You are here

Search results

Searching as anonymous (not verified)

227 items found in collection [showing 1 - 50]

Pages

  • CSV Spreadsheet
Effective and Efficient Approach for Clusterability Evaluation
Effective and Efficient Approach for Clusterability Evaluation
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Deep
Deep
Building Trusted Computer Systems via Unified Software Integrity Protection
Building Trusted Computer Systems via Unified Software Integrity Protection
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
F-Table
F-Table
Sparse Representations for Recognition
Sparse Representations for Recognition
Android Benchmarking for Architectural Research
Android Benchmarking for Architectural Research
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Improving Processor Efficiency Through Enhanced Instruction Fetch
Improving Processor Efficiency Through Enhanced Instruction Fetch
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
APECS
APECS
Towards Explainability in Machine Learning for Malware Detection
Towards Explainability in Machine Learning for Malware Detection
Enhanced Security for Mobile Agent Systems
Enhanced Security for Mobile Agent Systems
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Anonymous t-out-of-N Threshold Signature Schemes
Anonymous t-out-of-N Threshold Signature Schemes
Improving Monte Carlo Linear Solvers Through Better Iterative Processes
Improving Monte Carlo Linear Solvers Through Better Iterative Processes
Performance Driven Optimization Tuning in Vista
Performance Driven Optimization Tuning in Vista
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species
PPDA
PPDA
Appearance-Based Classification and Recognition Using Spectral Histogram          Representations and Hierarchical Learning for OCA
Appearance-Based Classification and Recognition Using Spectral Histogram Representations and Hierarchical Learning for OCA
Probabilistic Context-Free Grammar Based Password Cracking
Probabilistic Context-Free Grammar Based Password Cracking
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Dynamic, Perimeter Based, Community-Centric Access Control System
Dynamic, Perimeter Based, Community-Centric Access Control System
Normal Estimation and Surface Reconstruction of Large Point Clouds
Normal Estimation and Surface Reconstruction of Large Point Clouds
Acceleration Methods Forbayesian Network Sampling
Acceleration Methods Forbayesian Network Sampling
Trust Management in Mobile Wireless Networks
Trust Management in Mobile Wireless Networks
Time Parallelization Studies in Bio-Molecular Dynamics Simulations
Time Parallelization Studies in Bio-Molecular Dynamics Simulations
Tools in Support of Electronic Crime Investigations
Tools in Support of Electronic Crime Investigations
Improve the Interconnection Network Architecture for Future Supercomputers
Improve the Interconnection Network Architecture for Future Supercomputers
Graphical Visualization of Architectural Simulators
Graphical Visualization of Architectural Simulators
Effective Routing on Fat-Tree Topologies
Effective Routing on Fat-Tree Topologies
Geriatric Suite of Medical Applications for Android Powered Devices
Geriatric Suite of Medical Applications for Android Powered Devices
Expert System Ruleset Portability Using the Language Abstraction for Rule-Based          Knowledge Systems (LARK) Engine
Expert System Ruleset Portability Using the Language Abstraction for Rule-Based Knowledge Systems (LARK) Engine
Analyzing Password Strength & Efficient Password Cracking
Analyzing Password Strength & Efficient Password Cracking
Application Configurable Processors
Application Configurable Processors
Randomized Algorithms for Computing Low-Rank Matrix Approximation
Randomized Algorithms for Computing Low-Rank Matrix Approximation
BGP Anomalies Detection Based on Internet Numbers Allocation
BGP Anomalies Detection Based on Internet Numbers Allocation
Automated Empirical Optimization of High Performance Floating Point Kernels
Automated Empirical Optimization of High Performance Floating Point Kernels
Primitives and Schemes for Non-Atomic Information Authentication
Primitives and Schemes for Non-Atomic Information Authentication
Historical Study of the Development of Branch Predictors
Historical Study of the Development of Branch Predictors
SPRNG Gets a Normal Number Generator
SPRNG Gets a Normal Number Generator
Legally Resilient Signatures
Legally Resilient Signatures
Game Based Visual-to-Auditory Sensory Substitution Training
Game Based Visual-to-Auditory Sensory Substitution Training
Anemone
Anemone
Precomputed Global Illumination of Isosurfaces
Precomputed Global Illumination of Isosurfaces
Practical Opportunistic Routing in Wireless Mesh Networks
Practical Opportunistic Routing in Wireless Mesh Networks

Pages