Current Search:  Heritage Protocol & University Archives, Florida State University Libraries, Tallahassee, Florida. (x) » Department of Computer Science (x)

Search results

  • CSV Spreadsheet
(1 - 50 of 187)

Pages

Acceleration Methods Forbayesian Network Sampling
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Algorithms for Solving Near Point Problems
Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery
Analyzing Password Strength & Efficient Password Cracking
Android Benchmarking for Architectural Research
Anemone
Anonymous t-out-of-N Threshold Signature Schemes
APECS
Appearance-Based Classification and Recognition Using Spectral Histogram          Representations and Hierarchical Learning for OCA
Application Configurable Processors
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Automated Empirical Optimization of High Performance Floating Point Kernels
Automated Face Tracking and Recognition
Automatic Empirical Techniques for Developing Efficient MPI Collective Communication Routines
Automation of Email Analysis Using a Database
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of          Guaranteed Services
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
BGP Anomalies Detection Based on Internet Numbers Allocation
Block Incremental Algorithm for Computing Dominant Singular Subspaces
Botnets, a Threat to National Security
Building an Intelligent Assistant for Digital Forensics
Building Trusted Computer Systems via Unified Software Integrity Protection
Case-Based Framework for Meta Intrusion Detection
Cashtags
CC-MPI
College of Arts and Sciences Application of Sampling-Based Model Predictive Control to Motion Planning for Robotic          Manipulators
Community Search and Detection on Large Graphs
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Computational Models and Algorithms for Nucleosome Positioning
Computational Transformation Between Different Symbolic Representations of BK Products of Fuzzy Relations
Content Markup Language Design Principles
Context and Bio-Aware Mobile Applications
Context-Sensitive Semantic Segmentation
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Core Monitors
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
Crossing Reduction for Layered Hierarchical Graph Drawing
Customizable Learning Objects Metadata Authoring
Cyber Physical System Vulnerability Research
Deconstruction and Analysis of Email Messages
Dependency Collapsing in Instruction-Level Parallel Architectures
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
Design, Implementation, and Evaluation of a Reliable Multicast Protocol for          Ethernet Switched Networks
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Detecting Spam Zombies by Monitoring Outgoing Messages
Detection Framework for Phishing Websites
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the          Ever-Growing Databases
Discriminative Algorithms for Large-Scale Image Steganalysis and Their Limitations

Pages