Current Search:  Research Repository (x) » * (x) » Thesis (x) » Computer science (x)

Search results

  • CSV Spreadsheet
(1 - 50 of 193)

Pages

Next Generation Performance Monitoring
Content Markup Language Design Principles
Context and Bio-Aware Mobile Applications
Context-Sensitive Semantic Segmentation
Probabilistic Context-Free Grammar Based Password Cracking
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Primitives and Schemes for Non-Atomic Information Authentication
Precomputed Global Illumination of Isosurfaces
Predator and Prey Alert System
Practical Opportunistic Routing in Wireless Mesh Networks
Performance Driven Optimization Tuning in Vista
Performance Gains Through Sensory Systems
Parameter Sensitive Feature Selection for Learning on Large Datasets
Parallel Random Number Generation
Parallel Similarity Join
Parallelization of Carbon Nanotube Based Composites
Paraid
Normal Estimation and Surface Reconstruction of Large Point Clouds
Numerical Simulations of NASA Research Instrumentation in Hurricane Environments
Plugging I/O Resource Leaks in General Purpose Real-Time Systems
Platforms for Hpjava
Making Recommendations for an Intelligent Video Channel
Mechanism for Tracking the Effects of Requirement Changes in Enterprise Software          Systems
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Per-File Full-Data-Path Secure Deletion for Electronic Storage
Metrics and Techniques to Guide Software Development
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Modernized Version of Visual Cryptography
Methods of Detecting Intrusions in Security Protocols
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
Descriptive Post Titles as Advance Organizer
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Detection Framework for Phishing Websites
Design, Implementation, and Evaluation of a Reliable Multicast Protocol for          Ethernet Switched Networks
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the          Ever-Growing Databases
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Detecting Spam Zombies by Monitoring Outgoing Messages
Coupled Subspace Analysis and PCA Variants
Core Monitors
Anonymous t-out-of-N Threshold Signature Schemes
Appearance-Based Classification and Recognition Using Spectral Histogram          Representations and Hierarchical Learning for OCA
Application Configurable Processors
Computational Models and Algorithms for Nucleosome Positioning
Computational Transformation Between Different Symbolic Representations of BK Products of Fuzzy Relations
Instruction Caching in Multithreading Processors Using Guarantees
Instant Approximate 1-Center on Road Networks via Embeddings
Interaction Design Patterns for Musical Applications
Internet Computing with Matlab
Interface for Collaborative Digital Forensics

Pages