- Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays
- Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays
- Detecting Early Signs of Insider Attack Using Role-Based Analysis and Classification
- DETECTING EARNINGS MANAGEMENT
- Detecting Earnings Management Dechow , Sloan, Sweeney (1995)
- Detecting Earth-Skimming and Mountain-Penetrating Tau Neutrinos
- Detecting Eavesdropping A Solution
- Detecting Eavesdropping A Solution
- Detecting Ecological Effects of Development in the Wappingers and Fishkill Watersheds
- Detecting Economic Events Using a Semantics-Based Pipeline
- Detecting Ecosystem Stress and Declining Integrity: Indicators and Benchmarks
- Detecting Einstein’s Elusive Waves Opening a New Window to the Universe
- Detecting Einstein’s Elusive Waves Opening a New Window to the Universe
- Detecting (elastic and inelastic) diffraction at the LHC
- Detecting Electrons: CCD vs Film
- Detecting Electrons: CCD vs Film
- Detecting elements and compounds
- Detecting elusive warning signs of the migraine attack -an Ecological Momentary Assessment study-
- Detecting Emergent Behavior In Distributed Systems Caused By Overgeneralization
- Detecting Endocrine Disrupting Compounds in Wastewater with GC-MS
- Detecting enriched regions (Chip- seq , RIP- seq ) Statistical evaluation of enriched regions
- Changes in NRPP Device and Proficiency Elements
- Detecting Erroneous Sentences using Automatically Mined Sequential Patterns
- Detecting Error and Clinical Consequences
- Detecting EUV waves
- Detecting Evasion Attack at High Speed without Reassembly
- Detecting Evasion Attack at High Speed without Reassembly
- Detecting Evasion Attacks at High Speeds without Reassembly George Varghese J. Andrew Fingerhut Flavio Bonomi in ACM SIG
- Detecting Exo-Planet Transits: Adventures in Milli-mag Photometry
- Detecting Exo-Planet Transits: Adventures in Milli-mag Photometry
- Detecting Exoplanets and Exomoons
- Detecting Exoplanets and Exomoons
- Detecting Faces in Images : A Survey
- Detecting factors of Syndesmotic injury in Ankle Fx . in radiograph
- Detecting faint submm galaxies using RADIO lensing the case of the cluster MS0451
- Detecting fake materials
- Detecting Fake Websites: The Contribution of Statistical Learning Theory
- Detecting Faking on Noncognitive Assessments Using Decision Trees
- Detecting False Captioning Using Common Sense Reasoning
- DETECTING FATIGUE FROM VOICE USING SPEECH RECOGNITION
- DETECTING FATIGUE FROM VOICE USING SPEECH RECOGNITION
- Detecting Features in the Cosmic Ray Positron Spectrum with PAMELA and AMS-02
- Detecting flames and insults in text
- Detecting foodborne disease outbreaks using social media
- Detecting Forged Documents with Signature Verification Test!
- Detecting Forged TCP Reset Packets
- Detecting Forged TCP Reset Packets
- Detecting Forged TCP Reset Packets
- Detecting Format String Vulnerabilities with Type Qualifier
- Detecting Format String Vulnerabilities with Type Qualifier
- Detecting Fourth Generation Heavy Quarks at The LHC
- Why Crystal Structure Validation ?
- Detecting Fraud Using Benford’s Law
- Detecting Fraud with AI Classification Techniques
- Detecting Fraudulent Clicks From BotNets 2.0
- Detecting Fraudulent Personalities in Networks of Online Auctioneers
- Detecting g -ray Sources
- Detecting g -ray Sources
- Detecting g -ray Sources
- Detecting g -ray Sources
- Detecting galactic structure via the annual modulation signal of WIMPs
- Detecting Gambling Sites From Post Behaviors
- Detecting Gene-Environment and Gene-Gene Interactions through Endophenotypes
- Detecting gene flow from GM crops to wild relatives
- Detecting gene flow from GM crops to wild relatives
- Detecting gene-gene interactions in SNP-association studies
- Detecting Genre Shift
- Detecting Genuine M ulti -qubit Entanglement with Two Local Measurement Settings
- Detecting Genuine M ulti -qubit Entanglement with Two Local Measurement Settings
- Detecting Giant Monopole Resonances
- Detecting Gravitational-waves with Interferometers
- Detecting Gravitational Waves with Pulsars
- Detecting GRB ν ’s – an Opportunity For Observing Lorentz Invariance Violation
- Detecting Group Differences: Mining Contrast Sets
- Detecting ‘Heat’ with Light: Luminescent Sensors for Capsaicin
- Detecting HGT: unlikely presence/absence
- Detecting Hidden Attacks through the Mobile App-Web Interfaces
- Detecting Hidden File System Problems
- Detecting Hidden Issues - Why Sewer Surveys important
- Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
- Detecting Hidden Patterns_ Insights from Ambulatory BP Monitoring Machines
- Detecting Hidden Patterns_ Insights from weighing Machines
- Detecting horizontal gene transfers using discrepancies in species and gene classifications
- Detecting horizontal gene transfers using discrepancies in species and gene classifications
- Detecting horizontal gene transfers using discrepancies in species and gene classifications
- Detecting horizontal gene transfers using discrepancies in species and gene classifications
- Detecting Household Production
- Detecting Household Production
- Detecting HPV in Men
- Detecting human activities using smartphones and maps
- Detecting human influence on extreme daily temperature at regional scales
- Detecting Hydrologic Responses to Earthquakes using Support Vector Machines
- Detecting ICMP Rate-Limiting
- Detecting Image Features: Corner
- Detecting Image Region Duplication Using SIFT Features
- Detecting Implicit Collaboration Patterns
- Detecting Imposters at Point of Entry Are Your Practices Sterling ?
- Detecting Improper Laboratory Practices
- Detecting In-Flight Page Changes with Web Tripwires
- Detecting Incapacity
- Detecting Incapacity
- Detecting Inefficiently-Used Containers to Avoid Bloat
- Detecting Inefficiently-Used Containers to Avoid Bloat
- Detecting Infectious HIV in Human Milk
- Detecting Influenza Epidemics Using Search Engine Query Data
- Detecting influenza epidemics using search engine query data
- Detecting Influenza Outbreaks by Analyzing Twitter Messages
- Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
- Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
- Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
- Detecting Information Pooling: Evidence from Earnings Forecasts after Brokerage Mergers
- Detecting Insider Threats for Enhanced Organizational Security
- Detecting Insider Trading
- Detecting Insider Trading
- Detecting Insider Trading
- Detecting Interaction Coupling from Task Interaction Histories
- Detecting Intermittent Turbulence Using Advanced Signal Processing Techniques
- Detecting Intermittent Turbulence Using Advanced Signal Processing Techniques
- Detecting Intra-enterprise Scanning Worms based on Address Resolution
- Detecting Intruders from log files and traces
- Detecting Intrusions on Windows Operating Systems by Monitoring System Services
- Detecting Inversions in Human Genome
- Detecting Ionising Radiation
- Detecting Ionising Radiation
- Detecting Ionising Radiation
- Detecting Item Parameter Drift in a CAT program using the Rasch Measurement Model
- Detecting Item Parameter Drift in a CAT program using the Rasch Measurement Model
- Detecting Kernel-level Rootkits using Data Structure Invariants
- Detecting Kernel-level Rootkits using Data Structure Invariants
- Detecting Land Cover Land Use Change in Las Vegas
- Detecting language contact in Indo-European
- Detecting language contact in Indo-European
- Detecting language contact in Indo-European