Search by property
From ISLAB/CAISR
Jump to navigationJump to searchThis page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Publications:Reliability Evaluation of Power Cables Considering the Restoration Characteristic + (Reliability Evaluation of Power Cables Considering the Restoration Characteristic)
- Publications:Reliability Evaluation of Underground Power Cables with Probabilistic Models + (Reliability Evaluation of Underground Power Cables with Probabilistic Models)
- Publications:Remote Diagnosis Modelling + (Remote Diagnosis Modelling)
- Publications:Remote diagnosis modelling + (Remote diagnosis modelling)
- Replacements vs repairs. What is really a breakdown from the point of view of the data? + (Replacements vs repairs. What is really a breakdown from the point of view of the data?)
- Representation Learning for Deviation Detection + (Representation Learning for Deviation Detection)
- Representation Learning for Fault Detection and Prognosis + (Representation Learning for Fault Detection and Prognosis)
- Representation of Complex Data Types for Machine Learning + (Representation of Complex Data Types for Machine Learning)
- Resilience of ML Hardware Accelerators Against Accuracy Degrading Trojans + (Resilience of ML Hardware Accelerators Against Accuracy Degrading Trojans)
- Resilient Recovery: A Byzantine Fault Tolerance (BFT) Framework for Tactical Mesh Networks + (Resilient Recovery: A Byzantine Fault Tolerance (BFT) Framework for Tactical Mesh Networks)
- Resolving Class Imbalance using Generative Adversarial Networks + (Resolving Class Imbalance using Generative Adversarial Networks)
- Publications:Retinal vision applied to facial features detection and face authentication + (Retinal vision applied to facial features detection and face authentication)
- Reversible GANs + (Reversible GANs)
- Risk as a Service with Volvia + (Risk as a Service with Volvia)
- Road user behavior prediction + (Road user behavior prediction)
- Robot Artwork + (Robot Artwork)
- Robot Cooking + (Robot Cooking)
- Robotic First aid response + (Robotic First aid response)
- Robotics for Urban Traffic Support: Design, Prototyping, and Intelligent Interaction in Smart Cities + (Robotics for Urban Traffic Support: Design, Prototyping, and Intelligent Interaction in Smart Cities)
- Publications:Robust AFR estimation using the ion current and neural networks + (Robust AFR estimation using the ion current and neural networks)
- Publications:Robust tuning of Individual Cylinders AFR in SI Engines with the Ion Current + (Robust tuning of Individual Cylinders AFR in SI Engines with the Ion Current)
- Publications:Robustness of Deep Convolutional Neural Networks for Image Recognition + (Robustness of Deep Convolutional Neural Networks for Image Recognition)
- Publications:Row-detection on an agricultural field using omnidirectional camera + (Row-detection on an agricultural field using omnidirectional camera)
- SA3L - Situation Awareness for Ambient Assisted Living + (SA3L - Situation Awareness for Ambient Assisted Living)
- Publications:SAFE features for matching fingermarks by neighbourhoods of single minutiae + (SAFE features for matching fingermarks by neighbourhoods of single minutiae)
- SCANIA Project: Graph neural networks for anomaly detection + (SCANIA Project: Graph neural networks for anomaly detection)
- SELIES + (SELIES)
- SIDUS-AIR + (SIDUS-AIR)
- SOHOT + (SOHOT)
- Publications:Saccadic search with Gabor features applied to eye detection and real-time head tracking + (Saccadic search with Gabor features applied to eye detection and real-time head tracking)
- Safe deployment of Deep Neural Networks in automotive engineering + (Safe deployment of Deep Neural Networks in automotive engineering)
- Safety Assurance in Critical Automotive Control Systems: A Human-Centric and Standards-Compliant Approach + (Safety Assurance in Critical Automotive Control Systems: A Human-Centric and Standards-Compliant Approach)
- Safety assurance for human in automated crane environment + (Safety assurance for human in automated crane environment)
- Publications:Safety standard for mobile robots : a proposal for 3D sensors + (Safety standard for mobile robots : a proposal for 3D sensors)
- Sailboat Motion Planning using the Level-Set Method + (Sailboat Motion Planning using the Level-Set Method)
- Sandboxed scripting on embedded systems + (Sandboxed scripting on embedded systems)
- Scalable Standardized Information Extraction from Free-Text Electronic Health Records + (Scalable Standardized Information Extraction from Free-Text Electronic Health Records)
- Science without Borders + (Science without Borders)
- Publications:Screening paper Formation variations on production line + (Screening paper Formation variations on production line)
- Publications:Screening paper runnability in a web-offset pressroom by data mining + (Screening paper runnability in a web-offset pressroom by data mining)
- Publications:Screening web breaks in a pressroom by soft computing + (Screening web breaks in a pressroom by soft computing)
- SeMI + (SeMI)
- Secure Hardware Accelerators for Machine Learning: Design, Evaluation, and Mitigation of Vulnerabilities + (Secure Hardware Accelerators for Machine Learning: Design, Evaluation, and Mitigation of Vulnerabilities)
- Secure IP Core Design Through LLM-Driven Logic Locking + (Secure IP Core Design Through LLM-Driven Logic Locking)
- Secure Key Management for Partitioned IoBT Environments + (Secure Key Management for Partitioned IoBT Environments)
- Securing Internet of Autonomous Vehicles with Light-weight Authentication + (Securing Internet of Autonomous Vehicles with Light-weight Authentication)
- Securing Multi-Processor System-on-Chips: Assessing Vulnerabilities to Hardware Trojans Through Thermal Profiles + (Securing Multi-Processor System-on-Chips: Assessing Vulnerabilities to Hardware Trojans Through Thermal Profiles)
- Security Vulnerabilities in Multi-Model Computing-in-Memory Systems + (Security Vulnerabilities in Multi-Model Computing-in-Memory Systems)
- Security analysis of IIoT connectivity protocols + (Security analysis of IIoT connectivity protocols)
- Segment Routing based on Geographic Checkpoints + (Segment Routing based on Geographic Checkpoints)