Computer Science Ontology (CSO)

  1. s transforms
  2. s-box USE s-boxes
  3. s-boxes
  4. s-transform USE s transforms
  5. s3c2410
  6. sa algorithm
  7. saam
  8. saas
  9. saem
  10. safety applications
  11. safety critical applications
  12. safety critical software
  13. safety critical systems
  14. safety messages
  15. safety properties
  16. safety-critical systems USE safety critical systems
  17. sagnac interferometer
  18. sales
  19. salt removal
  20. salt-and-pepper noise
  21. saluta
  22. sample covariance matrix
  23. sampled data control systems
  24. sampled data systems
  25. sampled-data
  26. sampled-data control
  27. sampled-data systems USE sampled data systems
  28. sampling period
  29. sar adc
  30. sar data
  31. sar image USE sar images
  32. sar image segmentation
  33. sar imagery USE sar images
  34. sar images
  35. sar imaging
  36. sar interferometry
  37. sar sensors
  38. sar system
  39. sat
  40. sat instances
  41. sat problems
  42. sat solvers
  43. sat-solving
  44. satellite antennas
  45. satellite communication USE satellite communications
  46. satellite communication systems
  47. satellite communications
  48. satellite constellations
  49. satellite ground stations
  50. satellite links
  51. satellite navigation USE satellite navigation systems
  52. satellite navigation aids
  53. satellite navigation system USE satellite navigation systems
  54. satellite navigation systems
  55. satellite network
  56. satellite networks USE satellite network
  57. satellite relay systems
  58. satellite system
  59. satellite systems USE satellite system
  60. satisfiability
  61. satisfiability modulo theories
  62. satisfiability problem USE satisfiability problems
  63. satisfiability problems
  64. satisfying assignments
  65. saturable absorbers
  66. save energy
  67. saving energy USE save energy
  68. saw USE surface acoustic waves
  69. sbar
  70. sc-fde
  71. sc-fdma
  72. scada
  73. scada systems
  74. scalable coding
  75. scalable video
  76. scalable video coding
  77. scalable video coding (svc) USE scalable video coding
  78. scalable video streaming
  79. scalar multiplication
  80. scalar quantization
  81. scalar quantizers
  82. scale factor
  83. scale invariant
  84. scale invariant feature transform USE scale invariant feature transforms
  85. scale invariant feature transform (sift) USE scale invariant feature transforms
  86. scale invariant feature transforms
  87. scale parameter
  88. scale-free
  89. scaling function USE scaling functions
  90. scaling functions
  91. scan chain
  92. scatter matrix
  93. scatter search
  94. scattered field
  95. scattering mechanisms
  96. scattering problems
  97. scatternet
  98. scatterometer USE scatterometers
  99. scatterometers
  100. scene text
  101. scene understanding
  102. scene-based
  103. schedulability USE schedulability analysis
  104. schedulability analysis
  105. schedulability test
  106. scheduling tasks
  107. schema integration
  108. schema mapping USE schema mappings
  109. schema mappings
  110. schema matching
  111. scholarly communication
  112. school admission criteria
  113. schools, pharmacy
  114. schur complement
  115. scientific applications
  116. scientific computing
  117. scientific data
  118. scientific visualization
  119. scientific visualizations USE scientific visualization
  120. scintillation index
  121. score function
  122. score normalization
  123. score-level fusion
  124. scorm
  125. screen reader USE screen readers
  126. screen readers
  127. screw theory
  128. scripting languages
  129. scrum
  130. sctp
  131. sdm
  132. sdma
  133. sdr
  134. sea clutter USE sea clutters
  135. sea clutters
  136. sea state
  137. sea surface height
  138. sea trial
  139. seamless handover
  140. seamless mobility
  141. search behavior
  142. search engine USE search engines
  143. search engines
  144. search patterns
  145. search process
  146. search queries
  147. search range
  148. search sessions
  149. search tasks
  150. searchable encryption
  151. second harmonic generation
  152. second harmonics
  153. second order sliding modes
  154. second order statistics
  155. second-harmonic generation USE second harmonic generation
  156. second-order cone programming
  157. second-order sliding-mode control
  158. second-order statistics USE second order statistics
  159. secondary mirror
  160. secondary networks
  161. secondary paths
  162. secondary system
  163. secondary user USE secondary users
  164. secondary users
  165. secrecy capacity
  166. secret data USE secret messages
  167. secret image sharing
  168. secret images
  169. secret information
  170. secret key
  171. secret messages
  172. secret sharing
  173. secret sharing scheme USE secret sharing schemes
  174. secret sharing schemes
  175. secure communications
  176. secure computation
  177. secure group communication USE secure group communications
  178. secure group communications
  179. secure multi-party computation
  180. secure multicast USE secure multicasts
  181. secure multicasts
  182. secure multiparty computation USE secure multi-party computation
  183. secure software
  184. security analysis
  185. security and privacy
  186. security and privacy issues
  187. security architecture
  188. security attacks
  189. security attributes
  190. security challenges
  191. security controls
  192. security engineering
  193. security framework USE security frameworks
  194. security frameworks
  195. security issues
  196. security level USE security analysis
  197. security management
  198. security mechanism USE security issues
  199. security mechanisms USE security issues
  200. security model