You are here

Search results

Searching as anonymous (not verified)

231 items found in collection [showing 101 - 150]

Pages

  • CSV Spreadsheet
Plugging I/O Resource Leaks in General Purpose Real-Time Systems
Plugging I/O Resource Leaks in General Purpose Real-Time Systems
Topology Aware Routing Techniques for Next Generation Interconnect Networks
Topology Aware Routing Techniques for Next Generation Interconnect Networks
Sensor Systems and Signal Processing Algorithms for Wireless Applications
Sensor Systems and Signal Processing Algorithms for Wireless Applications
Instant Approximate 1-Center on Road Networks via Embeddings
Instant Approximate 1-Center on Road Networks via Embeddings
Techniques to Reduce Data Cache Access Energy Usage and Load Delay Hazards
Techniques to Reduce Data Cache Access Energy Usage and Load Delay Hazards
Evaluation of a Benchmark Suite Exposing Android System Complexities Using Region-Based Caching
Evaluation of a Benchmark Suite Exposing Android System Complexities Using Region-Based Caching
Machine Learning Approach for Generalizing Traffic Pattern-Based Adaptive Routing in Dragonfly Networks
Machine Learning Approach for Generalizing Traffic Pattern-Based Adaptive Routing in Dragonfly Networks
Information Hiding
Information Hiding
Using a Specialized Grammar to Generate Probable Passwords
Using a Specialized Grammar to Generate Probable Passwords
Cashtags
Cashtags
Effective Exploitation of a Large Data Register File
Effective Exploitation of a Large Data Register File
On Lid Allocation and Assignment in Infiniband Networks
On Lid Allocation and Assignment in Infiniband Networks
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting Spam Zombies by Monitoring Outgoing Messages
Enhancing Pattern Classification with Relational Fuzzy Neural Networks and Square          BK-Products
Enhancing Pattern Classification with Relational Fuzzy Neural Networks and Square BK-Products
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Tracing Faults in Mobile Ad Hoc Networks Using Symmetric Authentication Chains
Soft Error Event Monte Carlo Modeling and Simulation
Soft Error Event Monte Carlo Modeling and Simulation
Grid Computing Infrastructure for Monte Carlo Applications
Grid Computing Infrastructure for Monte Carlo Applications
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Music Recommendation and Classification Utilizing Machine Learning and Clustering Methods
Exploring Novel Burst Buffer Management on Extreme-Scale HPC Systems
Exploring Novel Burst Buffer Management on Extreme-Scale HPC Systems
Design, Implementation, and Evaluation of a Reliable Multicast Protocol for          Ethernet Switched Networks
Design, Implementation, and Evaluation of a Reliable Multicast Protocol for Ethernet Switched Networks
Towards Ubiquitous Sensing Using Commodity WiFi
Towards Ubiquitous Sensing Using Commodity WiFi
Parallel Random Number Generation
Parallel Random Number Generation
Routing Algorithms for the Emerging Topologies in HPC and Data Center Networks
Routing Algorithms for the Emerging Topologies in HPC and Data Center Networks
On Exactitude in Geographic Information Science
On Exactitude in Geographic Information Science
Enhancing Anonymity of Anonymous P2P Content Sharing Systems
Enhancing Anonymity of Anonymous P2P Content Sharing Systems
Botnets, a Threat to National Security
Botnets, a Threat to National Security
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Mobile Agent Protection with Data Encapsulation and Execution Tracing
Enabling Efficient Big Data Services on HPC Systems with SHMEM-Based Programming Stack
Enabling Efficient Big Data Services on HPC Systems with SHMEM-Based Programming Stack
Exploration of the Spectral Histogram Representation for Face Detection
Exploration of the Spectral Histogram Representation for Face Detection
Computational Transformation Between Different Symbolic Representations of BK Products of Fuzzy Relations
Computational Transformation Between Different Symbolic Representations of BK Products of Fuzzy Relations
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Dynamic Load Balancing for Peta-Scale Quantum Monte Carlo Applications
Fire Ant
Fire Ant
Reducing the Cost of Comparisons within Conditional Transfers of Control
Reducing the Cost of Comparisons within Conditional Transfers of Control
Automated Face Tracking and Recognition
Automated Face Tracking and Recognition
Small Discrete Fourier Transforms on Graphics Processors
Small Discrete Fourier Transforms on Graphics Processors
There & Never Back Again
There & Never Back Again
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
Optimizing MPI Point-to-Point Communication Performance on RDMA-Enabled SMP-CMP Clusters
Optimizing MPI Point-to-Point Communication Performance on RDMA-Enabled SMP-CMP Clusters
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Multiagent Dynamic Reasoning About Belief and Trust
Multiagent Dynamic Reasoning About Belief and Trust
Representation of Association Semantics with Annotations in a Biodiversity          Informatics System
Representation of Association Semantics with Annotations in a Biodiversity Informatics System
Future of Android with Liquid Development
Future of Android with Liquid Development
System Architecture That Facilitates Collaboration via Handheld Devices (PDAS)
System Architecture That Facilitates Collaboration via Handheld Devices (PDAS)
Algorithms for Solving Near Point Problems
Algorithms for Solving Near Point Problems
Tagless Access Buffer
Tagless Access Buffer
Hybrid Keyword Search Across Peer-to-Peer Federated Data
Hybrid Keyword Search Across Peer-to-Peer Federated Data
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control          Layer
Improving the Performance of Wireless Networks with Ubiquitously Compatible Solutions in the Medium Access Control Layer
Three-Dimensional Scene Estimation from Monocular Videos with Applications in Video Analysis
Three-Dimensional Scene Estimation from Monocular Videos with Applications in Video Analysis

Pages