Fingerprint The Elsevier Fingerprint Engine mines the text of the experts' scholarly documents - publication abstracts, awards, project summaries, patents, and other sources – to create an index of weighted terms which defines the text, known as a Fingerprint. By aggregating and comparing Fingerprints, the Elsevier Fingerprint Engine enables users to look beyond metadata and expose valuable connections among people, research units, publications, and ideas.

Engineering & Materials Science

Controllers
Data storage equipment
Communication
Hardware
Semantics
Costs
Sensors
Network protocols
Scheduling
Feedback
Bandwidth
Experiments
Sensor networks
Specifications
Quality of service
Trajectories
Internet
Servers
Testing
Monitoring
Dynamical systems
Topology
Model checking
Antennas
Throughput
Processing
Wireless networks
Robots
Imaging techniques
Sampling
Synchronization
Control systems
Availability
Scalability
Testbeds
Recovery
Program processors
Parallel algorithms
Middleware
Networks (circuits)
Electric potential
Industry
Real time systems
Data mining
Access control
Field programmable gate arrays (FPGA)
Computer systems
Learning systems
Computer programming languages
Resource allocation
Wireless sensor networks
Fault tolerance
Visualization
Ubiquitous computing
Linear systems
Agglomeration
Switches
Markov processes
Jamming
Cost functions
Decoding
Petri nets
Flow control
Statistics
Image reconstruction
Decision making
Nonlinear systems
Simulators
Unmanned aerial vehicles (UAV)
Planning
Websites
Detectors
Aircraft
Data structures
Magnetic resonance imaging
Systems analysis
Temporal logic
Energy efficiency
Mobile devices
Computer hardware
Transmitters
Feedback control
Decentralized control
Telecommunication networks
Engines
Collision avoidance
Labels
Motion planning
Intrusion detection
Learning algorithms
Software engineering
Computer programming
Large scale systems
Global positioning system
Hybrid systems
Routers
Redundancy
Clocks
Robotics
Decomposition

Mathematics

Maude
Game
Controller
Model
Rewriting Logic
Rewriting
Attack
Simulation
Decentralized
Real-time
Specification
Software
Model Checking
Vertex of a graph
Resources
Hardware
Modeling
Distributed Systems
Logic
Sensor
Costs
Demonstrate
Computing
Graph in graph theory
Output
Nash Equilibrium
Mining
Compiler
Framework
Concurrent
Safety
Modulo
Optimization
Trace
Evaluation
Optimal Control
Synthesis
Design
Termination
Scheduling
Monitoring
High Performance
Reasoning
Dependability
Trajectory
Path
Reachability
Automata
Distributed Algorithms
Formal Analysis
Fault
Methodology
Traffic
Concurrent Systems
Requirements
Discrete-time
Hybrid Systems
Programming Languages
Social Networks
Sensing
State Space
Sensor Networks
Trade-offs
Middleware
Interaction
Invariant
Hybrid Automata
Equational Logic
Receiver
Voltage
Programming
Java
Unknown
Control System
Axioms
Formulation
Target
Evaluate
Disturbance
Differential Games
Energy
Cost Function
Dynamic Games
Minimise
Runtime Verification
Thread
Uncertainty
Testing
Synchronization
Workload
Robot
Configuration
Infrastructure