Current Search:   Department of Computer Science (x)

Search results

  • CSV Spreadsheet
(1 - 50 of 278)

Pages

Internet-Based Interface For Database Management System
Utilizing Cutting-Edge Computational Biology Methods in the Genomic Analysis of Florida Endangered Species
Spatial-Temporal Deep Neural Networks for Land Use Classification of LandSat Images
Pyquery
Trueerase
Core Monitors
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Comparative Study between a Single Sorption Constant Model and a Humic Ion Binding Model
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Appearance-Based Classification and Recognition Using Spectral Histogram          Representations and Hierarchical Learning for OCA
Topology Aggregation for Networks with Two Additive Metrics
Detection Framework for Phishing Websites
Time Parallelization Studies in Bio-Molecular Dynamics Simulations
Testing Several Types of Random Number Generator
Performance Driven Optimization Tuning in Vista
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations
Quantifying Temporal and Spatial Localities in Storage Workloads and Transformations by Data Path Components
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Small Discrete Fourier Transforms on Graphics Processors
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
F-Table
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Study of Image Representations for Content-Based Image Retrieval
On Lid Allocation and Assignment in Infiniband Networks
Historical Study of the Development of Branch Predictors
Crossing Reduction for Layered Hierarchical Graph Drawing
Latency Reduction Techniques for Remote Memory Access in Anemone
Electronic Voting
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Sparse Representations for Recognition
Detecting Spam Zombies by Monitoring Outgoing Messages
End-to-End Approachesfor Ethernet Switch Level Topology Discovery
Dependency Collapsing in Instruction-Level Parallel Architectures
Comprehensive Study of Portability Bug Characteristics in Desktop and Android Applications
Deep
Enhancing Infiniband with Openflow-Style SDN Capability
There & Never Back Again
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Tagless Access Buffer
MAR
Examination of Dynamic Gene Expression Changes in the Mouse Brain During Pregnancy and the Postpartum Period.
Plugging I/O Resource Leaks in General Purpose Real-Time Systems
Probabilistic Context-Free Grammar Based Password Cracking
Context-Sensitive Semantic Segmentation
Soft Error Event Monte Carlo Modeling and Simulation
Time Series Analysis and Forecasting for Business Intelligence Applications
Building Tools for Forensic Analysis of Mobile and IoT Applications Using Selective Data Extraction
Dirac Cone in two dimensional bilayer graphene by intercalation with V, Nb, and Ta transition metals
Systematically generated two-qubit anyon braids
Numerical Simulation of Seawater Intrusion in a Well-Developed Costal Karstaquifer by Using VDFST-CFP Model

Pages