Computer Science Ontology (CSO)

  1. i/o performance
  2. i/q imbalance
  3. iaas
  4. iar
  5. ica algorithms
  6. ici cancellation
  7. ict
  8. id-based
  9. id-based cryptography
  10. identical machines
  11. identical parallel machines
  12. identity authentication
  13. identity based cryptography
  14. identity based encryption
  15. identity based signature
  16. identity information
  17. identity management
  18. identity management systems
  19. identity theft
  20. identity verification
  21. identity-based
  22. identity-based cryptography USE identity based cryptography
  23. identity-based encryption USE identity based encryption
  24. idle listening
  25. idma
  26. ids
  27. ieee 802.11 USE ieee 802.11s
  28. ieee 802.11 dcf
  29. ieee 802.11 distributed coordination functions
  30. ieee 802.11 mac
  31. ieee 802.11 networks
  32. ieee 802.11 standards USE ieee 802.11s
  33. ieee 802.11 wireless lan
  34. ieee 802.11 wireless networks
  35. ieee 802.11e
  36. ieee 802.11p
  37. ieee 802.11s
  38. ieee 802.15.3a
  39. ieee 802.15.4
  40. ieee 802.15.4 networks
  41. ieee 802.15.4 standards
  42. ieee 802.15.4a
  43. ieee 802.16
  44. ieee 802.16 standards
  45. ieee 802.16e
  46. ieee 802.16j
  47. ieee 802.22
  48. ieee802.11
  49. ieee802.11e USE ieee 802.11e
  50. ieee802.16 USE ieee 802.16
  51. ieee802.21
  52. igrt
  53. iir digital filters
  54. iir filter USE fir filters
  55. iir filters USE fir filters
  56. ill posed
  57. ill-posed inverse problem
  58. illumination conditions
  59. illumination invariant
  60. illumination normalization
  61. illumination variation
  62. illustrative examples
  63. ilp USE inductive logic programming (ilp)
  64. ilp formulation
  65. image acquisition
  66. image acquisition systems
  67. image analysis
  68. image and video processing
  69. image annotation
  70. image authentication
  71. image binarization
  72. image classification
  73. image coding
  74. image collections
  75. image communication systems
  76. image compression
  77. image compression algorithms
  78. image contrast enhancement
  79. image database
  80. image databases USE image database
  81. image de-noising USE image denoising
  82. image deblurring
  83. image degradation
  84. image denoising
  85. image denoising algorithm
  86. image denoising methods
  87. image descriptors
  88. image display
  89. image edge
  90. image edge detection USE edge detection algorithms
  91. image encryption USE image encryptions
  92. image encryption algorithm
  93. image encryption scheme
  94. image encryptions
  95. image enhancement
  96. image feature USE image features
  97. image features
  98. image forensics
  99. image forgery
  100. image formations
  101. image fusion
  102. image fusion algorithms USE image fusion methods
  103. image fusion methods
  104. image fusion techniques
  105. image guided radiotherapy
  106. image hashing
  107. image hiding
  108. image identification
  109. image indexing
  110. image interpretation, computer-assisted
  111. image matching
  112. image matching algorithm
  113. image noise
  114. image pairs
  115. image patches
  116. image processing
  117. image projection
  118. image quality
  119. image quality assessment
  120. image quality assessment (iqa) USE image quality assessment
  121. image quality metrics
  122. image reconstruction
  123. image reconstruction algorithm
  124. image registration
  125. image registration algorithm
  126. image registration techniques
  127. image rendering
  128. image representation USE image representations
  129. image representations
  130. image resolution
  131. image restoration
  132. image restoration algorithms
  133. image retrieval
  134. image retrieval systems
  135. image scrambling
  136. image search
  137. image search engine
  138. image segmentation
  139. image segmentation algorithm
  140. image semantics
  141. image sequence
  142. image sequences USE image sequence
  143. image sharing
  144. image steganography
  145. image subtraction
  146. image super-resolution
  147. image tampering
  148. image thresholding
  149. image transmission
  150. image understanding
  151. image watermarking
  152. image watermarking algorithm
  153. image-guided radiation therapy
  154. image-guided radiotherapy USE image guided radiotherapy
  155. imaging algorithm
  156. imaging radar
  157. imaging systems
  158. imaging techniques
  159. imaging, three-dimensional
  160. imf
  161. imitation learning
  162. immersive virtual environments
  163. impact analysis
  164. impedance bandwidth USE impedance bandwidths
  165. impedance bandwidths
  166. impedance control
  167. impedance controllers
  168. impedance matching USE impedance matching (electric)
  169. impedance matching (electric)
  170. impedance matchings USE impedance matching (electric)
  171. impedance mismatch
  172. imperative programs
  173. imperfect channel estimation
  174. imperfect channel state information
  175. imperfect csi
  176. impersonation attack
  177. implementation concerns
  178. implicit feedback
  179. improved bp neural network
  180. improved genetic algorithm USE improved genetic algorithms
  181. improved genetic algorithms
  182. improved particle swarm optimization
  183. improved particle swarm optimization algorithms USE improved particle swarm optimization
  184. improved pso
  185. improved scheme
  186. impulse noise
  187. impulse radio
  188. impulse radio (ir) USE impulse radio
  189. impulse radio ultra-wideband
  190. impulse radios USE impulse radio
  191. impulse response
  192. impulse response functions
  193. impulsive noise
  194. impulsive systems
  195. ims USE next generation network
  196. ims learning design
  197. imu
  198. in-chip
  199. in-door navigations USE indoor navigation
  200. in-network data aggregation