You are here

Search results:

Searching as anonymous (not verified)

212 items found in collection [showing 1 - 50]


  • CSV Spreadsheet
Automated Face Tracking and Recognition
Small Discrete Fourier Transforms on Graphics Processors
Optimizing MPI Point-to-Point Communication Performance on RDMA-Enabled SMP-CMP Clusters
Deconstruction and Analysis of Email Messages
Hybrid Keyword Search Across Peer-to-Peer Federated Data
Tagless Access Buffer
Understanding the Determining Factors and Their Cooperative Effects on Protein Folding
Design of a Low‐Cost Adaptive Question Answering System for Closed Domain Factoid Queries
There & Never Back Again
Representation of Association Semantics with Annotations in a Biodiversity          Informatics System
System Architecture That Facilitates Collaboration via Handheld Devices (PDAS)
Algorithms for Solving Near Point Problems
Parallelization of Carbon Nanotube Based Composites
Platforms for Hpjava
College of Arts and Sciences Application of Sampling-Based Model Predictive Control to Motion Planning for Robotic          Manipulators
Design, Implementation, and Evaluation of an Efficient Software Partial Packet Recovery System in 802.11 Wireless LANs
Multiagent Dynamic Reasoning About Belief and Trust
Feistel-Inspired Scrambling Improves the Quality of Linear Congruential Generators
Reflective, 3-Dimensional Behavior Tree Approach to Vehicle Autonomy
Study on Semantic Relation Representations in Neural Word Embeddings
Reducing the Cost of Comparisons within Conditional Transfers of Control
Metrics and Techniques to Guide Software Development
Contributions to Problems in Topology Control of Unmanned Aerial Systems
Improving Processor Efficiency Through Enhanced Instruction Fetch
Reducing Power Involved in Pipeline Scheduling Through the Use of an Incremental Hybrid Scheduler
Presentation and Low-Level Energy Usage Analysis of Two Low-Power Architectural Techniques
Building Trusted Computer Systems via Unified Software Integrity Protection
Evaluating Urban Deployment Scenarios for Vehicular Wireless Networks
Fire Ant
Enhanced Security for Mobile Agent Systems
Android Benchmarking for Architectural Research
Preventing Cyber-Induced Irreversible Physical Damage to Cyber-Physical Systems
Effective and Efficient Approach for Clusterability Evaluation
Authority Distribution in a Proxy-Based Massively Multiplayer Game Architecture
Sparse Representations for Recognition
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
Content Markup Language Design Principles
TuLiP, a Teacher's Tool for Lesson Planning
Three-Dimensional Scene Estimation from Monocular Videos with Applications in Video Analysis
Group Key Generation in Ad Hoc Wireless Networks Using a Subgroup Method
Parallel Similarity Join
Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques
Anonymous t-out-of-N Threshold Signature Schemes
Developing a Bioinformatics Utility Belt to Eliminate Search Redundancy from the          Ever-Growing Databases
Methods for Linear and Nonlinear Array Data Dependence Analysis with the Chains of Recurrences Algebra
Creation and Modification of Models of Nucleosome Occupancy and Their Applications Across Multiple Species