You are here

Search results

Searching as anonymous (not verified)

231 items found in collection [showing 51 - 100]

Pages

  • CSV Spreadsheet
Protecting Cyberspace
Protecting Cyberspace
Using Social Media Data to Identify Health Risks
Using Social Media Data to Identify Health Risks
Automation of Email Analysis Using a Database
Automation of Email Analysis Using a Database
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Towards Automating the Establishment and Evolution of Software Traceability
Towards Automating the Establishment and Evolution of Software Traceability
Simple, Thread-Safe, Approximate Nearest Neighbor Algorithm
Simple, Thread-Safe, Approximate Nearest Neighbor Algorithm
Reducing the WCET of Applications on Low End Embedded Systems
Reducing the WCET of Applications on Low End Embedded Systems
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Core Monitors
Core Monitors
TIDR
TIDR
Crossing Reduction for Layered Hierarchical Graph Drawing
Crossing Reduction for Layered Hierarchical Graph Drawing
There and Back Again… a Datum's Tale
There and Back Again… a Datum's Tale
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic          Analysis
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic Analysis
Context and Bio-Aware Mobile Applications
Context and Bio-Aware Mobile Applications
Geographic Ad Hoc Routing with Anonymous Properties
Geographic Ad Hoc Routing with Anonymous Properties
Cyber Physical System Vulnerability Research
Cyber Physical System Vulnerability Research
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of          Guaranteed Services
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of Guaranteed Services
Community Search and Detection on Large Graphs
Community Search and Detection on Large Graphs
Modernized Version of Visual Cryptography
Modernized Version of Visual Cryptography
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Securing Systems by Vulnerability Mitigation and Adaptive Live Patching
Securing Systems by Vulnerability Mitigation and Adaptive Live Patching
Segmentation and Structure Determination in Electron Microscopy
Segmentation and Structure Determination in Electron Microscopy
Efficient XML Stream Processing and Searching
Efficient XML Stream Processing and Searching
Dependency Collapsing in Instruction-Level Parallel Architectures
Dependency Collapsing in Instruction-Level Parallel Architectures
Making Recommendations for an Intelligent Video Channel
Making Recommendations for an Intelligent Video Channel
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Automatic Empirical Techniques for Developing Efficient MPI Collective Communication Routines
Automatic Empirical Techniques for Developing Efficient MPI Collective Communication Routines
Case-Based Framework for Meta Intrusion Detection
Case-Based Framework for Meta Intrusion Detection
Scrambled Quasirandom Sequences and Their Applications
Scrambled Quasirandom Sequences and Their Applications
Interaction Design Patterns for Musical Applications
Interaction Design Patterns for Musical Applications
Indexing, Searching, and Mining Large-Scale Visualdata via Structured Vector Quantization
Indexing, Searching, and Mining Large-Scale Visualdata via Structured Vector Quantization
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
CC-MPI
CC-MPI
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Reuse of Personal Software Assets
Reuse of Personal Software Assets
Modeling and Comparison of Large-Scale Interconnect Designs
Modeling and Comparison of Large-Scale Interconnect Designs
Using De-Optimization to Re-Optimize Code
Using De-Optimization to Re-Optimize Code
Improving Processor Efficiency by Statically Pipelining Instructions
Improving Processor Efficiency by Statically Pipelining Instructions
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Design and Implementation of Scalable Parallel Random Number Generators Library 4.0
Time Series Analysis and Forecasting for Business Intelligence Applications
Time Series Analysis and Forecasting for Business Intelligence Applications
Testing Several Types of Random Number Generator
Testing Several Types of Random Number Generator
Early Detection of Alzheimer's Disease Based on Volume and Intensity Changes in MRI Images
Early Detection of Alzheimer's Disease Based on Volume and Intensity Changes in MRI Images
Customizable Learning Objects Metadata Authoring
Customizable Learning Objects Metadata Authoring
Comprehensive Study of Portability Bug Characteristics in Desktop and Android Applications
Comprehensive Study of Portability Bug Characteristics in Desktop and Android Applications
Object Recognition Using Rapid Classification Trees
Object Recognition Using Rapid Classification Trees
Experimental Approaches to Computational Geometric and Statistical Machine Translation Problems
Experimental Approaches to Computational Geometric and Statistical Machine Translation Problems
Urban Mobility Models for Vehicular Ad Hoc Networks
Urban Mobility Models for Vehicular Ad Hoc Networks
Efficient Learning of Optimal Linear Representations for Object Classification
Efficient Learning of Optimal Linear Representations for Object Classification
Towards Efficient Compilation of the HPjava Language for High Performance Computing
Towards Efficient Compilation of the HPjava Language for High Performance Computing

Pages