- Detecting Phase Transitions on the Surface of an Individual Nanotube
- Detecting Phenotype-Specific Interactions Between Biological Processes
- Detecting Phishing Attacks: Theory, Cues, and Practice
- Detecting Phishing in Emails
- Detecting Phishing Using Machine Learning
- Detecting Phrase-Level Duplication on the World Wide Web
- Detecting Plagiarism in Microsoft Excel Assignments
- Detecting planets by symmetry breaking
- Detecting Polymorphisms in Mouse Genome
- Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
- Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
- Detecting Power Users Programmatically
- Detecting Prefix Hijackings in the Internet with Argus
- Detecting Preventing Fraud in Accounts Payable
- Detecting & Preventing Misuse of Privilege (PMOP)
- Detecting & Preventing Misuse of Privilege
- Detecting & Preventing Misuse of Privilege
- Detecting Primary Receivers for Cognitive Radio Applications
- Detecting Primes
- Detecting Product Review Spammers using Rating Behaviors
- Detecting Promotional Content in Wikipedia
- Detecting & Prosecuting Fraud 2 June 2010
- Detecting Prosody Improvement in Oral Rereading
- Detecting Prosody Improvement in Oral Rereading
- Detecting Prostate Cancer Using MRI Data
- Detecting Prostate Cancer Using MRI Data
- Detecting, Protecting, Preventing, and Reporting Computer Breaches
- Detecting, Protecting, Preventing, and Reporting Computer Breaches
- Detecting proteins in polyacrylamide gels and on electroblot membrane
- Detecting Psychoactive Drugs in the Developmental Stages of Psilocybe cyanescencs
- Detecting Psychoactive Drugs in the Developmental Stages of Psilocybe cyanescencs
- Detecting Radiation
- Detecting Radiation
- Detecting Re-captured Videos using Shot-Based Photo Response Non-Uniformity
- Detecting Recurrent Phase Behavior under Real-System Variability
- Detecting Regions of Interest in Dynamic Scenes with Camera Motions
- Detecting relic gravitational waves using pulsar timing arrays
- Detecting Reputation Variations in P2P Networks
- Detecting Return-to- libc Buffer Overflow Attacks Using Network Intrusion Detection Systems
- Detecting robust time-delayed regulation in Mycobacterium tuberculosis
- Detecting Rogue 802.11 Access Points within the Enterprise
- Detecting Roof Leaks with Help from a Trusted Carlsbad Contractor
- Detecting Salient Changes in Gene Profiles
- Detecting salt concentration dependence of the WNK1 kinase
- Detecting “Schrödinger’s Cat” States of Light : Insights from the Retrodictive Approach
- Detecting Script-to-Script Interactions in Call Processing Language
- Detecting Search Engine Switching Based on User Preferences, Search Tasks, and Behavior Patterns
- Detecting Search Sessions Using Document Metadata and Implicit Feedback
- Detecting selection using genome scans
- Detecting selection using genome scans
- Detecting selection using genome scans
- Detecting Selective Dropping Attacks in BGP
- Detecting Semantic Cloaking on the Web
- Detecting Semantic Cloaking on the Web
- Detecting Sequences and Cycles of Web Pages
- Detecting Sequences and Cycles of Web Pages
- Detecting service violation in Internet and Mobile ad hoc networks
- Detecting service violation in Internet and Mobile ad hoc networks
- Detecting Shapes in Cluttered Images
- Detecting Shared Congestion of Flows Via End-to-end Measurement
- Detecting Shared Congestion of Flows Via End-to-end Measurement (and other inference problems)
- Detecting shielded nuclear contraband using muon tomography
- Detecting Signal from Data with Noise
- Detecting Signal from Data with Noise
- Detecting Significant Spatial Patterns of Survival from Breast and Prostate Cancer in Michigan
- Detecting Similar Software Applications
- Detecting Skype flows Hidden in Web Traffic
- Detecting Social Spam Campaigns on Twitter
- Detecting Software Modularity Violations
- Detecting Software Theft via System Call Based Birthmarks
- Detecting Software Theft via System Call Based Birthmarks
- Detecting Spam and Spam Responses
- Detecting Spam Blogs: An Adaptive Online Approach Pranam Kolari
- Detecting spam in a Twitter network ( 과제 세미나 ) 2012.5.11
- Detecting Spam Web Pages
- Detecting Spam Web Pages
- Detecting Spammers on Social Networks
- Detecting Spammers on Social Networks
- DETECTING SPAMMERS ON SOCIAL NETWORKS
- Detecting Spammers on Social Networks
- Detecting Spammers on Social Networks
- Detecting Spammers on Twitter
- Detecting Spammers with SNARE: Spatio -temporal Network-level Automatic Reputation Engine
- Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
- Detecting Spatial Clustering in Matched Case-Control Studies
- Detecting Speech
- Detecting spelling errors in taxonomic databases
- Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
- Detecting State Coding Conflicts in STGs Using SAT
- Detecting Statistical Interactions with Additive Groves of Trees
- Detecting stellar differential rotation
- Detecting Stepping-Stone Intruders with Long Connection Chains
- Detecting Stepping-Stone Intruders with Long Connection Chains
- Detecting Subtle Changes in Structure
- Detecting Subtle Changes in Structure
- Detecting Subtle Changes in Structure
- Detecting Subtle Sequence Signals: a Gibbs Sampling Strategy for Multiple Alignment
- Detecting Supernovae with IceCube
- Detecting suspicious behaviors.
- Detecting Suspicious Claims : An Operational Perspective
- Detecting Symbolism in Literature
- Detecting SYN-Flooding Attacks
- Detecting SYN Flooding Attacks
- Detecting synchronization between the signals from multivariate and univariate biological data
- Detecting synchronization between the signals from multivariate and univariate biological data
- Detecting system
- DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS
- Detecting Targeted Attacks Using Shadow Honeypots
- Detecting temperature change
- Detecting Temperature Change