You are here

Search results

Searching as anonymous (not verified)

267 items found in collection [showing 51 - 100]

Pages

  • CSV Spreadsheet
Legally Resilient Signatures
Legally Resilient Signatures
Game Based Visual-to-Auditory Sensory Substitution Training
Game Based Visual-to-Auditory Sensory Substitution Training
Anemone
Anemone
Precomputed Global Illumination of Isosurfaces
Precomputed Global Illumination of Isosurfaces
Practical Opportunistic Routing in Wireless Mesh Networks
Practical Opportunistic Routing in Wireless Mesh Networks
Protecting Cyberspace
Protecting Cyberspace
Using Social Media Data to Identify Health Risks
Using Social Media Data to Identify Health Risks
Methods of Detecting Intrusions in Security Protocols
Methods of Detecting Intrusions in Security Protocols
Towards Automating the Establishment and Evolution of Software Traceability
Towards Automating the Establishment and Evolution of Software Traceability
Reduced Order Modeling for a Nonlocal Approach to Anomalous Diffusion Problems
Reduced Order Modeling for a Nonlocal Approach to Anomalous Diffusion Problems
Simple, Thread-Safe, Approximate Nearest Neighbor Algorithm
Simple, Thread-Safe, Approximate Nearest Neighbor Algorithm
Reducing the WCET of Applications on Low End Embedded Systems
Reducing the WCET of Applications on Low End Embedded Systems
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Modular Data Pipelining Architecture (MDPA) for Enabling Universal Accessibility in P2P Grids
Core Monitors
Core Monitors
TIDR
TIDR
Crossing Reduction for Layered Hierarchical Graph Drawing
Crossing Reduction for Layered Hierarchical Graph Drawing
There and Back Again… a Datum's Tale
There and Back Again… a Datum's Tale
Natural Language Processing by Deep Neural Networks
Natural Language Processing by Deep Neural Networks
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic          Analysis
Leveraging Big Data and Machine Learning Technologies for Accurate and Scalable Genomic Analysis
Large-Scale Multi-Target Tracking Problem for Interacting Targets
Large-Scale Multi-Target Tracking Problem for Interacting Targets
Context and Bio-Aware Mobile Applications
Context and Bio-Aware Mobile Applications
Geographic Ad Hoc Routing with Anonymous Properties
Geographic Ad Hoc Routing with Anonymous Properties
Cyber Physical System Vulnerability Research
Cyber Physical System Vulnerability Research
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Using Probabilistic Techniques to Aid in Password Cracking Attacks
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of          Guaranteed Services
Bcq a Bin-Based Core Stateless Packet Scheduler for Scalable and Flexible Support of Guaranteed Services
Community Search and Detection on Large Graphs
Community Search and Detection on Large Graphs
Modernized Version of Visual Cryptography
Modernized Version of Visual Cryptography
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Accuracy and Fairness in Dead Reckoning Based Distributed Multiplayer Games
Securing Systems by Vulnerability Mitigation and Adaptive Live Patching
Securing Systems by Vulnerability Mitigation and Adaptive Live Patching
Segmentation and Structure Determination in Electron Microscopy
Segmentation and Structure Determination in Electron Microscopy
Efficient XML Stream Processing and Searching
Efficient XML Stream Processing and Searching
Dependency Collapsing in Instruction-Level Parallel Architectures
Dependency Collapsing in Instruction-Level Parallel Architectures
Making Recommendations for an Intelligent Video Channel
Making Recommendations for an Intelligent Video Channel
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Wbridge Routing with Minimal Control Messages in Multi-Hop Wireless Ad-Hoc Networks
Automatic Empirical Techniques for Developing Efficient MPI Collective Communication Routines
Automatic Empirical Techniques for Developing Efficient MPI Collective Communication Routines
Case-Based Framework for Meta Intrusion Detection
Case-Based Framework for Meta Intrusion Detection
Scrambled Quasirandom Sequences and Their Applications
Scrambled Quasirandom Sequences and Their Applications
Parameter Sensitive Feature Selection for Learning on Large Datasets
Parameter Sensitive Feature Selection for Learning on Large Datasets
Coupled Subspace Analysis and PCA Variants
Coupled Subspace Analysis and PCA Variants
Interaction Design Patterns for Musical Applications
Interaction Design Patterns for Musical Applications
Indexing, Searching, and Mining Large-Scale Visualdata via Structured Vector Quantization
Indexing, Searching, and Mining Large-Scale Visualdata via Structured Vector Quantization
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
Behind-the-Scenes Story on Applying Cross-Layer Coordination to Disks and Raids
Using Deal.II to Solve Problems in Computational Fluid Dynamics
Using Deal.II to Solve Problems in Computational Fluid Dynamics
CC-MPI
CC-MPI
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation
Reuse of Personal Software Assets
Reuse of Personal Software Assets
Modeling and Comparison of Large-Scale Interconnect Designs
Modeling and Comparison of Large-Scale Interconnect Designs
Using De-Optimization to Re-Optimize Code
Using De-Optimization to Re-Optimize Code
Improving Processor Efficiency by Statically Pipelining Instructions
Improving Processor Efficiency by Statically Pipelining Instructions
Realtime Computing with the Parareal Algorithm
Realtime Computing with the Parareal Algorithm

Pages