Computer Science Ontology (CSO)
Toggle navigation
Home
Advanced search
About...
My account
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Home
S
:
1625
terms
s transforms
s-box
USE
s-boxes
s-boxes
s-transform
USE
s transforms
s3c2410
sa algorithm
saam
saas
saem
safety applications
safety critical applications
safety critical software
safety critical systems
safety messages
safety properties
safety-critical systems
USE
safety critical systems
sagnac interferometer
sales
salt removal
salt-and-pepper noise
saluta
sample covariance matrix
sampled data control systems
sampled data systems
sampled-data
sampled-data control
sampled-data systems
USE
sampled data systems
sampling period
sar adc
sar data
sar image
USE
sar images
sar image segmentation
sar imagery
USE
sar images
sar images
sar imaging
sar interferometry
sar sensors
sar system
sat
sat instances
sat problems
sat solvers
sat-solving
satellite antennas
satellite communication
USE
satellite communications
satellite communication systems
satellite communications
satellite constellations
satellite ground stations
satellite links
satellite navigation
USE
satellite navigation systems
satellite navigation aids
satellite navigation system
USE
satellite navigation systems
satellite navigation systems
satellite network
satellite networks
USE
satellite network
satellite relay systems
satellite system
satellite systems
USE
satellite system
satisfiability
satisfiability modulo theories
satisfiability problem
USE
satisfiability problems
satisfiability problems
satisfying assignments
saturable absorbers
save energy
saving energy
USE
save energy
saw
USE
surface acoustic waves
sbar
sc-fde
sc-fdma
scada
scada systems
scalable coding
scalable video
scalable video coding
scalable video coding (svc)
USE
scalable video coding
scalable video streaming
scalar multiplication
scalar quantization
scalar quantizers
scale factor
scale invariant
scale invariant feature transform
USE
scale invariant feature transforms
scale invariant feature transform (sift)
USE
scale invariant feature transforms
scale invariant feature transforms
scale parameter
scale-free
scaling function
USE
scaling functions
scaling functions
scan chain
scatter matrix
scatter search
scattered field
scattering mechanisms
scattering problems
scatternet
scatterometer
USE
scatterometers
scatterometers
scene text
scene understanding
scene-based
schedulability
USE
schedulability analysis
schedulability analysis
schedulability test
scheduling tasks
schema integration
schema mapping
USE
schema mappings
schema mappings
schema matching
scholarly communication
school admission criteria
schools, pharmacy
schur complement
scientific applications
scientific computing
scientific data
scientific visualization
scientific visualizations
USE
scientific visualization
scintillation index
score function
score normalization
score-level fusion
scorm
screen reader
USE
screen readers
screen readers
screw theory
scripting languages
scrum
sctp
sdm
sdma
sdr
sea clutter
USE
sea clutters
sea clutters
sea state
sea surface height
sea trial
seamless handover
seamless mobility
search behavior
search engine
USE
search engines
search engines
search patterns
search process
search queries
search range
search sessions
search tasks
searchable encryption
second harmonic generation
second harmonics
second order sliding modes
second order statistics
second-harmonic generation
USE
second harmonic generation
second-order cone programming
second-order sliding-mode control
second-order statistics
USE
second order statistics
secondary mirror
secondary networks
secondary paths
secondary system
secondary user
USE
secondary users
secondary users
secrecy capacity
secret data
USE
secret messages
secret image sharing
secret images
secret information
secret key
secret messages
secret sharing
secret sharing scheme
USE
secret sharing schemes
secret sharing schemes
secure communications
secure computation
secure group communication
USE
secure group communications
secure group communications
secure multi-party computation
secure multicast
USE
secure multicasts
secure multicasts
secure multiparty computation
USE
secure multi-party computation
secure software
security analysis
security and privacy
security and privacy issues
security architecture
security attacks
security attributes
security challenges
security controls
security engineering
security framework
USE
security frameworks
security frameworks
security issues
security level
USE
security analysis
security management
security mechanism
USE
security issues
security mechanisms
USE
security issues
security model
1
2
3
4
5
6
7
8
9
Next »