (IAS), 2012 IEEE
Tools with Artificial Intelligence (ICTAI), 2010 22nd IEEE International Conference on
Communication Technology Proceedings, 2003. ICCT 2003. International Conference on
Group IV Photonics (GFP), 2010 7th IEEE International Conference on
Distributed Computing Systems, 2003. Proceedings. 23rd International Conference on
Aerospace Conference, 2005 IEEE
Industrial Informatics, IEEE Transactions on
Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on
Computational Sciences and Its Applications, 2008. ICCSA '08. International Conference on
Dependable and Secure Computing, IEEE Transactions on
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Ultrasonics, Ferroelectrics and Frequency Control, IEEE Transactions on
Computers and Communications (ISCC), 2010 IEEE Symposium on
Dependable and Secure Computing, IEEE Transactions on
Networking, Architecture, and Storage, 2008. NAS '08. International Conference on
Neural Networks, IEEE Transactions on
Mechatronics and Automation, 2007. ICMA 2007. International Conference on
Intelligence and Security Informatics Conference (EISIC), 2012 European
Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops,2009. TridentCom 200
Computer Supported Cooperative Work in Design, 2006. CSCWD '06. 10th International Conference on
Computer-Aided Design, 2006. ICCAD '06. IEEE/ACM International Conference on
OCEANS '02 MTS/IEEE
Data Engineering, 2006. ICDE '06. Proceedings of the 22nd International Conference on
Artificial Intelligence and Computational Intelligence, 2009. AICI '09. International Conferenceon
Intelligent Systems Design and Applications, 2006. ISDA '06. Sixth International Conference on
Frontiers in Education Conference, 2009. FIE '09. 39th IEEE
Pattern Recognition, 2006. ICPR 2006. 18th International Conference on
Data Engineering (ICDE), 2011 IEEE 27th International Conference on
Parallel Architecture and Compilation Techniques, 2007. PACT 2007. 16th International Conferenceon
Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conferenceon
American Control Conference, 2008
Particle Accelerator Conference, 2007. PAC. IEEE
Electronics, Communications and Control (ICECC), 2011 International Conference on
Power and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific
Nuclear Science, IEEE Transactions on
Computer Security Applications Conference, 2004. 20th Annual
Point-of-Care Healthcare Technologies (PHT), 2013 IEEE
Control Applications, (CCA) Intelligent Control, (ISIC), 2009 IEEE
INFOCOM, 2011 Proceedings IEEE
Networking, IEEE/ACM Transactions on
Advancements in Nuclear Instrumentation Measurement Methods and their Applications (ANIMMA), 20112nd International Co
Communications, 2003. ICC '03. IEEE International Conference on
Urban Remote Sensing Event, 2009 Joint
Parallel Processing (ICPP), 2012 41st International Conference on
Software Engineering Research, Management and Applications (SERA), 2011 9th InternationalConference on
Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE
Data Engineering Workshops (ICDEW), 2011 IEEE 27th International Conference on
Quality Electronic Design (ISQED), 2012 13th International Symposium on
Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007. Fourth International Conference on
Machine Learning and Applications, 2008. ICMLA '08. Seventh International Conference on
Control Theory Applications, IET
INFOCOM, 2013 Proceedings IEEE
Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE JointInternational
Network and System Security (NSS), 2011 5th International Conference on
Computer Science Education (ICCSE), 2013 8th International Conference on
Knowledge and Data Engineering, IEEE Transactions on
Reliability, Safety and Hazard (ICRESH), 2010 2nd International Conference on
Dependable Computing, 2009. LADC '09. Fourth Latin-American Symposium on
Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on
Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International
Integrated Network Management, 2009. IM '09. IFIP/IEEE International Symposium on
Computational Intelligence in Cyber Security (CICS), 2013 IEEE Symposium on
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies.Proceedings IEEE
Industrial Electronics, 2007. ISIE 2007. IEEE International Symposium on
Quality of Service, 2008. IWQoS 2008. 16th International Workshop on
Communications and Signal Processing (ICCSP), 2013 International Conference on
Simulation Conference, 2004. Proceedings of the 2004 Winter
Computational Intelligence, Communication Systems and Networks (CICSyN), 2010 Second InternationalConference on
Indoor Positioning and Indoor Navigation (IPIN), 2011 International Conference on
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
Computer Science and Information Technology, 2009. IMCSIT '09. International Multiconference on
Biomedical Imaging: From Nano to Macro, 2007. ISBI 2007. 4th IEEE International Symposium on
Software Engineering Workshop, 2002. Proceedings. 27th Annual NASA Goddard/IEEE
Microwave Workshop Series on Millimeter Wave Wireless Technology and Applications (IMWS), 2012 IEEEMTT-S Internation
OCEANS 2010
VLSI Test Symposium (VTS), 2013 IEEE 31st
Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on
Network Operations and Management Symposium (NOMS), 2012 IEEE
INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on
Electron Devices, IEEE Transactions on
Journal of Applied Physics
INFOCOM, 2011 Proceedings IEEE
Review of Scientific Instruments
Microwave and Millimeter Wave Technology, 2008. ICMMT 2008. International Conference on
Information and Automation, 2009. ICIA '09. International Conference on
Telecommunication Networking Workshop on QoS in Multiservice IP Networks, 2008. IT-NEWS 2008. 4thInternational
World Automation Congress (WAC), 2012
Networking, IEEE/ACM Transactions on
Natural Computation (ICNC), 2010 Sixth International Conference on
Communication Networks and Services Research Conference, 2009. CNSR '09. Seventh Annual
Applications of Ferroelectrics, 2008. ISAF 2008. 17th IEEE International Symposium on the
Unmanned Aircraft Systems (ICUAS), 2013 International Conference on
Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd InternationalConference on
Network and System Security (NSS), 2010 4th International Conference on
Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008. Second InternationalConference on
Radar Conference (EuRAD), 2012 9th European
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
Intelligent Robots and Systems, 2007. IROS 2007. IEEE/RSJ International Conference on
Energy Conference and Exhibition (EnergyCon), 2010 IEEE International
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
Industrial Technology, 2005. ICIT 2005. IEEE International Conference on
Applied Physics Letters
Current Measurement Technology, 2003. Proceedings of the IEEE/OES Seventh Working Conference on
Sensors, 2009 IEEE
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of
Information Forensics and Security, IEEE Transactions on
Computer Science and Network Technology (ICCSNT), 2012 2nd International Conference on
Plasma Science, IEEE Transactions on
Computational Intelligence in Games (CIG), 2013 IEEE Conference on
Software Maintenance and Reengineering, 2008. CSMR 2008. 12th European Conference on
Decision and Control and European Control Conference (CDC-ECC), 2011 50th IEEE Conference on
Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on
Software Engineering, IEEE Transactions on
Nuclear Science Symposium Conference Record, 2005 IEEE
Aerospace Conference, 2010 IEEE
Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on
Network and Service Management, IEEE Transactions on
Bioengineering Conference, 2003 IEEE 29th Annual, Proceedings of
Computing, Communication, Control, and Management, 2008. CCCM '08. ISECS International Colloquiumon
Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on
Specification and Design Languages (FDL), 2012 Forum on
Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific
Instrumentation, Measurement, Computer, Communication and Control (IMCCC), 2012 SecondInternational Conference on
Nuclear Science, IEEE Transactions on
Modeling, Analysis Simulation of Computer and Telecommunication Systems (MASCOTS), 2010 IEEEInternational Symposiu
Data Engineering (ICDE), 2011 IEEE 27th International Conference on
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of
Antennas and Propagation, IEEE Transactions on
Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual
Systems and Control in Aerospace and Astronautics, 2008. ISSCAA 2008. 2nd International Symposiumon
High Performance Computing (HiPC), 2012 19th International Conference on
Communications, 2002. ICC 2002. IEEE International Conference on
Autonomic and Autonomous Systems, 2007. ICAS07. Third International Conference on
Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International
Computational Engineering in Systems Applications, IMACS Multiconference on
Networking, Architecture, and Storage, 2008. NAS '08. International Conference on
Image Processing, 2006 IEEE International Conference on
Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International Conference on
Control Systems Technology, IEEE Transactions on
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE
Data Mining (ICDM), 2012 IEEE 12th International Conference on
AUTOTESTCON, 2012 IEEE
Intelligent System Design and Engineering Application (ISDEA), 2010 International Conference on
American Control Conference (ACC), 2010
Networking, International Conference on Systems and International Conference on MobileCommunications and Learning Tec
Ultra Modern Telecommunications Workshops, 2009. ICUMT '09. International Conference on
Power Systems Conference and Exposition, 2009. PSCE '09. IEEE/PES
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7thInternational Conference on
Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE
Recent Advances in Space Technologies, 2007. RAST '07. 3rd International Conference on
Communication Theory, Reliability, and Quality of Service, 2009. CTRQ '09. Second InternationalConference on
Dependable and Secure Computing, IEEE Transactions on
Junction Technology, 2005. Extended Abstracts of the Fifth International Workshop on
Wireless Communications, IEEE Transactions on
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Asia-Pacific Service Computing Conference, The 2nd IEEE
High Performance Computing Simulation, 2009. HPCS '09. International Conference on
Computer Communications and Networks, 2007. ICCCN 2007. Proceedings of 16th InternationalConference on
Communications (ICC), 2010 IEEE International Conference on
Computer Science and Network Technology (ICCSNT), 2011 International Conference on
Power and Energy Society General Meeting, 2011 IEEE
Engineering in Medicine and Biology Society,EMBC, 2011 Annual International Conference of theIEEE
Ultrasonics, Ferroelectrics and Frequency Control, IEEE Transactions on
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE InternationalConference on
Neural Engineering, 2007. CNE '07. 3rd International IEEE/EMBS Conference on
Computer Supported Cooperative Work in Design, 2005. Proceedings of the Ninth InternationalConference on
Systems Communications, 2005. Proceedings
Journal of Applied Physics
Journal of Applied Physics
Advanced Computer Control (ICACC), 2010 2nd International Conference on
Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conferenceon
Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on
INFOCOM, 2012 Proceedings IEEE
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Industrial Technology (ICIT), 2010 IEEE International Conference on
Discharges and Electrical Insulation in Vacuum, 2006. ISDEIV '06. International Symposium on
American Control Conference, 2007. ACC '07
Signal Processing, Communications and Networking, 2007. ICSCN '07. International Conference on
Computational Intelligence for Engineering Solutions (CIES), 2013 IEEE Symposium on
Database and Expert Systems Application, 2008. DEXA '08. 19th International Workshop on
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
Digital Information Management, 2008. ICDIM 2008. Third International Conference on
Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on
Digital Manufacturing and Automation (ICDMA), 2010 International Conference on
Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquiumon
Computational Intelligence for Modelling Control Automation, 2008 International Conference on
Control, Automation and Systems Engineering, 2009. CASE 2009. IITA International Conference on
Piezoelectricity, Acoustic Waves, and Device Applications (SPAWDA) and 2009 China Symposium onFrequency Control Tec
Reliability and Maintainability Symposium, 2009. RAMS 2009. Annual
World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium ona
Visualization and Computer Graphics, IEEE Transactions on
Knowledge and Data Engineering, IEEE Transactions on
Software Engineering (ICSE), 2013 35th International Conference on
Networks, 2008. ICON 2008. 16th IEEE International Conference on
Information Science and Engineering (ISISE), 2009 Second International Symposium on
Communications, 2006. ICC '06. IEEE International Conference on
Software Engineering, IEEE Transactions on
Embedded and Real-Time Computing Systems and Applications, 2008. RTCSA '08. 14th IEEE InternationalConference on
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Performance Evaluation of Computer Telecommunication Systems, 2009. SPECTS 2009. InternationalSymposium on
Aerospace conference, 2009 IEEE
OCEANS 2003. Proceedings
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology(ECTI-CON), 2013 10th Intern
Communications, 2006. ICC '06. IEEE International Conference on
IEEE Industrial Electronics, IECON 2006 - 32nd Annual Conference on
Digital Media and Digital Content Management (DMDCM), 2011 Workshop on
Systems and Control in Aerospace and Astronautics, 2008. ISSCAA 2008. 2nd International Symposiumon
Quality and Security of Electric Power Delivery Systems, 2003. CIGRE/PES 2003. CIGRE/IEEE PESInternational Symposium
Control Conference, 2006. CCC 2006. Chinese
Frequency Control Symposium, 2007 Joint with the 21st European Frequency and Time Forum. IEEEInternational
Systems, Man and Cybernetics, 2002 IEEE International Conference on
Computer-Aided Design, 2008. ICCAD 2008. IEEE/ACM International Conference on
Hardware-Oriented Security and Trust (HOST), 2012 IEEE International Symposium on
Photonics Conference (IPC), 2012 IEEE
Aerospace Conference, 2008 IEEE
Power Modulator Symposium, 2002 and 2002 High-Voltage Workshop. Conference Record of theTwenty-Fifth International
Energy Conversion Engineering Conference, 2002. IECEC '02. 2002 37th Intersociety
Aerospace Conference, 2013 IEEE
Frequency Control Symposium and Exposition, 2005. Proceedings of the 2005 IEEE International
Instrumentation and Measurement, IEEE Transactions on
Management of e-Commerce and e-Government, 2009. ICMECG '09. International Conference on
Aerospace Conference, 2013 IEEE
Visualizing Software for Understanding and Analysis, 2007. VISSOFT 2007. 4th IEEE InternationalWorkshop on
Service Operations and Logistics, and Informatics (SOLI), 2012 IEEE International Conference on
Software Engineering, IEEE Transactions on
Autonomic Computing, 2008. ICAC '08. International Conference on
Parallel and Distributed Systems, IEEE Transactions on
Reliability, IEEE Transactions on
Power Electronics Specialists Conference, 2008. PESC 2008. IEEE
Analysis of Multi-temporal Remote Sensing Images (Multi-Temp), 2011 6th International Workshop onthe
Computer Network and Multimedia Technology, 2009. CNMT 2009. International Symposium on
Transparent Optical Networks (ICTON), 2013 15th International Conference on
Aerospace Conference, 2012 IEEE
Network, IEEE
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th InternationalCongress on
Intelligent Agent Technology, 2007. IAT '07. IEEE/WIC/ACM International Conference on
Dependable and Secure Computing, IEEE Transactions on
OCEANS 2008
Broadband Communications, Information Technology Biomedical Applications, 2008 Third InternationalConference on
Multi Topic Conference, 2003. INMIC 2003. 7th International
Biomedical Engineering and Biotechnology (iCBEB), 2012 International Conference on
Dependability of Computer Systems, 2006. DepCos-RELCOMEX '06. International Conference on
Aerospace Conference, 2013 IEEE
Resilient Control Systems (ISRCS), 2012 5th International Symposium on
Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on
Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP
Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on
Intelligent Agent Technology, 2007. IAT '07. IEEE/WIC/ACM International Conference on
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology(ECTI-CON), 2012 9th Interna
Networks, 2007. ICON 2007. 15th IEEE International Conference on
Intelligent Control and Automation, 2004. WCICA 2004. Fifth World Congress on
Intelligent Computer Communication and Processing (ICCP), 2010 IEEE International Conference on
MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012
Mobile Computing, IEEE Transactions on
Engineering in Medicine and Biology Society,EMBC, 2011 Annual International Conference of theIEEE
Aerospace Conference, 2013 IEEE
AUTOTESTCON, 2010 IEEE
Programmable Logic Conference (SPL), 2010 VI Southern
Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2011 IEEE InternationalSymposium on
Engineering in Medicine and Biology Society,EMBC, 2011 Annual International Conference of theIEEE
High Performance Switching and Routing (HPSR), 2013 IEEE 14th International Conference on
Aerospace Conference, 2013 IEEE
Machine Learning and Cybernetics (ICMLC), 2011 International Conference on
Vehicular Technology, IEEE Transactions on
Empirical Software Engineering, 2005. 2005 International Symposium on
Aerospace Conference, 2008 IEEE
Telecommunications, 2008. ICT 2008. International Conference on
Internet Surveillance and Protection, 2006. ICISP '06. International Conference on
Information Networking (ICOIN), 2013 International Conference on
Reverse Engineering, 2002. Proceedings. Ninth Working Conference on
Nanoelectronics Conference (INEC), 2010 3rd International
Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE InternationalConference on
Decision and Control (CDC), 2010 49th IEEE Conference on
Microwave Optoelectronics Conference (IMOC), 2013 SBMO/IEEE MTT-S International
Resilient Control Systems (ISRCS), 2013 6th International Symposium on
Instrumentation Measurement Magazine, IEEE
INFOCOM, 2010 Proceedings IEEE
Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21stCentury, 2008 IEEE
Decision and Control (CDC), 2010 49th IEEE Conference on
Communications (ICC), 2011 IEEE International Conference on
Emerging Technologies Factory Automation (ETFA), 2013 IEEE 18th Conference on
Aerospace and Electronic Systems Magazine, IEEE
Educational and Information Technology (ICEIT), 2010 International Conference on
Communications, 2005. ICC 2005. 2005 IEEE International Conference on
Intelligence Information Processing and Trusted Computing (IPTC), 2011 2nd International Symposiumon
Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference on
Control Conference (CCC), 2013 32nd Chinese
Journal of Applied Physics
Geoscience and Remote Sensing, IEEE Transactions on
Electronic Components and Technology Conference (ECTC), 2012 IEEE 62nd
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Object-Oriented Real-Time Distributed Computing, 2002. (ISORC 2002). Proceedings. Fifth IEEEInternational Symposium on
Diagnostics for Electric Machines, Power Electronics Drives (SDEMPED), 2011 IEEE InternationalSymposium on
American Control Conference (ACC), 2012
Communications and Networks, Journal of
Parallel and Distributed Processing Symposium, 2003. Proceedings. International
Intelligent Agent Technology, 2007. IAT '07. IEEE/WIC/ACM International Conference on
Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference on
Review of Scientific Instruments
Electrical Insulation and Dielectric Phenomena, 2005. CEIDP '05. 2005 Annual Report Conferenceon
Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on
OCEANS 2006
Wireless and Optical Communications Networks, 2009. WOCN '09. IFIP International Conference on
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Modern Computing, 2006. JVA '06. IEEE John Vincent Atanasoff 2006 International Symposium on
Resilient Control Systems (ISRCS), 2013 6th International Symposium on
Magnetics, IEEE Transactions on
Systems, Applications and Technology Conference (LISAT), 2013 IEEE Long Island
Information Systems and Technologies (CISTI), 2011 6th Iberian Conference on
Visual Languages and Human-Centric Computing, 2008. VL/HCC 2008. IEEE Symposium on
Industrial Electronics (ISIE), 2013 IEEE International Symposium on
Telecommunications (IST), 2012 Sixth International Symposium on
Wireless Communications and Networking Conference (WCNC), 2010 IEEE
Spectrum, IEEE
ITS Telecommunications Proceedings, 2006 6th International Conference on
Applied Physics Letters
Proceedings of the IEEE
Vehicular Technology, IEEE Transactions on
Innovative Technologies in Intelligent Systems and Industrial Applications, 2009. CITISIA 2009
Frontiers in Education Conference, 2009. FIE '09. 39th IEEE
Program Comprehension, 2006. ICPC 2006. 14th IEEE International Conference on
Software Maintenance, 2004. Proceedings. 20th IEEE International Conference on
Design Automation Conference, 2006 43rd ACM/IEEE
Computational Intelligence and Design, 2008. ISCID '08. International Symposium on
High Performance Switching and Routing (HPSR), 2013 IEEE 14th International Conference on
Quality Software (QSIC), 2010 10th International Conference on
Intelligent Systems Design and Applications, 2008. ISDA '08. Eighth International Conference on
Quality of Information and Communications Technology (QUATIC), 2010 Seventh InternationalConference on the
Engineering of Computer Based Systems (ECBS-EERC), 2011 2nd Eastern European Regional Conference onthe
Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009.SCALCOM-EMB
Reverse Engineering, 2009. WCRE '09. 16th Working Conference on
Data Mining, 2009. ICDM '09. Ninth IEEE International Conference on
Science and Technology for Humanity (TIC-STH), 2009 IEEE Toronto International Conference
Education Technology and Computer Science (ETCS), 2010 Second International Workshop on
Software Metrics, 2005. 11th IEEE International Symposium
Applied Computational Intelligence and Informatics (SACI), 2011 6th IEEE International Symposiumon
Computer Supported Cooperative Work in Design, 2006. CSCWD '06. 10th International Conference on
Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on
Prognostics and Health Management, 2008. PHM 2008. International Conference on
Computer Application and System Modeling (ICCASM), 2010 International Conference on
Systems Engineering and Electronics, Journal of
Knowledge and Data Engineering, IEEE Transactions on
Intelligent Systems Design and Applications, 2008. ISDA '08. Eighth International Conference on
Reverse Engineering, 2002. Proceedings. Ninth Working Conference on
Innovations in Intelligent Systems and Applications (INISTA), 2011 International Symposium on
Network Computing and Applications (NCA), 2011 10th IEEE International Symposium on
Pattern Recognition (ICPR), 2010 20th International Conference on
High Capacity Optical Networks and Enabling Technologies, 2008. HONET 2008. International Symposiumon
Geoscience and Remote Sensing Symposium,2009 IEEE International,IGARSS 2009
Information Networking (ICOIN), 2012 International Conference on
Reverse Engineering (WCRE), 2012 19th Working Conference on
Intelligent Computer Communication and Processing (ICCP), 2010 IEEE International Conference on
Computer and Information Technology (CIT), 2012 IEEE 12th International Conference on
Network Computing and Applications (NCA), 2012 11th IEEE International Symposium on
Multimedia Technology (ICMT), 2011 International Conference on
Security Privacy, IEEE
Computational Intelligence and Security (CIS), 2011 Seventh International Conference on
Computer Science and Software Engineering, 2008 International Conference on
High-Assurance Systems Engineering (HASE), 2012 IEEE 14th International Symposium on
Computer Science and Service System (CSSS), 2011 International Conference on
Semantic Computing and Applications, 2008. IWSCA '08. IEEE International Workshop on
Intelligent Systems Design and Applications, 2006. ISDA '06. Sixth International Conference on
Aerospace Conference, 2004. Proceedings. 2004 IEEE
Electric Information and Control Engineering (ICEICE), 2011 International Conference on
Data Mining and Optimization (DMO), 2011 3rd Conference on
Software Components, Architectures and Reuse (SBCARS), 2011 Fifth Brazilian Symposium on
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Computer Science Service System (CSSS), 2012 International Conference on
System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2011 InternationalConference on
Electronics, Communications and Control (ICECC), 2011 International Conference on
Aerospace Conference, 2005 IEEE
Innovative Computing, Information and Control, 2007. ICICIC '07. Second International Conferenceon
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Intelligence and Security Informatics, 2009. ISI '09. IEEE International Conference on
Software Engineering (SBES), 2010 Brazilian Symposium on
Computer Science and Information Systems (FedCSIS), 2012 Federated Conference on
Control and Decision Conference, 2008. CCDC 2008. Chinese
Sensors Journal, IEEE
Information Technology Interfaces, 2006. 28th International Conference on
Software Engineering (SBES), 2010 Brazilian Symposium on
Engineering in Medicine and Biology Society,EMBC, 2011 Annual International Conference of theIEEE
Software Engineering, IEEE Transactions on
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on
Industry Applications Society Annual Meeting (IAS), 2010 IEEE
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conferenceon
Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on
Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposiumon
Optical Fiber Communication Conference, 2004. OFC 2004
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Resilient Control Systems (ISRCS), 2011 4th International Symposium on
Industrial Electronics and Applications (ICIEA), 2012 7th IEEE Conference on
Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2002. Proceedings ofthe International C
Software Testing, Verification and Validation (ICST), 2013 IEEE Sixth International Conferenceon
Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Fifth International Conference on
Machine Learning and Cybernetics, 2008 International Conference on
Industry Applications, IEEE Transactions on
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference ofthe IEEE
Networking, IEEE/ACM Transactions on
Magnetics Conference, 2006. INTERMAG 2006. IEEE International
Software Maintenance, 2006. ICSM '06. 22nd IEEE International Conference on
Electrical Contacts (HOLM), 2010 Proceedings of the 56th IEEE Holm Conference on
Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on
Intelligent Systems, 2009. GCIS '09. WRI Global Congress on
Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on
Source Code Analysis and Manipulation (SCAM), 2011 11th IEEE International Working Conference on
Visualizing Software for Understanding and Analysis (VISSOFT), 2011 6th IEEE International Workshopon
Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on
Natural Computation (ICNC), 2012 Eighth International Conference on
Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conferenceon
Services Computing (SCC), 2012 IEEE Ninth International Conference on
Symbolic and Numeric Algorithms for Scientific Computing, 2005. SYNASC 2005. Seventh InternationalSymposium on
Knowledge and Data Engineering, IEEE Transactions on
Artificial Intelligence and Signal Processing (AISP), 2012 16th CSI International Symposium on
Future Computer and Communication (ICFCC), 2010 2nd International Conference on
Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on
Geoscience and Remote Sensing Symposium (IGARSS), 2012 IEEE International
Software Engineering, IEEE Transactions on
Information Technology in Biomedicine, IEEE Transactions on
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE InternationalConference on
Tools with Artificial Intelligence (ICTAI), 2011 23rd IEEE International Conference on
Electronics and the Environment, 2002 IEEE International Symposium on
Computer Science Education (ICCSE), 2012 7th International Conference on
Computer Engineering and Technology (ICCET), 2010 2nd International Conference on
Information Forensics and Security, IEEE Transactions on
Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. InternationalConference on
Biometrics and Kansei Engineering (ICBAKE), 2013 International Conference on
Signal Processing Systems (ICSPS), 2010 2nd International Conference on
Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on
Computational Intelligence for Modelling, Control and Automation, 2006 and International Conferenceon Intelligent Agents, W
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on
Field Programmable Logic and Applications, 2007. FPL 2007. International Conference on
Control, Automation, Robotics and Vision, 2002. ICARCV 2002. 7th International Conference on
Network Infrastructure and Digital Content (IC-NIDC), 2012 3rd IEEE International Conference on
Network Infrastructure and Digital Content, 2010 2nd IEEE International Conference on
Applied Imagery Pattern Recognition Workshop, 2008. AIPR '08. 37th IEEE
Sensors Journal, IEEE
Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on
Pattern Recognition, 2006. ICPR 2006. 18th International Conference on
Pattern Recognition (ICPR), 2012 21st International Conference on
Data Engineering (ICDE), 2011 IEEE 27th International Conference on
Geoscience and Remote Sensing, IEEE Transactions on
Solid-State and Integrated Circuit Technology (ICSICT), 2012 IEEE 11th International Conferenceon
Intelligent Environments (IE), 2010 Sixth International Conference on
Mechatronics and Machine Vision in Practice (M2VIP), 2012 19th International Conference
Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on
Power and Energy Society General Meeting, 2012 IEEE
Electronics Goes Green 2012+ (EGG), 2012
Microelectronics and Electron Devices, 2004 IEEE Workshop on
Mechatronic Science, Electric Engineering and Computer (MEC), 2011 International Conference on
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Industrial and Information Systems, First International Conference on
Prognostics and Health Management (PHM), 2012 IEEE Conference on
Development and Learning, 2002. Proceedings. The 2nd International Conference on
Intelligent Systems Design and Applications, 2009. ISDA '09. Ninth International Conference on
Computational Intelligence and Design (ISCID), 2012 Fifth International Symposium on
Photovoltaic Specialists Conference (PVSC), 2011 37th IEEE
Intelligent Control and Automation (WCICA), 2010 8th World Congress on
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
Engineering in Medicine and Biology Society (EMBC), 2012 Annual International Conference of theIEEE
Geoscience and Remote Sensing, IEEE Transactions on
Agile Development Conference, 2004
System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2011 InternationalConference on
Sensors, 2008 IEEE
Consumer Electronics, IEEE Transactions on
Computer Aided Control Systems Design, 2004 IEEE International Symposium on
Prognostics and Health Management (PHM), 2011 IEEE Conference on
Software Maintenance and Reengineering, 2005. CSMR 2005. Ninth European Conference on
Design Automation Conference (DAC), 2013 50th ACM / EDAC / IEEE
Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications,2006 IEEE Internationa
Applications and the Internet, 2009. SAINT '09. Ninth Annual International Symposium on
Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on
Cognitive Informatics (ICCI), 2010 9th IEEE International Conference on
Computational Intelligence and Design (ISCID), 2010 International Symposium on
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Science and Social Research (CSSR), 2010 International Conference on
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Software Maintenance, 2006. ICSM '06. 22nd IEEE International Conference on
Control and Decision Conference, 2008. CCDC 2008. Chinese
Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on
Cybernetics and Intelligent Systems, 2008 IEEE Conference on
Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on
Dependable Computing Conference (EDCC), 2012 Ninth European
Globecom Workshops, 2007 IEEE
Intelligent Transportation Systems, IEEE Transactions on
Networking, 2008. ICN 2008. Seventh International Conference on
Local Computer Networks (LCN), 2010 IEEE 35th Conference on
Networked Computing (INC), 2010 6th International Conference on
American Control Conference, 2003. Proceedings of the 2003
Computer Science and Education (ICCSE), 2010 5th International Conference on
Evolutionary Computation (CEC), 2010 IEEE Congress on
Network and Service Security, 2009. N2S '09. International Conference on
Microwave Symposium, 2007. IEEE/MTT-S International
Electric Technology and Civil Engineering (ICETCE), 2011 International Conference on
Software Aging and Rejuvenation (WoSAR), 2010 IEEE Second International Workshop on
Electronic Measurement Instruments, 2009. ICEMI '09. 9th International Conference on
2009 International Conference on Signal Processing Systems
Military Communications Conference, 2006. MILCOM 2006. IEEE
American Control Conference (ACC), 2013
Power Delivery, IEEE Transactions on
Communications, 2006. ICC '06. IEEE International Conference on
System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2011 InternationalConference on
Wavelet Analysis and Pattern Recognition, 2008. ICWAPR '08. International Conference on
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11thInternational Conference on
Reverse Engineering, 2009. WCRE '09. 16th Working Conference on
Applications and the Internet, 2009. SAINT '09. Ninth Annual International Symposium on
INFOCOM, 2011 Proceedings IEEE
Empirical Software Engineering in Practice (IWESEP), 2012 Fourth International Workshop on
Emerging Technologies Factory Automation (ETFA), 2012 IEEE 17th Conference on
Innovations in Information Technology, 2007. IIT '07. 4th International Conference on
Communications (ICC), 2012 IEEE International Conference on
Software Engineering Workshop, 2008. SEW '08. 32nd Annual IEEE
INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings
Computational and Information Sciences (ICCIS), 2011 International Conference on
Software Maintenance, 2004. Proceedings. 20th IEEE International Conference on
Mechatronics and Automation (ICMA), 2010 International Conference on
Source Code Analysis and Manipulation (SCAM), 2013 IEEE 13th International Working Conference on
Software Engineering (ICSE), 2013 35th International Conference on
Aerospace Conference, 2003. Proceedings. 2003 IEEE
Information Technology Interfaces (ITI), 2010 32nd International Conference on
Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on
Dependable Systems Networks, 2009. DSN '09. IEEE/IFIP International Conference on
Mechanic Automation and Control Engineering (MACE), 2011 Second International Conference on
Software Maintenance, 2003. ICSM 2003. Proceedings. International Conference on
Information Management, Innovation Management and Industrial Engineering (ICIII), 2012International Conference on
American Control Conference (ACC), 2011
Empirical Software Engineering, 2005. 2005 International Symposium on
Software Engineering (ICSE), 2011 33rd International Conference on
Applications and the Internet Workshops, 2004. SAINT 2004 Workshops. 2004 International Symposiumon
Information Technology, Computer Engineering and Management Sciences (ICM), 2011 InternationalConference on
Systems, Man and Cybernetics, 2003. IEEE International Conference on
Software Maintenance (ICSM), 2010 IEEE International Conference on
Security and Privacy (SP), 2011 IEEE Symposium on
Review of Scientific Instruments
Visual Languages and Human-Centric Computing (VL/HCC), 2013 IEEE Symposium on
Communications (ICC), 2012 IEEE International Conference on
Quality of Information and Communications Technology (QUATIC), 2010 Seventh InternationalConference on the
Electronic Measurement Instruments, 2009. ICEMI '09. 9th International Conference on
Control and Automation, 2007. ICCA 2007. IEEE International Conference on
Modern Technique and Technologies, 2005. MTT 2005. 11th International Scientific and PracticalConference of Students, Po
Measuring Technology and Mechatronics Automation (ICMTMA), 2011 Third International Conferenceon
Control Conference, 2008. CCC 2008. 27th Chinese
Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on
Bioinformatics and Biomedical Engineering , 2009. ICBBE 2009. 3rd International Conference on
Intelligent Control and Automation, 2002. Proceedings of the 4th World Congress on
Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conferenceon
Intelligent Computation Technology and Automation, 2009. ICICTA '09. Second InternationalConference on
Reliability, IEEE Transactions on
Selected Topics in Signal Processing, IEEE Journal of
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th InternationalCongress on
Computational and Information Sciences (ICCIS), 2010 International Conference on
Control, Automation and Systems (ICCAS), 2011 11th International Conference on
TENCON 2008 - 2008 IEEE Region 10 Conference
Software Engineering, IEEE Transactions on
Control and Decision Conference (CCDC), 2012 24th Chinese
Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
Technologies for Homeland Security, 2007 IEEE Conference on
Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conferenceon
Information and Automation (ICIA), 2011 IEEE International Conference on
Securecomm and Workshops, 2006
Vehicular Technology, IEEE Transactions on
Magnetics, IEEE Transactions on
Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on
Software Engineering (ICSE), 2013 35th International Conference on
Intelligent Human-Machine Systems and Cybernetics, 2009. IHMSC '09. International Conference on
Prognostics and Health Management, 2008. PHM 2008. International Conference on
Control, Automation and Systems, 2008. ICCAS 2008. International Conference on
Technology Management for the Global Future, 2006. PICMET 2006
Systems and Information Engineering Design Symposium, 2008. SIEDS 2008. IEEE
Networking and Communication Conference, 2004. INCC 2004. International
Information Theory Workshop, 2004. IEEE
Artificial Intelligence, 2009. JCAI '09. International Joint Conference on
Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conferenceon
Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on
Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on
Control and Decision Conference, 2009. CCDC '09. Chinese
Industry Applications, IEEE Transactions on
Communications Magazine, IEEE
Autonomic Computing, 2008. ICAC '08. International Conference on
Industry Applications Conference, 2003. 38th IAS Annual Meeting. Conference Record of the
Electronics and the Environment, 2002 IEEE International Symposium on
Wireless Communications, IEEE
Digital Avionics Systems Conference (DASC), 2011 IEEE/AIAA 30th
Visualization and Computer Graphics, IEEE Transactions on
Computers in Cardiology, 2009
American Control Conference, 2008
Network and System Security, 2009. NSS '09. Third International Conference on
AUTOTESTCON Proceedings, 2002. IEEE
Computers in Cardiology, 2005
Natural Computation, 2009. ICNC '09. Fifth International Conference on
Oceans 2005 - Europe
Ultrasonics, Ferroelectrics and Frequency Control, IEEE Transactions on
Mechanic Automation and Control Engineering (MACE), 2010 International Conference on
Measuring Technology and Mechatronics Automation (ICMTMA), 2011 Third International Conferenceon
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Networking and Digital Society (ICNDS), 2010 2nd International Conference on
Bioinformatics and Biomedical Engineering (iCBBE), 2010 4th International Conference on
Logistics Systems and Intelligent Management, 2010 International Conference on
Control and Decision Conference (CCDC), 2010 Chinese
SICE, 2007 Annual Conference
Antennas and Propagation Magazine, IEEE
Electronic Components and Technology Conference, 2008. ECTC 2008. 58th
Control Conference, 2007. CCC 2007. Chinese
Control and Decision Conference (CCDC), 2012 24th Chinese
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Sensors, 2007 IEEE
Engineering Management Conference, 2004. Proceedings. 2004 IEEE International
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
Intelligent Systems Design and Applications, 2008. ISDA '08. Eighth International Conference on
Service Operations and Logistics, and Informatics, 2008. IEEE/SOLI 2008. IEEE InternationalConference on
SRII Global Conference (SRII), 2011 Annual
Signal Processing and Information Technology, 2007 IEEE International Symposium on
Research Challenges in Information Science, 2008. RCIS 2008. Second International Conference on
SICE 2002. Proceedings of the 41st SICE Annual Conference
Electrical and Control Engineering (ICECE), 2010 International Conference on
Biomedical Engineering, IEEE Transactions on
Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conferenceof the IEEE
Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on
Next Generation Internet Design and Engineering, 2006. NGI '06. 2006 2nd Conference on
Quality of Service (IWQoS), 2012 IEEE 20th International Workshop on
Database Technology and Applications, 2009 First International Workshop on
Spectrum, IEEE
Virtual Reality Conference, 2006
Physics and Control, 2005. Proceedings. 2005 International Conference
Global Humanitarian Technology Conference: South Asia Satellite (GHTC-SAS), 2013 IEEE
Intelligent Systems, 2002. Proceedings. 2002 First International IEEE Symposium
Mechatronics and Automation (ICMA), 2013 IEEE International Conference on
Virtual Reality Conference, 2009. VR 2009. IEEE
Machine Learning and Cybernetics, 2006 International Conference on
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Computational Intelligence in Robotics and Automation, 2003. Proceedings. 2003 IEEE InternationalSymposium on
Testing: Academic and Industrial Conference - Practice And Research Techniques, 2006. TAIC PART2006. Proceedings
Sensors, 2004. Proceedings of IEEE
Software Evolution, 2003. Proceedings. Sixth International Workshop on Principles of
Computational Intelligence in Robotics and Automation, 2003. Proceedings. 2003 IEEE InternationalSymposium on
Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology(ECTI-CON), 2011 8th Interna
Engineering in Medicine and Biology Workshop, 2007 IEEE Dallas
Computing: Theory and Applications, 2007. ICCTA '07. International Conference on
Intelligent Control and Automation, 2004. WCICA 2004. Fifth World Congress on
Reverse Engineering, 2009. WCRE '09. 16th Working Conference on
Information Management, Innovation Management and Industrial Engineering (ICIII), 2011International Conference on
TRANSDUCERS, Solid-State Sensors, Actuators and Microsystems, 12th International Conference on,2003
Sensors, 2009 IEEE
Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conferenceon
System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on
Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on
Source Code Analysis and Manipulation (SCAM), 2011 11th IEEE International Working Conference on
Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing(SNPD), 2012 13th ACIS Internatio
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Software Maintenance and Reengineering (CSMR), 2012 16th European Conference on
Computer Science and Information Engineering, 2009 WRI World Congress on
Robotics, Automation and Mechatronics, 2004 IEEE Conference on
Visualization and Computer Graphics, IEEE Transactions on
Mechanic Automation and Control Engineering (MACE), 2011 Second International Conference on
Electronics and the Environment, 2004. Conference Record. 2004 IEEE International Symposium on
Data Mining and Optimization (DMO), 2012 4th Conference on
Engineering in Medicine and Biology Society (EMBC), 2012 Annual International Conference of theIEEE
Geoscience and Remote Sensing Symposium (IGARSS), 2012 IEEE International
Intelligent Control and Automation (WCICA), 2012 10th World Congress on
Control and Decision Conference (CCDC), 2013 25th Chinese
Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM), 2011 InternationalConference on
Power Energy Society General Meeting, 2009. PES '09. IEEE
Control and Automation, 2007. ICCA 2007. IEEE International Conference on
Intelligent Control and Automation (WCICA), 2010 8th World Congress on
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
MIPRO, 2010 Proceedings of the 33rd International Convention
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Software Engineering (ICSE), 2013 35th International Conference on
Biometrics and Kansei Engineering (ICBAKE), 2013 International Conference on
Software Maintenance (ICSM), 2010 IEEE International Conference on
Control and Automation (ICCA), 2013 10th IEEE International Conference on
Probabilistic Methods Applied to Power Systems, 2008. PMAPS '08. Proceedings of the 10thInternational Conference on
Power Engineering Society Inaugural Conference and Exposition in Africa, 2005 IEEE
Mechanic Automation and Control Engineering (MACE), 2010 International Conference on
Reverse Engineering (WCRE), 2012 19th Working Conference on
Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM), 2011 InternationalConference on
Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM), 2011 InternationalConference on
Bioinformatics and Biomedical Engineering , 2009. ICBBE 2009. 3rd International Conference on
Power Systems, 2009. ICPS '09. International Conference on
Control and Decision Conference (CCDC), 2011 Chinese
Systems Biology (ISB), 2013 7th International Conference on
Artificial Intelligence (MICAI), 2011 10th Mexican International Conference on
Emerging Trends in Software Metrics (WETSoM), 2013 4th International Workshop on
Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on
Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on
Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conferenceon
Annals of the History of Computing, IEEE
Control Conference (CCC), 2013 32nd Chinese
Intelligent Computation Technology and Automation, 2009. ICICTA '09. Second InternationalConference on
Engineering Management, IEEE Transactions on
Robotics and Automation, 2007 IEEE International Conference on
Industrial Technology, 2005. ICIT 2005. IEEE International Conference on
Mechanic Automation and Control Engineering (MACE), 2010 International Conference on
Robotics and Automation, 2007 IEEE International Conference on
Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on
Electronics and the Environment, 2002 IEEE International Symposium on
Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on
SICE Annual Conference, 2008
Control Conference, 2007. CCC 2007. Chinese
Computer Modelling and Simulation, 2009. UKSIM '09. 11th International Conference on
Intelligent Control and Automation (WCICA), 2010 8th World Congress on
Control Conference, 2008. CCC 2008. 27th Chinese
Electronics and the Environment, 2003. IEEE International Symposium on
Energy 2030 Conference, 2008. ENERGY 2008. IEEE
Computer Modelling and Simulation, 2009. UKSIM '09. 11th International Conference on
Emerging Technologies Factory Automation, 2009. ETFA 2009. IEEE Conference on
Bioinformatics and Biomedical Engineering, (iCBBE) 2011 5th International Conference on
Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conferenceon
Control and Decision Conference, 2009. CCDC '09. Chinese
Control and Decision Conference (CCDC), 2012 24th Chinese
Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on
Africon Conference in Africa, 2002. IEEE AFRICON. 6th
Decision and Control (CDC), 2010 49th IEEE Conference on
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Industrial Engineering and Engineering Management (IE EM), 2011 IEEE 18Th International Conferenceon
Management Science and Engineering (ICMSE), 2013 International Conference on
Computing, Control and Industrial Engineering (CCIE), 2011 IEEE 2nd International Conference on
Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on
Mechatronics and Automation, 2007. ICMA 2007. International Conference on
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of
Control Automation, 2007. MED '07. Mediterranean Conference on
Control Conference, 2006. CCC 2006. Chinese
Smart Manufacturing Application, 2008. ICSMA 2008. International Conference on
Neural Networks, IEEE Transactions on
Intelligent Systems, 2002. Proceedings. 2002 First International IEEE Symposium
Bioinformatics and Biomedical Engineering (iCBBE), 2010 4th International Conference on
Geoscience and Remote Sensing Symposium, 2004. IGARSS '04. Proceedings. 2004 IEEE International
System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on
Technology Management for Emerging Technologies (PICMET), 2012 Proceedings of PICMET '12:
Mechanic Automation and Control Engineering (MACE), 2010 International Conference on
Mechatronics and Automation, 2009. ICMA 2009. International Conference on
Control Conference, 2007. CCC 2007. Chinese
Mechanic Automation and Control Engineering (MACE), 2010 International Conference on
Electrical and Control Engineering (ICECE), 2010 International Conference on
Biomedical Engineering and Biotechnology (iCBEB), 2012 International Conference on
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Control and Decision Conference (CCDC), 2012 24th Chinese
Control Conference (CCC), 2012 31st Chinese
Electrical and Control Engineering (ICECE), 2010 International Conference on
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Control Automation and Systems (ICCAS), 2010 International Conference on
Electric Information and Control Engineering (ICEICE), 2011 International Conference on
Control and Decision Conference (CCDC), 2013 25th Chinese
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Emerging Technologies and Factory Automation (ETFA), 2010 IEEE Conference on
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
MIPRO, 2011 Proceedings of the 34th International Convention
Control Theory Applications, IET
Computer, Mechatronics, Control and Electronic Engineering (CMCE), 2010 International Conferenceon
Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference on
Computing in Science Engineering
Software Evolvability, 2007 Third International IEEE Workshop on
Future Information Technology and Management Engineering, 2008. FITME '08. International Seminaron
Biomedical Engineering and Computer Science (ICBECS), 2010 International Conference on
Multimodal Interfaces, 2002. Proceedings. Fourth IEEE International Conference on
Sensors, 2003. Proceedings of IEEE
Bioinformatics and Biomedical Engineering , 2009. ICBBE 2009. 3rd International Conference on
Cognitive Informatics, 2003. Proceedings. The Second IEEE International Conference on
Sensors Journal, IEEE
Computer Science Service System (CSSS), 2012 International Conference on
Software Testing Verification and Validation, 2009. ICST '09. International Conference on
TRANSDUCERS, Solid-State Sensors, Actuators and Microsystems, 12th International Conference on,2003
Consumer Electronics - Berlin (ICCE-Berlin), 2011 IEEE International Conference on
Control Conference, 2008. CCC 2008. 27th Chinese
Information Communication Technology Electronics Microelectronics (MIPRO), 2013 36th InternationalConvention on
Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conferenceon
Management Science and Engineering (ICMSE), 2013 International Conference on
Engineering in Medicine and Biology Society,EMBC, 2011 Annual International Conference of theIEEE
Control and Decision Conference (CCDC), 2011 Chinese
Sustainable Power Generation and Supply, 2009. SUPERGEN '09. International Conference on
Engineering in Medicine and Biology Magazine, IEEE
Information Technology in Biomedicine, IEEE Transactions on
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Physics and Control, 2003. Proceedings. 2003 International Conference
Information Engineering and Computer Science, 2009. ICIECS 2009. International Conference on
Industrial and Information Systems (ICIIS), 2012 7th IEEE International Conference on
Informatics Education and Research for Knowledge-Circulating Society, 2008. ICKS 2008.International Conference on
Database Engineering and Application Symposium, 2005. IDEAS 2005. 9th International
Emerging Trends in Engineering and Technology (ICETET), 2009 2nd International Conference on
Innovative Technologies in Intelligent Systems and Industrial Applications, 2009. CITISIA 2009
Developments in Renewable Energy Technology ( ICDRET), 2009 1st International Conference on the
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th InternationalConference on
Mathematical/Analytical Modelling and Computer Simulation (AMS), 2010 Fourth Asia InternationalConference on
Bioinformatics and Biomedical Engineering , 2009. ICBBE 2009. 3rd International Conference on
Instrumentation and Measurement, IEEE Transactions on
Bioinformatics and Biomedical Engineering, (iCBBE) 2011 5th International Conference on
Digital Libraries, 2006. JCDL '06. Proceedings of the 6th ACM/IEEE-CS Joint Conference on
Engineering in Medicine and Biology Society, 2003. Proceedings of the 25th Annual InternationalConference of the IEEE
New Technology of Agricultural Engineering (ICAE), 2011 International Conference on
Computer Games (CGAMES), 2011 16th International Conference on
Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conferenceof the IEEE
Environmental and Computer Science, 2009. ICECS '09. Second International Conference on
Neural Networks, 2003. Proceedings of the International Joint Conference on
Modern Techniques and Technologies, 2003. MTT 2003. Proceedings of the 9th International Scientificand Practical Conferen
Instrumentation Measurement Magazine, IEEE
Sensors Journal, IEEE
SICE-ICASE, 2006. International Joint Conference
Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM), 2011 InternationalConference on
Control Conference (CCC), 2013 32nd Chinese
IT in Medicine and Education, 2008. ITME 2008. IEEE International Symposium on
Virtual Reality Conference, 2009. VR 2009. IEEE
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposiumon
Control and Decision Conference (CCDC), 2010 Chinese
Solid-State Sensors, Actuators and Microsystems Conference, 2007. TRANSDUCERS 2007.International
Electronics, Communications and Control (ICECC), 2011 International Conference on
Sensors Journal, IEEE
E -Business and E -Government (ICEE), 2011 International Conference on
Proceedings of the 5th International Workshop on Modeling in Software Engineering
Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research
Proceedings of the 2013 Chilean Conference on Human - Computer Interaction
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the 15th Annual Conference on Genetic and Evolutionary Computation
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the 2013 International Conference on Software Engineering
Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering
Proceedings of the 29th Spring Conference on Computer Graphics
ACM Trans. Softw. Eng. Methodol.
Proceedings of the 2013 International Conference on Software Engineering
Software Maintenance (ICSM), 2013 29th IEEE International Conference on
Services (SERVICES), 2013 IEEE Ninth World Congress on
Information Management, Innovation Management and Industrial Engineering (ICIII), 2013 6thInternational Conference on
Intelligent Transportation Systems - (ITSC), 2013 16th International IEEE Conference on
Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on
High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 2013 10th InternationalConference on
Digital Heritage International Congress (DigitalHeritage), 2013
Computer Engineering Systems (ICCES), 2013 8th International Conference on
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conferenceon
Plasma Science, IEEE Transactions on
Measurements and Networking Proceedings (M N), 2013 IEEE International Workshop on
Communications and Network Security (CNS), 2013 IEEE Conference on
Microwave Technology Computational Electromagnetics (ICMTCE), 2013 IEEE International Conferenceon
Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conferenceon
Software Reliability Engineering Workshops (ISSREW), 2013 IEEE International Symposium on
Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposiumon
Consumer Electronics, Communications and Networks (CECNet), 2013 3rd International Conference on
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on
Applied Imagery Pattern Recognition Workshop: Sensing for Control and Augmentation, 2013 IEEE(AIPR
Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd International Conference on
Signal-Image Technology Internet-Based Systems (SITIS), 2013 International Conference on
MOBILe Wireless MiddleWARE, Operating Systems and Applications (Mobilware), 2013 InternationalConference on
Electric Ship Technologies Symposium (ESTS), 2013 IEEE
Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on
Protective Relay Engineers, 2013 66th Annual Conference for
eScience (eScience), 2013 IEEE 9th International Conference on
Biosignals and Biorobotics Conference (BRC), 2013 ISSNIP
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom),IEEE Internationa
Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on
Recent Trends in Information Technology (ICRTIT), 2013 International Conference on
Software Maintenance (ICSM), 2013 29th IEEE International Conference on
Software Maintenance (ICSM), 2013 29th IEEE International Conference on
Intelligent Networks and Intelligent Systems (ICINIS), 2013 6th International Conference on
Embedded Software (EMSOFT), 2013 Proceedings of the International Conference on
Software Engineering (SBES), 2013 27th Brazilian Symposium on
Data Mining (ICDM), 2013 IEEE 13th International Conference on
Advanced Computing (ICoAC), 2013 Fifth International Conference on
Image Information Processing (ICIIP), 2013 IEEE Second International Conference on
Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 InternationalConference on
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom),IEEE Internationa
Neural Networks (IJCNN), The 2013 International Joint Conference on
Power and Energy Society General Meeting (PES), 2013 IEEE
Reverse Engineering (WCRE), 2013 20th Working Conference on
Materials for Renewable Energy and Environment (ICMREE), 2013 International Conference on
Software Engineering, IEEE Transactions on
Healthcare Informatics (ICHI), 2013 IEEE International Conference on
Computational Intelligence and Security (CIS), 2013 9th International Conference on
Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on
Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on
Industrial Electronics Society, IECON 2013 - 39th Annual Conference of the IEEE
Control Conference (CCC), 2013 32nd Chinese
Open Systems (ICOS), 2013 IEEE Conference on
Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on
Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on
Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2013 IEEE 18thInternational Worksh
Computational Intelligence and Design (ISCID), 2013 Sixth International Symposium on
Artificial Reality and Telexistence (ICAT), 2013 23rd International Conference on
Automated Software Engineering (ASE), 2013 IEEE/ACM 28th International Conference on
GCC Conference and Exhibition (GCC), 2013 7th IEEE
High Performance Computing and Communications 2013 IEEE International Conference on Embedded andUbiquitous Comp
Software Engineering Conference (APSEC, 2013 20th Asia-Pacific
Measuring Technology and Mechatronics Automation (ICMTMA), 2013 Fifth International Conferenceon
Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd InternationalSymposium on
Instrumentation and Measurement, Sensor Network and Automation (IMSNA), 2013 2nd InternationalSymposium on
Electricity Distribution (CIRED 2013), 22nd International Conference and Exhibition on
Engineering (NUiCONE), 2013 Nirma University International Conference on
Visual Languages and Human-Centric Computing (VL/HCC), 2013 IEEE Symposium on
Information Management, Innovation Management and Industrial Engineering (ICIII), 2013 6thInternational Conference on
SENSORS, 2013 IEEE
Control, Automation and Systems (ICCAS), 2013 13th International Conference on
Middle East Journal of Scientific Research
SAE Technical Papers
Science
International Journal of Molecular Sciences
Assistive Technology Research Series
IEEE International Conference on Software Maintenance, ICSM
IEEE Transactions on Software Engineering
IEEE International Conference on Software Maintenance, ICSM
Proceedings of the International Conference on Engineering Design, ICED
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinform
IET Conference Publications
Journal of Food Quality
Food Science and Technology International
Acta Periodica Technologica
Procedia Engineering
Journal of Consciousness Studies
IEEE SENSORS 2013 - Proceedings
International Agricultural Engineering Journal
Informacion Tecnologica
ACM International Conference Proceeding Series
Proceedings of the National Academy of Sciences of the United States of America
2013 IEEE International Conference on Mechatronics and Automation, IEEE ICMA 2013
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Nature
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Proceedings of the National Academy of Sciences of the United States of America
Biosensors and Bioelectronics
IEEE Transactions on Visualization and Computer Graphics
Proceedings of the National Academy of Sciences of the United States of America
ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE)
IEEE 13th International Working Conference on Source Code Analysis and Manipulation, SCAM 2013
Proceedings of the 13th International Conference of the European Society for Precision Engineering and Nanotechnology, EU
International Journal of Decision Support System Technology
Journal of Nanomedicine and Nanotechnology
Proceedings - 2013 27th Brazilian Symposium on Software Engineering, SBES 2013
2013 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2013
2013 IEEE Conference on Open Systems, ICOS 2013
Proceedings - SCCG 2013: 29th Spring Conference on Computer Graphics
Engineering for Rural Development
Information Sciences
Mechanism and Machine Theory
Safety Science
Decision Support Systems
\{NDT\} & E International
Computer Networks
Parallel Computing
Fusion Engineering and Design
Procedia Technology
Keywords Type URL Volume Pages DOI ISSN/ISBN
http://dl.acm.org/citation.cfm?id 650--660 978-1-4673-10
http://doi.acm.org/10.1145/1597 4:1--4:1 10.1145/1597 978-1-60558-8
http://dl.acm.org/citation.cfm?id 1217--1220 978-1-4673-30
Interruption modalities, http://dx.doi.org/10.1109/ICMI.2 479-- 10.1109/ICMI 0-7695-1834-6
Code Smells, Dynamic http://doi.acm.org/10.1145/2351 282--285 10.1145/2351 978-1-4503-12
code smells, domain-spec http://doi.acm.org/10.1145/1810 167--170 10.1145/1810 978-1-60558-7
http://doi.acm.org/10.1145/1408 117--126 10.1145/1408 978-1-60558-2
code smells, empirical sthttp://doi.acm.org/10.1145/1984 33--36 10.1145/1984 978-1-4503-05
HCI, ambient awareness,http://doi.acm.org/10.1145/1027 183--190 10.1145/1027 1-58113-995-0
http://dx.doi.org/10.1109/ESEM. 390--400 10.1109/ESEM978-1-4244-48
code smell, controlled e http://doi.acm.org/10.1145/2460 48--59 10.1145/2460 978-1-4503-18
http://dx.doi.org/10.1109/MSR.20 10-- 10.1109/MSR.0-7695-2950-
C\#, Java, code smells, ehttp://doi.acm.org/10.1145/1809 32--38 10.1145/1809 978-1-60558-9
code change, design defhttp://doi.acm.org/10.1145/2463 1461--1468 10.1145/2463 978-1-4503-19
air quality, domestic comhttp://doi.acm.org/10.1145/1620 81--84 10.1145/1620 978-1-60558-4
digital photographs, olfa http://doi.acm.org/10.1145/1124 653--662 10.1145/1124 1-59593-372-7
Human-computer interacti http://doi.acm.org/10. 8 2:1--2:17 10.1145/2071 1551-6857
olfactory related techno http://doi.acm.org/10.1145/2072 205--214 10.1145/2072 978-1-4503-08
bad smells, faults, open http://doi.acm.org/10.1145/1390 43--44 10.1145/1390 978-1-60558-0
bidirectional, empathy, hhttp://doi.acm.org/10.1145/1690 66--71 10.1145/1690 978-1-60558-8
class extension, module http://doi.acm.org/10.1145/1094 177--189 10.1145/1094 1-59593-031-0
http://dl.acm.org/citation.cfm?id 76--90 3-540-75208-0
http://dx.doi.org/10.1007/115683 444--453 10.1007/1156 3-540-29395-7
code smells, refactoring,http://doi.acm.org/10.1145/1879 5--14 10.1145/1879 978-1-4503-00
color dynamics, coloroi http://dx.doi.org/10.2312/CO 231--240 10.2312/COM 3-905673-27-4
software maintenance, shttp://doi.acm.org/10.1145/2372 107--110 10.1145/2372 978-1-4503-10
code inspection, code sme http://doi.acm.org/10.1145/1852 8:1--8:10 10.1145/1852 978-1-4503-00
air quality, domestic te http://doi.acm.org/10.1145/1753 1861--1870 10.1145/1753 978-1-60558-9
http://dl.acm.org/citation.cfm?id 1365--1368 978-1-4673-30
Levenshtein distance, cohttp://doi.acm.org/10.1145/2328 1--7 10.1145/2328 978-1-4503-15
co-dining experience, m http://doi.acm.org/10.1145/2388 225--228 10.1145/2388 978-1-4503-14
end user software engin http://doi.acm.org/10.1145/1985 81--90 10.1145/1985 978-1-4503-04
http://doi.acm.org/10.1145/1029 163--163 10.1145/1029 1-58113-957-8
code ownership, code sme http://doi.acm.org/10.1145/1852 63:1--63:1 10.1145/1852 978-1-4503-00
http://dl.acm.org/citation.cfm?id 33:1--33:9 978-1-4673-12
bad smells, design defechttp://doi.acm.org/10.1145/1294 31--34 10.1145/1294 978-1-59593-7
4D effects, 4D films, 4 http://doi.acm.org/10.1145/2087 375--378 10.1145/2087 978-1-4503-10
code inspection, code sme http://doi.acm.org/10.1145/1409 77--86 10.1145/1409 978-1-60558-1
http://dl.acm.org/citation.cfm?id 682--691 978-1-4673-30
co-located public game http://doi.acm.org/10.1145/2071 56:1--56:8 10.1145/2071 978-1-4503-08
PuLSE-E, goal-based prod http://doi.acm.org/10.1145/2362 239--248 10.1145/2362 978-1-4503-10
images, information fora http://doi.acm.org/10.1145/2063 475--484 10.1145/2063 978-1-4503-07
architectural degenerati http://doi.acm.org/10.1145/1985 1090--1093 10.1145/1985 978-1-4503-04
high-fidelity virtual envi http://doi.acm.org/10.1145/1921 19--25 10.1145/1921 978-1-60558-9
aspect-oriented programhttp://doi.acm.org/10.1145/1960 203--214 10.1145/1960 978-1-4503-06
architectural anomalies, http://doi.acm.org/10.1145/2162 167--178 10.1145/2162 978-1-4503-10
duplicated code, erlang, http://doi.acm.org/10.1145/1480 169--178 10.1145/1480 978-1-60558-3
design heuristics, evolut http://doi.acm.org/10.1145/1143 1909--1916 10.1145/1143 1-59593-186-4
1-59593-589-4
co-change analysis, conchttp://doi.acm.org/10.1145/1294 83--89 10.1145/1294 978-1-59593-7
code smells, refactoring http://doi.acm.org/10.1145/1159 288--296 10.1145/1159 1-59593-218-6
HTN planning, big refacto http://doi.acm.org/10.1145/2328 24--31 10.1145/2328 978-1-4503-15
adaptivity, evaluation, s http://doi.acm.org/10.1145/1613 89:1--89:2 10.1145/1613 978-1-60558-2
http://dl.acm.org/citation.cfm?id 441--451 978-1-4673-10
Refactoring sequence, bhttp://doi.acm.org/10.1145/2351 406--409 10.1145/2351 978-1-4503-12
anomaly, api usage, clo http://doi.acm.org/10.1145/1595 383--392 10.1145/1595 978-1-60558-0
http://dl.acm.org/citation.cfm?id 1169--1172 978-1-4673-30
refactoring, relational t http://doi.acm.org/10.1145/1985 820--823 10.1145/1985 978-1-4503-04
clone detection, clone http://doi.acm.org/10.1145/2245 1235--1242 10.1145/2245 978-1-4503-08
Bugdetection, data mininhttp://doi.acm.org/10. 22 7:1--7:25 10.1145/2430 1049-331X
code smells, design debt,http://doi.acm.org/10.1145/1985 17--23 10.1145/1985 978-1-4503-05
cross-sensory perceptionhttp://doi.acm.org/10.1145/1785 18:1--18:6 10.1145/1785 978-1-60558-8
<!-- Tag Not Handled -- http://www.sciencedirec 86 2639 - 2653 http://dx.doi. 0164-1212
<!-- Tag Not Handled -- http://www.sciencedirec 55 2223 - 2242 http://dx.doi.o 0950-5849
Design flaw, code smell,http://www.sciencedirec 141 117 - 136 http://dx.doi. 1571-0661
Object-oriented design, http://www.sciencedirec 80 1120 - 1128 http://dx.doi. 0164-1212
Gas detector tube, Two-http://www.sciencedirec 125 138 - 143 http://dx.doi. 0925-4005
Biosensors, Olfactory r http://www.sciencedirec 146 554 - 558 http://dx.doi. 0925-4005
http://www.sciencedirec 215 36 - http://dx.doi 0262-4079
Nanobioelectronic nose,http://www.sciencedirec 33 1722 - 1729 http://dx.doi. 0142-9612
Gas detector tube, A4-sihttp://www.sciencedirec 119 84 - 88 http://dx.doi. 0925-4005
<!-- Tag Not Handled -- http://www.sciencedirec 26 968 - 973 http://dx.doi.o 0950-4230
<!-- Tag Not Handled -- http://www.sciencedirec 82 1068 - 1074 http://dx.doi. 1386-5056
Dependency locality, Hiehttp://www.sciencedirec 82 463 - 472 http://dx.doi. 0164-1212
<!-- Tag Not Handled -- http://www.sciencedirect.com/sci - http://dx.doi. 0167-6423
<!-- Tag Not Handled -- http://www.sciencedirec 93 2529 - 2538 http://dx.doi. 0165-1684
Security, Vulnerability, http://www.sciencedirec 55 1279 - 1288 http://dx.doi.o 0950-5849
<!-- Tag Not Handled -- http://www.sciencedirect.com/sci - http://dx.doi. 1350-6307
Virtual maintenance, Maihttp://www.sciencedirec 45 937 - 949 http://dx.doi. 0010-4485
Password-based, Three-p http://www.sciencedirec 235 329 - 340 http://dx.doi. 0020-0255
External failure costs, S http://www.sciencedirec 29 766 - 777 http://dx.doi. 0272-6963
Multi-objective dynamic http://www.sciencedirec 37 3598 - 3604 http://dx.doi. 0957-4174
<!-- Tag Not Handled -- http://www.sciencedirec 48 17 - 23 http://dx.doi. 0950-7051
Robustness, Parameter de http://www.sciencedirec 18 1818 - 1830 http://dx.doi. 1350-6307
Wayfinding, Healthcare, http://www.sciencedirec 41 447 - 458 http://dx.doi. 0169-8141
<!-- Tag Not Handled -- http://www.sciencedirec 191 431 - 437 http://dx.doi. 0925-4005
Information systems, In http://www.sciencedirec 79 637 - 648 http://dx.doi. 1386-5056
Metrics, Petri nets, Undehttp://www.sciencedirec 51 610 - 626 http://dx.doi.o 0950-5849
Cryptography, Trusted cohttp://www.sciencedirec 110 485 - 488 http://dx.doi.o 0020-0190
social security incidents http://www.sciencedirec 45 235 - 239 http://dx.doi. 1877-7058
Long-span bridge, Extr http://www.sciencedirec 33 1657 - 1665 http://dx.doi. 0141-0296
sensory integration, chi http://www.sciencedirec 53 288 - 293 http://dx.doi. 1877-7058
Thermal expansion, Weld, http://www.sciencedirec 10 503 - 509 http://dx.doi 1350-6307
Physician order entry sy http://www.sciencedirec 76 157 - 168 http://dx.doi. 1386-5056
Paper mill sludge, Micr http://www.sciencedirec 31 3897 - 3903 http://dx.doi. 1359-4311
Automated static analysis http://www.sciencedirec 53 363 - 387 http://dx.doi.o 0950-5849
<!-- Tag Not Handled -- http://www.sciencedirec 44 734 - 742 http://dx.doi. 0950-0618
Framework, Metadata, Me http://www.sciencedirec 86 1239 - 1256 http://dx.doi. 0164-1212
plasma ozonizer, converthttp://www.sciencedirec 32 148 - 154 http://dx.doi. 1877-7058
Olfaction, Sex, Pheromohttp://www.sciencedirec 3 1-9 http://dx.doi. 2090-1232
\{CAPTCHA\}, \{QRBGS\}, http://www.sciencedirec 29 141 - 157 http://dx.doi. 0167-4048
Feeling of presence, Vir http://www.sciencedirec 24 227 - 236 http://dx.doi. 0953-5438
Cyanobacteria, Cyanotoxin http://www.sciencedirec 309 106 - 112 http://dx.doi. 0011-9164
Differential electronic n http://www.sciencedirec 39 9886 - 9891 http://dx.doi. 0957-4174
Refactoring, Aspect-oriehttp://www.sciencedirec 233 105 - 125 http://dx.doi. 1571-0661
Electronic nose, Lipids, http://www.sciencedirec 120 245 - 251 http://dx.doi. 0925-4005
Electronic nose, Differenhttp://www.sciencedirec 145 246 - 249 http://dx.doi. 0925-4005
Electronic nose, Electr http://www.sciencedirec 156 832 - 839 http://dx.doi. 0925-4005
Sensor array, Illuminati http://www.sciencedirec 131 37 - 42 http://dx.doi. 0925-4005
Education, Engagement,http://www.sciencedirec 69 722 - 729 http://dx.doi. 0094-5765
Electronic nose, Wavelehttp://www.sciencedirec 157 395 - 400 http://dx.doi. 0925-4005
Object-oriented develop http://www.sciencedirec 52 1167 - 1187 http://dx.doi.o 0950-5849
Zinc phosphide, Suicida http://www.sciencedirec 2 149 - 156 http://dx.doi. 2090-1232
Electronic nose, Black http://www.sciencedirec 131 110 - 116 http://dx.doi. 0925-4005
Refactoring, Java excepthttp://www.sciencedirec 82 333 - 345 http://dx.doi. 0164-1212
Wastewater, Nanofiltrati http://www.sciencedirec 245 314 - 320 http://dx.doi. 0011-9164
Odor recorder, Odor sens http://www.sciencedirec 106 388 - 393 http://dx.doi. 0925-4005
Aldehydes, Volatile org http://www.sciencedirec 44 2106 - 2113 http://dx.doi. 0360-1323
Electronic nose, Fermenthttp://www.sciencedirec 122 627 - 634 http://dx.doi. 0925-4005
Genetic algorithms, Sig http://www.sciencedirec 110 13 - 22 http://dx.doi. 0925-4005
Fire cues recognition, Whttp://www.sciencedirec 39 663 - 688 http://dx.doi.o 0379-7112
http://www.sciencedirec 5 34 - 39 http://dx.doi 1369-7021
Diabetics patients, Condhttp://www.sciencedirec 108 305 - 308 http://dx.doi. 0925-4005
Article http://www.scopus.com 55 2223-2242
Article http://www.scopus.com 67 1485-1494
Conferen http://www.scopus.com 821-822 476-479
Conferen http://www.scopus.com/inward/r 5-8
Conferen http://www.scopus.com 208 LNE 309-313
Article http://www.scopus.com 13 4305-4311
Article http://www.scopus.com 6 29-50
Conferen http://www.scopus.com 8027 LNA289-298
Conferen http://www.scopus.com/inward/r 184-193
Conferen http://www.scopus.com 8134 LN 664-681
Article http://www.scopus.com 86 2639-2653
Article http://www.scopus.com 6 2844-2859
Article http://www.scopus.com 7 35-44
Article http://www.scopus.com 24 751-758
Article http://www.scopus.com 29 292-297
Conferen http://www.scopus.com/inward/r 322-331
Article http://www.scopus.com 39 1245-1263
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84883088972&partn
Article http://www.scopus.com 93 2529-2538
Article http://www.scopus.com 9
Article http://www.scopus.com 48 1861-1867
Conferen http://www.scopus.com 348 334-349
Article http://www.scopus.com 56 203-212
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84881347506&partn
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84881309968&partne
Article http://www.scopus.com 39 1144-1156
Article http://www.scopus.com 500 580-584
Article http://www.scopus.com 5 1068-1072
Article http://www.scopus.com 48 17-23
Article http://www.scopus.com 115 935-945
Article http://www.scopus.com 29 10-17
Article http://www.scopus.com 48 1714-1721
Article http://www.scopus.com 12
Article http://www.scopus.com 133 212-218+5
Article http://www.scopus.com 133 206-211+4
Conferen http://www.scopus.com 7939 LN 181-196
Article http://www.scopus.com 7 167-186
Conferen http://www.scopus.com 55 1279-1288
Article http://www.scopus.com 50 1534-1541
Article http://www.scopus.com 29 286-296
Article http://www.scopus.com 235 329-340
Article http://www.scopus.com 110 10294-10299
Article http://www.scopus.com 23 227-235
Article http://www.scopus.com 37
Article http://www.scopus.com 28 12-28
Article http://www.scopus.com 236 1009-1014
Article http://www.scopus.com 29 278-286
Conferen http://www.scopus.com/inward/r 48-59
Conferen http://www.scopus.com/inward/ 42-47
Conferen http://www.scopus.com/inward/r 111-120
Article http://www.scopus.com 69 73-77
Article http://www.scopus.com 20 151-165
Article http://www.scopus.com 42 341-355
Article http://www.scopus.com 44 734-742
Article http://www.scopus.com 86 1239-1256
Article http://www.scopus.com 497 486-489
Conferen http://www.scopus.com 7629 LNA273-284
Article http://www.scopus.com 110 E1321-E1329
Article http://www.scopus.com 19 195-206
Article http://www.scopus.com 12 107-132
Article http://www.scopus.com 19 606-615
Article http://www.scopus.com 19 177-186
Conferen http://www.scopus.com 310 20-23
Conferen http://www.scopus.com 303-306 912-917
Article http://www.scopus.com 110 4093-4098
Article http://www.scopus.com 14 5668-5685
Article http://www.scopus.com 8
Article http://www.scopus.com 88 216-225
Article http://www.scopus.com 110 3615-3620
Article http://www.scopus.com 40 174-179
Article http://www.scopus.com 22
Article http://www.scopus.com 33 405-412
Article http://www.scopus.com 493 424-428
Article http://www.scopus.com 309 106-112
Article http://www.scopus.com 17 357-361
Article http://www.scopus.com 96 38-41
Article http://www.scopus.com 60 5-8
Article http://www.scopus.com 53 245-250
Article http://www.scopus.com 17 33-43
Conferen http://www.scopus.com/inward/r 3-9
Article http://www.scopus.com 41 1246-1261
Article http://www.scopus.com 338 1462-1465
Conferen http://www.scopus.com/inward/r 827-830
Article http://www.scopus.com 109 20479-20484
Article http://www.scopus.com 491 66-71
Conferen http://www.scopus.com/inward/r 225-228
Conferen http://www.scopus.com/inward/r 56-65
Conferen http://www.scopus.com/inward/r 306-315
Conferen http://www.scopus.com/inward/r 399-408
Article http://www.scopus.com 11
Conferen http://www.scopus.com/inward/r 299-304
Conferen http://www.scopus.com/inward/r 409-418
Conferen http://www.scopus.com/inward/r 235-244
Article http://www.scopus.com 6 17-31
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84874288195&partn
Conferen http://www.scopus.com 2 1029-1033
Article http://www.scopus.com 7 2800-2807
Conferen http://www.scopus.com 6 4828-4838
Conferen http://www.scopus.com 7 5186-5195
Conferen http://www.scopus.com 13 10971-10977
Conferen http://www.scopus.com 2 DS73 20-28
Conferen http://www.scopus.com 1 741-746
Article http://www.scopus.com 25 655-677
Conferen http://www.scopus.com/inward/r 97-98
Conferen http://www.scopus.com 50 259-266
Conferen http://www.scopus.com/inward/r 571-576
Article http://www.scopus.com 2012 6172-6175
Conferen http://www.scopus.com/inward/r 1643-1647
Conferen http://www.scopus.com 200 199-202
Article http://www.scopus.com 491 393-398
Conferen http://www.scopus.com/inward/r 289-294
Article http://www.scopus.com 6 1030-1035
Conferen http://www.scopus.com/inward/r 169-178
Article http://www.scopus.com 10 459-471
Conferen http://www.scopus.com 2 723-728
Conferen http://www.scopus.com/inward/r 157-162
Conferen http://www.scopus.com/inward/ 225-228
Conferen http://www.scopus.com/inward/r 107-110
Conferen http://www.scopus.com 1 239-248
Conferen http://www.scopus.com/inward/r 282-285
Conferen http://www.scopus.com/inward/r 406-409
Article http://www.scopus.com 8 80-116
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84866635180&partne
Article http://www.scopus.com 11 1677-1686
Article http://www.scopus.com 41 606-619
Article http://www.scopus.com 42 131-134
Article http://www.scopus.com 28 921-926
Article http://www.scopus.com 15 595-610
Article http://www.scopus.com 33 204-215
Article http://www.scopus.com 109 E2324-E2333
Article http://www.scopus.com 109 14081-14086
Article http://www.scopus.com 488 512-516
Article http://www.scopus.com 109 13775-13780
Conferen http://www.scopus.com/inward/r 90-91
Conferen http://www.scopus.com/inward/r 24-31
Conferen http://www.scopus.com/inward/r 1-7
Article http://www.scopus.com 23 1965-1977
Conferen http://www.scopus.com 17 503-530
Article http://www.scopus.com 32 35-45
Article http://www.scopus.com 39 9886-9891
Article http://www.scopus.com 158 28-35
Conferen http://www.scopus.com/inward/ 650-660
Conferen http://www.scopus.com/inward/r 441-451
Conferen http://www.scopus.com/inward/r 1235-1242
Article http://www.scopus.com 10 1752-1756
Article http://www.scopus.com 24 227-236
Article http://www.scopus.com 4 73-91
Article http://www.scopus.com 24 121-124
Conferen http://www.scopus.com/inward/r 630-634
Article http://www.scopus.com 8
Article http://www.scopus.com 6 45-51
Article http://www.scopus.com 35 335-341
Conferen http://www.scopus.com/inward/r 547-551
Conferen http://www.scopus.com/inward/ 277-286
Conferen http://www.scopus.com/inward/ 411-416
Conferen http://www.scopus.com/inward/r 167-178
Article http://www.scopus.com/inward/ 27-41
Article http://www.scopus.com 8
Article http://www.scopus.com 18 2227-2240
Article http://www.scopus.com/inward/r 42-45
Article http://www.scopus.com 41 193-203
Conferen http://www.scopus.com 55 64-70
Article http://www.scopus.com 11 121-135
Article http://www.scopus.com 19 223-243
Article http://www.scopus.com 8
Conferen http://www.scopus.com 455-456 55-59
Conferen http://www.scopus.com 7035 LN 77-84
Article http://www.scopus.com/inward/record.url?eid=2-s2.0-84856877046&partn
Article http://www.scopus.com 153 332-338
Article http://www.scopus.com 61 1803-1810
Article http://www.scopus.com 482 39-41
Article http://www.scopus.com 33 1722-1729
Article http://www.scopus.com 8
Conferen http://www.scopus.com 430-432 866-868
Article http://www.scopus.com 31 44-48
Article http://www.scopus.com 30 62-69
Conferen http://www.scopus.com 121-126 4345-4349
Article http://www.scopus.com 5 385-390
Conferen http://www.scopus.com/inward/r 97-106
Article http://www.scopus.com 9 161-164
Conferen http://www.scopus.com/inward/r 131-140
Conferen http://www.scopus.com/inward/r 437-438
Conferen http://www.scopus.com 2 222-226
Conferen http://www.scopus.com 123 LNE 523-528
Conferen http://www.scopus.com/inward/r 41-50
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84862945377&partn
Conferen http://www.scopus.com/inward/r 205-214
Article http://www.scopus.com 1
Article http://www.scopus.com 37 3036-3044
Conferen http://www.scopus.com 121 LNE 405-415
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84873366327&partn
Conferen http://www.scopus.com/inward/r 113-118
Conferen http://www.scopus.com/inward/r 109-114
Conferen http://www.scopus.com/inward/r 97-106
Conferen http://www.scopus.com 1 167-175
Conferen http://www.scopus.com 31 3897-3903
Article http://www.scopus.com 65 611-624
Conferen http://www.scopus.com 1 266-275
Conferen http://www.scopus.com/inward/r 397-416
Article http://www.scopus.com 137 1060-1070
Conferen http://www.scopus.com 1 278-281
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84855372582&partn
Conferen http://www.scopus.com 3 1479-1482
Article http://www.scopus.com 18 167-177
Conferen http://www.scopus.com/inward/r 36-47
Article http://www.scopus.com 18 119-131
Article http://www.scopus.com 1
Conferen http://www.scopus.com/inward/r 375-378
Article http://www.scopus.com 6 324-329
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-82055193738&partne
Conferen http://www.scopus.com/inward/r 125-134
Conferen http://www.scopus.com/inward/r 65-74
Conferen http://www.scopus.com 7040 LN 345-349
Conferen http://www.scopus.com/inward/r 2007-2010
Article http://www.scopus.com/inward/r 57-64
Conferen http://www.scopus.com/inward/ 163-164
Article http://www.scopus.com 29 1304-1316
Article http://www.scopus.com 29 766-777
Article http://www.scopus.com 4 1149-1175
Conferen http://www.scopus.com/inward/ 3644-3647
Article http://www.scopus.com 167 199-203
Article http://www.scopus.com 157 395-400
Article http://www.scopus.com 8 1258-1262
Article http://www.scopus.com 24 485-511
Article http://www.scopus.com 18 1818-1830
Article http://www.scopus.com 113 1266-1272
Article http://www.scopus.com 34 363-369
Conferen http://www.scopus.com/inward/r 134-141
Conferen http://www.scopus.com/inward/r 975-980
Article http://www.scopus.com 108 E646-E654
Article http://www.scopus.com 108 E655-E662
Conferen http://www.scopus.com 6851 LN 128-134
Article http://www.scopus.com 69 722-729
Article http://www.scopus.com 3 3440-3445
Conferen http://www.scopus.com/inward/r 540-549
Article http://www.scopus.com E94-D 1575-1589
Article http://www.scopus.com 21 277-283
Article http://www.scopus.com 156 832-839
Article http://www.scopus.com 14 265-272
Article http://www.scopus.com 27 2302-2303
Article http://www.scopus.com 17 331-341
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-79960640352&partne
Conferen http://www.scopus.com/inward/r 17-23
Article http://www.scopus.com 277 76-83
Conferen http://www.scopus.com 6773 LN 280-289
Article http://www.scopus.com 40 598-607
Conferen http://www.scopus.com 6762 LN 464-473
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-79960139122&partn
Conferen http://www.scopus.com/inward/ 1090-1093
Conferen http://www.scopus.com/inward/r 820-823
Conferen http://www.scopus.com/inward/r 81-90
Conferen http://www.scopus.com/inward/r 33-36
Article http://www.scopus.com 8 359-370
Conferen http://www.scopus.com 6698 LN 282-298
Article http://www.scopus.com 108 10320-10325
Article http://www.scopus.com 11 6145-6164
Conferen http://www.scopus.com/inward/r 127-130
Article http://www.scopus.com 108 8479-8484
Article http://www.scopus.com 108 8059-8064
Article http://www.scopus.com 33 1657-1665
Article http://www.scopus.com 58 1208-1215
Conferen http://www.scopus.com/inward/ 203-214
Conferen http://www.scopus.com/inward/r 77-78
Article http://www.scopus.com 472 186-192
Article http://www.scopus.com 472 217-222
Article http://www.scopus.com 472 95-100
Conferen http://www.scopus.com 6603 LN 356-370
Article http://www.scopus.com 23 179-202
Article http://www.scopus.com/inward/r 85-93
Article http://www.scopus.com 53 363-387
Article http://www.scopus.com 31 161-170
Article http://www.scopus.com 2 149-156
Article http://www.scopus.com 11 3667-3686
Article http://www.scopus.com 108 5075-5080
Article http://www.scopus.com 108 5087-5092
Article http://www.scopus.com 108 3797-3802
Article http://www.scopus.com 35 348-366
Article http://www.scopus.com 75 172-180
Article http://www.scopus.com 12
Article http://www.scopus.com 11 2129-2154
Article http://www.scopus.com 11 1405-1417
Article http://www.scopus.com 31 83-87
Article http://www.scopus.com 174 455-460
Conferen http://www.scopus.com 6543 LN 86-98
Article http://www.scopus.com 331 226-230
Article http://www.scopus.com 108 822-827
Conferen http://www.scopus.com 152-153 1188-1191
Article http://www.scopus.com 108 834-839
Article http://www.scopus.com 469 102-107
Article http://www.scopus.com 108 254-259
Article http://www.scopus.com 13
Article http://www.scopus.com 43 347-360
Conferen http://www.scopus.com/inward/r 867-870
Conferen http://www.scopus.com 7658
Article http://www.scopus.com 39 1541-1554
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-78650103847&partne
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-78650166517&partn
Conferen http://www.scopus.com/inward/ 175-190
Conferen http://www.scopus.com/inward/r 426-439
Conferen http://www.scopus.com 6414 LNA285-294
Article http://www.scopus.com 48 59-65
Conferen http://www.scopus.com 1 V1637-V1642
Conferen http://www.scopus.com/inward/r 5-14
Conferen http://www.scopus.com/inward/r 60-69
Conferen http://www.scopus.com/inward/r 128-137
Conferen http://www.scopus.com/inward/r 337-342
Conferen http://www.scopus.com/inward/r 106-115
Conferen http://www.scopus.com/inward/r 62-68
Conferen http://www.scopus.com 1 633-638
Conferen http://www.scopus.com/inward/ 5662-5667
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-79959411053&partn
Conferen http://www.scopus.com 11 235-242
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84876775146&partne
Conferen http://www.scopus.com/inward/r 19-26
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-78651451138&partn
Conferen http://www.scopus.com/inward/r 3145-3148
Conferen http://www.scopus.com/inward/r 219-222
Conferen http://www.scopus.com 37-38 36-40
Article http://www.scopus.com 42 47-53
Article http://www.scopus.com 5 1899-1906
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-80052566104&partn
Conferen http://www.scopus.com 7850
Article http://www.scopus.com 39 1684-1686
Conferen http://www.scopus.com/inward/ 270-275
Article http://www.scopus.com 45 2531-2537
Conferen http://www.scopus.com/inward/r 157-166
Article http://www.scopus.com 2 31-35
Article http://www.scopus.com 26 399-404
Article http://www.scopus.com 39 1322-1329
Article http://www.scopus.com 34 94-100
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-78149252929&partn
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-78149262765&partn
Article http://www.scopus.com 99 1239-1243
Article http://www.scopus.com 6
Article http://www.scopus.com 9 387-403
Article http://www.scopus.com 103 339-352
Article http://www.scopus.com 38 91-95
Conferen http://www.scopus.com 52 1167-1187
Conferen http://www.scopus.com/inward/r 23-31
Conferen http://www.scopus.com/inward/ 6708-6713
Article http://www.scopus.com 107 18682-18687
Conferen http://www.scopus.com/inward/r 683-688
Article http://www.scopus.com 4 4937-4942
Article http://www.scopus.com 4 161-175
Article http://www.scopus.com 58 540-550
Article http://www.scopus.com 41 78-81
Article http://www.scopus.com 10 8185-8197
Article http://www.scopus.com 10 1732-1739
Conferen http://www.scopus.com 2 167-170
Conferen http://www.scopus.com/inward/r 32-38
Conferen http://www.scopus.com 2 485-486
Article http://www.scopus.com 107 12930-12934
Conferen http://www.scopus.com/inward/r 175-180
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-77954485119&partn
Article http://www.scopus.com 107 12363-12368
Conferen http://www.scopus.com 40 657-663
Article http://www.scopus.com 27 65-71
Conferen http://www.scopus.com 3 1861-1870
Article http://www.scopus.com 34 43-56
Conferen http://www.scopus.com/inward/r 72-81
Article http://www.scopus.com 110 485-488
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-77953299944&partn
Conferen http://www.scopus.com 3 1810-1813
Article http://www.scopus.com 7 933-943
Article http://www.scopus.com/ 25 119-131
Conferen http://www.scopus.com/inward/ 1153-1157
Conferen http://www.scopus.com/inward/r 39-42
Article http://www.scopus.com 49 4904-4913
Article http://www.scopus.com 107 9436-9439
Article http://www.scopus.com 37 3598-3604
Article http://www.scopus.com 146 554-558
Article http://www.scopus.com 10 1120-1127
Article http://www.scopus.com 107 7060-7065
Article http://www.scopus.com 6
Article http://www.scopus.com 20 168-175
Article http://www.scopus.com 49 17-21+27
Article http://www.scopus.com 138 63-70
Article http://www.scopus.com 107 6052-6057
Conferen http://www.scopus.com 5937 LN 104-118
Article http://www.scopus.com 145 246-249
Article http://www.scopus.com 49 28-30+36
Article http://www.scopus.com 36 20-36
Article http://www.scopus.com 107 22-27
Article http://www.scopus.com 29 141-157
Article http://www.scopus.com 24 253-256
Article http://www.scopus.com 30 30-37
Article http://www.scopus.com 13 78-81
Article http://www.scopus.com 10 36-46
Conferen http://www.scopus.com/inward/r 317-320
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-72749114344&part
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-72749126928&partner
Conferen http://www.scopus.com/inward/r 390-400
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-72149128201&partn
Conferen http://www.scopus.com 109 557-568
Article http://www.scopus.com 106 21247-21251
Conferen http://www.scopus.com 7498
Article http://www.scopus.com 31 293-297
Conferen http://www.scopus.com/inward/ 487-490
Conferen http://www.scopus.com 5902 LN 1-16
Conferen http://www.scopus.com/inward/r 75-84
Conferen http://www.scopus.com/inward/ 83-93
Conferen http://www.scopus.com/inward/r 95-99
Article http://www.scopus.com 35 756-779
Conferen http://www.scopus.com/inward/r 145-154
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84855621584&partn
Conferen http://www.scopus.com 5900 LN 485-499
Article http://www.scopus.com 33 30-37
Article http://www.scopus.com 96 217-225
Conferen http://www.scopus.com/inward/r 199-204
Conferen http://www.scopus.com 5857 LN 356-370
Conferen http://www.scopus.com/inward/r 161-166
Conferen http://www.scopus.com/inward/r 383-392
Conferen http://www.scopus.com 5883 LNA222-231
Conferen http://www.scopus.com 6 4044-4050
Conferen http://www.scopus.com/inward/r 5435-5438
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84872652594&partne
Conferen http://www.scopus.com/inward/r 487-493
Conferen http://www.scopus.com 25 1071-1074
Conferen http://www.scopus.com/inward/r 66-71
Article http://www.scopus.com 16 388-394
Article http://www.scopus.com 16 67-74
Conferen http://www.scopus.com/inward/ 345-350
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-70450233596&partn
Article http://www.scopus.com 136 88-94
Conferen http://www.scopus.com/inward/r 81-84
Conferen http://www.scopus.com/inward/r 113-115
Conferen http://www.scopus.com/inward/r 188-191
Conferen http://www.scopus.com 358 927-933
Conferen http://www.scopus.com/inward/r 67-72
Conferen http://www.scopus.com 5581 LN 146-162
Conferen http://www.scopus.com 5440 LN 167-192
Conferen http://www.scopus.com/inward/r 125-128
Article http://www.scopus.com 106 18803-18808
Article http://www.scopus.com 40 184-188
Article http://www.scopus.com 135 152-157
Conferen http://www.scopus.com/inward/r 200-205
Article http://www.scopus.com 21 6081-6085
Article http://www.scopus.com 11 267-277
Article http://www.scopus.com 22 1169-1173
Article http://www.scopus.com 44 2106-2113
Article http://www.scopus.com 245 314-320
Article http://www.scopus.com 461 277-281
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-69249201387&partne
Article http://www.scopus.com 44 1836-1842
Article http://www.scopus.com 37 104-106
Conferen http://www.scopus.com/inward/r 169-177
Article http://www.scopus.com 10
Conferen http://www.scopus.com 5543 LN 112-123
Article http://www.scopus.com 106 11776-11781
Article http://www.scopus.com 106 11703-11708
Conferen http://www.scopus.com 5452 16-34
Conferen http://www.scopus.com/inward/r 301-302
Article http://www.scopus.com 131 168-177
Article http://www.scopus.com 459 574-577
Article http://www.scopus.com 459 218-223
Article http://www.scopus.com 52 853-858
Article http://www.scopus.com 19 389-420
Article http://www.scopus.com 24 2659-2664
Article http://www.scopus.com 13 170-171
Article http://www.scopus.com 106 5359-5364
Article http://www.scopus.com/ 233 105-125
Article http://www.scopus.com 51 610-626
Article http://www.scopus.com 82 463-472
Conferen http://www.scopus.com 5414 LN 462-472
Article http://www.scopus.com 106 2401-2406
Article http://www.scopus.com 82 333-345
Article http://www.scopus.com 6 75-86
Article http://www.scopus.com 24 1498-1502
Article http://www.scopus.com 3 113-126
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-58049089734&partn
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-58049100880&partn
Conferen http://www.scopus.com/inward/r 366-375
Conferen http://www.scopus.com 1 1162-1167
Conferen http://www.scopus.com/inward/r 356-363
Conferen http://www.scopus.com/inward/r 43-44
Conferen http://www.scopus.com/inward/r 26-35
Conferen http://www.scopus.com/inward/r 111-122
Conferen http://www.scopus.com 5256 LN 318-337
Conferen http://www.scopus.com/inward/r 117-126
Conferen http://www.scopus.com 5095 LN 406-418
Conferen http://www.scopus.com/inward/r 213-220
Conferen http://www.scopus.com/inward/ 173-178
Conferen http://www.scopus.com/inward/r 332-334
Conferen http://www.scopus.com/inward/r 77-86
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-80053662553&partne
Article http://www.scopus.com 128 455-460+1
Conferen http://www.scopus.com 55-57 425-428
Conferen http://www.scopus.com/inward/ 799-802
Conferen http://www.scopus.com 1 337-341
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-58149145222&partn
Conferen http://www.scopus.com/inward/r 146-148
Conferen http://www.scopus.com 13 8676-8684
Conferen http://www.scopus.com 1 794-798
Conferen http://www.scopus.com 6 996-1000
Conferen http://www.scopus.com/inward/r 136-146
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-58149104456&partne
Conferen http://www.scopus.com 6 883-886
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84865277267&partn
Article http://www.scopus.com 128 461-466+2
Conferen http://www.scopus.com/inward/ 344-353
Conferen http://www.scopus.com 1 333-338
Conferen http://www.scopus.com/inward/r 75-81
Article http://www.scopus.com 12 707-713
Conferen http://www.scopus.com 5199 LN 859-868
Conferen http://www.scopus.com/inward/r 1129-1134
Article http://www.scopus.com 105 17430-17435
Conferen http://www.scopus.com/inward/r 1425-1428
Article http://www.scopus.com 62 473-482
Conferen http://www.scopus.com 1 538-544
Article http://www.scopus.com 105 14674-14679
Conferen http://www.scopus.com/inward/ 1642-1647
Article http://www.scopus.com 105 13598-13603
Conferen http://www.scopus.com/inward/r 279-283
Article http://www.scopus.com 455 227-231
Conferen http://www.scopus.com/inward/r 47-51
Article http://www.scopus.com 105 10996-11001
Article http://www.scopus.com 51 83-89
Article http://www.scopus.com 4
Article http://www.scopus.com 454 114-117
Article http://www.scopus.com 135 383-406
Article http://www.scopus.com 131 37-42
Article http://www.scopus.com 131 110-116
Article http://www.scopus.com 4
Article http://www.scopus.com 319 1842-1845
Article http://www.scopus.com 452 473-477
Article http://www.scopus.com 105 4576-4581
Article http://www.scopus.com 105 4571-4575
Article http://www.scopus.com 105 3404-3409
Article http://www.scopus.com 27 380-393
Article http://www.scopus.com 105 571-576
Article http://www.scopus.com 28 75-78
Article http://www.scopus.com 54 310-320
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84858488635&partn
Conferen http://www.scopus.com/inward/r 31-34
Conferen http://www.scopus.com/inward/r 31-34
Conferen http://www.scopus.com 4735 LN 76-90
Conferen http://www.scopus.com/inward/r 1626-1635
Article http://www.scopus.com/inward/r 91-93
Conferen http://www.scopus.com 4383 LN 109-121
Conferen http://www.scopus.com/inward/ 1544-1549
Article http://www.scopus.com 32 617-628
Conferen http://www.scopus.com/inward/ 23-28
Conferen http://www.scopus.com/inward/ 194-200
Article http://www.scopus.com 39 862-866
Conferen http://www.scopus.com/inward/ 341-348
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-51349132489&partne
Conferen http://www.scopus.com/inward/ 21
Conferen http://www.scopus.com/inward/r 174-177
Conferen http://www.scopus.com/inward/r 396-401
Conferen http://www.scopus.com/inward/r 83-89
Conferen http://www.scopus.com/inward/ 83-89
Conferen http://www.scopus.com/inward/r 1479-1482
Article http://www.scopus.com 450 503-508
Article http://www.scopus.com 18 59-68
Article http://www.scopus.com 450 289-293
Conferen http://www.scopus.com 6540
Article http://www.scopus.com 450 63-70
Conferen http://www.scopus.com 38 214-216
Article http://www.scopus.com 104 15905-15910
Article http://www.scopus.com 104 15917-15922
Article http://www.scopus.com 17 337-347
Article http://www.scopus.com 449 468-472
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-34548706553&partne
Article http://www.scopus.com 163 575
Article http://www.scopus.com 26 427-433
Article http://www.scopus.com 37 1209-1213
Conferen http://www.scopus.com 6504
Article http://www.scopus.com 448 1009-1014
Article http://www.scopus.com 448 1054-1057
Article http://www.scopus.com 448 709-713
Conferen http://www.scopus.com/inward/r 257-260
Article http://www.scopus.com 127 359-362+5
Article http://www.scopus.com 125 138-143
Article http://www.scopus.com 104 11826-11831
Article http://www.scopus.com 80 1120-1128
Article http://www.scopus.com 16 341-353
Article http://www.scopus.com 56 171-179
Conferen http://www.scopus.com 6279 PART 2
Article http://www.scopus.com 1 15-21
Article http://www.scopus.com 104 6084-6089
Article http://www.scopus.com 27 165-170
Article http://www.scopus.com 446 542-546
Article http://www.scopus.com 104 5614-5619
Article http://www.scopus.com 4 15-20
Article http://www.scopus.com 122 627-634
Article http://www.scopus.com 104 4653-4657
Article http://www.scopus.com 104 1953-1958
Article http://www.scopus.com 25 61-77
Article http://www.scopus.com 445 406-409
Article http://www.scopus.com 104 858-863
Article http://www.scopus.com 6 81-87
Conferen http://www.scopus.com 26 81-94
Conferen http://www.scopus.com 2006 159-168
Article http://www.scopus.com 120 245-251
Conferen http://www.scopus.com 2006 288-296
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-77957818529&part
Conferen http://www.scopus.com/inward/r 728-732
Conferen http://www.scopus.com/inward/r 391-400
Conferen http://www.scopus.com/inward/r 181-190
Conferen http://www.scopus.com/inward/r 401-410
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-50049091274&partn
Conferen http://www.scopus.com/inward/r 435
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84865171806&partn
Conferen http://www.scopus.com 4282 LN 1322-1332
Conferen http://www.scopus.com 1 87-93
Conferen http://www.scopus.com 3 269-273
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84865165954&partn
Conferen http://www.scopus.com 1 4312-4316
Conferen http://www.scopus.com 2006 297-306
Conferen http://www.scopus.com 2006 1745-1750
Article http://www.scopus.com 10 293-305
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84865173865&partn
Conferen http://www.scopus.com 3 1739-1747
Conferen http://www.scopus.com 2006
Article http://www.scopus.com 119 84-88
Conferen http://www.scopus.com 2006 161-163
Conferen http://www.scopus.com 2006 685-688
Article http://www.scopus.com E89-A 3327-3332
Article http://www.scopus.com/inward/r 1475
Article http://www.scopus.com 26 2134-2136
Conferen http://www.scopus.com 2 1909-1916
Conferen http://www.scopus.com 2006 48
Article http://www.scopus.com 103 15206-15211
Article http://www.scopus.com 103 13543-13548
Conferen http://www.scopus.com 11 395-431
Conferen http://www.scopus.com 12 811-827
Article http://www.scopus.com 12 985-989
Conferen http://www.scopus.com 3976 LN 293-306
Conferen http://www.scopus.com 2 653-662
Article http://www.scopus.com 103 9310-9314
Article http://www.scopus.com 153 365-375
Article http://www.scopus.com 20 239-249
Article http://www.scopus.com 103 8269-8274
Article http://www.scopus.com 49 544-566
Article http://www.scopus.com 21 115-121
Article http://www.scopus.com 103 4293-4298
Article http://www.scopus.com 72 934-940
Article http://www.scopus.com 311 666-670
Article http://www.scopus.com 8 81-90
Article http://www.scopus.com 103 1112-1117
Article http://www.scopus.com 103 1129-1134
Article http://www.scopus.com 102 19027-19032
Article http://www.scopus.com 102 18688-18693
Conferen http://www.scopus.com 10 6785-6814
Conferen http://www.scopus.com 141 117-136
Article http://www.scopus.com 18 794-797
Conferen http://www.scopus.com DS 35
Conferen http://www.scopus.com 2005 125-133
Conferen http://www.scopus.com 3770 LN 444-453
Conferen http://www.scopus.com 3713 LN 355-366
Conferen http://www.scopus.com 2005 685-690
Conferen http://www.scopus.com/inward/ 414-427
Conferen http://www.scopus.com 2005 63-70
Article http://www.scopus.com 15 445-457
Conferen http://www.scopus.com/inward/r 287-296
Conferen http://www.scopus.com 6 161-166
Conferen http://www.scopus.com/inward/r 177-189
Article http://www.scopus.com 40 177-189
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84877406548&partne
Conferen http://www.scopus.com 2005 393-396
Conferen http://www.scopus.com/inward/r 5472-5490
Conferen http://www.scopus.com 2005 177-180
Conferen http://www.scopus.com 2005 315-324
Conferen http://www.scopus.com 455 265-270
Conferen http://www.scopus.com/inward/ 14-19
Article http://www.scopus.com 438 179-184
Conferen http://www.scopus.com 2 1880-1883
Conferen http://www.scopus.com/inward/r 466-475
Article http://www.scopus.com 26 1001-1003
Conferen http://www.scopus.com 1 177-184
Conferen http://www.scopus.com/inward/r 92-101
Conferen http://www.scopus.com/inward/r 62-71
Article http://www.scopus.com 110 13-22
Article http://www.scopus.com 16 115-121
Article http://www.scopus.com 38 641-649
Article http://www.scopus.com 35 61-73
Article http://www.scopus.com 58 15-20
Conferen http://www.scopus.com 5742 71-78
Article http://www.scopus.com 20 1257-1265
Article http://www.scopus.com/inward/r 1033-1047
Article http://www.scopus.com 309 787-790
Conferen http://www.scopus.com 108 305-308
Article http://www.scopus.com 16 1-14
Article http://www.scopus.com 102 9697-9702
Article http://www.scopus.com 10 315-321
Article http://www.scopus.com 88 1929-1937
Article http://www.scopus.com 308 1931-1934
Article http://www.scopus.com 5 537-545
Article http://www.scopus.com 102 7724-7729
Article http://www.scopus.com 102 7356-7361
Article http://www.scopus.com 435 205-207
Conferen http://www.scopus.com 106 388-393
Conferen http://www.scopus.com 41 265-270
Article http://www.scopus.com 19 151-161
Article http://www.scopus.com 434 470-477
Article http://www.scopus.com 102 4608-4612
Article http://www.scopus.com 101 17861-17866
Conferen http://www.scopus.com 5415 494-501
Conferen http://www.scopus.com 5415 521-532
Conferen http://www.scopus.com/inward/r 350-359
Conferen http://www.scopus.com/inward/r 399-408
Conferen http://www.scopus.com 14 108-117
Article http://www.scopus.com 36 35-45
Conferen http://www.scopus.com E87-C 2081-2086
Conferen http://www.scopus.com/inward/r 53-58
Article http://www.scopus.com 3103 1030-1041
Conferen http://www.scopus.com B B427-B430
Conferen http://www.scopus.com/inward/ 183-190
Conferen http://www.scopus.com/inward/r 898-903
Conferen http://www.scopus.com 3 1254-1258
Conferen http://www.scopus.com 104
Conferen http://www.scopus.com/inward/r 163
Conferen http://www.scopus.com 2 587-590
Conferen http://www.scopus.com/inward/r 143-146
Conferen http://www.scopus.com/inward/ 13.1-13.4
Conferen http://www.scopus.com 1 299-305
Conferen http://www.scopus.com 8 156-157
Article http://www.scopus.com 432 508-511
Article http://www.scopus.com/inward/r 116-128
Article http://www.scopus.com 39 663-688
Conferen http://www.scopus.com/inward/r 47-56
Article http://www.scopus.com/inward/r 175-184+310
Article http://www.scopus.com 431 188-191
Article http://www.scopus.com 15 1053-1062
Article http://www.scopus.com 101 11459-11464
Article http://www.scopus.com/ 20 147-163
Conferen http://www.scopus.com 8 174-183
Conferen http://www.scopus.com 8 223-232
Article http://www.scopus.com 101 10476-10481
Conferen http://www.scopus.com 1 36-41
Article http://www.scopus.com 7 2-14
Conferen http://www.scopus.com 3 4202-4219
Article http://www.scopus.com 101 7763-7768
Article http://www.scopus.com 16 999-1012
Article http://www.scopus.com 101 5058-5063
Article http://www.scopus.com 57 477-484
Article http://www.scopus.com 427 605-606
Article http://www.scopus.com 13 45-51
Article http://www.scopus.com 303 366-370
Article http://www.scopus.com 427 208
Article http://www.scopus.com 26 71-80
Article http://www.scopus.com 101 337-342
Article http://www.scopus.com 100 15794-15799
Article http://www.scopus.com 426 623-629
Conferen http://www.scopus.com/inward/r 91-100
Conferen http://www.scopus.com/inward/r 381-384
Article http://www.scopus.com 26 771-780
Article http://www.scopus.com 361 2225-2244
Article http://www.scopus.com 100 10706-10711
Article http://www.scopus.com 10 56-59
Article http://www.scopus.com 10 503-509
Article http://www.scopus.com 3 468-474
Conferen http://www.scopus.com 217 73-88
Article http://www.scopus.com 424 68-72
Article http://www.scopus.com 9 57-74
Article http://www.scopus.com 36 383-386
Article http://www.scopus.com 422 716-719
Article http://www.scopus.com 100 4299-4304
Article http://www.scopus.com 23 119-123
Article http://www.scopus.com 95 109-117
Article http://www.scopus.com 299 1196-1201
Article http://www.scopus.com 1 28-36
Article http://www.scopus.com 298 2010-2012
Conferen http://www.scopus.com 1 1018-1025
Conferen http://www.scopus.com/inward/r 151-164
Article http://www.scopus.com 21 341-348
Article http://www.scopus.com 45 834-837
Conferen http://www.scopus.com 1 1665-1670
Conferen http://www.scopus.com 12 785-796
Article http://www.scopus.com 419 802
Article http://www.scopus.com 99 12622-12627
Article http://www.scopus.com 41 395-407
Article http://www.scopus.com 419 70-74
Article http://www.scopus.com 14 2201-2220
Article http://www.scopus.com 49 852-858
Article http://www.scopus.com/ 297 359-365
Article http://www.scopus.com 417 282-287
Article http://www.scopus.com 21 171-184
Article http://www.scopus.com 99 2187-2192
software architecture;software maintenance;anomalous cod277-286 10.1109/CSMR1534-5351
Unified Modeling Language;protocols;UEF;UML22m 5 pp.- 10.1109/AINA 1550-445X
geophysical image processing;remote sensing;RX 48 1211-1223 10.1109/TGRS0196-2892
fuzzy set theory;pattern clustering;security of data;anom 8 pp.- 10.1109/PRDC.2005.18
Internet;security of data;Internet traces;Internet traffi 225-234 10.1109/MAS 1526-7539
artificial life;fuzzy set theory;security of data;IPv6 en 5 pp.-486 10.1109/HPCASIA.2005.7
SRAM chips;active noise control;computer network performa 1-7 10.1109/EIT. 2154-0357
electron density;ionospheric electromagnetic wave propaga3931-3931
adaptive control;case-based reasoning;learning (5 570-574 10.1109/CSIE.2009.355
software architecture;software metrics;architecturally-re 82-88 10.1109/MiSE 2156-7883
database management systems;security of data;theorem prov 1-7 10.1109/INMIC.2009.538312
data structures;firewalls;trees (mathematics);BTF;SDD;anom 93-98 10.1109/JCSSE.2013.65673
Web sites;security of data;aggregating function;anomaly 919-926 10.1109/LCN.2008.4664304
adaptive filters;covariance matrices;data reduc 51 3492-3503 10.1109/TGRS0196-2892
computer vision;image segmentation;image sequences;image 1975-1981 10.1109/CVPR1063-6919
feature extraction;geophysical signal processin 40 1314-1325 10.1109/TGRS0196-2892
security of data;active probe-enabled measurement infras 1377-1385 10.1109/INFC 0743-166X
decision making;security of data;anomaly based intrusion d959-964 10.1109/ISTEL.2012.648312
biomedical transducers;biomedical ultrasonics;co55 2509-2518 10.1109/TUFF0885-3010
Gaussian processes;Internet;Wiener filters;autor 5 288-299 10.1109/TIFS 1556-6013
fuzzy logic;security of data;smart power grids;IT2 FLS;an 48-54 10.1109/ISRCS.2012.63092
PI control;adaptive control;aircraft control;control engin 1125-1130 10.1109/ISDA.2010.5687036
authorisation;business data processing;cognitio 9 318-331 10.1109/TDSC1545-5971
correlation methods;feature extraction;image motion analy 2054-2060 10.1109/CVPR1063-6919
computer network management;pattern classificat2 367-370 10.1109/ICICTA.2009.324
archaeology;geophysical techniques;ground penetrating ra1-4 10.1109/IWAGPR.2011.5963
telecommunication security;wireless sensor net 15 34-40 10.1109/MWC.1536-1284
aerospace;circuit oscillations;circuit simulation;field effe 1371-1378 10.1109/ITHE 1087-9870
ad hoc networks;data mining;mobile radio;routing protoco 505-508 10.1109/MOBHOC.2006.278
backpropagation;neural nets;security of data;BP neural ne 1061-1066 10.1109/ICICIC.2009.106
security of data;sequences;telecommunication security;a 1-10 10.1109/COMSNETS.2011.5
feature extraction;local area networks;pattern c 1 8 pp.- 10.1109/SUTC.2006.163621
database management systems;fuzzy set theory;se 3 1034-1039 10.1109/SNPD.2007.187
field programmable gate arrays;invasive software6 1170-1179 10.1109/TIFS 1556-6013
Internet;security of data;telecommunication network routi 192-195 10.1109/NAS.2009.41
power apparatus;power supply quality;Indian industrial sup320-325
Bayesian methods;Detectors;Discrete wavelet transforms;E354-358 10.1109/EEEI.2006.321102
Internet;computer network management;data mining;security 8 pp.- 10.1109/IPDPS.2005.160
computer networks;principal component analysis;security 178-185 10.1109/CISDA.2007.36815
observers;telecommunication control;telecommunication sec 5120-5125 10.1109/CDC. 0743-1546
buried object detection;geomagnetism;geophysical signal p322-327 10.1109/ISSPIT.2005.15771
security of data;anomalous activity;anomalous behavior i 367-376 10.1109/ACSA1063-9527
Internet;pattern clustering;security of data;social netwo 403-410 10.1109/ASONAM.2012.72
sensor placement;wireless sensor networks;end-to-end mea 386-394 10.1109/SAHC2155-5486
program testing;public domain software;software maintenan56-65 10.1109/ICSM1063-6773
Hilbert transforms;parameter estimation;telecom 1 710-713 10.1109/IAS.2009.219
data visualisation;human computer interaction;marine engi 170-178 10.1109/IV.20 1550-6037
flashover;insulation co-ordination;power overhead lines;rel 264-270 10.1109/ELINSL.2002.99592
security of data;IDS;alert ranking system;alert visualizat 264-268 10.1109/ICSCCN.2011.6024
coils;inspection;metallurgical industries;productivity;weld 1-8 10.1109/IAS. 0197-2618
biosensors;diseases;gait analysis;geriatrics;lear 2 331-336 10.1109/ICTAI1082-3409
genetic algorithms;mean square error methods;su1 382-384 vol.1 10.1109/ICCT.2003.1209103
Bragg gratings;optical waveguide filters;photonic crystal 237-239 10.1109/GROUP4.2010.564
ad hoc networks;data mining;mobile computing;routing pro478-487 10.1109/ICDC 1063-6927
nonparametric statistics;signal detection;SemiP detector; 2022-2029 10.1109/AERO.2005.155949
security of data;telecommunication security;wirel 6 744-757 10.1109/TII.2 1551-3203
operating system kernels;security of data;Hook 3 338-342 10.1109/CMC.2009.225
ART neural nets;data mining;data reduction;fuzzy neural n 252-260 10.1109/ICCSA.2008.70
inference mechanisms;pattern classification;stati 8 494-509 10.1109/TDSC1545-5971
data mining;pattern clustering;security of data; 6 472-475 10.1109/ICCSIT.2010.55640
biomedical ultrasonics;dentistry;A-scan;B-scan; 49 1437-1443 10.1109/TUFF0885-3010
Artificial neural networks;Detectors;Intrusion detection;N 405-410 10.1109/ISCC 1530-1346
Internet;digital signatures;security of data;te 4 41-55 10.1109/TDSC1545-5971
learning (artificial intelligence);radial basis function ne 173-174 10.1109/NAS.2008.41
computer networks;fault diagnosis;maximum likel16 1053-1063 10.1109/TNN. 1045-9227
database management systems;security of data;software ar2270-2275 10.1109/ICMA.2007.430390
Web services;condition monitoring;containerisation;contain76-83 10.1109/EISIC.2012.39
business communication;computer network management;comput 1-6 10.1109/TRIDENTCOM.2009
groupware;pattern matching;program diagnostics;security 1-6 10.1109/CSCWD.2006.2530
circuit simulation;integrated circuit design;Inferno;appro 860-867 10.1109/ICCA 1092-3152
cable laying;manufacture;optical cables;project 1 491-493 vol.1 10.1109/OCEANS.2002.119
Algorithm design and analysis;Data engineering;Data m 15-15 10.1109/ICDE.2006.88
data mining;security of data;RBF classifier;anom 3 203-207 10.1109/AICI.2009.450
learning (artificial intelligence);radial basis f 2 1081-1084 10.1109/ISDA.2006.253762
engineering education;SAID structure;design studio series;1-6 10.1109/FIE. 0190-5848
computer crime;fraud;pattern matching;tree sear 1 1208-1211 10.1109/ICPR 1051-4651
data mining;graphs;inference mechanisms;parallel algorit 243-254 10.1109/ICDE 1063-6382
decision theory;geometry;optimisation;optimising compilers292-304 10.1109/PACT1089-795X
telecommunication congestion control;arrival rate reducti 1-4 10.1109/CISE.2009.5366674
aircraft control;mobile robots;multi-robot systems;remot 3145-3150 10.1109/ACC. 0743-1619
electron accelerators;linear accelerators;parity;particle 780-784 10.1109/PAC.2007.4441101
aberrations;dynamic testing;optical communication;optical 4501-4505 10.1109/ICECC.2011.60663
electromagnetic devices;electromagnetic field theory;inte 1-3 10.1109/APPEEC.2010.5449
perturbation theory;power convertors;radiation e 60 1929-1952 10.1109/TNS. 0018-9499
data visualisation;security of data;anomaly-based intrusion61-70 10.1109/CSAC1063-9527
biomedical transducers;biomedical ultrasonics;cancer;ima 128-131 10.1109/PHT.2013.6461301
delay systems;observers;queueing theory;robust control;t 525-530 10.1109/CCA.2009.5280706
decoding;encoding;telecommunication network management; 1799-1807 10.1109/INFC 0743-166X
SRAM chips;computer networks;data structures;d20 1622-1634 10.1109/TNET1063-6692
fission reactor instrumentation;fission reactor safety;liqu 1-7 10.1109/ANIMMA.2011.6172
computer network reliability;fault diagnosis;loc 1 301-308 vol.1 10.1109/ICC.2003.1204189
aircraft;cameras;data communication;geographic informatio1-7 10.1109/URS.2009.5137476
cache storage;distributed memory systems;parallel proce 470-479 10.1109/ICPP 0190-3918
protocols;security of data;network intrusion detection al 171-174 10.1109/SERA.2011.26
ad hoc networks;mobile radio;self-adjusting sys 2 831-836 Vol.2 10.1109/WCNC 1525-3511
cache storage;electronic commerce;query processing;sup 243-248 10.1109/ICDEW.2011.57676
CMOS logic circuits;integrated circuit interconnections;int 663-671 10.1109/ISQE 1948-3287
database management systems;fuzzy set theory;se 3 670-674 10.1109/FSKD.2007.531
computer networks;learning (artificial intelligence);patter 877-882 10.1109/ICMLA.2008.18
IP networks;observers;queueing theory;telecommun 6 506-517 10.1049/iet-ct 1751-8644
Internet;computer network performance evaluation;compute70-74 10.1109/INFC 0743-166X
Internet;fuzzy logic;fuzzy set theory;pattern cla 1 119-122 10.1109/ITAIC.2011.603016
computer network security;learning (artificial intelligen 161-168 10.1109/ICNSS.2011.60599
data mining;knowledge based systems;pattern clustering;se982-987 10.1109/ICCSE.2013.65540
belief networks;data analysis;inference mechan 25 2177-2191 10.1109/TKDE1041-4347
closed loop systems;microtrons;nuclear engineering comput 395-398 10.1109/ICRESH.2010.5779
data integrity;device drivers;disc drives;security of data 119-126 10.1109/LADC.2009.12
concrete;elastic waves;finite difference methods;finite el 3283-3286 10.1109/CECNET.2011.5769
Unix;computer network management;mobile agents;security 191a-191a 10.1109/IPDPS.2005.33
authorisation;digital signatures;telecommunication traffi 809-814 10.1109/INM.2009.5188887
condition monitoring;learning (artificial intelligence);ma 45-51 10.1109/CICYBS.2013.6597
Internet;computer viruses;digital signatures;o 2 1384-1394 vol.10.1109/INFC 0743-166X
computer network management;neural nets;protocols;securit 1905-1910 10.1109/ISIE.2007.4374898
Internet;quality of service;routing protocols;telecommunicat80-89 10.1109/IWQO1548-615X
DNA;approximation theory;cancer;cellular biophysics;dens 149-153 10.1109/iccsp.2013.6577034
performance evaluation;probability;simulation;sp 1 -702 10.1109/WSC.2004.1371378
computer network security;computer viruses;data visualisat227-231 10.1109/CICSyN.2010.64
magnetic field measurement;microsensors;navigation;MEMS 1-10 10.1109/IPIN.2011.6071947
expert systems;word processing;English skills;Microsoft Of8 pp.- 10.1109/HICSS.2003.11737
algorithm theory;security of data;computationally complex 25-30 10.1109/IMCSIT.2009.53527
biological fluid dynamics;biomedical MRI;biomedicalmeasur1288-1291 10.1109/ISBI.2007.357095
electronic commerce;fault tolerant computing;parameter es17-23 10.1109/SEW.2002.1199445
electromagnetic wave polarisation;geometry;submillimetre 1-3 10.1109/IMWS2.2012.63382
data analysis;data visualisation;geographic information s 1-10 10.1109/OCEANS.2010.566
circuit tuning;elemental semiconductors;mixed analogue-dig 1-6 10.1109/VTS. 1093-0167
8687-8691 10.1109/ICAS 1520-6149
IP networks;computer network management;computer network 269-277 10.1109/NOMS1542-1201
Java;cellular radio;mobile agents;telecommunication comput 1805-1810 10.1109/NCM.2009.257
III-V semiconductors;Schottky gate field effect 50 1194-1199 10.1109/TED. 0018-9383
IV-VI semiconductors;absorption coefficients;fe 91 3556-3561 10.1063/1.14 0021-8979
correlation methods;failure analysis;wireless sensor netwo 1548-1556 10.1109/INFC 0743-166X
Peltier effect;barium compounds;calorimetry;c 73 2755-2765 10.1063/1.14 0034-6748
digital filters;electromagnetic wave scattering;f 3 1515-1517 10.1109/ICMMT.2008.45407
Internet;cellular radio;cleaning;control engineering com 277-282 10.1109/ICINFA.2009.52049
computer network management;resource allocation;telecomm 129-134 10.1109/ITNEWS.2008.4488
Gaussian Mixture Model (GMM);Home Security;Pattern Re1-3 2154-4824
Internet;Linux;computer network management;qua 21 648-662 10.1109/TNET1063-6692
principal component analysis;security of data;se 3 1182-1185 10.1109/ICNC.2010.5583654
data mining;fuzzy set theory;learning (artificial intellige 286-291 10.1109/CNSR.2009.51
Dielectric materials;Elasticity;Electrostatic a 2 1-4 10.1109/ISAF 1099-4734
autonomous aerial vehicles;distance measurement;inspecti244-252 10.1109/ICUAS.2013.65646
Java;cellular radio;fault diagnosis;inference mechanisms; 55-55 10.1109/AUSWIRELESS.200
IP networks;Kalman filters;Web services;hypermedia;securi247-254 10.1109/NSS.2010.69
cognition;handicapped aids;neurophysiology;patient rehabil108-111 10.1109/PCTHEALTH.2008.
MIMO communication;hyperthermia;microstrip antenna array 477-480
Bluetooth;data visualisation;graphical user interfaces;pat 377-391 10.1109/ACSA1063-9527
airports;mobile robots;surveillance;ANSER project;airport 991-996 10.1109/IROS.2007.4399319
data analysis;fault location;nonparametric statistics;patt 429-434 10.1109/ENERGYCON.2010.
Internet;computer crime;intelligent networks;neural nets; 543-547 10.1109/ccnc08.2007.126
decentralised control;feature extraction;industrial contro 51-56 10.1109/ICIT.2005.1600609
optical filters;ultraviolet detectors 95 161107-1611010.1063/1.32 0003-6951
Doppler shift;UHF antennas;delays;hydrological techniques55-59 10.1109/CCM.2003.1194283
security of data;telecommunication network reliability;t 1026-1029 10.1109/ICSE 1930-0395
Kalman filters;agriculture;atmospheric precipit 3 57-66 10.1109/JSTA 1939-1404
cameras;computer forensics;image classification 5 816-825 10.1109/TIFS 1556-6013
HBase;multi-row transaction;serializable snapshot isolatio 1741-1744 10.1109/ICCSNT.2012.6526
aerospace test facilities;electrostatic discharg 40 237-245 10.1109/TPS. 0093-3813
Approximation methods;Communities;Computational modeling 1-8 10.1109/CIG. 2325-4270
program visualisation;software metrics;software quality;a 279-283 10.1109/CSMR1534-5351
busbars;control system synthesis;machine control;optimal c4066-4071 10.1109/CDC. 0743-1546
integrated circuit design;microprocessor chips;f 27 380-393 10.1109/TCAD0278-0070
formal specification;program verification;softw 36 20-36 10.1109/TSE. 0098-5589
gamma-ray detection;gamma-ray spectrometers;ano 2 1062-1066 10.1109/NSSM1095-7863
Jupiter;aerospace instrumentation;planetary satellites;r 1-14 10.1109/AERO1095-323X
internetworking;routing protocols;Border routers;anomal 145-152 10.1109/LCN.2009.5355200
computer network security;pattern clustering;pro 6 110-121 10.1109/TNSM1932-4537
aerospace control;artificial satellites;command and cont 110-111 10.1109/NEBC.2003.121601
data flow computing;trees (mathematics);data-f 3 103-107 10.1109/CCCM.2008.242
object-oriented programming;system recovery;systems analy 161-165 10.1109/ITNG.2006.31
C++ language;discrete event simulation;hardware descript 112-119 1636-9874
Internet;authorisation;computer network security;data visua1-8 10.1109/APNOMS.2011.607
computational complexity;public domain software;software 299-304 10.1109/IMCCC.2012.74
field programmable gate arrays;gamma-ray detecti 60 1102-1106 10.1109/TNS. 0018-9499
Web services;computer network security;decision trees;re 3-13 10.1109/MAS 1526-7539
business process re-engineering;concurrency control;data m 613-624 10.1109/ICDE 1063-6382
correlation methods;data acquisition;geophysica 6 801-814 10.1109/JSTA 1939-1404
antenna feeds;differential amplifiers;low noise 58 68-78 10.1109/TAP. 0018-926X
security of data;service-oriented architecture;software re 362-367 10.1109/COMPSACW.2011.
aerospace control;iterative methods;optimisation;position 1-5 10.1109/ISSCAA.2008.4776
graphics processing units;parallel processing;real-time 1-10 10.1109/HiPC.2012.6507508
channel allocation;code division multiple acce 5 3106-3110 vol 10.1109/ICC.2002.997409
computer networks;control charts;data structures;optimisa 56-56 10.1109/CONIELECOMP.200
data models;flowcharting;security of data;softw 2 275-280 10.1109/COM 0730-3157
aerospace computing;artificial satellites;ellipti 1 675-679 10.1109/CESA.2006.428173
file organisation;behavior anomalies characterization;file 201-206 10.1109/NAS.2008.29
feature extraction;image processing;principal component 965-968 10.1109/ICIP. 1522-4880
Global Positioning System;computerised monitoring;condit 907-912 10.1109/ICPA 1521-9097
adaptive control;autonomous aerial vehicles;cont21 1400-1406 10.1109/TCST1063-6536
laboratories;military communication;risk analysis;LBRR a 1-6 10.1109/MILC 2155-7578
3G mobile communication;cellular radio;telecommunication1-8 s 10.1109/GLO 1930-529X
advertising;electronic publishing;graph theory;iterative 171-180 10.1109/ICDM1550-4786
fault tolerant computing;military computing;missiles;prog 294-298 10.1109/AUTE1088-7725
braking;pressure sensors;road accidents;road sa1 518-523 10.1109/ISDEA.2010.436
actuators;adaptive control;aerospace control;aircraft;clos 1308-1313 0743-1619
Bandwidth;Communication system security;Cross layer desi 143-143 10.1109/ICNICONSMCL.200
observers;quality of service;security of data;telecommunic 1-7 10.1109/ICUMT.2009.53454
control system synthesis;decentralised control;power gen 1-7 10.1109/PSCE.2009.484022
authorisation;business data processing;cloud computing;fau 487-494
grid computing;image processing;image sensors;intelligent 623-630 10.1109/APSCC.2008.12
artificial satellites;secondary cells;solar cell arrays;s 491-496 10.1109/RAST.2007.428404
Internet;computer network management;computer network113-118
rel 10.1109/CTRQ.2009.18
Access control;Algorithm design and analysis;Au10 341-354 10.1109/TDSC1545-5971
MOSFET;impurity distribution;incoherent light annealing;1 111-114 10.1109/IWJT.2005.203897
3G mobile communication;code division multiple 3 1088-1103 10.1109/TWC.1536-1276
entropy;security of data;telecommunication traff 1 231-235 10.1109/ISECS.2009.174
artificial immune systems;multi-agent systems;security o 466-472 10.1109/APSCC.2007.34
Internet;security of data;Web applications;anomaly-based 193-199 10.1109/HPCSIM.2009.5194
computer network management;real-time systems;telecommun 605-610 10.1109/ICCC 1095-2055
Communications Society;Computer networks;Computer scie 1-5 10.1109/ICC. 1550-3607
IP networks;computer network security;observers1 617-620 10.1109/ICCSNT.2011.6182
energy consumption;power markets;power system reliabili 1-8 10.1109/PES. 1944-9925
Adaptation models;Biomedical monitoring;Blood pressure 278-281 10.1109/IEMB 1557-170X
acoustic variables measurement;acoustic wave ab 58 1628-1640 10.1109/TUFF0885-3010
Internet telephony;feature extraction;signalling protocols 204-211 10.1109/ARES.2008.205
maximum likelihood detection;regression analysis5 V-817-20 vol.510.1109/ICAS 1520-6149
data acquisition;medical control systems;prosthetics;use 346-349 10.1109/CNE.2007.369681
concurrency control;data warehouses;software 2 1046-1051 Vol10.1109/CSCWD.2005.1943
backpropagation;fuzzy neural nets;security of data;N-gra 116-121 10.1109/ICW.2005.49
metamaterials;numerical analysis;self-induced 112 124509-1245010.1063/1.47 0021-8979
composite materials;lead compounds;magnetic se 101 024108-0241010.1063/1.24 0021-8979
arc furnaces;closed loop systems;control system 2 109-113 10.1109/ICACC.2010.54871
Internet;security of data;adaptive Internet applications; 222-229 10.1109/KIMAS.2007.36981
backpropagation;neural nets;security of data;N-gram techn427-433 10.1109/ISCC 1530-1346
Internet;principal component analysis;telecommunication tr1755-1763 10.1109/INFC 0743-166X
accidents;biomedical equipment;condition monitoring;healt1156-1159 10.1109/ICICES.2013.65082
manufacturing systems;multi-agent systems;agent-based ma 489-494 10.1109/ICIT.2010.5472751
aerospace safety;solar cells;space vehicle powe 2 746-749 10.1109/DEIV 1093-2941
PI control;adaptive control;aircraft control;nonlinear con 3300-3305 10.1109/ACC. 0743-1619
Internet;learning (artificial intelligence);pattern cluster 366-371 10.1109/ICSCN.2007.35076
constraint handling;electric furnaces;learning (artificial 188-195 10.1109/CIES.2013.6611748
computer networks;security of data;ESIDE-Depian;anomaly675-679d 10.1109/DEXA1529-4188
Internet;protocols;telecommunication network routing;BGP 172-181 10.1109/DSN.2005.57
security of data;word processing;attack detection;boundar 334-339 10.1109/ICDIM.2008.474682
Cloud Environment;IDSaaS;Intrusion Detection;Network Se181-188 10.1109/INCoS.2013.35
copper;metallurgy;optimisation;smelting;Cu;Lagran 2 275-278 10.1109/ICDMA.2010.232
building management systems;control system synth 1 115-118 10.1109/CCCM.2009.526813
decision support systems;environmental science computing686-691 10.1109/CIMCA.2008.85
building management systems;data mining;security of data;13-16 10.1109/CASE.2009.65
electromagnetic waves;frequency selective surfaces;wavegu 49-49 10.1109/SPAWDA.2009.542
decision making;probability;risk management;space vehic 140-145 10.1109/RAMS0149-144X
Classification algorithms;Computer architecture;Engines;En1-6 10.1109/WOWMOM.2010.55
cognition;computer vision;data visualisation;imag19 1228-1241 10.1109/TVCG1077-2626
data mining;statistical distributions;EXPREX;ano 25 1280-1292 10.1109/TKDE1041-4347
Linux;public domain software;software maintenance;build s1353-1356 10.1109/ICSE.2013.6606715
Internet;access protocols;customer satisfaction;schedulin 1-6 10.1109/ICON1556-6463
arc furnaces;closed loop systems;multivariable systems;no565-569 10.1109/ISISE.2009.25
Bandwidth;Degradation;Delay;Downlink;Processo5 2072-2077 10.1109/ICC. 8164-9547
Petri nets;formal specification;formal verificati 32 265-278 10.1109/TSE. 0098-5589
multiprocessing systems;object-oriented programming;pow285-290 10.1109/RTCS1533-2306
optimisation;telecommunication congestion control;teleco 1-4 10.1109/WiCom.2008.1053
multimedia communication;quality of service;res 41 viii-ix
aerospace control;artificial satellites;motion control;pert 1-9 10.1109/AERO.2009.483933
data acquisition;oceanographic techniques;radar 5 P2804-P2807 10.1109/OCEANS.2003.178
data mining;distributed processing;pattern clustering;se 1-6 10.1109/ECTICon.2013.655
Adaptive systems;Bandwidth;Communication system 5 2225-2230 10.1109/ICC. 8164-9547
Petri nets;biology;fault diagnosis;Internet;Matlab-Simuli 4425-4430 10.1109/IECO 1553-572X
Fourier analysis;data visualisation;image denoising;image r215-222 10.1109/DMDCM.2011.21
Kalman filters;geomagnetism;inertial navigation;iterative 1-5 10.1109/ISSCAA.2008.4776
active filters;control systems;fault tolerance;middlewar 165-169 10.1109/QSEPDS.2003.125
Lyapunov methods;aerospace control;genetic algorithms;pos 668-671 10.1109/CHICC.2006.28069
PI control;atomic clocks;beam steering;hydrogen;masers;pha 463-466 10.1109/FREQ1075-6787
gait analysis;handicapped aids;microcontrollers; 4 6 pp. vol.4- 10.1109/ICSM1062-922X
analogue integrated circuits;circuit CAD;circuit optimisat xxxv-xxxv 10.1109/ICCA 1092-3152
CMOS logic circuits;delay circuits;embedded systems;integr 75-82 10.1109/HST.2012.6224324
III-V semiconductors;MOS capacitors;aluminium compounds;c 792-793 10.1109/IPCon.2012.635886
space vehicles;Constellation program;International Spac 1-14 10.1109/AERO1095-323X
PWM power convertors;accelerator RF systems;bridge circui 684-688 10.1109/MOD 1076-8467
energy management systems;power system measurement;robu 93- 10.1109/IECEC.2002.13919
celestial mechanics;space vehicles;J2 effect;Keplerian one1-9 10.1109/AERO1095-323X
clocks;control system CAD;frequency standards;robust con3 pp.- 10.1109/FREQ.2005.157400
Kalman filters;accelerometers;application specif 62 590-598 10.1109/TIM. 0018-9456
electronic commerce;game theory;China e-commerce field;a 53-57 10.1109/ICMeCG.2009.118
atmospheric measuring apparatus;radiation belts;Atlas V 401-12 10.1109/AERO1095-323X
data visualisation;security of data;software engineering; 163-164 10.1109/VISSOF.2007.4290
condition monitoring;leak detection;pipelines;sensor fusion 372-376 10.1109/SOLI.2012.6273565
object-oriented programming;software maintenance 39 1245-1263 10.1109/TSE. 0098-5589
security of data;Linux implementation;Rootsense;anomaly-b 151-160 10.1109/ICAC.2008.24
cloud computing;information dissemination;peer- 22 1342-1349 10.1109/TPDS1045-9219
reliability theory;weapons;CAD;CAE;CAM;CIM;SPICE 51 133-140 10.1109/TR.2 0018-9529
electric current control;poles and zeros;power convertor 3206-3212 10.1109/PESC0275-9306
climatology;reflectivity;time series;vegetation mapping; 257-260 10.1109/Multi-Temp.2011.6
security of data;anomaly detection engine;distributed intr 1-4 10.1109/CNMT.2009.537456
Q-factor;Rayleigh scattering;diffraction gratings;nanopho 1-4 10.1109/ICTO 2161-2056
calibration;extrasolar planets;space vehicles;stellar pho 1-9 10.1109/AERO1095-323X
Internet;telecommunication network routing;tele 22 34-39 10.1109/MNET0890-8044
data visualisation;steganography;telecommunication comput 947-954 10.1109/ICUM2157-0221
multi-agent systems;real-time systems;security of data;tel 477-480 10.1109/IAT.2007.66
hidden Markov models;security of data;system mo 6 96-110 10.1109/TDSC1545-5971
accelerometers;atmospheric techniques;climatology;ocean1-10 10.1109/OCEANS.2008.515
digital signatures;invasive software;protocols;telecommun 142-147 10.1109/BROADCOM.2008.2
artificial intelligence;security of data;Universiti Tekno 340-345 10.1109/INMIC.2003.141674
decision making;environmental management;geographic info 1845-1849 10.1109/iCBEB.2012.442
control system analysis computing;failure analysis;mathema 327-334 10.1109/DEPCOS-RELCOME
SRAM chips;Web services;aerospace computing;artificial sa 1-12 10.1109/AERO1095-323X
aerospace simulation;control engineering computing;decisi25-27 10.1109/ISRCS.2012.63092
invasive software;P2P based benign worm;anomal 1 260-264 10.1109/ISECS.2009.185
Internet;authorisation;data mining;telecommunication secu 305-315 10.1109/NOMS1542-1201
IP networks;Internet;quality of service;telecomm 3 2695-2699 vol 10.1109/ICOSP.2004.14423
computer networks;multi-agent systems;open systems;securi 498-504 10.1109/IAT.2007.67
atmospheric temperature;data visualisation;geophysics comp 1-4 10.1109/ECTICon.2012.625
log normal distribution;routing protocols;telecommunicati 176-181 10.1109/ICON1556-6463
distributed processing;inference mechanisms;kno5 4331-4334 Vol10.1109/WCICA.2004.13423
computer network security;distributed control;software ag 111-114 10.1109/ICCP.2010.5606455
data mining;military communication;mobile ad hoc network 1-7 10.1109/MILC 2155-7578
carrier sense multiple access;channel allocation 7 513-527 10.1109/TMC. 1536-1233
density;patient monitoring;Kullback-Leibler based algorith 6943-6946 10.1109/IEMB 1557-170X
1-9 10.1109/AERO1095-323X
XML;automatic test software;program testing;program v 2-6 10.1109/AUTE1088-7725
clocks;field programmable gate arrays;optical radar;FPG 163-166 10.1109/SPL.2010.5483021
dislocations;fault diagnosis;integrated circuit layout;inte 139-145 10.1109/DFT.2011.21
Accelerometers;Autism;Dictionaries;Event detection;Featur365-368 10.1109/IEMB 1557-170X
computer centres;telecommunication traffic;transport proto 49-55 10.1109/HPSR2325-5552
Mars;aerospace control;aerospace testing;brakes;shock ab1-8 10.1109/AERO1095-323X
biomedical communication;computerised monitorin 2 477-482 10.1109/ICML 2160-133X
access protocols;channel allocation;wireless LA 56 3073-3088 10.1109/TVT. 0018-9545
object-oriented programming;public domain software;high- 8 pp.- 10.1109/ISESE.2005.154185
aerospace testing;automatic testing;space vehicles;Dawn m 1-10 10.1109/AERO1095-323X
Internet;communication complexity;telecommunication traffi1-6 10.1109/ICTEL.2008.465271
Internet;quality of service;telecommunication congestion 3-3 10.1109/ICISP.2006.19
Internet;access control;computer network security;overlay 24-29 10.1109/ICOI 1976-7684
pattern matching;relational databases;reverse engineerin 267-276 10.1109/WCRE1095-1350
biomagnetism;biomedical materials;biomedical optical im 350-351 10.1109/INEC.2010.5424739
Access control;Communication system traffic control;Contr 667-671 10.1109/WCINS.2010.55418
Gaussian channels;Kalman filters;discrete time filters;wir 5967-5972 10.1109/CDC. 0743-1546
Couplings;Crosstalk;Electromagnetic compatibility;Electro 1-5 10.1109/IMOC.2013.664652
Computational modeling;Computers;IP networks;Image edg218-224 10.1109/ISRCS.2013.66237
aerospace expert systems;fault tolerant computi 7 60-64 10.1109/MIM. 1094-6969
access protocols;multi-access systems;wireless LAN;MAC-l1-9 10.1109/INFC 0743-166X
maintenance engineering;power cables;British Columbia Tr1-6 10.1109/PES. 1932-5517
actuators;aircraft control;control systems;fault diagnosi 4385-4392 10.1109/CDC. 0743-1546
Internet;internetworking;routing protocols;statistical an 1-6 10.1109/icc.2 1550-3607
Assembly;Availability;Companies;Logistics;Unified modeli 1-7 10.1109/ETFA1946-0740
surveillance;target tracking;JDL level informati 25 11-16 10.1109/MAES0885-8985
3G mobile communication;cellular radio;protocol 3 V3-229-V3-23 10.1109/ICEIT.2010.560838
Internet;data compression;discrete cosine trans 1 168-172 Vol. 110.1109/ICC.2005.1494341
artificial satellites;position control;STK simulation;critical 210-213 10.1109/IPTC.2011.61
IEEE 802.11 and MAC;RTS Threshold;Saturation throughp651-656
Adhesion force;Anti-slip brake system;Neuro-adaptive;Slip 291-296
X-ray diffraction;bismuth compounds;calorimetry;100 033908-0339010.1063/1.22 0021-8979
Mars;electrical resistivity;magnetic sensors;mag 43 1499-1506 10.1109/TGRS0196-2892
electromyography;electronics packaging;microsensors;pres86-91 10.1109/ECTC0569-5503
local area networks;wide area networks;LAN;consistency co 115-118 10.1109/ICCSN.2011.60137
operating systems (computers);processor scheduling;real 271-279 10.1109/ISORC.2002.10037
compressors;damping;induction motor drives;industrial plan474-481 10.1109/DEMPED.2011.606
autonomous aerial vehicles;fault tolerance;reliability th 2515-2520 0743-1619
Markov processes;access protocols;cooperative 13 463-471 10.1109/JCN. 1229-2370
computer networks;multiprocessor interconnection network6 pp.- 10.1109/IPDP 1530-2075
multi-agent systems;security of data;agent-based network 528-531 10.1109/IAT.2007.111
handicapped aids;haptic interfaces;disabled people;hapti 1153-1157 10.1109/CISIS.2010.120
Earth rotation;geophysical equipment;gyroscop 82 074502-0745010.1063/1.36 0034-6748
flashover;high-voltage techniques;insulators;power overhead 389-392 10.1109/CEIDP.2005.15607
attitude control;fault diagnosis;nonlinear control systems 726-733 10.1109/ICSMC.2007.44138
data acquisition;solar powered vehicles;underwater vehic 1-5 10.1109/OCEANS.2006.306
access protocols;wireless LAN;wireless channels;AR-CMAC 1-6 10.1109/WOCN.2009.50105
security of data;system monitoring;Deception Toolkit;Hon 138-145 10.1109/IAW.2004.1437809
replicated databases;transport protocols;RHUT protocol;data 98-106 10.1109/JVA.2006.1
Bioinformatics;Computer security;Databases;Laboratories;Li 170-174 10.1109/ISRCS.2013.66237
Curie temperature;austenitic steel;chromium allo 46 326-332 10.1109/TMAG0018-9464
blood vessels;diseases;eye;image colour analysis;image s 1-6 10.1109/LISAT.2013.657822
construction industry;groupware;inspection;planning;preven1-4
computer animation;software maintenance;software quality13-20 10.1109/VLHC1943-6092
Batteries;Hardware;Temperature sensors;Valves;Windows;E 1-6 10.1109/ISIE. 2163-5137
expert systems;fraud;fuzzy logic;human factors;smart card 1088-1093 10.1109/ISTEL.2012.648314
biomedical measurement;body sensor networks;health care;p 1-6 10.1109/WCNC 1525-3511
educational institutions;organisational aspects; 41 18, 20- 10.1109/MSPE0018-9235
DiffServ networks;error statistics;quality of service;sch 573-576 10.1109/ITST.2006.288969
Landau levels;barium compounds;calcium compounds 100 222910-2229110.1063/1.47 0003-6951
Global Positioning System;aircraft landing guida 96 1958-1975 10.1109/JPRO0018-9219
access protocols;queueing theory;wireless LAN;I56 1366-1373 10.1109/TVT. 0018-9545
biomedical engineering;biosensors;gait analysis;graphical 230-235 10.1109/CITISIA.2009.5224
Active learning;Cyber Defense Competition 1-2 10.1109/FIE. 0190-5848
object-oriented programming;program debugging;software 159-168 10.1109/ICPC 1092-8138
object-oriented programming;program debugging;software 3m50-359 10.1109/ICSM1063-6773
automatic testing;integrated circuit design;integrated cir 344-347 10.1109/DAC. 0738-100X
data mining;regression analysis;security of data 2 52-56 10.1109/ISCID.2008.95
Haar transforms;digital signatures;principal component an 185-190 10.1109/HPSR2325-5552
computational complexity;software quality;design flaw im 23-31 10.1109/QSIC 1550-6002
entropy;telecommunication network routing;teleco2 151-157 10.1109/ISDA.2008.167
object-oriented programming;software maintenance;software 106-115 10.1109/QUATIC.2010.16
program diagnostics;software maintenance;software quality;d163-164 10.1109/ECBS-EERC.2011.3
Haar transforms;Internet;normal distribution;security of d 449-454 10.1109/EmbeddedCom-Sca
configuration management;software maintenance;software145-154
q 10.1109/WCRE1095-1350
data mining;security of data;anomaly detection;complex da617-626 10.1109/ICDM1550-4786
aerospace engines;blades;condition monitoring;design engi182-187 10.1109/TIC-STH.2009.5444
telecommunication networks;telecommunication tra 2 428-431 10.1109/ETCS.2010.544
Object-Oriented Designs;Refactoring;Software Metrics;Ap 15-15 10.1109/METR1530-1435
data mining;security of data;DBSCAN algorithm;anomaly de 75-83 10.1109/SACI.2011.5872976
Internet;behavioural sciences computing;hidden Markov mo1-6 10.1109/CSCWD.2006.2530
Bayes methods;Gaussian processes;expectation-maximisatio 596-601 10.1109/ISDA.2009.220
automotive electronics;battery management systems;vehicl1-6 10.1109/PHM.2008.4711431
feature extraction;image processing;matrix alge 13 V13-288-V13- 10.1109/ICCASM.2010.5622
Algorithm design and analysis;Image edge detec24 68-75 10.1109/JSEE.2013.00009
Algorithm design and analysis;Covariance matri 25 1460-1470 10.1109/TKDE1041-4347
computer networks;learning (artificial intelligen 2 14-18 10.1109/ISDA.2008.129
Java;program visualisation;software quality;Java;automati 97-106 10.1109/WCRE1095-1350
climatology;geophysics computing;pattern clustering;stati 91-95 10.1109/INISTA.2011.59460
Internet;system recovery;MTTR;Web-based application;adapti 171-178 10.1109/NCA.2011.30
infrared imaging;object detection;wavelet transforms;2D w 1385-1388 10.1109/ICPR 1051-4651
IP networks;scheduling;wireless LAN;IP scheduler;Linux ke57-62 10.1109/HONET.2008.48102
covariance matrices;fires;geophysical signal p 4 IV-65-IV-68 10.1109/IGARSS.2009.5417
security of data;time series;SAX technique;anomaly disco 329-333 10.1109/ICOI 1976-7684
Java;data visualisation;online front-ends;software mainte xix-xix 10.1109/WCRE1095-1350
security of data;statistical analysis;wavelet transforms; 313-319 10.1109/ICCP.2010.5606421
security of data;string matching;character strings;improv 1097-1102 10.1109/CIT.2012.223
cloud computing;pattern clustering;security of data;MapR 159-162 10.1109/NCA.2012.15
geophysical image processing;geophysical techniques;imag 3436-3439 10.1109/ICMT.2011.6002215
protocols;security of data;telecommunication se 1 28-36 10.1109/MSEC1540-7993
pattern clustering;security of data;IDS;KDD CUP 1999 data1049-1052 10.1109/CIS.2011.233
data analysis;tree searching;anomaly detection; 4 627-630 10.1109/CSSE.2008.841
data mining;pattern classification;pattern clustering;prob 32-39 10.1109/HASE1530-2059
data mining;pattern clustering;security of data;anomaly de 1059-1062 10.1109/CSSS.2011.597457
data mining;security of data;anomaly detection;data minin 78-80 10.1109/IWSCA.2008.17
multilayer perceptrons;security of data;anomaly 2 1095-1102 10.1109/ISDA.2006.253765
aerospace expert systems;artificial satellites;c 1 -97 Vol.1 10.1109/AERO1095-323X
aircraft instrumentation;automatic test equipment;seats;ATE3156-3158 10.1109/ICEICE.2011.57779
computer network security;data mining;fuzzy set theory;te 63-69 10.1109/DMO.2155-6938
aspect-oriented programming;software architecture;archite41-50 10.1109/SBCARS.2011.18
computer crime;computer networks;covariance matrices;prin 108-115 10.1109/SMCSIA.2003.1232
biomedical equipment;cardiology;diseases;health care;med1339-1342 10.1109/CSSS.2012.338
fuzzy logic;hidden Markov models;security of da 2 301-304 10.1109/ICSSEM.2011.6081
expectation-maximisation algorithm;geophysical image pro1345-1348 10.1109/ICECC.2011.60662
aerospace computing;remote sensing;software tools;Earth 791-802 10.1109/AERO.2005.155937
data mining;security of data;anomaly detection;network in 583-583 10.1109/ICICIC.2007.170
Internet;security of data;telecommunication traffic;Inter 1-4 10.1109/WiCom.2008.1112
security of data;social networking (online);anomaly detec 236-247 10.1109/ISI.2009.5137318
object-oriented methods;program visualisation;God Class;a128-137 10.1109/SBES.2010.21
data mining;formal concept analysis;genetic algorithms;se 597-602
fault diagnosis;furnaces;lead;smelting;zinc;data-driven d 453-457 10.1109/CCDC.2008.459735
data acquisition;electric impedance imaging;elec 5 1421-1432 10.1109/JSEN1530-437X
transportation;tree searching;capacitated vehicle routing 677-682 10.1109/ITI.2 1330-1012
aspect-oriented programming;chemioception;libraries;obj 60-69 10.1109/SBES.2010.14
handicapped aids;indoor radio;magnetometers;mobile comp 5315-5318 10.1109/IEMB 1557-170X
Java;regression analysis;software maintenance;Ec 39 1144-1156 10.1109/TSE. 0098-5589
data mining;matrix decomposition;security of data;anomaly172-179 10.1109/IAS.2008.53
harmonic analysis;harmonic distortion;power grids;power ha 1-10 10.1109/IAS. 0197-2618
Bayes methods;learning (artificial intelligence);pattern cl 1-5 10.1109/WiCO2161-9646
artificial immune systems;security of data;DCA;a 1 448-451 10.1109/CSAE.2012.627263
data mining;merging;pattern clustering;security of data;ID 458-462 10.1109/IPTC.2010.94
coupled mode analysis;dielectric resonator filter 1 379-
IP networks;computer network security;IP address octets; 1-6 10.1109/GLO 1930-529X
alarm systems;critical infrastructures;neurocontrollers;se 35-41 10.1109/ISRCS.2011.60160
Internet;chemioception;control engineering computing;huma 1429-1434 10.1109/ICIEA.2012.636094
arc furnaces;energy conservation;expert systems;optima 207- 10.1109/TCSET.2002.10159
program diagnostics;program testing;software maintenance; 322-331 10.1109/ICST.2013.45
pattern classification;security of data;classific 4 317-321 10.1109/FSKD.2008.15
classification;security of data;anomaly detectio 2 1105-1110 10.1109/ICMLC.2008.46205
aluminium;harmonic analysis;harmonic distortion;47 973-983 10.1109/TIA. 0093-9994
grid computing;pattern clustering;security of data;grid-ba 104-106 10.1109/ISDPE.2007.110
cardiovascular system;data analysis;diseases;electrocard 2267-2270 10.1109/EMBC1557-170X
Internet;Markov processes;telecommunication se17 54-65 10.1109/TNET1063-6692
exchange interactions (electron);magnetisation;perpendicu183-183 10.1109/INTMAG.2006.3756
Unified Modeling Language;software maintenance;software391-400 10.1109/ICSM1063-6773
aluminium industry;clamps;electrical contacts;losses;smel 1-9 10.1109/HOLM1062-6808
adaptive control;backpropagation;feedforward neur 2 1440-1443 vol 10.1109/WCICA.2002.10208
control system synthesis;fuzzy control;programm1 541-544 10.1109/GCIS.2009.264
artificial immune systems;batch processing (indus1 40-43 10.1109/PIC.2010.5687957
object-oriented methods;software maintenance;source codi65-74 10.1109/SCAM.2011.9
data visualisation;graph theory;object-oriented methods;s 1-8 10.1109/VISSOF.2011.6069
entropy;moving average processes;statistical ana1 535-539 10.1109/CSAE.2012.627265
artificial immune systems;radiofrequency identification;N 859-863 10.1109/ICNC 2157-9555
aerospace components;aerospace computing;failure analysi 630-635 10.1109/ICST.2012.151
Java;control charts;multi-threading;resource allocation;s 250-257 10.1109/SCC.2012.59
automatic programming;program compilers;program diagnosti 8 pp.- 10.1109/SYNASC.2005.20
computer crime;data mining;fraud;business rules;24 533-546 10.1109/TKDE1041-4347
data mining;I-IncLOF;data streams outlier mining;deletion 023-028 10.1109/AISP.2012.6313711
telecommunication congestion control;telecommu3 V3-26-V3-30 10.1109/ICFCC.2010.54976
cloud computing;data analysis;security of data;system mo 137-144 10.1109/ICDMW.2011.62
cameras;data acquisition;geophysical image processing;i 5474-5477 10.1109/IGAR 2153-6996
Web services;business process re-engineering;pr37 247-263 10.1109/TSE. 0098-5589
data mining;diseases;medical administrative data13 313-321 10.1109/TITB 1089-7771
data mining;distributed sensors;information retrieval;radi 427-428 10.1109/PerComW.2013.652
convex programming;integer programming;learning (artifici 385-392 10.1109/ICTAI1082-3409
plastics;printed circuits;recycling;PWB;chemical recyclin 274-279 10.1109/ISEE 1095-2020
pattern classification;security of data;ArtiAnomalyG algor 1289-1293 10.1109/ICCSE.2012.62953
control engineering computing;enterprise resour 7 V7-52-V7-56 10.1109/ICCET.2010.54853
face recognition;surgery;face recognition;facial 5 441-448 10.1109/TIFS 1556-6013
computational complexity;entropy;error analysis;estimatio 2302-2305 10.1109/WICOM.2007.574
electrocardiography;feature extraction;medical signal det 261-266 10.1109/ICBAKE.2013.51
data mining;pattern classification;anomalies det 2 V2-179-V2-18 10.1109/ICSPS.2010.55552
computer networks;pattern clustering;security of data;tele 245-247 10.1109/ISI.2008.4565069
distribution networks;fuzzy neural nets;load forecasting; 118-118 10.1109/CIMCA.2006.141
computer networks;pattern clustering;security of data;spect1-4 10.1109/WiCom.2008.1100
boring machines;genetic algorithms;geology;geophysical p1-4 10.1109/ICIECS.2009.53634
Monte Carlo methods;field programmable gate arrays;predi453-458 10.1109/FPL.2007.4380688
chemioception;gas sensors;mobile robots;semico2 815-819 vol.2 10.1109/ICARCV.2002.1238
Internet;computer network security;Internet;baseline enve 310-313 10.1109/ICNIDC.2012.64187
computer network security;telecommunication links;Snort; 66-70 10.1109/ICNIDC.2010.56579
image sequences;anomalous change detection;ephemeral 1-8 ch 10.1109/AIPR 1550-5219
CCD image sensors;aerosols;fluorescence spectro 10 655-661 10.1109/JSEN1530-437X
acoustic signal processing;acoustics;algorithm 34 1526-1540 10.1109/TSMC1083-4419
brain;diseases;feature extraction;filtering the 4 679-682 10.1109/ICPR 1051-4651
hidden Markov models;object tracking;unsupervised learnin3716-3720 1051-4651
data mining;pattern clustering;security of data;anomaly d 135-146 10.1109/ICDE 1063-6382
geophysics computing;iterative methods;remote s49 4223-4238 10.1109/TGRS0196-2892
decision diagrams;flow graphs;hardware description langua1-3 10.1109/ICSICT.2012.64679
domestic appliances;energy conservation;power consumptio 29-33 10.1109/IE.2010.13
lab-on-a-chip;medical image processing;LoC technology;an194-199
cloud computing;data mining;iterative methods;matrix mul 5341-5344 10.1109/ICAS 1520-6149
load shedding;overcurrent protection;power generation pro1-8 10.1109/PESG1944-9925
WEEE Directive;assembling;design for disassembly;product 1-3
design of experiments;electric resistance measurement;inte99-102 10.1109/WMED.2004.12973
arc furnaces;control system synthesis;electrodes;industria 2518-2521 10.1109/MEC.2011.6026005
additives;drag;metallurgical industries;minerals;pipelines 323-327 10.1109/ICCSN.2011.60149
civil engineering computing;computer animation;constructio261-267 10.1109/ICIIS.2006.365734
condition monitoring;learning (artificial intelligence);mac 1-6 10.1109/ICPHM.2012.62995
behavioural sciences;learning (artificial intelligence);n 235- 10.1109/DEVLRN.2002.1011
Internet;behavioural sciences computing;groupware;infor 294-299 10.1109/ISDA.2009.19
network theory (graphs);small-world networks;tim1 503-506 10.1109/ISCID.2012.131
flaw detection;life testing;reliability;solar cells;wear test 003601-0036010.1109/PVSC0160-8371
energy consumption;kilns;linear systems;steel industry;dec5814-5818 10.1109/WCICA.2010.55545
fault tolerant computing;formal verification;program testi 466-475 10.1109/DSN.2005.53
biological organs;biomimetics;cancer;prosthetics;speech;s 827-830 10.1109/EMBC1557-170X
Gaussian processes;geophysical signal processing 43 502-518 10.1109/TGRS0196-2892
project management;software process improvement;team wo 106-113 10.1109/ADEVC.2004.17
aspect-oriented programming;software maintenanc 2 222-226 10.1109/ICSSEM.2011.6081
Internet;electronic noses;Internet;odor concentration cha 799-802 10.1109/ICSE 1930-0395
Access control;Access protocols;Authentication;B56 566-569 10.1109/TCE. 0098-3063
constraint theory;critical path analysis;estimation theo 267-272 10.1109/CACSD.2004.13938
condition monitoring;data handling;machinery;neural nets 1-10 10.1109/ICPHM.2011.60243
formal specification;inheritance;object-oriented methods 62-71 10.1109/CSMR1534-5351
distributed processing;embedded systems;jitter;scheduling1-10 0738-100X
Batteries;Computer networks;Energy efficiency;Intelligen 131-136 10.1109/CACSD-CCA-ISIC.2
chemioception;display instrumentation;haptic interfaces;se 125-128 10.1109/SAINT.2009.28
Internet;quality of service;telecommunication co 1 339-344 Vol.1 10.1109/ISCC.2004.1358427
cognitive systems;information retrieval;sensor fusion;air 1-1 10.1109/COGINF.2010.5599
data mining;SODRNN;data stream outlier detecti2 236-239 10.1109/ISCID.2010.149
biomedical MRI;biomedical materials;brain models 3 420-425 10.1109/ICECTECH.2011.59
Ethics;Meteorology;NASA;Rockets;Solids;Space shuttles;St437-440 10.1109/CSSR.2010.577381
multicast communication;telecommunication net 1 337-341 10.1109/MINES.2009.56
software maintenance;software metrics;CBO metrics;LCOM483-486 10.1109/ICSM1063-6773
electrodes;fuzzy control;programmable controllers;PLC;e 216-220 10.1109/CCDC.2008.459730
telecommunication network routing;telecommunication secur 31-36 10.1109/ICIMP.2008.18
image reconstruction;image resolution;security of data;S t 459-464 10.1109/ICCIS.2008.467090
ad hoc networks;mobile radio;routing protocols;security 1-5 10.1109/ICCCNET.2008.478
artificial satellites;data analysis;data mining;expectation 212-217 10.1109/EDCC.2012.19
Internet;principal component analysis;telecommunication 1-5 10.1109/GLOCOMW.2007.4
pattern classification;road traffic;anomaly detec 12 695-704 10.1109/TITS 1524-9050
computer networks;entropy;filtering theory;telecommunicatio 497-502 10.1109/ICN.2008.83
routing protocols;autonomous system;border gateway proto480-487 10.1109/LCN. 0742-1303
Algorithm design and analysis;Clustering algorithms;Clust 1-6
data analysis;dynamics;fault diagnosis;formal l 5 4275-4280 vol 10.1109/ACC. 0743-1619
computer networks;data flow analysis;data mining;feature e1462-1464 10.1109/ICCSE.2010.55937
behavioural sciences computing;evolutionary computation;in 1-6 10.1109/CEC.2010.5586409
fuzzy set theory;pattern clustering;security of data;stati 1-5
biometrics (access control);image processing;security;sur 761-764 10.1109/MWS 0149-645X
design engineering;mining industry;sustainable developmen 1724-1728 10.1109/ICETCE.2011.5774
Internet;learning (artificial intelligence);object-oriente 1-7 10.1109/WOSAR.2010.5722
giant magnetoresistance;magnetic moments;magnetic sensor 2-1021-2-102610.1109/ICEMI.2009.527461
authorisation;data mining;database management systems;tre 814-817 10.1109/ICSPS.2009.139
Internet;computer network reliability;principal compone 1-7 10.1109/MILCOM.2006.3024
aerospace computing;data analysis;data mining;embedded2668-2673
sy 0743-1619
circuit breakers;high-voltage techniques;vibrat 23 1986-1994 10.1109/TPWR0885-8977
Aggregates;Algorithm design and analysis;Classif2 723-728 10.1109/ICC. 8164-9547
computer network security;trees (mathematics); 2 259-262 10.1109/ICSSEM.2011.6081
adaptive resonance theory;pattern clustering;se 1 282-286 10.1109/ICWAPR.2008.4635
computer network security;internetworking;routing protocol1239-1244 10.1109/TrustCom.2012.100
data mining;object-oriented programming;program diagnosti 75-84 10.1109/WCRE1095-1350
broadband networks;radio networks;routing protocols;tele 9-15 10.1109/SAINT.2009.11
principal component analysis;telecommunication network 176-180 10.1109/INFC 0743-166X
public domain software;software fault tolerance;code fr 3-9 10.1109/IWESEP.2012.12
SCADA systems;security of data;SCADA networks;data transmis 1-4 10.1109/ETFA1946-0740
XML;authorisation;computer networks;XML;XML based open 163-167
too 10.1109/IIT.2007.4430449
computer network security;control charts;statistical anal 1091-1095 10.1109/ICC. 1550-3607
object-oriented programming;reverse engineering;software161-166 10.1109/SEW.1550-6215
principal component analysis;security of data;statistical 1-2 10.1109/INFO 0743-166X
Algorithm design and analysis;Educational institutions;Gr 133-136 10.1109/ICCIS.2011.10
program diagnostics;software houses;software metrics;so 399-408 10.1109/ICSM1063-6773
computational complexity;job shop scheduling;production 1994-1997 10.1109/ICMA2152-7431
Cascading style sheets;Conferences;HTML;Measurement;Pr 116-125 10.1109/SCAM.2013.664819
Java;principal component analysis;software maintenance;so 682-691 10.1109/ICSE.2013.6606614
planets;space vehicles;Mars scout mission;aeroth1 1-253 vol.1 10.1109/AERO1095-323X
chemioception;codes;collections of physical data;testin 683-688 1330-1012
genetic algorithms;pattern recognition;abnormal 1 4254-4258 10.1109/WCICA.2006.17131
security of data;anomaly-detection algorithm;keystroke dy 125-134 10.1109/DSN.2009.5270346
biotechnology;coal;microorganisms;mining industry;sewag 3644-3647 10.1109/MACE.2011.598778
object-oriented programming;program compilers;software m381-384 10.1109/ICSM1063-6773
control system synthesis;drying;dynamic response 3 54-57 10.1109/ICIII.2012.6339918
discrete event systems;observability;optimisation;time-var 4470-4477 0743-1619
object-oriented programming;software metrics;code smell 10 pp.- 10.1109/ISESE.2005.154183
program compilers;software maintenance;NIER track;feature 820-823 10.1145/1985 0270-5257
Internet;routing protocols;telecommunication traffic;IPv4 165-172 10.1109/SAINTW.2004.1268
evolutionary computation;particle swarm optimisa2 157-161 10.1109/ICM.2011.184
aerospace control;data handling;data visualisati 1 750-755 vol.1 10.1109/ICSM1062-922X
program diagnostics;software performance evaluation;softw1-6 10.1109/ICSM1063-6773
authorisation;graph theory;program diagnostics;social netw263-278 10.1109/SP.2 1081-6011
magnetic flux;magnetisation;mass spectrometer 75 2848-2853 10.1063/1.17 0034-6748
Arrays;Detectors;Instruments;Performance analysis;Proto 159-166 10.1109/VLHC1943-6092
hidden Markov models;security of data;HMM algorithms;ex1113-1117 10.1109/ICC. 1550-3607
expert systems;regression analysis;software maintenance;337-342 10.1109/QUATIC.2010.60
coal;diffusion;iron;minerals;phosphorus;smelting;steel ma 4-1060-4-106210.1109/ICEMI.2009.527411
blast furnaces;fault diagnosis;lead;production engineering 1643-1648 10.1109/ICCA.2007.4376639
casting;corrosion resistance;crystallisation;metal stampi 63-65 10.1109/SPCMTT.2005.4493
metallurgical industries;metallurgy;minerals;sl 3 803-806 10.1109/ICMTMA.2011.773
data reduction;fault diagnosis;feature extraction;furnaces 74-77 10.1109/CHICC.2008.46053
case-based reasoning;furnaces;particle swarm optimisation1967-1970 10.1109/WCICA.2008.45932
blast furnaces;combustion;ecology;fuel;gas mixtures;recy 1-4 10.1109/ICBBE.2009.51628
backpropagation;furnaces;fuzzy logic;fuzzy syste2 1369-1375 vol 10.1109/WCICA.2002.10208
iron compounds;reaction kinetics;slag;smelting;steel;ther 672-676 10.1109/RSETE.2011.59643
arc furnaces;closed loop systems;feedforward;fuz2 668-671 10.1109/ICICTA.2009.396
computerised instrumentation;fault diagnosis;roa 58 286-294 10.1109/TR.2 0018-9529
cameras;computer vision;image motion analysis;i2 568-581 10.1109/JSTS 1932-4553
Web services;codes;computer network security;file servers;274-279 10.1109/ICUM2157-0221
Internet;computer network security;statistical analysis;AR 1182-1185 10.1109/ICCIS.2010.292
aquaculture;artificial immune systems;condition monitoring 1309-1312 2093-7121
software metrics;software quality;software tools;average 1-6 10.1109/TENCON.2008.476
computer crime;software engineering;AJECT;IMAP 36 357-370 10.1109/TSE. 0098-5589
arc furnaces;control system synthesis;convergence of num2162-2165 10.1109/CCDC.2012.624434
embedded systems;mobile robots;sensor fusion;car drive 2037-2044 10.1109/ICSM1062-922X
Markov processes;object-oriented methods;security of data352-359 10.1109/ARES.2008.75
road vehicles;statistical process control;time series;CUSU 133-138 10.1109/THS.2007.370034
authorisation;computer network security;diagnosis process1037-1046 10.1109/AINA 1550-445X
computer network security;hidden Markov models;HMM based 339-342 10.1109/ICINFA.2011.59490
Internet;invasive software;statistical analysis;Atak worm 1-10 10.1109/SECCOMW.2006.35
access protocols;transport protocols;wireless 59 2974-2985 10.1109/TVT. 0018-9545
ferromagnetic materials;magnetic sensors;wirele 48 2340-2345 10.1109/TMAG0018-9464
genetic algorithms;learning (artificial intelligence);arti 395-400 10.1109/NaBIC.2011.608946
data visualisation;software performance evaluation;softwa 292-301 10.1109/ICSE.2013.6606575
arc furnaces;closed loop systems;electrodes;fuzz2 49-52 10.1109/IHMSC.2009.138
aerospace computing;aerospace control;error detection;roc1-12 10.1109/PHM.2008.4711462
earthquakes;electromagnetism;entropy;numerical analysis 1250-1253 10.1109/ICCAS.2008.46943
costing;customer satisfaction;customer services 5 2382-2392 10.1109/PICMET.2006.2968
IP networks;Internet;government data processing;pattern cl11-16 10.1109/SIEDS.2008.45596
computer networks;security of data;telecommunication sec36-41 10.1109/INCC.2004.1366573
Unix;computer network management;encoding;sequences;tele 82-87 10.1109/ITW.2004.1405279
data mining;pattern classification;security of data;anomaly 275-277 10.1109/JCAI.2009.25
Internet;ad hoc networks;computer network security;data m647-654 10.1109/AINA 1550-445X
routing protocols;delivery guaranteed protocol;delivery g 340-346 10.1109/MAHSS.2008.46600
3G mobile communication;alarm systems;embedded systems 1277-1280 10.1109/ICICIC.2009.60
evolutionary computation;security of data;anomaly-based det 1355-1360 10.1109/CCDC.2009.519461
aluminium industry;industrial power systems;po 40 1644-1655 10.1109/TIA.2 0093-9994
telecommunication network management;telecommun 49 80-86 10.1109/MCOM 0163-6804
computer networks;security of data;telecommunication secur 131-140 10.1109/ICAC.2008.25
aluminium;damping;distribution networks;indust 1 79-89 vol.1 10.1109/IAS.2003.1257487
consumer electronics;metals;recycling;air emissions;consu169-173 10.1109/ISEE 1095-2020
traffic information systems;vehicular ad hoc net 18 64-73 10.1109/MWC.1536-1284
aerospace computing;aerospace testing;air traffic control;l 7C5-1-7C5-10 10.1109/DASC2155-7195
computational geometry;solid modelling;splines 17 515-526 10.1109/TVCG1077-2626
Doppler measurement;biomedical ultrasonics;electrocardiog 709-712 0276-6547
Hilbert transforms;data analysis;data mining;monitoring;wa4292-4297 10.1109/ACC. 0743-1619
Internet;probability;telecommunication security;telecommuni 9-17 10.1109/NSS.2009.35
data mining;military computing;military systems;model-b 818-841 10.1109/AUTE1080-7725
biochemistry;biomedical measurement;blood;cardiovasculars 695-698 10.1109/CIC.2005.1588198
artificial immune systems;copper;genetic algorit 4 22-26 10.1109/ICNC.2009.581
archaeology;image recognition;object detection; 1 287-292 Vol. 110.1109/OCEANSE.2005.15
X-ray diffraction;bismuth compounds;ferroelectr 54 2505-2509 10.1109/TUFF0885-3010
arc furnaces;genetic algorithms;neural nets;power consum3586-3589 10.1109/MACE.2010.553541
energy conservation;iron;minerals;steel industry 2 41-44 10.1109/ICMTMA.2011.297
backpropagation;blast furnaces;iron;neurocontroll2 276-280 10.1109/ICCAE.2010.54514
amplifiers;safety;smelting;bus insulation resist 2 274-277 10.1109/ICNDS.2010.54793
botany;chromium;copper;iron;lead;manganese;mining;soil po 1-8 10.1109/ICBB 2151-7614
closed loop systems;feedforward;furnaces;three-1 435-437 10.1109/ICLSIM.2010.54613
backpropagation;neural nets;production engineering compu2663-2667 10.1109/CCDC.2010.549873
distributed parameter systems;glass industry;optimisation; 2950-2954 10.1109/SICE.2007.4421496
aerospace instrumentation;astronomical technique 53 215-221 10.1109/MAP. 1045-9243
printed circuit design;semiconductor device manufacture;S513-520 10.1109/ECTC0569-5503
control system synthesis;evolutionary computation;fuzzy con 249-253 10.1109/CHICC.2006.43474
arc furnaces;control system synthesis;convergence;hydraul4074-4077 10.1109/CCDC.2012.624465
approximation theory;arc furnaces;least squares 3 263-266 10.1109/CMCE.2010.561032
electronic noses;mass spectroscopy;apple flavor;large-sc 174-177 10.1109/ICSE 1930-0395
telecommunication channels;telecommunication se 3 1254-1258 Vol10.1109/IEMC.2004.140889
chemioception;multimedia computing;synchronisat 40 657-663 10.1109/TSMC1083-4427
operating systems (computers);principal compone1 201-206 10.1109/ISDA.2008.243
corporate social responsibility;ecology;environ 1 337-341 10.1109/SOLI.2008.4686416
crops;marketing data processing;ontologies (artificial i 540-549 10.1109/SRII.2011.62
curve fitting;diagnostic radiography;edge detection;imag 396-401 10.1109/ISSPIT.2007.44581
object-oriented programming;software cost estimation;soft 111-122 10.1109/RCIS.2008.4632099
backpropagation;chemioception;gas sensors;patte 5 2661-2665 vol 10.1109/SICE.2002.1195512
distribution networks;harmonic analysis;power grids;power 3791-3794 10.1109/iCECE.2010.925
biocontrol;bioelectric potentials;biomedical el 49 852-858 10.1109/TBME0018-9294
Blood flow;Charge coupled devices;Circuits;Dark current 3743-3746 10.1109/IEMB 1557-170X
cardiology;learning (artificial intelligence);medical compu 432-438 10.1109/ISDA.2010.5687227
resource allocation;telecommunication traffic;wireless LAN 8 pp.-109 10.1109/NGI.2006.1678229
Internet;cache storage;game theory;innovation management; 1-9 10.1109/IWQo1548-615X
data mining;graph theory;medical computing;statistical a 188-191 10.1109/DBTA.2009.65
lenses;liquid crystal displays;three-dimensiona 47 50-56 10.1109/MSPE0018-9235
Displays;Electronic mail;Motion pictures;Olfactory;Solenoid291-292 10.1109/VR.2 1087-8270
H∞ control;Kalman filters;adaptive estimation;damping;in 685-690 10.1109/PHYCON.2005.151
Boilers;Computer architecture;Education;Industries;Solid m280-285 10.1109/GHTC-SAS.2013.66
genetic algorithms;medical diagnostic computing;m 1 254-259 vol.1 10.1109/IS.2002.1044264
Measurement;Position report task;Vibrotactile stimuli 135-140 10.1109/ICMA.2013.661790
chemioception;interactive devices;user interfaces;virtual 301-302 10.1109/VR.2 1087-8270
decision making;decision theory;fuzzy set theory;susta 1745-1750 10.1109/ICMLC.2006.25897
environmental economics;macroeconomics;Xi'an region;e 1-5 10.1109/WiCom.2008.1927
learning (artificial intelligence);mobile robots 1 175-180 vol.1 10.1109/CIRA.2003.1222084
Java;graph theory;software maintenance;Java open-source181-192 10.1109/TAIC-PART.2006.3
electronic noses;feature extraction;multidimensional sign 587-590 vol.2 10.1109/ICSENS.2004.1426
Smalltalk;object-oriented programming;program verificatio 39-44 10.1109/IWPSE.2003.12312
backpropagation;domestic safety;gas sensors;hum 3 1070-1074 vol 10.1109/CIRA.2003.1222145
chemioception;data flow graphs;software maintenance;softw 492-495 10.1109/ECTICON.2011.594
biomedical measurement;chemioception;diseases;neurophysi 47-50 10.1109/EMBSW.2007.4454
beverages;electronic noses;fermentation;manufacturing pro257-260 10.1109/ICCTA.2007.119
BASIC;agricultural products;backpropagation;digi3 2622-2625 Vol10.1109/WCICA.2004.13420
public domain software;software maintenance;lexicon con 95-99 10.1109/WCRE1095-1350
microeconomics;organisational aspects;China;SOE 2 125-127 10.1109/ICIII.2011.177
adsorption;gas sensors;orbital calculations;org 1 a540-a543 vol 10.1109/SENSOR.2003.121
cameras;electrical engineering computing;gas sensors;hum281-286 10.1109/ICSE 1930-0395
adsorption;desorption;nitrogen compounds;wastewatertrea344-348 10.1109/RSETE.2011.59642
behavioural sciences computing;health care;professional as10 pp.- 10.1109/HICSS.2004.12653
handicapped aids;haptic interfaces;medical compu 1 4312-4316 10.1109/WCICA.2006.17131
grammars;object-oriented programming;public domain softw 125-134 10.1109/SCAM.2011.18
graphical user interfaces;program testing;software mainte 289-294 10.1109/SNPD.2012.10
data envelopment analysis;pollution control;data envelope 1-4 10.1109/WiCom.2008.1921
data mining;public domain software;software maintenance;411-416 10.1109/CSMR1534-5351
backpropagation;genetic algorithms;magnesium;m 5 600-602 10.1109/CSIE.2009.569
electronic noses;inference mechanisms;mobile rob 2 898-903 vol.2 10.1109/RAMECH.2004.143
virtual reality;2D display screen;airflow balance; 19 606-615 10.1109/TVCG1077-2626
calcium compounds;iron;metallurgical industries;reduction(2469-2473 10.1109/MACE.2011.598748
copper;glass;lead;recycling;slag;smelting;CRT glass;Cu;LC231-236 10.1109/ISEE 1095-2020
aluminium industry;data analysis;data mining;fault diagno 43-46 10.1109/DMO.2012.6329796
cardiology;diseases;gas sensors;medical disorders;organic4034-4037 10.1109/EMBC1557-170X
archaeology;copper;remote sensing;smelting;soil;spectrome 4182-4185 10.1109/IGAR 2153-6996
image processing;principal component analysis;production4865-4868 10.1109/WCICA.2012.63593
fault diagnosis;furnaces;generalisation (artificial inte 1087-1092 10.1109/CCDC.2013.656108
blast furnaces;boilers;combustion;exergy;heat transfer;re 206-210 10.1109/CDCIEM.2011.516
AC-DC power convertors;closed loop systems;power systems 1-7 10.1109/PES. 1944-9925
copper;fuzzy neural nets;genetic algorithms;production en 2328-2333 10.1109/ICCA.2007.4376777
blast furnaces;principal component analysis;smelting;statis1557-1562 10.1109/WCICA.2010.55542
carbon;grey systems;smelting;steel;carbon conten 3 112-115 10.1109/CMCE.2010.561037
Control systems;Copper;Costs;Distributed control;Energ 664-667
blast furnaces;energy consumption;manganese all 3 267-270 10.1109/CMCE.2010.561032
authorisation;information retrieval;program diagnostics;PH 1169-1172 10.1109/ICSE.2013.6606670
chemioception;electroencephalography;neurophysiology;psy 76-81 10.1109/ICBAKE.2013.15
object-oriented programming;public domain software;softw1-10 10.1109/ICSM1063-6773
fault diagnosis;principal component analysis;singular valu 1447-1453 10.1109/ICCA 1948-3449
power markets;power system measurement;power system 1-7 relia
computerised monitoring;data acquisition;expert systems;me 326-331 10.1109/PESAFR.2005.1611
coke;energy consumption;furnaces;manganese alloys;neural 3603-3606 10.1109/MACE.2010.553547
Unified Modeling Language;computational complexity;public 235-244 10.1109/WCRE1095-1350
blast furnaces;cast iron;emission;minerals;phosphorus;sme1283-1286 10.1109/CDCIEM.2011.353
iron;liquid metals;mineral processing;pH;phosphorus;reduc1279-1282 10.1109/CDCIEM.2011.356
ash;current density;drying;electrochemical electrodes;elec 1-4 10.1109/ICBBE.2009.51622
PI control;aluminium;aluminium industry;electric current 1-6 10.1109/ICPWS.2009.54426
electric furnaces;iterative methods;learning (artificial i 2665-2669 10.1109/CCDC.2011.596866
Biological system modeling;Chaos;Diseases;Mathematical 6-9 10.1109/ISB. 2325-0704
chemioception;disasters;electronic noses;mobile robots;mu109-114 10.1109/MICAI.2011.29
Code Bad Smells;Message Chains;measurement;measurem 62-68 10.1109/WETS2327-0950
program testing;software quality;assert instruction analysi 111-120 10.1109/CSMR1534-5351
chaos;ferroresonance;nonlinear control systems;3 1477-1481 Vol10.1109/ICMLC.2005.15271
air pollution;chemical reactors;energy consumption;hydrog 4841-4844 10.1109/RSETE.2011.59653
copper;metallurgical industries;mining industry 34 34-43 10.1109/MAHC1058-6180
Fault Detection;Imperial Smelting Furnace (ISF);Kernel D 6094-6099
machinery production industries;supply chain m 3 967-971 10.1109/ICICTA.2009.699
electronic data interchange;information technol 49 293-304 10.1109/TEM. 0018-9391
fork lift trucks;industrial robots;metallurgy;mobile robo 1176-1182 10.1109/ROBO1050-4729
distortion;interference suppression;static VAr compensa 621-626 10.1109/ICIT.2005.1600712
Runge-Kutta methods;chemical reactors;computational flui532-535 10.1109/MACE.2010.553681
fork lift trucks;industrial robots;manipulators;metallurgy 2770-2771 10.1109/ROBO1050-4729
adaptive control;moisture control;neurocontrollers;permeabili
8676-8680 10.1109/WCICA.2008.45942
melting;printed circuits;recycling;separation;United Stat 242-248 10.1109/ISEE 1095-2020
fuzzy control;fuzzy set theory;lead;neuralnets;op 1 1861-1865 10.1109/WCICA.2006.17126
copper;fuzzy control;mixing;neurocontrollers;smelting;c 3163-3167 10.1109/SICE.2008.4655210
backpropagation;neural nets;predictive control;sintering;b 202-206 10.1109/CHICC.2006.43471
air pollution;algebra;anodes;electrolysis;electrolytic dev 217-222 10.1109/UKSIM.2009.94
blast furnaces;energy consumption;fuzzy set theory;iron;pa1547-1551 10.1109/WCICA.2010.55542
metallurgical industries;predictive control;smelting;Teni 666-670 10.1109/CHICC.2008.46057
bromine;flameproofing;health hazards;metals;polymers;rec318-322 10.1109/ISEE 1095-2020
arc furnaces;power supplies to apparatus;semiconductor t 1-7 10.1109/ENERGY.2008.478
fuzzy control;neurocontrollers;alumina control;feed contr 380-385 10.1109/UKSIM.2009.95
fault diagnosis;gas mixtures;pressure control;principal 1-6 10.1109/ETFA1946-0759
flotation (process);leaching;metallurgy;recycling;waste re 1-3 10.1109/icbbe 2151-7614
gallium;leaching;materials preparation;phosphorus;Ga;P;ga7458-7461 10.1109/RSETE.2011.59660
case-based reasoning;fuzzy set theory;production enginee3747-3751 10.1109/CCDC.2009.519196
furnaces;particle swarm optimisation;steel industry;EAF 867-871 10.1109/CCDC.2012.624413
logistics;production control;steel industry;combined-furna 231-231 10.1109/ICICIC.2008.523
load flow;load forecasting;operations research; 2 901-905 vol.2 10.1109/AFRCON.2002.116
PI control;blast furnaces;case-based reasoning;intelligen 3313-3318 10.1109/CDC. 0743-1546
carbon;chemical analysis;furnaces;hot working;i 3 444-446 10.1109/CMCE.2010.561027
case-based reasoning;costing;production engineePart 2 968-972 10.1109/ICIEEM.2011.60353
aquaculture;forestry;government policies;waste;Beijing;DE 1122-1127 10.1109/ICMS2155-1847
environmental factors;industrial economics;Wuhan 1 19-22 10.1109/CCIENG.2011.6007
backpropagation;furnaces;genetic algorithms;liq 2 7742-7745 10.1109/WCICA.2006.17134
adaptive control;arc furnaces;electrodes;intelligent contr 2939-2944 10.1109/ICMA.2007.430402
air pollution;climatology;geophysical technique 2 293-298 10.1109/JSTA 1939-1404
adaptive control;arc furnaces;electrodeposition;graphite;p 1-6 10.1109/MED.2007.4433737
drying;evolutionary computation;mineral processing indust 501-504 10.1109/CHICC.2006.28062
maintenance engineering;pyrolysis;radioactive waste dis 591-595 10.1109/ICSMA.2008.45055
Hopfield neural nets;metallurgical industries; 13 229-236 10.1109/72.9 1045-9227
computerised monitoring;fault diagnosis;heurist 3 2-7 vol.3 10.1109/IS.2002.1042576
atomic absorption spectroscopy;cadmium;copper;geochemist 1-4 10.1109/ICBB 2151-7614
aquaculture;data acquisition;echo;lakes;neura 2 1430-1434 vol 10.1109/IGARSS.2004.1368
patient treatment;speech;teleconferencing;telemedicine;cl 9 pp.- 10.1109/HICSS.2002.99413
technical presentation;technology management;value engin201-206
arc furnaces;least squares approximations;smelting;suppor3326-3329 10.1109/MACE.2010.553550
backpropagation;carbon;furnaces;iron;metal refining;neur 2426-2430 10.1109/ICMA.2009.524604
blending;lead;neurocontrollers;optimisation;predictive co 489-493 10.1109/CHICC.2006.43473
deformation;dislocation density;fracture toughness;grains 3721-3725 10.1109/MACE.2010.553534
arc furnaces;crystallisation;finite element analysis;mag 433-436 10.1109/iCECE.2010.112
contamination;industrial plants;lead;powders;smelting;soil 385-388 10.1109/iCBEB.2012.473
carbon;chromium;furnaces;smelting;steel;temper3 396-399 10.1109/CMCE.2010.561029
Newton-Raphson method;chemical industry;parameter estimat 3594-3598 10.1109/CCDC.2012.624457
copper;genetic algorithms;power convertors;smelting;Cu;PS 7224-7227 1934-1768
Bayes methods;blast furnaces;condition monitoring;decisio990-993 10.1109/iCECE.2010.251
arc furnaces;energy consumption;least squares a3 108-111 10.1109/CMCE.2010.561037
blast furnaces;coke;copper;smelting;thickness measuremen 330-333
arc furnaces;electrodes;model reference adaptive control 1727-1729 10.1109/ICEICE.2011.57777
absorption;correlation methods;metallurgical industries;re 3091-3094 10.1109/CCDC.2013.656147
carbon;iron alloys;learning (artificial intellig 4 225-227 10.1109/CMCE.2010.561016
Internet;mining;process control;smelting;wireless channel 1-8 10.1109/ETFA1946-0740
arc furnaces;backpropagation;forecasting theor 3 238-240 10.1109/CMCE.2010.561034
computer networks;copper;hardware-software codesign;meta 768-770
adaptive control;fault diagnosis;furnaces;indust 4 2527-2538 10.1049/iet-ct 1751-8644
carbon;furnaces;neural nets;production engineer 4 371-373 10.1109/CMCE.2010.561014
agricultural products;backpropagation;data acquisition;ei 808-811 10.1109/ICNSC.2008.45253
chemioception;computer based training;data visua 6 80-83 10.1109/MCSE1521-9615
Java;object-oriented programming;Java classes;bad code 23-28 10.1109/SE.2007.13
innovation management;risk analysis;strategic planning;en346-351 10.1109/FITME.2008.11
emergency services;national security;public administrati 1-5 10.1109/ICBECS.2010.5462
human factors;user interfaces;disruptiveness;heat;interrup 479-482 10.1109/ICMI.2002.1167043
electronic noses;microbalances;pattern classific 1 590-595 Vol.1 10.1109/ICSENS.2003.1279
Bayes methods;contamination;health hazards;river pollutio1-5 10.1109/ICBBE.2009.51628
biology computing;brain;cognition;eye;visual perception;bi 225- 10.1109/COGINF.2003.1225
chemioception;gas sensors;mixing;singular value3 468-474 10.1109/JSEN1530-437X
automatic optical inspection;computer vision;food process 1888-1891 10.1109/CSSS.2012.470
Java;Unified Modeling Language;program diagnostics;progra 101-110 10.1109/ICST.2009.34
chemioception;gas sensors;microbalances;citrus 2 1140-1143 vol 10.1109/SENSOR.2003.121
WEEE Directive;consumer electronics;environmental econo286-290 10.1109/ICCE-Berlin.2011.6
electrical engineering computing;furnaces;neural nets;zinc 469-471 10.1109/CHICC.2008.46050
energy consumption;power system control;power system mea 896-900
Petri nets;logistics;manufacturing processes;Petri net mo 1-3 10.1109/CISE.2009.5366525
educational institutions;environmental factors;innovation 569-578 10.1109/ICMS2155-1847
biomedical measurement;chemical sensors;chromatography; 3664-3667 10.1109/IEMB 1557-170X
catalysis;catalysts;chemical engineering;sulphur compoun 4017-4022 10.1109/CCDC.2011.596892
combustion;energy conservation;heat recovery;heat transf 1-6 10.1109/SUPERGEN.2009.5
brain;chemioception;dyes;fluorescence;medical s27 69-79 10.1109/EMB. 0739-5175
biochemistry;chemical analysis;diseases;expecta12 707-713 10.1109/TITB 1089-7771
government data processing;open systems;D-C space dist1-4 10.1109/WiCom.2008.2738
H∞ optimisation;Kalman filters;damping;inertia 1 121-126 vol.1 10.1109/PHYCON.2003.123
electronic noses;food processing industry;principal compon1-3 10.1109/ICIECS.2009.53637
AC generators;load flow control;minimisation;power generat1-6 10.1109/ICIInfS.2012.63047
brain;neurophysiology;virtual reality;brain;mind;sensory 47-51 10.1109/ICKS.2008.11
data mining;data privacy;security of data;completely two-p 339-343 10.1109/IDEA 1098-8068
computer vision;food processing industry;food products;n 458-463 10.1109/ICETET.2009.161
computer vision;food processing industry;nondestructive 311-316 10.1109/CITISIA.2009.5224
waste-to-energy power plants;Dhaka city corporation;comb1-4 10.1109/ICDRET.2009.5454
DP industry;Internet;evolutionary computation;game theory1-5 10.1109/WiCom.2008.2162
computer based training;user interfaces;virtual reality;zoo 482-485 10.1109/AMS.2010.98
clay;detergents;industrial economics;oils;pollution;recycl 1-5 10.1109/ICBBE.2009.51635
chemical analysis;chromatography;electronic nos61 1803-1810 10.1109/TIM. 0018-9456
flotation (process);fly ash;industrial waste;percolation;so 1-3 10.1109/icbbe 2151-7614
digital libraries;document handling;human factors;user int 365-365 10.1145/1141753.1141860
biomedical measurement;clothing;cognition;data 4 3744-3747 Vol10.1109/IEMB 1094-687X
agricultural products;enzymes;food products;inhibitors;p 869-873 10.1109/ICAE.2011.5943927
computer games;local area networks;Sweden;computer 134-141 10.1109/CGAMES.2011.600
diseases;radiation therapy;WS TY101 FIR;allergic rhinitis; 1479-1482 10.1109/IEMB 1557-170X
agriculture;behavioural sciences;botany;Qom;diet compos 345-350 10.1109/ICECS.2009.105
array signal processing;fermentation;food proces1 404-409 vol.1 10.1109/IJCN 1098-7576
aluminium compounds;arcs (electric);infrared spectrosco 179-181 10.1109/SPCMTT.2003.1438
identification;modelling;real-time systems;unc 7 44-50 10.1109/MIM. 1094-6969
electronic noses;least squares approximations; 13 4305-4311 10.1109/JSEN1530-437X
bioelectric phenomena;electroencephalography;feature ext604-607 10.1109/SICE.2006.315706
biotechnology;cerium;Ce;REE;Spirodela polyrrhiza;analogou 2306-2309 10.1109/CDCIEM.2011.195
pattern recognition;radar;surface control 2548-2553
diseases;medical diagnostic computing;Chinese ancient He583-586 10.1109/ITME.2008.4743931
least squares approximations;matrix decomposition;multim159-162 10.1109/VR.2 1087-8270
Web sites;computer aided instruction;distance le 1 794-798 10.1109/IITA.2008.16
neural nets;production engineering computing;steel manufa2882-2886 10.1109/CCDC.2010.549868
chemical sensors;chemical variables measurement;electron2481-2484 10.1109/SENSOR.2007.430
Cities and towns;Industrial pollution;Industries;Producti 2805-2808 10.1109/ICECC.2011.60679
approximation theory;electronic noses;least sq 12 3225-3231 10.1109/JSEN1530-437X
Coal;Economics;Manufacturing industries;Petroleum;Product 1-5 10.1109/ICEBEG.2011.5882
architectural design, co http://dl.acm.org/citation.cfm?id 82--88 978-1-4673-64
http://dl.acm.org/citation.cfm?id 132--146
awareness, capturer of http://doi.acm.org/10.1145/2535 42--47 10.1145/2535 978-1-4503-22
http://dl.acm.org/citation.cfm?id 682--691 978-1-4673-30
code change, design defhttp://doi.acm.org/10.1145/2463 1461--1468 10.1145/2463 978-1-4503-19
http://dl.acm.org/citation.cfm?id 1365--1368 978-1-4673-30
http://dl.acm.org/citation.cfm?id 1217--1220 978-1-4673-30
code smell, controlled e http://doi.acm.org/10.1145/2460 48--59 10.1145/2460 978-1-4503-18
Ambient temperature, Cro http://doi.acm.org/10.1145/2508 091:91--091:9 10.1145/2508 978-1-4503-24
Bugdetection, data mininhttp://doi.acm.org/10. 22 7:1--7:25 10.1145/2430 1049-331X
http://dl.acm.org/citation.cfm?id 1169--1172 978-1-4673-30
Java;object-oriented programming;program diagnostics;sof260-269 10.1109/ICSM1063-6773
Bayes methods;feature extraction;mobile computing;pattern312-316 10.1109/SERVICES.2013.77
data mining;database management systems;pattern 2 619-622 10.1109/ICIII.2013.6703229
image classification;image reconstruction;video signal pro 955-960 10.1109/ITSC.2013.6728355
cloud computing;neural nets;security of data;Ia 1 387-394 10.1109/CloudCom.2013.57
computer network security;telecommunication traffic;Intern 141-145 10.1109/HONET.2013.67297
archaeology;geographic information systems;remot 1 193-196 10.1109/DigitalHeritage.201
Bayes methods;SQL;authorisation;pattern classification;q 73-79 10.1109/ICCES.2013.67071
computer network security;data mining;decision trees;patte247-254 10.1109/3PGCIC.2013.43
electromagnetic interference;electromagnetic pul41 3545-3557 10.1109/TPS. 0093-3813
geophysical equipment;geophysical techniques;volcanology68-73 10.1109/IWMN.2013.666377
Linux;invasive software;virtual machines;virtualisation;Li 498-503 10.1109/CNS.2013.6682767
airborne radar;antenna feeds;antenna phased arrays;anten291-295 10.1109/ICMTCE.2013.6812
light emitting diodes;thermal resistance;LED lighting pro 404-408 10.1109/ICGCE.2013.68234
aerospace computing;digital forensics;program testing;sof 106-106 10.1109/ISSREW.2013.6688
Accuracy;Clustering algorithms;Distance measurement;Mon 2326-2330 10.1109/PIMR2166-9570
Unix;information systems;security of data;statistical anal 653-657 10.1109/CECNet.2013.6703
data analysis;diseases;estimation theory;gaze tracking;med2532-2537 10.1109/CDC. 0743-1546
discrete wavelet transforms;feature extraction;geophysics 1-5 10.1109/AIPR.2013.6749306
graph theory;overlay networks;peer-to-peer computing;tel 172-177 10.1109/ICDCSW.2013.35
business data processing;data mining;information system 990-997 10.1109/SITIS.2013.160
computerised monitoring;critical infrastructures;mobile a 110-119 10.1109/Mobilware.2013.26
earthing;failure analysis;power system protection;power sy192-198 10.1109/ESTS.2013.652373
data analysis;decision making;electronic commerce;anomaly 194-200 10.1109/ICDMW.2013.42
auditing;calibration;digital communication;hydroelectric 354-364 10.1109/CPRE.2013.682205
bioinformatics;meta data;pattern classification;Fonoteca N 212-220 10.1109/eScience.2013.14
diseases;electrocardiography;medical disorders;medical 1-6 10.1109/BRC. 2326-7771
information retrieval;security of data;Google Web page 2226-2230 10.1109/GreenCom-iThings
data mining;earthquakes;feature extraction;geophysics comp 2665-2670 10.1109/SMC.2013.454
computer network security;mobile ad hoc networks;Dos att429-433 10.1109/ICRTIT.2013.68442
Internet;Java;software maintenance;software metrics;soft 566-571 10.1109/ICSM1063-6773
learning (artificial intelligence);pattern classification 396-399 10.1109/ICSM1063-6773
control nonlinearities;control system synthesis;delays;fu 127-130 10.1109/ICINIS.2013.39
energy conservation;mobile computing;operating system 1-10 10.1109/EMSOFT.2013.665
project management;software maintenance;software metrics; 79-88 10.1109/SBES.2013.9
eigenvalues and eigenfunctions;graph theory;network theo1271-1276 10.1109/ICDM1550-4786
computer network security;decision trees;feature selection;1-7 10.1109/ICoAC.2013.692191
atmospheric temperature;climatology;geographic informati 136-141 10.1109/ICIIP.2013.6707570
cryptography;image processing;trees (mathematics);decrypt 586-589 10.1109/ICE-CCN.2013.652
cellular automata;data analysis;fraud;parallel algorithms; 1467-1472 10.1109/GreenCom-iThings
Hopfield neural nets;chemioception;data reduction;electroe1-8 10.1109/IJCN 2161-4393
aluminium industry;commutation;frequency control;frequen1-5 10.1109/PESM1944-9925
program diagnostics;software maintenance;software qualit 242-251 10.1109/WCRE.2013.66712
air pollution control;electrolysis;energy consum 1 386-389 10.1109/ICMREE.2013.6893
Internet;software maintenance;Web sources;Yaho 39 1654-1679 10.1109/TSE. 0098-5589
biomedical measurement;chemioception;diseases;medical 99-106
d 10.1109/ICHI.2013.19
colorimetry;digital signal processing chips;field progr 533-536 10.1109/CIS.2013.118
Gaussian channels;compressed sensing;least squares appro 853-860 10.1109/Allerton.2013.67366
data mining;pattern classification;security of data;KDD 99 335-342 10.1109/ICDMW.2013.83
compressed air systems;condition monitoring;energy conse7519-7524 10.1109/IECO 1553-572X
computational complexity;wireless sensor networks;HyCARCE 7394-7397
combustion;computerised instrumentation;electronic noses;f 221-225 10.1109/ICOS.2013.6735078
behavioural sciences computing;business data processing;p 219-227 10.1109/ICDMW.2013.166
evolutionary computation;multimedia systems;search proble 1690-1695 10.1109/SMC.2013.291
cache storage;media streaming;multimedia systems;video o 89-93 10.1109/CAMAD.2013.6708
cement industry;energy conservation;energy man1 11-14 10.1109/ISCID.2013.10
augmented reality;computer graphics;AR;HMD;advanced com 11-12 10.1109/ICAT.2013.6728899
fault tolerant computing;software maintenance;software ma268-278 10.1109/ASE.2013.6693086
AC-DC power convertors;aluminium;rectifiers;semiconductor 622-627 10.1109/IEEEGCC.2013.670
furnaces;numerical analysis;parallel processing;producti 1953-1957 10.1109/HPCC.and.EUC.201
software fault tolerance;software quality;suppo 1 106-115 10.1109/APSE1530-1362
consumer behaviour;decision making;electricity supply in 251-253 10.1109/ICMTMA.2013.66
carbon;furnaces;metal refining;production engineering co 588-590 10.1109/IMSNA.2013.67433
radial basis function networks;refining;smelting;steel 595-598 10.1109/IMSNA.2013.67433
electric furnaces;load regulation;power control;power supp 1-6 10.1049/cp.2013.0621
computer vision;food technology;image processing;nondestr 1-5 10.1109/NUiCONE.2013.678
data flow analysis;software maintenance;software perform 169-170 10.1109/VLHC1943-6092
environmental economics;industrial pollution;ind 3 363-366 10.1109/ICIII.2013.6703593
beverages;electronic noses;neural nets;portable instrumen1-4 10.1109/ICSE 1930-0395
nozzles;robots;tactile sensors;electric conductivity;elec 151-153 10.1109/ICCA 2093-7121
Article http://www.scopus.com 17 1578-1585
Conferen http://www.scopus.com 7
Article http://www.scopus.com 342 1389-1392
Article http://www.scopus.com 14 24055-24063
Conferen http://www.scopus.com 33 109-114
Conferen http://www.scopus.com/inward/ 260-269
Article http://www.scopus.com 39 1654-1679
Conferen http://www.scopus.com/inward/r 566-571
Conferen http://www.scopus.com 7 DS75-0 497-506
Conferen http://www.scopus.com 8250 LN 215-226
Conferen http://www.scopus.com 2013
Article http://www.scopus.com 36 432-440
Article http://www.scopus.com 19 523-533
Article http://www.scopus.com 44 95-102
Conferen http://www.scopus.com 53 288-293
Article http://www.scopus.com 20 195-204
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84893946572&partne
Article http://www.scopus.com 22 21-29
Article http://www.scopus.com 24 29-34
Conferen http://www.scopus.com/inward/r 42-47
Article http://www.scopus.com 110 19579-19584
Conferen http://www.scopus.com/inward/r 135-140
Article http://www.scopus.com 110 18704-18709
Article http://www.scopus.com 110 18680-18685
Article http://www.scopus.com 502 507-512
Article http://www.scopus.com 110 16235-16240
Article http://www.scopus.com 110 12084-12089
Article http://www.scopus.com 110 11261-11266
Article http://www.scopus.com 42 618-625
Article http://www.scopus.com 19 606-615
Article http://www.scopus.com 110 1017-1022
Conferen http://www.scopus.com 8 B
Conferen http://www.scopus.com/inward/r 116-125
Conferen http://www.scopus.com 2 277-280
Conferen http://www.scopus.com 5 49-58
Article http://www.scopus.com 4
Conferen http://www.scopus.com/inward/r 79-88
Conferen http://www.scopus.com/inward/record.url?eid=2-s2.0-84892644896&partn
Conferen http://www.scopus.com/inward/r 221-225
Conferen http://www.scopus.com/inward/r 91-98
Conferen http://www.scopus.com/inward/r 628-632
Mobile ad hoc network, http://www.sciencedirec 220 580 - 602 http://dx.doi. 0020-0255
Antikythera mechanism, http://www.sciencedirec 70 354 - 371 http://dx.doi. 0094-114X
Licensee Event Report (http://www.sciencedirec 57 118 - 128 http://dx.doi. 0925-7535
Workflow design, Data dhttp://www.sciencedirec 55 270 - 283 http://dx.doi. 0167-9236
Ground-penetrating radahttp://www.sciencedirec 59 68 - 76 http://dx.doi. 0963-8695
VoIP security, Social thr http://www.sciencedirec 57 1545 - 1559 http://dx.doi. 1389-1286
Computational workflow,http://www.sciencedirec 39 291 - 305 http://dx.doi. 0167-8191
Remote handling, Product http://www.sciencedirec 88 2128 - 2132 http://dx.doi. 0920-3796
Flow-level traffic filter http://www.sciencedirec 7 360 - 369 http://dx.doi. 2212-0173
Inclusion and Exclusion Criteria
Importation Date (I) Empiri (E) It is n (E) It doe (E) It is (E) Extend(E) Automa(E) Refact
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N Y N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N Y N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N Y N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N Y N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N Y N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N Y N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N Y N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N Y N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N N N Y N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N Y N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N Y N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N Y N N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
11/06/2013 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N N N N Y
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N N N N Y
12/11/2014 N N N N N N N
12/11/2014 N N N N N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N N N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N Y N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N N N Y N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N Y N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N Y N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N N N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
12/11/2014 N N N Y N N N
(E) Visuali (E) Metrics(E) It is S (E) Short (E) It is n (E) Not av (E) Discus (E) Empirical study is not well written
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N Y
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N Y
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N Y N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N Y N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N Y N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N Y N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
Y N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
N N N N N N N N
Y N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N Y
N N N N N N N N Y
N N N N N N N N N
N N N N N N N N N
N N Y N N N N N N
N N N N N N N Y N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N Y
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N Y N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N Y
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
N N N N N N N N N
rical study is not well written
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N
N N

You might also like